944 resultados para communication network
Resumo:
Chez les animaux, les jeunes dépendant des parents durant leur développement sont en compétition pour obtenir la nourriture, qu'ils quémandent par des cris et postures ostentatoires et se disputent physiquement. Les frères et soeurs n'ont pas la même compétitivité, en particulier s'ils diffèrent en âge, et leur niveau de faim fluctue dans le temps. Comme dans tout type de compétition, chacun doit ajuster son investissement aux rivaux, c'est à dire aux besoins et comportements de ses frères et soeurs. Dans le contexte de la famille, selon la théorie de sélection de parentèle, les jeunes bénéficient de leur survie mutuelle et donc de la propagation de la part de gènes qu'ils ont en commun. L'hypothèse de la « négociation frères-soeurs » prédit que, sous certaines conditions, les jeunes négocient entre eux la nourriture, ce qui réduit les coûts de compétition et permet de favoriser les frères et soeurs les plus affamés. La littérature actuelle se focalise sur les signaux de quémande entre enfants et parents et les interactions compétitives frères-soeurs sont étudiées principalement au sein de paires, alors que les nichées ou portées en comprennent souvent de nombreux. Cette thèse vise à mieux comprendre comment et jusqu'à quel point plusieurs jeunes ajustent mutuellement leurs signaux de besoin. C'est une question importante, étant donné que cela influence la répartition de nourriture entre eux, donc la résolution du conflit qui les oppose et à terme leur valeur évolutive. Le modèle d'étude est la chouette effraie (Tyto alba), chez laquelle jusqu'à neufs poussins émettent des milliers de cris chacun par nuit. Ils négocieraient entre eux la prochaine proie indivisible rapportée au nid avant que les parents ne reviennent : un poussin affamé crie plus qu'un autre moins affamé, ce qui dissuade ce dernier de crier en retour et par la suite de quémander la nourriture aux parents. L'investissement optimal correspondrait donc à écarter son frère en permanence vu que l'arrivée des parents est imprévisible, mais à moindre coût. Dans un premier axe, nous avons exploré au sein de dyades les mécanismes acoustiques permettant aux poussins de doser leur effort vocal durant les heures de compétition où ils sont laissés seuls au nid. Nous avons trouvé que les poussins évitent de crier simultanément, ce qui optimiserait la discrimination du nombre et de la durée de leurs cris, lesquels reflètent de façon honnête leur niveau de faim et donc leur motivation. L'alternance des cris paraît particulièrement adaptée au fait que les poussins se fient à des variations temporelles subtiles dans le rythme et la durée de leurs vocalisations pour prendre la parole. En particulier, allonger ses cris tout en criant moins dissuade efficacement le rival de répondre, ce qui permet de monopoliser la parole dans de longs « monologues ». Ces règles seraient universelles puisqu'elles ne dépendent pas de la séniorité, de la faim, ni de la parenté et les poussins répondent à un playback de façon similaire à un vrai frère. Tous ces résultats apportent la première preuve expérimentale que les juvéniles communiquent de façon honnête sur leurs besoins, ajustent activement le rythme de leurs cris et utilisent des composantes multiples de leurs vocalisations d'une façon qui réduit le coût de la compétition. De plus, il s'agit de la première démonstration que des règles de conversation régissent de longs échanges vocaux chez les animaux de façon comparable aux règles basiques observées chez l'Homme. Dans un second axe, nous avons exploré les stratégies comportementales que les poussins adoptent pour rivaliser avec plusieurs frères et soeurs, par le biais d'expériences de playback. Nous avons trouvé que les poussins mémorisent des asymétries de compétitivité entre deux individus qui dialoguent et répondent plus agressivement au moins compétitif une fois qu'ils sont confrontés à chacun isolément. Dans la même ligne, quand ils entendent un nombre variable d'individus criant à un taux variable, les poussins investissent le plus contre des rivaux moins nombreux et moins motivés. En accord avec les prédictions des modèles théoriques, les poussins de chouette effraie escaladent donc les conflits pour lesquels leur chance de gagner contrebalance le plus l'énergie dépensée. Nous révélons ainsi que 1) les jeunes frères et soeurs 'espionnent' les interactions de leurs rivaux pour évaluer leur compétitivité relative, ce qui est sans doute moins coûteux qu'une confrontation directe avec chacun, et 2) dosent leur investissement vocal en fonction du nombre de rivaux actuellement en compétition et de leur motivation de façon concomitante. Ces résultats montrent que les interactions entre frères et soeurs au nid reposent sur des mécanismes similaires à ceux observés, mais encore de façon anecdotique, chez les adultes non apparentés qui se disputent les territoires et partenaires sexuels. Cette thèse souligne donc combien il est crucial de considérer dorénavant la famille comme un réseau de communication à part entière pour mieux comprendre comment les jeunes résolvent les conflits autour du partage des ressources parentales. Plus généralement, elle révèle l'importance de la dynamique temporelle des vocalisations dans les conflits et la communication des animaux. A la lumière de nos résultats, la chouette effraie apparaît comme un modèle clé pour de futures recherches sur la résolution des conflits et la communication acoustique. - In species with parental care, offspring contest priority access to food by begging through conspicuous postures and vocalisations and by physically jockeying. Siblings differ in their competitiveness, especially in the case of age and size hierarchies, and their hunger level fluctuates in time. As in competition in general, each individual should adjust its investment to opponents that is to say to its siblings' needs and behaviours. In the particular context of family, according to kin selection theory, siblings derive extra fitness benefits from their mutual survival and hence the spreading of the genes they share. The "sibling negotiation" predicts that, under certain conditions, young would negotiate among them priority access to food, which reduces competition costs and enables promoting the most hungry siblings. To date, the literature focuses on signals of need between parents and offspring and competitive interactions (in particular among siblings) are mostly studied within pairwise interactions, yet they commonly involve more numerous rivals. This PhD aims at better understanding how and the extent to which several young siblings compete through signalling. This is important since this influences how food is allocated among them, thus the outcome of sibling rivalry and ultimately their fitness. I use the barn owl (Tyto alba) as a model, in which the one to nine nestlings emit a simple noisy call thousands of times per night. Thereby, they would negotiate among them priority access to the indivisible food next delivered prior to parents' feeding visits. A hungry nestling emits more calls than a less hungry sibling, which deters it to call in return and ultimately beg food at parents. The optimal investment thus corresponds to constantly deterring the rival to compete, given that parents' arrival is unpredictable, but at the lowest costs. In the first axis of my thesis, we explored within dyads the acoustic mechanisms by which owlets dose vocal effort when competing during the hours they are left alone. We found that owlets avoid overlapping each other's calls. This would enhance the discrimination of both call number and duration, which honestly reflect individuals' hunger level and hence motivation to compete. Such antiphony seems best adapted to the fact that siblings actually use subtle temporal variations in the rhythm and duration of their calls to take or give their turn. Owlets alternate monologs, in which lengthening calls efficiently deters the rival to respond while reducing call number. Such rules depend neither on seniority, hunger level nor kinship since nestlings responded similarly to a live sibling and an unrelated playback individual. Taken together, these findings provide the first experimental proof that dependent young honestly communicate about their need, actively adjust the timing of their calls and use multicomponent signals in a way that reduces vocal costs. Moreover, this is the first demonstration of conversational rules underlying animal long-lasting vocal exchanges comparable to the basic turn-taking signals observed in humans. In the second axis, we focused on the behavioural strategies owlets adopt to compete with more than one sibling, using playback experiments. We found that singleton bystanders memorised competitive asymmetries between two playback individuals dialoguing and responded more aggressively to the submissive one once they later faced each of both alone. Moreover, when hearing a varying number of nestlings calling at varying rates, owlets vocally invested the most towards fewer and less motivated rivals. In line with predictions from models on conflict settlement, barn owls thus escalate contests in which their chance of winning best counterbalances the energy spent. These results reveal that young socially eavesdrop on their siblings' interactions to assess their relative competitiveness at likely lower costs than direct confrontation, and dose vocal effort relative to both their number and motivation. This shows that young siblings' interactions imply mechanisms similar to those observed, yet still anecdotally, in unrelated adults that contest mates and territories. This PhD therefore highlights how crucial it is to further consider family as a communication network to better understand how siblings resolve conflicts over the share of parental resources. More generally, it provides important insights into the role of the temporal dynamics of signalling during animal contests and communication. In the light of our findings, the barn owl emerges as a key model for future research on conflict resolution and acoustic communication in animals.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This is a newsletter produced by the Department of Iowa Communication Network. This newsletter updates what is going on with the ICN through out the state of Iowa.
Resumo:
This work is divided into three volumes: Volume I: Strain-Based Damage Detection; Volume II: Acceleration-Based Damage Detection; Volume III: Wireless Bridge Monitoring Hardware. Volume I: In this work, a previously-developed structural health monitoring (SHM) system was advanced toward a ready-for-implementation system. Improvements were made with respect to automated data reduction/analysis, data acquisition hardware, sensor types, and communication network architecture. The statistical damage-detection tool, control-chart-based damage-detection methodologies, were further investigated and advanced. For the validation of the damage-detection approaches, strain data were obtained from a sacrificial specimen attached to the previously-utilized US 30 Bridge over the South Skunk River (in Ames, Iowa), which had simulated damage,. To provide for an enhanced ability to detect changes in the behavior of the structural system, various control chart rules were evaluated. False indications and true indications were studied to compare the damage detection ability in regard to each methodology and each control chart rule. An autonomous software program called Bridge Engineering Center Assessment Software (BECAS) was developed to control all aspects of the damage detection processes. BECAS requires no user intervention after initial configuration and training. Volume II: In this work, a previously developed structural health monitoring (SHM) system was advanced toward a ready-for-implementation system. Improvements were made with respect to automated data reduction/analysis, data acquisition hardware, sensor types, and communication network architecture. The objective of this part of the project was to validate/integrate a vibration-based damage-detection algorithm with the strain-based methodology formulated by the Iowa State University Bridge Engineering Center. This report volume (Volume II) presents the use of vibration-based damage-detection approaches as local methods to quantify damage at critical areas in structures. Acceleration data were collected and analyzed to evaluate the relationships between sensors and with changes in environmental conditions. A sacrificial specimen was investigated to verify the damage-detection capabilities and this volume presents a transmissibility concept and damage-detection algorithm that show potential to sense local changes in the dynamic stiffness between points across a joint of a real structure. The validation and integration of the vibration-based and strain-based damage-detection methodologies will add significant value to Iowa’s current and future bridge maintenance, planning, and management Volume III: In this work, a previously developed structural health monitoring (SHM) system was advanced toward a ready-for-implementation system. Improvements were made with respect to automated data reduction/analysis, data acquisition hardware, sensor types, and communication network architecture. This report volume (Volume III) summarizes the energy harvesting techniques and prototype development for a bridge monitoring system that uses wireless sensors. The wireless sensor nodes are used to collect strain measurements at critical locations on a bridge. The bridge monitoring hardware system consists of a base station and multiple self-powered wireless sensor nodes. The base station is responsible for the synchronization of data sampling on all nodes and data aggregation. Each wireless sensor node include a sensing element, a processing and wireless communication module, and an energy harvesting module. The hardware prototype for a wireless bridge monitoring system was developed and tested on the US 30 Bridge over the South Skunk River in Ames, Iowa. The functions and performance of the developed system, including strain data, energy harvesting capacity, and wireless transmission quality, were studied and are covered in this volume.
Resumo:
In this paper we study the reconstruction of a network topology from the values of its betweenness centrality, a measure of the influence of each of its nodes in the dissemination of information over the network. We consider a simple metaheuristic, simulated annealing, as the combinatorial optimization method to generate the network from the values of the betweenness centrality. We compare the performance of this technique when reconstructing different categories of networks –random, regular, small-world, scale-free and clustered–. We show that the method allows an exact reconstruction of small networks and leads to good topological approximations in the case of networks with larger orders. The method can be used to generate a quasi-optimal topology fora communication network from a list with the values of the maximum allowable traffic for each node.
Resumo:
Matkustajat pitävät junissa annettavaa informaatiota entistä tärkeämpänä. Tähän haasteeseen pyritään vastaamaan rutiinikuulutusten, kuten asemille tulokuulutusten, automatisoinnilla. Kuulutukset soitetaan ääneen ja esitetään tekstinä näytöillä. Tällöin annettava informaatio on selkeää ja tasalaatuista myös vieraalla kielellä. Junan tiedot, kuten määränpää ja vaunun myyntinumero, esitetään junan ulkoseinällä ovien vierellä junaan nousevia matkustajia varten. Tässä diplomityössä luodaan yleiskatsaus junaväylään liittyviin standardeihin, TCN-standardiin ja UIC-556-määrelehteen. Yleiskatsauksen lisäksi käsitellään tarkemmin matkustajainformaatiojärjestelmään liittyvät osat. Tutustumme myös UIC-176-määrelehteen, joka käsittelee matkustajainformaatiojärjestelmän näyttöjä. Luomme yleiskatsauksen EKE-Elektroniikka Oy:n kehittämään modulaariseen junanhallintajärjestelmään. Työssä suunnitellaan asiakkaan ja standardien vaatimusten pohjalta matkustajainformaatiojärjestelmä, joka on integroitu junanhallintajärjestelmään. Tekstitiedon välittämiseen vaunusta toiseen käytetään WTB-junaväylää. Siinä kommunikoidaan UIC-556-määrelehden mukaisesti, joka mahdollistaa eurooppalaisen yhteensopivuuden. Työn tuloksena on määritelty järjestelmän fyysinen rakenne, ohjelmistorakenne, vaadittavat tietokannat, tiedon syöttäminen järjestelmälle ja junaväylässä käytettävät telegrammit. Erityishaasteena on ratkaistu tilanne, jossa juna jakautuu matkan varrella useampaan suuntaan.
Resumo:
Technology scaling has proceeded into dimensions in which the reliability of manufactured devices is becoming endangered. The reliability decrease is a consequence of physical limitations, relative increase of variations, and decreasing noise margins, among others. A promising solution for bringing the reliability of circuits back to a desired level is the use of design methods which introduce tolerance against possible faults in an integrated circuit. This thesis studies and presents fault tolerance methods for network-onchip (NoC) which is a design paradigm targeted for very large systems-onchip. In a NoC resources, such as processors and memories, are connected to a communication network; comparable to the Internet. Fault tolerance in such a system can be achieved at many abstraction levels. The thesis studies the origin of faults in modern technologies and explains the classification to transient, intermittent and permanent faults. A survey of fault tolerance methods is presented to demonstrate the diversity of available methods. Networks-on-chip are approached by exploring their main design choices: the selection of a topology, routing protocol, and flow control method. Fault tolerance methods for NoCs are studied at different layers of the OSI reference model. The data link layer provides a reliable communication link over a physical channel. Error control coding is an efficient fault tolerance method especially against transient faults at this abstraction level. Error control coding methods suitable for on-chip communication are studied and their implementations presented. Error control coding loses its effectiveness in the presence of intermittent and permanent faults. Therefore, other solutions against them are presented. The introduction of spare wires and split transmissions are shown to provide good tolerance against intermittent and permanent errors and their combination to error control coding is illustrated. At the network layer positioned above the data link layer, fault tolerance can be achieved with the design of fault tolerant network topologies and routing algorithms. Both of these approaches are presented in the thesis together with realizations in the both categories. The thesis concludes that an optimal fault tolerance solution contains carefully co-designed elements from different abstraction levels
Resumo:
This thesis describes the design and implementation of a graphical application on a mobile device to teleoperate a mobile robot. The department of information technology in Lappeenranta University conducts research in robotics, and the main motivation was to extend the available teleoperation applications for mobile devices. The challenge was to port existing robot software library onto an embedded device platform, then develop a suitable user interface application that provides sufficient functionality to perform teleoperation tasks over a wireless communication network. This thesis involved investigating previous teleoperation applications and conducted similar experiments to test and evaluate the designed application for functional activity and measure performance on a mobile device which have been identified and achieved. The implemented solution offered good results for navigation purposes particularly for teleoperating a visible robot and suggests solutions for exploration when no environment map for the operator is present.
Resumo:
Sähköpostin käyttö suomalaisilla työpaikoilla on kasvanut merkittävästi 2000 -luvun alusta lähtien. Tänä päivänä suuri osa työntekijöistä käyttää työpaikoillaan sähköpostia päivittäin. Tutkimuksen tavoitteena on tutkia työnantajan oikeutta lukea työntekijän sähköposteja. Edellisen lisäksi huomio kiinnittyi työntekijän yksityisyyden suojaan sekä työnantajan oikeuksiin ja velvollisuuksiin. Tutkimukseni on toteutettu kvalitatiivisena tutkimuksena. Tutkimusaineistoon valittiin kaikki tutkimusaihetta koskevat kirjoitukset. Aineisto kerättiin pääasiallisesti suomalaisista lakiteksteistä sekä tutkielmani empiirinen osio koostui neljästä suomalaisesta oikeustapauksesta. Tutkimuksen perusteella voidaan todeta, että Suomessa työnantajat osaavat kunnioittaa työntekijän yksityisyyttä ja sähköpostin käytöstä työpaikoilla ei ole usein syntynyt ongelmia.
Power Electronic Converters in Low-Voltage Direct Current Distribution – Analysis and Implementation
Resumo:
Over the recent years, smart grids have received great public attention. Many proposed functionalities rely on power electronics, which play a key role in the smart grid, together with the communication network. However, “smartness” is not the driver that alone motivates the research towards distribution networks based on power electronics; the network vulnerability to natural hazards has resulted in tightening requirements for the supply security, set both by electricity end-users and authorities. Because of the favorable price development and advancements in the field, direct current (DC) distribution has become an attractive alternative for distribution networks. In this doctoral dissertation, power electronic converters for a low-voltage DC (LVDC) distribution system are investigated. These include the rectifier located at the beginning of the LVDC network and the customer-end inverter (CEI) on the customer premises. Rectifier topologies are introduced, and according to the LVDC system requirements, topologies are chosen for the analysis. Similarly, suitable CEI topologies are addressed and selected for study. Application of power electronics into electricity distribution poses some new challenges. Because the electricity end-user is supplied with the CEI, it is responsible for the end-user voltage quality, but it also has to be able to supply adequate current in all operating conditions, including a short-circuit, to ensure the electrical safety. Supplying short-circuit current with power electronics requires additional measures, and therefore, the short-circuit behavior is described and methods to overcome the high-current supply to the fault are proposed. Power electronic converters also produce common-mode (CM) and radio-frequency (RF) electromagnetic interferences (EMI), which are not present in AC distribution. Hence, their magnitudes are investigated. To enable comprehensive research on the LVDC distribution field, a research site was built into a public low-voltage distribution network. The implementation was a joint task by the LVDC research team of Lappeenranta University of Technology and a power company Suur-Savon S¨ahk¨o Oy. Now, the measurements could be conducted in an actual environment. This is important especially for the EMI studies. The main results of the work concern the short-circuit operation of the CEI and the EMI issues. The applicability of the power electronic converters to electricity distribution is demonstrated, and suggestions for future research are proposed.
Resumo:
In the scope of the current thesis we review and analyse networks that are formed by nodes with several attributes. We suppose that different layers of communities are embedded in such networks, besides each of the layers is connected with nodes' attributes. For example, examine one of a variety of online social networks: an user participates in a plurality of different groups/communities – schoolfellows, colleagues, clients, etc. We introduce a detection algorithm for the above-mentioned communities. Normally the result of the detection is the community supplemented just by the most dominant attribute, disregarding others. We propose an algorithm that bypasses dominant communities and detects communities which are formed by other nodes' attributes. We also review formation models of the attributed networks and present a Human Communication Network (HCN) model. We introduce a High School Texting Network (HSTN) and examine our methods for that network.