941 resultados para Communication channel


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Brain-computer interfaces (BCI) have the potential to restore communication or control abilities in individuals with severe neuromuscular limitations, such as those with amyotrophic lateral sclerosis (ALS). The role of a BCI is to extract and decode relevant information that conveys a user's intent directly from brain electro-physiological signals and translate this information into executable commands to control external devices. However, the BCI decision-making process is error-prone due to noisy electro-physiological data, representing the classic problem of efficiently transmitting and receiving information via a noisy communication channel.

This research focuses on P300-based BCIs which rely predominantly on event-related potentials (ERP) that are elicited as a function of a user's uncertainty regarding stimulus events, in either an acoustic or a visual oddball recognition task. The P300-based BCI system enables users to communicate messages from a set of choices by selecting a target character or icon that conveys a desired intent or action. P300-based BCIs have been widely researched as a communication alternative, especially in individuals with ALS who represent a target BCI user population. For the P300-based BCI, repeated data measurements are required to enhance the low signal-to-noise ratio of the elicited ERPs embedded in electroencephalography (EEG) data, in order to improve the accuracy of the target character estimation process. As a result, BCIs have relatively slower speeds when compared to other commercial assistive communication devices, and this limits BCI adoption by their target user population. The goal of this research is to develop algorithms that take into account the physical limitations of the target BCI population to improve the efficiency of ERP-based spellers for real-world communication.

In this work, it is hypothesised that building adaptive capabilities into the BCI framework can potentially give the BCI system the flexibility to improve performance by adjusting system parameters in response to changing user inputs. The research in this work addresses three potential areas for improvement within the P300 speller framework: information optimisation, target character estimation and error correction. The visual interface and its operation control the method by which the ERPs are elicited through the presentation of stimulus events. The parameters of the stimulus presentation paradigm can be modified to modulate and enhance the elicited ERPs. A new stimulus presentation paradigm is developed in order to maximise the information content that is presented to the user by tuning stimulus paradigm parameters to positively affect performance. Internally, the BCI system determines the amount of data to collect and the method by which these data are processed to estimate the user's target character. Algorithms that exploit language information are developed to enhance the target character estimation process and to correct erroneous BCI selections. In addition, a new model-based method to predict BCI performance is developed, an approach which is independent of stimulus presentation paradigm and accounts for dynamic data collection. The studies presented in this work provide evidence that the proposed methods for incorporating adaptive strategies in the three areas have the potential to significantly improve BCI communication rates, and the proposed method for predicting BCI performance provides a reliable means to pre-assess BCI performance without extensive online testing.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile devices and smartphones have become a significant communication channel for everyday life. The sensing capabilities of mobile devices are expanding rapidly, and sensors embedded in these devices are cheaper and more powerful than before. It is evident that mobile devices have become the most suitable candidates to sense contextual information without needing extra tools. However, current research shows only a limited number of sensors are being explored and investigated. As a result, it still needs to be clarified what forms of contextual information extracted from mo- bile sensors are useful. Therefore, this research investigates the context sensing using current mobile sensors, the study follows experimental methods and sensor data is evaluated and synthesised, in order to deduce the value of various sensors and combinations of sensor for the use in context-aware mobile applications. This study aims to develop a context fusion framework that will enhance the context-awareness on mobile applications, as well as exploring innovative techniques for context sensing on smartphone devices.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Vehicular accidents are one of the deadliest safety hazards and accordingly an immense concern of individuals and governments. Although, a wide range of active autonomous safety systems, such as advanced driving assistance and lane keeping support, are introduced to facilitate safer driving experience, these stand-alone systems have limited capabilities in providing safety. Therefore, cooperative vehicular systems were proposed to fulfill more safety requirements. Most cooperative vehicle-to-vehicle safety applications require relative positioning accuracy of decimeter level with an update rate of at least 10 Hz. These requirements cannot be met via direct navigation or differential positioning techniques. This paper studies a cooperative vehicle platform that aims to facilitate real-time relative positioning (RRP) among adjacent vehicles. The developed system is capable of exchanging both GPS position solutions and raw observations using RTCM-104 format over vehicular dedicated short range communication (DSRC) links. Real-time kinematic (RTK) positioning technique is integrated into the system to enable RRP to be served as an embedded real-time warning system. The 5.9 GHz DSRC technology is adopted as the communication channel among road-side units (RSUs) and on-board units (OBUs) to distribute GPS corrections data received from a nearby reference station via the Internet using cellular technologies, by means of RSUs, as well as to exchange the vehicular real-time GPS raw observation data. Ultimately, each receiving vehicle calculates relative positions of its neighbors to attain a RRP map. A series of real-world data collection experiments was conducted to explore the synergies of both DSRC and positioning systems. The results demonstrate a significant enhancement in precision and availability of relative positioning at mobile vehicles.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Recent natural disasters such as the Haitian earthquake 2011, the South East Queensland floods 2011, the Japanese earthquake and tsunami 2011 and Hurricane Sandy in the United States of America in 2012, have seen social media platforms changing the face of emergency management communications, not only in times of crisis and also during business-as-usual operations. With social media being such an important and powerful communication tool, especially for emergency management organisations, the question arises as to whether the use of social media in these organisations emerged by considered strategic design or more as a reactive response to a new and popular communication channel. This paper provides insight into how the social media function has been positioned, staffed and managed in organisations throughout the world, with a particular focus on how these factors influence the style of communication used on social media platforms. This study has identified that the social media function falls on a continuum between two polarised models, namely the authoritative one-way communication approach and the more interactive approach that seeks to network and engage with the community through multi-way communication. Factors such the size of the organisation; dedicated resourcing of the social media function; organisational culture and mission statement; the presence of a social media champion within the organisation; management style and knowledge about social media play a key role in determining where on the continuum organisations sit in relation to their social media capability. This review, together with a forthcoming survey of Australian emergency management organisations and local governments, will fill a gap in the current body of knowledge about the evolution, positioning and usage of social media in organisations working in the emergency management field in Australia. These findings will be fed back to Industry for potential inclusion in future strategies and practices.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Virtual working environments are intrinsic to the contemporary workplace and collaborative skills are a vital graduate capability. To develop students’ collaborative skills, first year medical laboratory science students undertake a group poster project, based on a blended learning model. Learning is scaffolded in lectures, workshops in collaborative learning spaces, practitioner mentoring sessions, and online resources. Google Drive provides an online collaborative space for students to realise tangible outcomes from this learning. A Google Drive document is created for each group and shared with members. In this space, students assign tasks and plan workflow, share research, progressively develop poster content, reflect and comment on peer contributions and use the messaging functions to ‘talk’ to group members. This provides a readily accessible, transparent record of group work, crucial in peer assessment, and a communication channel for group members and the lecturer, who can support groups if required. This knowledge creation space also augments productivity and effectiveness of face-to-face collaboration. As members are randomly allocated to groups and are often of diverse backgrounds and unknown to each other, resilience is built as students navigate the uncertainties and complexities of group dynamics, learning to focus on the goal of the team task as they constructively and professionally engage in team dialogue. Students are responsible and accountable for individual and group work. The use of Google Drive was evaluated in a survey including Likert scale and open ended qualitative questions. Statistical analysis was carried out. Results show students (79%) valued the inclusion of online space in collaborative work and highly appreciated (78%) the flexibility provided by Google Drive, while recognising the need for improved notification functionality. Teaching staff recognised the advantages in monitoring and moderating collaborative group work, and the transformational progression in student collaborative as well as technological skill acquisition, including professional dialogue.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tanner Graph representation of linear block codes is widely used by iterative decoding algorithms for recovering data transmitted across a noisy communication channel from errors and erasures introduced by the channel. The stopping distance of a Tanner graph T for a binary linear block code C determines the number of erasures correctable using iterative decoding on the Tanner graph T when data is transmitted across a binary erasure channel using the code C. We show that the problem of finding the stopping distance of a Tanner graph is hard to approximate within any positive constant approximation ratio in polynomial time unless P = NP. It is also shown as a consequence that there can be no approximation algorithm for the problem achieving an approximation ratio of 2(log n)(1-epsilon) for any epsilon > 0 unless NP subset of DTIME(n(poly(log n))).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examines the interaction between inhabitants and urban planning. In addition to traditional methods of participation there can be seen an increasing need to find new channels and means to influence on one´s environment. Hearing of inhabitants during planning is hoped to decrease the amount of claims and this way to speed up the planning process. Discussion that emphasizes competitiveness and innovativeness in planning has brought out the role of inhabitants as selective consumers and end users. This extension of civil perspective completes the thought of participation in city planning and adds the pressure on developing the interaction and user orientation. The aim of the study is to point out the present situation of inhabitant´s participation and influencing in Helsinki. Helsinki City Planning Department opened a new information and exhibiotion hall called Laituri in 2008. Laituri provides the latest information about planning projects in Helsinki and temporary exhibitions as well as it operates as communication channel and information point for the department. In this study Laituri is examined as a case study of interaction between citizen and planner. The study is divided into two principal themes. The aim is to research action and interactivity at Laituri from the inhabitants´and planners´point of view. The qualitative study has inquiries, interview surveys and observation as research methods. Empiricial data of the study consists of three parts which complement each other: Laituri operational reseach, inquiry directed to the members of Laituri team and interviews of three experts. The aim is to find answers to questions like, does Laituri reach the citizens and will the opportunities to participate improve along Laituri. The study examines also how the local knowledge of inhabitants will come across to planners and further to planning. The study combines discussions of inhabitants´ influencing in Finnish society and science community. Cornerstones of the study are inhabitant participation, interaction and local knowledge in urban planning. The theory behind the study is communicative planning theory. In addition the theory consists of key concepts. The study introduces a concept of Inhabitant´s Helsinki, which reflects the inhabitant as customer-citizen who is an active product developer in participative urban planning. According to the research results the experts of Laituri and majority of inhabitants in Helsinki experience that the inhabitant´s possibilities to participate will improve along Laituri. However half of the citizens in Helsinki believe that local knowledge and ideas will only have minor impact on the final plan. According to city dwellers the present practise used by Helsinki City Planning Department supports only partially adequate interaction. The experts of Laituri experience that the role of Laituri is first of all forum of communication and discussion channel instead of effective local data collector. Based on the results the study introduces a model of inhabitant´s participation field. According to the model Laituri can be seen as phenomenom in Helsinki urban planning which has the elements of network municipality. The planner is more like diplomatic trend-setter and visionary. The inhabitant of Helsinki is an expert in city living and participative producer of local knowledge. Participation methods are increasingly segmented and tailored in every plan and project. The study argues that Inhabitant´s Helsinki is a pluralistic milieu in constant pressure for change. Therefore reaching the everyday life experiencies of inhabintants should be at higher degree in Helsinki City Planning Department´s operations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider information theoretic secret key (SK) agreement and secure function computation by multiple parties observing correlated data, with access to an interactive public communication channel. Our main result is an upper bound on the SK length, which is derived using a reduction of binary hypothesis testing to multiparty SK agreement. Building on this basic result, we derive new converses for multiparty SK agreement. Furthermore, we derive converse results for the oblivious transfer problem and the bit commitment problem by relating them to SK agreement. Finally, we derive a necessary condition for the feasibility of secure computation by trusted parties that seek to compute a function of their collective data, using an interactive public communication that by itself does not give away the value of the function. In many cases, we strengthen and improve upon previously known converse bounds. Our results are single-shot and use only the given joint distribution of the correlated observations. For the case when the correlated observations consist of independent and identically distributed (in time) sequences, we derive strong versions of previously known converses.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The characteristics of media in communication channel are analyzed briefly and the reasonable optical parameters of media are adopted. With certain communication system parameters the temporal and spatial distributions of the received signal from submerged platform are simulated using Monte Carlo method. The upper limit of the ratio of Monte Carlo estimated error to averaged value is about 0.3%. From the simulated results, the optimized sampling timing of receiver and field of view of telescope are obtained. Also the signal-to-noise ratio of the receiver is calculated. Based on this, the error probability of the communication system is deduced from laser pulse position modulation and maximum likelihood detection. The results show that under severe environment robust laser communication from a satellite to a submerged platform can be achieved.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

详细分析了蓝绿激光穿过大气海洋信道的信道效应和物理特性,利用理论分析和蒙特卡罗模拟方法完成对光信道仿真。介绍了大气海洋激光通信蒙特卡罗模拟方法及计算步骤。研究了不同厚度云层对光束投影面积的展宽,和光脉冲穿过不同深度海水后的空间分布和时域信号波形,讨论了其不同的展宽机理,并对信道的噪声分布进行了分析。发现云层对光脉冲展宽作用在云层厚度500 m时达到饱和,信号能量的随机起伏随海水深度的增加而增大,但能量分布的半峰全宽并不增加,大气海洋的综合信道效应可以用时延滤波器进行建模。