959 resultados para Communication protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. This book explores not only the iPhone’s particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone—as a symbol, culture and a set of material practices around contemporary convergent mobile media—the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Medical industries have brought Information Technology (IT) in their systems for both patients and medical staffs due to the numerous benefits of IT we experience at presently. Moreover, the Mobile healthcare (M-health) system has been developed as the first step of Ubiquitous Health Environment (UHE). With the mobility and multi-functions, M-health system will be able to provide more efficient and various services for both doctors and patients. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well implemented. In this paper, user authentication and authorization procedures will applied as a featured component at each level of M-health systems inthe hospital environment. Accordingly, M-health system in the hospital will meet the optimal requirements as a countermeasure to its vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Cooperative Collision Warning System (CCWS) is an active safety techno- logy for road vehicles that can potentially reduce traffic accidents. It provides a driver with situational awareness and early warnings of any possible colli- sions through an on-board unit. CCWS is still under active research, and one of the important technical problems is safety message dissemination. Safety messages are disseminated in a high-speed mobile environment using wireless communication technology such as Dedicated Short Range Communication (DSRC). The wireless communication in CCWS has a limited bandwidth and can become unreliable when used inefficiently, particularly given the dynamic nature of road traffic conditions. Unreliable communication may significantly reduce the performance of CCWS in preventing collisions. There are two types of safety messages: Routine Safety Messages (RSMs) and Event Safety Messages (ESMs). An RSM contains the up-to-date state of a vehicle, and it must be disseminated repeatedly to its neighbouring vehicles. An ESM is a warning message that must be sent to all the endangered vehi- cles. Existing RSM and ESM dissemination schemes are inefficient, unscalable, and unable to give priority to vehicles in the most danger. Thus, this study investigates more efficient and scalable RSM and ESM dissemination schemes that can make use of the context information generated from a particular traffic scenario. Therefore, this study tackles three technical research prob- lems, vehicular traffic scenario modelling and context information generation, context-aware RSM dissemination, and context-aware ESM dissemination. The most relevant context information in CCWS is the information about possible collisions among vehicles given a current vehicular traffic situation. To generate the context information, this study investigates techniques to model interactions among multiple vehicles based on their up-to-date motion state obtained via RSM. To date, there is no existing model that can represent interactions among multiple vehicles in a speciffic region and at a particular time. The major outcome from the first problem is a new interaction graph model that can be used to easily identify the endangered vehicles and their danger severity. By identifying the endangered vehicles, RSM and ESM dis- semination can be optimised while improving safety at the same time. The new model enables the development of context-aware RSM and ESM dissemination schemes. To disseminate RSM efficiently, this study investigates a context-aware dis- semination scheme that can optimise the RSM dissemination rate to improve safety in various vehicle densities. The major outcome from the second problem is a context-aware RSM dissemination protocol. The context-aware protocol can adaptively adjust the dissemination rate based on an estimated channel load and danger severity of vehicle interactions given by the interaction graph model. Unlike existing RSM dissemination schemes, the proposed adaptive scheme can reduce channel congestion and improve safety by prioritising ve- hicles that are most likely to crash with other vehicles. The proposed RSM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed RSM protocol outperforms existing pro- tocols in terms of efficiency, scalability and safety. To disseminate ESM efficiently, this study investigates a context-aware ESM dissemination scheme that can reduce unnecessary transmissions and deliver ESMs to endangered vehicles as fast as possible. The major outcome from the third problem is a context-aware ESM dissemination protocol that uses a multicast routing strategy. Existing ESM protocols use broadcast rout- ing, which is not efficient because ESMs may be sent to a large number of ve- hicles in the area. Using multicast routing improves efficiency because ESMs are sent only to the endangered vehicles. The endangered vehicles can be identified using the interaction graph model. The proposed ESM protocol has been implemented and evaluated by simulation. The simulation results have shown that the proposed ESM protocol can prevent potential accidents from occurring better than existing ESM protocols. The context model and the RSM and ESM dissemination protocols can be implemented in any CCWS development to improve the communication and safety performance of CCWS. In effect, the outcomes contribute to the realisation of CCWS that will ultimately improve road safety and save lives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two hundred and twelve Australian mothers completed an online survey examining features of mother-child communication about child sexual abuse prevention. Two-thirds (67.5%) of respondents had discussed child sexual abuse prevention with their children. Proportions of mothers talking with their children about child sexual abuse prevention varied according to age range (highest for mothers with children aged 5-12 years) and only child status (lowest for mothers of only children). The number of topics discussed with their children differed according to child gender (greater number of topics discussed by mothers with both girls and boys) and age range (greater number of topics discussed by mothers with children aged 5-12 years). These findings provide new insights into mother-child communication about child sexual abuse prevention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The tricky terrain of intercultural communication within the pressure-cooker environment of creating new performance work is explored through the experiences of five Australians working with 55 artists in Hanoi, Vietnam on a project called Through the Eyes of the Phoenix. Key cultural communication issues such as the concept of ‘face’, identity, translation, adaptability, ambiguity tolerance, empathy, enmeshment and the development of shared understandings are examined in relation to theories of high and low context cultures and individualist collectivist frameworks. The experiences of both Australian and Vietnamese artists are foregrounded, revealing the importance of other intercultural communication modes such as visual, kinaesthetic and tactile languages as well as the languages of their art forms. Immersion in social activities and the importance of the emotional domain are also highlighted as essential factors to survive and thrive in intense creative collaborations across cultures. These dance perspectives, embedded in practice, provide alternative contributions to the messy complexities of intercultural communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

My interest in producing this paper on Indigenous languages was borne out of conversations with and learnings from community members in the Torres Straits and those connected to the ‘Dream Circle’. Nakata (2003, p. 12) laments the situation whereby ‘teachers are transitionary and take their hard-earned knowledge with them when they leave’. I am thus responding to the call to add to the conversation in a productive albeit culturally loaded way. To re-iterate, I am neither Indigenous nor am I experienced in teaching and learning in these contexts. As problematic as these two points are, I am in many ways typical of the raft of inexperienced white Australian teachers assigned to positions in school contexts where Indigenous students are enrolled or in mainstream contexts with substantial populations of Indigenous students. By penning this article, it is neither my intention to contribute to the silencing of Indigenous educators or Indigenous communities. My intention is to articulate my teacherly reflections as they apply to the topic under discussion. The remainder of this paper is presented in three sections. The next section provides a brief overview of the number of Indigenous people and Indigenous languages in Australia and the role of English as a language of communication. The section which follows draws on theorisations from second/additional language acquisition to overview three different schools of thought about the consequences of English in the lives of Indigenous Australians. The paper concludes by considering the tensions for inexperienced white Australian teachers caught up in the fray.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Right-to-left shunting via a patent foramen ovale (PFO) has a recognized association with embolic events in younger patients. The use of agitated saline contrast imaging (ASCi) for detecting atrial shunting is well documented, however optimal technique is not well described. The purpose of this study is to assess the efficacy and safety of ASCi via TTE for assessment of right-to-left atrial communication in a large cohort of patients. Method: A retrospective review was undertaken of 1162 consecutive transthoracic (TTE) ASCi studies, of which 195 had also undergone clinically indicated transesophageal (TEE) echo. ASCi shunt results were compared with color flow imaging (CFI) and the role of provocative maneuvers (PM) assessed. Results: 403 TTE studies (35%) had paradoxical shunting seen during ASCi. Of these, 48% were positive with PM only. There was strong agreement between TTE ASCi and reported TEE findings (99% sensitivity, 85% specificity), with six false positive and two false negative results. In hindsight, the latter were likely due to suboptimal right atrial opacification, and the former due to transpulmonary shunting. TTE CFI was found to be insensitive (22%) for the detection of a PFO compared with TTE ASCi. Conclusions: TTE ASCi is minimally invasive and highly accurate for the detection of right-to-left atrial communication when PM are used. TTE CFI was found to be insensitive for PFO screening. It is recommended that TTE ASCi should be considered the initial diagnostic tool for the detection of PFO in clinical practice. A dedicated protocol should be followed to ensure adequate agitated saline contrast delivery and performance of provocative maneuvers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent management research has evidenced the significance of organizational social networks, and communication is believed to impact the interpersonal relationships. However, we have little knowledge on how communication affects organizational social networks. This paper studies the dynamics between organizational communication patterns and the growth of organizational social networks. We propose an organizational social network growth model, and then collect empirical data to test model validity. The simulation results agree well with the empirical data. The results of simulation experiments enrich our knowledge on communication with the findings that organizational management practices that discourage employees from communicating within and across group boundaries have disparate and significant negative effect on the social network’s density, scalar assortativity and discrete assortativity, each of which correlates with the organization’s performance. These findings also suggest concrete measures for management to construct and develop the organizational social network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article addresses the paucity of systematic data on graduate careers in the arts and humanities in the broader context of enduring public and policy debates about the benefits of education to society, the relation between public and private good that is derivable from education, and the specific disciplinary angle that can be brought to bear on these questions from media, cultural and communication studies. We report findings from a survey of ten years of graduates from Queensland University of Technology’s courses in media, cultural and communication studies which indicate very high employment levels and generally positive accounts of the relevance of courses to working life. A major insight that can be drawn from the research is that media, cultural and communication studies deliver capabilities, skills and orientations which are themselves strongly aligned with the kinds of transferable generic attributes which facilitate transition into the workplace.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article investigates the role of information communication technologies (ICTs) in establishing a well-aligned, authentic learning environment for a diverse cohort of non-cognate and cognate students studying event management in a higher education context. Based on a case study which examined the way ICTs assisted in accommodating diverse learning needs, styles and stages in an event management subject offered in the Creative Industries Faculty at Queensland University of Technology in Brisbane, Australia, the article uses an action research approach to generate grounded, empirical data on the effectiveness of the dynamic, individualised curriculum frameworks that the use of ICTs makes possible. The study provides insights into the way non-cognate and cognate students respond to different learning tools. It finds that whilst non-cognate and cognate students do respond to learning tools differently, due to a differing degree of emphasis on technical, task or theoretical competencies, the use of ICTs allows all students to improve their performance by providing multiple points of entry into the content. In this respect, whilst the article focuses on the way ICTs can be used to develop an authentic, well-aligned curriculum model that meets the needs of event management students in a higher education context, with findings relevant for event educators in Business, Hospitality, Tourism and Creative Industries, the strategies outlined may also be useful for educators in other fields who are faced with similar challenges when designing and developing curriculum for diverse cohorts.