824 resultados para Computer Communication Networks
Resumo:
This study integrated the research streams of computer-mediated communication (CMC) and group conflict by comparing the expression of different types of conflict in CMC groups and face-to face (FTF) groups over time. The main aim of the study was to compare the cues-filtered-out approach against the social information processing theory A laboratory study was conducted with 39 groups (19 CMC and 20 FTF) in which members were required to work together over three sessions. The frequencies of task, process, and relationship conflict were analyzed. Findings supported the social information processing theory. There was more process and relationship conflict in CMC groups compared to FTF groups on Day 1. However, this difference disappeared on Days 2 and 3. There was no difference between CMC and FTF groups in the amount of task conflict expressed on any day.
Resumo:
Background: Increasingly there is a call from clinicians and researchers for measures that document the impact of aphasia on a person's everyday communication. Do existing assessments of communication disability adequately sample communication activities relevant to our clients? Communication skills and networks change with age. A need exists to determine the everyday communication activities of older people and in particular those with aphasia. Aims: The primary aim of this study was to describe and compare the everyday communication activities of older people with aphasia and healthy older people who are living in the community. A secondary aim was to investigate the content validity of the American Speech-Language Hearing Association Functional Assessment of Communication Skills for Adults (ASHA FACS, 1997) for older Australians. Methods & Procedures: Naturalistic observation was the method of choice for detailing the everyday communication of 15 older people with chronic aphasia following stroke and a matched group of 15 healthy older people who were living in the community. Researchers, in the role of participant observer, took field notes for 8 hours, over three occasions within a week. A total of 240 hours of observation have been coded in terms of communication activity, topic, communication partners, and place of communication. A brief 5-day diary served to check the representativeness of the observational data. After each hour of observation, the researcher checked which ASHA FACS items had been observed. Outcomes & Results: Naturalistic observation provided a rich, rigorous, and systematic methodology for detailing the dynamics and complexities of authentic communication. The most common communication activities for both groups were conversations at home and in social groups. Real-life communication was revealed to serve the dual purposes of transaction and interaction. Results indicate that older people with aphasia engage in similar communication activities to healthy older people although differences were evident in the frequency of communication and in specific activities such as story telling, writing, commenting, and acknowledging. ASHA FACS items were generally relevant to older Australians living in the community. Conclusions: This study demonstrated that communication activity is multifaceted in terms of the type of communication and contextual factors. The observational data describe the effects of aphasia on a person's everyday communication activity and reveal the impact of aphasia on the social functions of communication including sharing information, maintaining and establishing relationships, and telling one's story. Functional communication assessment requires a greater focus on the interactional and uniquely interpersonal aspects of social communication.
Resumo:
Admission controls, such as trunk reservation, are often used in loss networks to optimise their performance. Since the numerical evaluation of performance measures is complex, much attention has been given to finding approximation methods. The Erlang Fixed-Point (EFP) approximation, which is based on an independent blocking assumption, has been used for networks both with and without controls. Several more elaborate approximation methods which account for dependencies in blocking behaviour have been developed for the uncontrolled setting. This paper is an exploratory investigation of extensions and synthesis of these methods to systems with controls, in particular, trunk reservation. In order to isolate the dependency factor, we restrict our attention to a highly linear network. We will compare the performance of the resulting approximations against the benchmark of the EFP approximation extended to the trunk reservation setting. By doing this, we seek to gain insight into the critical factors in constructing an effective approximation. (C) 2003 Elsevier Ltd. All rights reserved.
Resumo:
According to the opinion of clinicians, emerging medical conditions can be timely detected by observing changes in the activities of daily living and/or in the physiological signals of a person. To accomplish such purpose, it is necessary to properly monitor both the person’s physiological signals as well as the home environment with sensing technology. Wireless sensor networks (WSNs) are a promising technology for this support. After receiving the data from the sensor nodes, a computer processes the data and extracts information to detect any abnormality. The computer runs algorithms that should have been previously developed and tested in real homes or in living-labs. However, these installations (and volunteers) may not be easily available. In order to get around that difficulty, this paper suggests the making of a physical model to emulate basic actions of a user at home, thus giving autonomy to researchers wanting to test the performance of their algorithms. This paper also studies some data communication issues in mobile WSNs namely how the orientation of the sensor nodes in the body affects the received signal strength, as well as retransmission aspects of a TDMA-based MAC protocol in the data recovery process.
Resumo:
Several studies suggest that computer-mediated communication can lead to decreases in group effectiveness and reduce satisfaction levels in terms of trust and comfort of its users. Supported by an experiment, where the emotional or affective aspects of communication were tested with the experimentation of two architectures, Direct Communication Architecture (DCA) and the Virtual Communication Architecture (VCA) this paper validates the thesis that, from the users’ perspective, there is no opposition to the acceptance of virtual environments and interfaces for communication, and that these environments are able to cope with the reconfiguration dynamics requirements of virtual teams or client-server relations in a virtual enterprise operation.
Resumo:
Pectus excavatum is the most common deformity of the thorax and usually comprises Computed Tomography (CT) examination for pre-operative diagnosis. Aiming at the elimination of the high amounts of CT radiation exposure, this work presents a new methodology for the replacement of CT by a laser scanner (radiation-free) in the treatment of pectus excavatum using personally modeled prosthesis. The complete elimination of CT involves the determination of ribs external outline, at the maximum sternum depression point for prosthesis placement, based on chest wall skin surface information, acquired by a laser scanner. The developed solution resorts to artificial neural networks trained with data vectors from 165 patients. Scaled Conjugate Gradient, Levenberg-Marquardt, Resilient Back propagation and One Step Secant gradient learning algorithms were used. The training procedure was performed using the soft tissue thicknesses, determined using image processing techniques that automatically segment the skin and rib cage. The developed solution was then used to determine the ribs outline in data from 20 patient scanners. Tests revealed that ribs position can be estimated with an average error of about 6.82±5.7 mm for the left and right side of the patient. Such an error range is well below current prosthesis manual modeling (11.7±4.01 mm) even without CT imagiology, indicating a considerable step forward towards CT replacement by a 3D scanner for prosthesis personalization.
Resumo:
Com a criação da teoria das redes, assistiu-se nos últimos anos a uma revolução científica de carácter interdisciplinar Não é uma teoria inteiramente nova, tendo sido precedida pela criação por P. Erdvos, nos anos sessenta, da teoria dos grafos aleatórios. Esta última é uma teoria puramente matemática, donde termos escrito “grafo” em lugar de “rede”. Apenas recentemente podemos falar de uma efectiva teoria das redes reais, e isso devido ao abandono de algumas das ideias essenciais avançadas por Erdvos, em especial a ideia de partir de um conjunto previamente dado de nós, os quais de seguida vão sendo conectados aleatoriamente com probabilidade p. Este quadro geral começou a ser modificado pelo chamado modelo dos “mundo-pequenos” proposto em 1998 por Duncan Watts e Steve Strogatz, modificação que se tornou ainda mais radical quando, em 1999, Albert Barabási e colaboradores propuseram um modelo no qual os nós vão progressivamente nascendo e conectados por uma função de preferência: um nó conecta-se em proporção às ligações que os outros nós já possuem, pelo que quantas mais ligações um nó possui maior a probabilidade de receber ulteriores ligações.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
Dissertação apresentada ao Instituto Superior de Contabilidade para a obtenção do Grau de Mestre em Assessoria de Administração
Resumo:
Integrated manufacturing constitutes a complex system made of heterogeneous information and control subsystems. Those subsystems are not designed to the cooperation. Typically each subsystem automates specific processes, and establishes closed application domains, therefore it is very difficult to integrate it with other subsystems in order to respond to the needed process dynamics. Furthermore, to cope with ever growing marketcompetition and demands, it is necessary for manufacturing/enterprise systems to increase their responsiveness based on up-to-date knowledge and in-time data gathered from the diverse information and control systems. These have created new challenges for manufacturing sector, and even bigger challenges for collaborative manufacturing. The growing complexity of the information and communication technologies when coping with innovative business services based on collaborative contributions from multiple stakeholders, requires novel and multidisciplinary approaches. Service orientation is a strategic approach to deal with such complexity, and various stakeholders' information systems. Services or more precisely the autonomous computational agents implementing the services, provide an architectural pattern able to cope with the needs of integrated and distributed collaborative solutions. This paper proposes a service-oriented framework, aiming to support a virtual organizations breeding environment that is the basis for establishing short or long term goal-oriented virtual organizations. The notion of integrated business services, where customers receive some value developed through the contribution from a network of companies is a key element.
Resumo:
In this work, we present a neural network (NN) based method designed for 3D rigid-body registration of FMRI time series, which relies on a limited number of Fourier coefficients of the images to be aligned. These coefficients, which are comprised in a small cubic neighborhood located at the first octant of a 3D Fourier space (including the DC component), are then fed into six NN during the learning stage. Each NN yields the estimates of a registration parameter. The proposed method was assessed for 3D rigid-body transformations, using DC neighborhoods of different sizes. The mean absolute registration errors are of approximately 0.030 mm in translations and 0.030 deg in rotations, for the typical motion amplitudes encountered in FMRI studies. The construction of the training set and the learning stage are fast requiring, respectively, 90 s and 1 to 12 s, depending on the number of input and hidden units of the NN. We believe that NN-based approaches to the problem of FMRI registration can be of great interest in the future. For instance, NN relying on limited K-space data (possibly in navigation echoes) can be a valid solution to the problem of prospective (in frame) FMRI registration.
Resumo:
CISTI'2015 - 10ª Conferência Ibérica de Sistemas e Tecnologias de Informação, 17 a 20 de junho de 2015, Águeda, Aveiro, Portugal.
Resumo:
This presentation intends to show to what extent the Portuguese municipalities’ commitment, from the first decade of this century, in cultural facilities of municipal management and which has provided 12 of the 18 district capitals of mainland Portugal with equipment, resulted in a regular, diverse and innovative schedule. Investing in urban regeneration, local government has tried to convert cities’ demographic changes (strengthening of the most educated and professionally qualified groups) in effective cultural demands that consolidate the three axes of development competitiveness-innovation-creativity. What the empirical study to the programming and communication proposals of those equipment shows is that it is not enough to provide cities with facilities; to escape to a utilitarian conception of culture, there is a whole work to be done so that such equipment be experienced and felt as new public sphere. Equipment in which proposals go through a fluid bind, constructed through space and discourse with local community, devotes a diversified and innovative bet full filling development axis. This paper presents in a systematic way what contributes to this binding on the analyzed equipment.
Resumo:
O presente trabalho enquadra-se na área das redes de computadores, fazendo referência aos protocolos e ao conjunto de equipamentos e softwares necessários para a administração, controlo e monitorização desse tipos de infra-estruturas. Para a gestão de uma rede de dados, é essencial dispor de conhecimentos e documentação de nível técnico para representar da forma mais fiel possível a configuração da rede, seguindo passo a passo a interligação entre os equipamentos existentes e oferecendo assim uma visão o mais fidedigna possível das instalações. O protocolo SNMP é utilizado em larga escala sendo praticamente um standard para a administração de redes baseadas na tecnologia TCP/IP. Este protocolo define a comunicação entre um administrador e um agente, estabelecendo o formato e o significado das mensagens trocadas entre ambos. Tem a capacidade de suportar produtos de diferentes fabricantes, permitindo ao administrador manter uma base de dados com informações relevantes da monitorização de vários equipamentos, que pode ser consultada e analisada por softwares NMS concebidos especialmente para a gestão de redes de computadores. O trabalho apresentado nesta dissertação teve como objectivo desenvolver uma ferramenta para apoiar à gestão da infra-estrutura de comunicações do Aeroporto Francisco Sá Carneiro que permitisse conhecer em tempo real o estado dos elementos de rede, ajudar no diagnóstico de possíveis problemas e ainda apoiar a tarefa de planeamento e expansão da rede instalada. A ferramenta desenvolvida utiliza as potencialidades do protocolo SNMP para adquirir dados de monitorização de equipamentos de rede presentes na rede do AFSC, disponibilizando-os numa interface gráfica para facilitar a visualização dos parâmetros e alertas de funcionamento mais importantes na administração da rede.