951 resultados para Local and Wide Area Network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the last years the number of industrial applications for Augmented Reality (AR) and Virtual Reality (VR) environments has significantly increased. Optical tracking systems are an important component of AR/VR environments. In this work, a low cost optical tracking system with adequate attributes for professional use is proposed. The system works in infrared spectral region to reduce optical noise. A highspeed camera, equipped with daylight blocking filter and infrared flash strobes, transfers uncompressed grayscale images to a regular PC, where image pre-processing software and the PTrack tracking algorithm recognize a set of retro-reflective markers and extract its 3D position and orientation. Included in this work is a comprehensive research on image pre-processing and tracking algorithms. A testbed was built to perform accuracy and precision tests. Results show that the system reaches accuracy and precision levels slightly worse than but still comparable to professional systems. Due to its modularity, the system can be expanded by using several one-camera tracking modules linked by a sensor fusion algorithm, in order to obtain a larger working range. A setup with two modules was built and tested, resulting in performance similar to the stand-alone configuration.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ocean acidification, caused by increased atmospheric carbon dioxide (CO2) concentrations, is currently an important environmental problem. It is therefore necessary to investigate the effects of ocean acidification on all life stages of a wide range of marine organisms. However, few studies have examined the effects of increased CO2 on early life stages of organisms, including corals. Using a range of pH values (pH 7.3, 7.6, and 8.0) in manipulative duplicate aquarium experiments, we have evaluated the effects of increased CO2 on early life stages (larval and polyp stages) of Acropora spp. with the aim of estimating CO2 tolerance thresholds at these stages. Larval survival rates did not differ significantly between the reduced pH and control conditions. In contrast, polyp growth and algal infection rates were significantly decreased at reduced pH levels compared to control conditions. These results suggest that future ocean acidification may lead to reduced primary polyp growth and delayed establishment of symbiosis. Stress exposure experiments using longer experimental time scales and lower levels of CO2 concentrations than those used in this study are needed to establish the threshold of CO2 emissions required to sustain coral reef ecosystems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Federal Highway Administration, Washington, D.C.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Arguably, the world has become one large pervasive computing environment. Our planet is growing a digital skin of a wide array of sensors, hand-held computers, mobile phones, laptops, web services and publicly accessible web-cams. Often, these devices and services are deployed in groups, forming small communities of interacting devices. Service discovery protocols allow processes executing on each device to discover services offered by other devices within the community. These communities can be linked together to form a wide-area pervasive environment, allowing processes in one p u p tu interact with services in another. However, the costs of communication and the protocols by which this communication is mediated in the wide-area differ from those of intra-group, or local-area, communication. Communication is an expensive operation for small, battery powered devices, but it is less expensive for servem and workstations, which have a constant power supply and 81'e connected to high bandwidth networks. This paper introduces Superstring, a peer to-peer service discovery protocol optimised fur use in the wide-area. Its goals are to minimise computation and memory overhead in the face of large numbers of resources. It achieves this memory and computation scalability by distributing the storage cost of service descriptions and the computation cost of queries over multiple resolvers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

B-ISDN is a universal network which supports diverse mixes of service, applications and traffic. ATM has been accepted world-wide as the transport technique for future use in B-ISDN. ATM, being a simple packet oriented transfer technique, provides a flexible means for supporting a continuum of transport rates and is efficient due to possible statistical sharing of network resources by multiple users. In order to fully exploit the potential statistical gain, while at the same time provide diverse service and traffic mixes, an efficient traffic control must be designed. Traffic controls which include congestion and flow control are a fundamental necessity to the success and viability of future B-ISDN. Congestion and flow control is difficult in the broadband environment due to the high speed link, the wide area distance, diverse service requirements and diverse traffic characteristics. Most congestion and flow control approaches in conventional packet switched networks are reactive in nature and are not applicable in the B-ISDN environment. In this research, traffic control procedures mainly based on preventive measures for a private ATM-based network are proposed and their performance evaluated. The various traffic controls include CAC, traffic flow enforcement, priority control and an explicit feedback mechanism. These functions operate at call level and cell level. They are carried out distributively by the end terminals, the network access points and the internal elements of the network. During the connection set-up phase, the CAC decides the acceptance or denial of a connection request and allocates bandwidth to the new connection according to three schemes; peak bit rate, statistical rate and average bit rate. The statistical multiplexing rate is based on a `bufferless fluid flow model' which is simple and robust. The allocation of an average bit rate to data traffic at the expense of delay obviously improves the network bandwidth utilisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Collaborative Anomaly Detection (CAD) is an emerging field of network security in both academia and industry. It has attracted a lot of attention, due to the limitations of traditional fortress-style defense modes. Even though a number of pioneer studies have been conducted in this area, few of them concern about the universality issue. This work focuses on two aspects of it. First, a unified collaborative detection framework is developed based on network virtualization technology. Its purpose is to provide a generic approach that can be applied to designing specific schemes for various application scenarios and objectives. Second, a general behavior perception model is proposed for the unified framework based on hidden Markov random field. Spatial Markovianity is introduced to model the spatial context of distributed network behavior and stochastic interaction among interconnected nodes. Algorithms are derived for parameter estimation, forward prediction, backward smooth, and the normality evaluation of both global network situation and local behavior. Numerical experiments using extensive simulations and several real datasets are presented to validate the proposed solution. Performance-related issues and comparison with related works are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Crime: Local and Global covers the way local events (such as prostitution) have wider aspects than previously thought. Links with people traffickers, international organised crime and violence cannot be ignored any longer. Each crime or area of activity selected within this text has a global reach, and is made ever more possible due to the way globalisation has opened up markets, both legitimate and illegitimate. The book's approach and scope emphasises that we can no longer view 'crime' as something which occurs within certain jurisdictions, at certain times and in particular places. For example, the chapter on cybercrime highlights the 'illegal' acts that can be perpetrated by second lifers, anywhere in the world, but are they a crime?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Crime: Local and Global covers the way local events (such as prostitution) have wider aspects than previously thought. Links with people traffickers, international organised crime and violence cannot be ignored any longer. Each crime or area of activity selected within this text has a global reach, and is made ever more possible due to the way globalisation has opened up markets, both legitimate and illegitimate. The book's approach and scope emphasises that we can no longer view 'crime' as something which occurs within certain jurisdictions, at certain times and in particular places. For example, the chapter on cybercrime highlights the 'illegal' acts that can be perpetrated by second lifers, anywhere in the world, but are they a crime?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building on innovative frameworks for analysing and visualising the tweet data available from Twitter, developed by the authors, this paper examines the patterns of tweeting activity that occurred during and after the Feb, 2011 Christchurch earthquake. Local and global responses to the disaster were organised around the pre-existing hashtag #eqnz, which averaged some 100 tweets per minute in the hours following the earthquake. The paper identifies the key contributors to the #eqnz network and shows the key themes of their messages. Emerging from this analysis is a more detailed understanding of Twitter and other social media as key elements in the overall ecology of the media forms used for crisis communication. Such uses point both to the importance of social media as a tool for affected communities to self-organise their disaster response and recovery activities, and as a tool for emergency management services to disseminate key information and receive updates from local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Institutions represent the ‘technologies of the social.’ They are increasingly modelled and transported to other cultures and societies, and criminal justice institutions—traditional, parochial, and local as they are—are no exception to this. Problems of crime and insecurity have engendered the travelling of institutions from the centre to the periphery and vice versa. This paper will explore the problems which arise from travelling and modelling, and from the transport and creation of institutions in the area of criminal justice. An important feature in the travel of criminal justice institutions is the use of ‘local knowledge’ and its role in this process.