868 resultados para Communication between software components
Resumo:
This study focuses on self-employed industrial designers and how they emerge new venture ideas. More specifically, this study strives to determine what design entrepreneurs do when they create new venture ideas, how venture ideas are nurtured into being, and how the processes are organized to bring such ideas to the market in the given industrial context. In contemporary times when the concern for the creative class is peaking, the research and business communities need more insight of the kind that this study provides, namely how professionals may contribute to their entrepreneurial processes and other agents’ business processes. On the one hand, the interviews underlying this study suggest that design entrepreneurs may act as reactive service providers who are appointed by producers or marketing parties to generate product-related ideas on their behalf. On the other hand, the interviews suggest that proactive behaviour that aims on generating own venture ideas, may force design entrepreneurs to take considerable responsibility in organizing their entrepreneurial processes. Another option is that they strive to bring venture ideas to the market in collaboration, or by passing these to other agents’ product development processes. Design entrepreneurs’ venture ideas typically emerge from design related starting points and observations. Product developers are mainly engaged with creating their own ideas, whereas service providers refer mainly to the development of other agents’ venture ideas. In contrast with design entrepreneurs, external actors commonly emphasize customer demand as their primary source for new venture ideas, as well as development of these in close interaction with available means of production and marketing. Consequently, design entrepreneurs need to address market demand since without sales their venture ideas may as well be classified as art. In case, they want to experiment with creative ideas, then there should be another source of income to support this typically uncertain and extensive process. Currently, it appears like a lot of good venture ideas and resources are being wasted, when venture ideas do not suite available production or business procedures. Sufficient communication between design entrepreneurs and other agents would assist all parties in developing production efficient and distributable venture ideas. Overall, the findings suggest that design entrepreneurs are often involved simultaneously in several processes that aim at emerging new product related ventures. Consequently, design entrepreneurship is conceptualized in this study as a dual process. This implies that design entrepreneurs can simultaneously be in charge of their entrepreneurial processes, as they operate as resources in other agents’ business processes. The interconnection between activities and agents suggests that these kinds of processes tend to be both complex and multifaceted to their nature.
Resumo:
In many applications of wireless ad hoc networks, wireless nodes are owned by rational and intelligent users. In this paper, we call nodes selfish if they are owned by independent users and their only objective is to maximize their individual goals. In such situations, it may not be possible to use the existing protocols for wireless ad hoc networks as these protocols assume that nodes follow the prescribed protocol without deviation. Stimulating cooperation among these nodes is an interesting and challenging problem. Providing incentives and pricing the transactions are well known approaches to stimulate cooperation. In this paper, we present a game theoretic framework for truthful broadcast protocol and strategy proof pricing mechanism called Immediate Predecessor Node Pricing Mechanism (IPNPM). The phrase strategy proof here means that truth revelation of cost is a weakly dominant-strategy (in game theoretic terms) for each node. In order to steer our mechanism-design approach towards practical implementation, we compute the payments to nodes using a distributed algorithm. We also propose a new protocol for broadcast in wireless ad hoc network with selfish nodes based on IPNPM. The features of the proposed broadcast protocol are reliability and a significantly reduced number of packet forwards compared to the number of network nodes, which in turn leads to less system-wide power consumption to broadcast a single packet. Our simulation results show the efficacy of the proposed broadcast protocol.
Resumo:
The IEEE 802.1le medium access control (MAC) standard provides distributed service differentiation or Quality-of- Service (QoS) by employing a priority system. In 802.1 le networks, network traffic is classified into different priorities or access categories (ACs). Nodes maintain separate queues for each AC and packets at the head-of-line (HOL) of each queue contend for channel access using AC-specific parameters. Such a mechanism allows the provision of differentiated QoS where high priority, performance sensitive traffic such as voice and video applications will enjoy less delay, greater throughput and smaller loss, compared to low priority traffic (e. g. file transfer). The standard implicitly assumes that nodes are honest and will truthfully classify incoming traffic into its appropriate AC. However, in the absence of any additional mechanism, selfish users can gain enhanced performance by selectively classifying low priority traffic as high priority, potentially destroying the QoS capability of the system.
Resumo:
The phase equilibrium studies of organic system, involving resorcinol (R) and p-dimethylaminobenzaldehyde (DMAB), reveal the formation of a 1:1 molecular complex with two eutectics. The heat of mixing, entropy of fusion, roughness parameter, interfacial energy, and the excess thermodynamic functions were calculated based on enthalpy of fusion data determined via differential scanning calorimetric (DSC) method. X-ray powder diffraction studies confirm that the eutectics are not simple mechanical mixture of the components under investigation. The spectroscopic investigations (IR and NMR) suggest the occurrence of hydrogen bonding between the components forming the molecular complex. The dielectric measurements, carried out on hot-pressed addition compound (molecular complex), show higher dielectric constant at 320 K than that of individual components. The microstructural investigations of eutectic and addition compound indicate dendritic and faceted morphological features. (C) 2000 Elsevier Science B.V. All rights reserved.
Resumo:
Frequency response analysis is critical in understanding the steady and transient state behavior of any electrical network. Network analyzeror frequency response analyzer is used to determine the frequency response of an electrical network. This paper deals with the design of an inexpensive digitally controlled Network Analyzer. The frequency range of the network analyzer is from 10Hz to 50kHz (suitable range for system studies on most power electronics apparatus). It is composed of a microcontroller (as central processing unit) and a personal computer (as analyzer and display). The communication between the microcontroller and personal computer is established through one of the USB ports. The testing and evaluation of the analyzer is done with RC, RLC and multi-resonant circuits. The design steps, basis of analysis, experimental results, limitation in bandwidth and possible techniques for improvement in performances are presented.
Resumo:
The management and coordination of business-process collaboration experiences changes because of globalization, specialization, and innovation. Service-oriented computing (SOC) is a means towards businessprocess automation and recently, many industry standards emerged to become part of the service-oriented architecture (SOA) stack. In a globalized world, organizations face new challenges for setting up and carrying out collaborations in semi-automating ecosystems for business services. For being efficient and effective, many companies express their services electronically in what we term business-process as a service (BPaaS). Companies then source BPaaS on the fly from third parties if they are not able to create all service-value inhouse because of reasons such as lack of reasoures, lack of know-how, cost- and time-reduction needs. Thus, a need emerges for BPaaS-HUBs that not only store service offers and requests together with information about their issuing organizations and assigned owners, but that also allow an evaluation of trust and reputation in an anonymized electronic service marketplace. In this paper, we analyze the requirements, design architecture and system behavior of such a BPaaS-HUB to enable a fast setup and enactment of business-process collaboration. Moving into a cloud-computing setting, the results of this paper allow system designers to quickly evaluate which services they need for instantiationg the BPaaS-HUB architecture. Furthermore, the results also show what the protocol of a backbone service bus is that allows a communication between services that implement the BPaaS-HUB. Finally, the paper analyzes where an instantiation must assign additional computing resources vor the avoidance of performance bottlenecks.
Resumo:
Human papillomaviruses (HPVs) are the causal agents of cervical cancer, which is the second most common cancer among women worldwide. Cellular transformation and carcinogenesis depend on the activities of viral E5, E6 and E7 proteins. Alterations in cell-cell contacts and in communication between epithelial cells take place during cervical carcinogenesis, leading to changes in cell morphology, increased cell motility and finally invasion. The aim of this thesis was to study genome-wide effects of the HPV type 16 (HPV-16) E5 protein on the expression of host cell messenger RNAs (mRNAs) and microRNAs by applying microarray technology. The results showed that the HPV-16 E5 protein alters several cellular pathways involved in cellular adhesion, motility and proliferation as well as in the extracellular matrix. The E5 protein was observed to enhance wound healing of epithelial cell monolayers by increasing cell motility in vivo. HPV-16 E5-induced alterations in the expression of cellular microRNAs and their target genes seem to favour increased proliferation and tumorigenesis. E5 was also shown to affect the expression of adherens junction proteins in HaCaT epithelial keratinocytes. In addition, a study of a membrane cytoskeletal cross-linker protein, ezrin, revealed that when activated, it localizes to adherens junctions. The results suggest that ezrin distribution to forming adherens junctions is due to Rac1 activity in epithelial cells. These studies reveal for the first time the holistic effects of HPV-16 E5 protein in promoting precancerous events in epithelial cells. The results contribute to identifyinging novel markers for cervical precancerous stages and to predicting disease behaviour.
Resumo:
Theoretical study of propagation characteristics of VLF electromagnetic waves through an idealised parallel-plane earth-crust waveguide with overburden, experimental verification of some of these characteristics with the aid of a model tank and use of range equation reveal the superiority of radio communication between land and a deeply submerged terminal inside a ocean via the earth-crust over direct link communication through the ocean.
Resumo:
A local algorithm with local horizon r is a distributed algorithm that runs in r synchronous communication rounds; here r is a constant that does not depend on the size of the network. As a consequence, the output of a node in a local algorithm only depends on the input within r hops from the node. We give tight bounds on the local horizon for a class of local algorithms for combinatorial problems on unit-disk graphs (UDGs). Most of our bounds are due to a refined analysis of existing approaches, while others are obtained by suggesting new algorithms. The algorithms we consider are based on network decompositions guided by a rectangular tiling of the plane. The algorithms are applied to matching, independent set, graph colouring, vertex cover, and dominating set. We also study local algorithms on quasi-UDGs, which are a popular generalisation of UDGs, aimed at more realistic modelling of communication between the network nodes. Analysing the local algorithms on quasi-UDGs allows one to assume that the nodes know their coordinates only approximately, up to an additive error. Despite the localisation error, the quality of the solution to problems on quasi-UDGs remains the same as for the case of UDGs with perfect location awareness. We analyse the increase in the local horizon that comes along with moving from UDGs to quasi-UDGs.
Resumo:
The three dimensional structure of a protein is formed and maintained by the noncovalent interactions among the amino acid residues of the polypeptide chain These interactions can be represented collectively in the form of a network So far such networks have been investigated by considering the connections based on distances between the amino acid residues Here we present a method of constructing the structure network based on interaction energies among the amino acid residues in the protein We have investigated the properties of such protein energy based networks (PENs) and have shown correlations to protein structural features such as the clusters of residues involved in stability formation of secondary and super secondary structural units Further we demonstrate that the analysis of PENs in terms of parameters such as hubs and shortest paths can provide a variety of biologically important information such as the residues crucial for stabilizing the folded units and the paths of communication between distal residues in the protein Finally the energy regimes for different levels of stabilization in the protein structure have clearly emerged from the PEN analysis
Resumo:
Modal cohesion and subordination. The Finnish conditional and jussive moods in comparison to the French subjunctive This study examines verb moods in subordinate clauses in French and Finnish. The first part of the analysis deals with the syntax and semantics of the French subjunctive, mood occurring mostly in subordinate positions. The second part investigates Finnish verb moods. Although subordinate positions in Finnish grammar have no special finite verb form, certain uses of Finnish verb moods have been compared to those of subjunctives and conjunctives in other languages. The present study focuses on the subordinate uses of the Finnish conditional and jussive (i.e. the third person singular and plural of the imperative mood). The third part of the analysis discusses the functions of subordinate moods in contexts beyond complex sentences. The data used for the analysis include 1834 complex sentences gathered from newspapers, online discussion groups and blog texts, as well as audio-recorded interviews and conversations. The data thus consist of both written and oral texts as well as standard and non-standard variants. The analysis shows that the French subjunctive codes theoretical modality. The subjunctive does not determine the temporal and modal meaning of the event, but displays the event as virtual. In a complex sentence, the main clause determines the temporal and modal space within which the event coded by the subjunctive clause is interpreted. The subjunctive explicitly indicates that the space constructed in the main clause extends its scope over the subordinate clause. The subjunctive can therefore serve as a means for creating modal cohesion in the discourse. The Finnish conditional shares the function of making explicit the modal link between the components of a complex construction with the French subjunctive, but the two moods differ in their semantics. The conditional codes future time and can therefore occur only in non-factual or counterfactual contexts, whereas the event expressed by French subjunctive clauses can also be interpreted as realized. Such is the case when, for instance, generic and habitual meaning is involved. The Finnish jussive mood is used in a relatively limited number of subordinate clause types, but in these contexts its modal meaning is strikingly close to that of the French subjunctive. The permissive meaning, typical of the jussive in main clause positions, is modified in complex sentences so that it entails inter-clausal relation, namely concession. Like the French subjunctive, the jussive codes theoretical modal meaning with no implication of the truth value of the proposition. Finally, the analysis shows that verb moods mark modal cohesion, not only on the syntagmatic level (namely in complexe sentences), but also on the paradigmatic axis of discourse in order to create semantic links over entire segments of talk. In this study, the subjunctive thus appears, not as an empty category without function, as it is sometimes described, but as an open form that conveys the temporal and modal meanings emerging from the context.
Resumo:
Channel assignment in multi-channel multi-radio wireless networks poses a significant challenge due to scarcity of number of channels available in the wireless spectrum. Further, additional care has to be taken to consider the interference characteristics of the nodes in the network especially when nodes are in different collision domains. This work views the problem of channel assignment in multi-channel multi-radio networks with multiple collision domains as a non-cooperative game where the objective of the players is to maximize their individual utility by minimizing its interference. Necessary and sufficient conditions are derived for the channel assignment to be a Nash Equilibrium (NE) and efficiency of the NE is analyzed by deriving the lower bound of the price of anarchy of this game. A new fairness measure in multiple collision domain context is proposed and necessary and sufficient conditions for NE outcomes to be fair are derived. The equilibrium conditions are then applied to solve the channel assignment problem by proposing three algorithms, based on perfect/imperfect information, which rely on explicit communication between the players for arriving at an NE. A no-regret learning algorithm known as Freund and Schapire Informed algorithm, which has an additional advantage of low overhead in terms of information exchange, is proposed and its convergence to the stabilizing outcomes is studied. New performance metrics are proposed and extensive simulations are done using Matlab to obtain a thorough understanding of the performance of these algorithms on various topologies with respect to these metrics. It was observed that the algorithms proposed were able to achieve good convergence to NE resulting in efficient channel assignment strategies.
Resumo:
At the heart of understanding cellular processes lies our ability to explore the specific nature of communication between sequential information carrying biopolymers. However, the data extracted from conventional solution phase studies may not reflect the dynamics of communication between recognized partners as they occur in the crowded cellular milieu. We use the principle of immobilization of histidine-tagged biopolymers at a Ni(II)-encoded Langmuir monolayer to study sequence-specific protein-protein interactions in an artificially crowded environment The advantage of this technique lies in increasing the surface density of one of the interacting partners that allows us to study macromolecular interactions in a controlled crowded environment, but without compromising the speed of the reactions. We have taken advantage of this technique to follow the sequential assembly process of the multiprotein complex Escherichia coil RNA polymerase at the interface and also deciphered the role of one of the proteins, omega (omega), in the assembly pathway. Our reconstitution studies indicate that in the absence of molecular chaperones or other cofactors, omega (omega) plays a decisive role in refolding the largest protein beta prime (beta') and its recruitment into the multimeric assembly to reconstitute an active RNA polymerase. It was also observed that the monolayer had the ability to distinguish between sequence-specific and -nonspecific interactions despite the immobilization of one of the biomacromolecules. The technique provides a universal two-dimensional template for studying protein-ligand interactions while mimicking molecular crowding.
Resumo:
Defending a large social insect colony containing several thousands of workers requires the simultaneous action of many individuals. Ideally this action involves communication between the workers, enabling coordinated action and a fast response. The Asian dwarf honeybee, Apis florea, is a small honeybee with an open nesting habit and a comparatively small colony size, features that leave them particularly exposed to predators. We describe here a novel defence response of these bees in which the emission of an initial warning signal from one individual (“piping”) is followed 0.3 to 0.7 seconds later by a general response from a large number of bees (“hissing”). Piping is audible to the human ear, with a fundamental frequency of 384 ± 31Hz and lasting for 0.82 ± 0.35 seconds. Hissing is a broad band, noisy signal, clearly audible to the human observer and produced by slight but visible movements of the bees' wings. Hissing begins in individuals close to the piping bee, spreads rapidly to neighbours and results in an impressive coordinated crescendo occasionally involving the entire colony. Piping and hissing are accompanied by a marked decrease, or even cessation, of worker activities such as forager dancing and departures from the colony. We show that whereas hissing of the colony can be elicited without piping, the sequential and correlated piping and hissing response is specific to the presence of potential predators close to the colony. We suggest that the combined audio-visual effect of the hissing might deter small predators, while the cessation of flight activity could decrease the risk of predation by birds and insects which prey selectively on flying bees.
Resumo:
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxy-based scheme in the work of Ling and Znati (2005) and Li et al. (2005), we introduce a friend-based scheme for establishing pairwise keys securely. We show that the chances of finding friends in a neighbourhood are considerably more than that of finding proxies, leading to lower communication overhead. Further, we prove that the friend-based scheme performs better than the proxy-based scheme both in terms of resilience against node capture as well as in energy consumption for pairwise key establishment, making our scheme more feasible.