877 resultados para Building, Communication, ICT, Protocol, Smart-Medium Enterprise
Resumo:
A spectrally efficient cooperative protocol for uplink wireless transmission in a centralised communication system is proposed, where each of the N users play the relaying and source roles simultaneously by using superposition (SP) modulation. The probability density function of the mutual information between SP-modulated transmitted and received signals of the cooperative uplink channels is derived. Using the high-signal-to-noise ratio (SNR) approximation of this density function, the outage probability formula of the system as well as its easily computable tight upper and lower bounds are obtained and these formulas are evaluated numerically. Numerical results show that the proposed strategy can achieve around 3 dB performance gain over comparable schemes. Furthermore, the multiplexing and diversity tradeoff formula is derived to illustrate the optimal performance of the proposed protocol, which also confirms that the SP relaying transmission does not cause any loss of data rate. Moreover, performance characterisation in terms of ergodic and outage capacities are studied and numerical results show that the proposed scheme can achieve significantly larger outage capacity than direct transmission, which is similar to other cooperative schemes. The superiority of the proposed strategy is demonstrated by the fact that it can maintain almost the same ergodic capacity as the direct transmission, whereas the ergodic capacity of other cooperative schemes would be much worse.
Resumo:
The new pedagogical framework arisen since the Bologna Declaration,the Prague Communiquand the introduction of the European Higher Education Area (EHEA), encourages, significantly, the use of new Communication and Information Technology to evolve teaching methodologies. The different ways teachers relate to learners have undergone a staggering change from which educational initiatives have emerged. Many of them are based on contents democratization through the use of ICT. The current article is intended to show the results obtained until the 2012/2013 academic course, since the implementation of the teaching innovation project entitled The use of ICT for the students autonomous learning in the university education of the course Photography. Elaboration of a virtual classroom and results analysis related to the acquisition of skills and competencies that has been developed in the course called Draw with light: Photography, belonging to the Fine Arts Degree at the University of Murcia.
Resumo:
The provision of security in mobile ad hoc networks is of paramount importance due to their wireless nature. However, when conducting research into security protocols for ad hoc networks it is necessary to consider these in the context of the overall system. For example, communicational delay associated with the underlying MAC layer needs to be taken into account. Nodes in mobile ad hoc networks must strictly obey the rules of the underlying MAC when transmitting security-related messages while still maintaining a certain quality of service. In this paper a novel authentication protocol, RASCAAL, is described and its performance is analysed by investigating both the communicational-related effects of the underlying IEEE 802.11 MAC and the computational-related effects of the cryptographic algorithms employed. To the best of the authors' knowledge, RASCAAL is the first authentication protocol which proposes the concept of dynamically formed short-lived random clusters with no prior knowledge of the cluster head. The performance analysis demonstrates that the communication losses outweigh the computation losses with respect to energy and delay. MAC-related communicational effects account for 99% of the total delay and total energy consumption incurred by the RASCAAL protocol. The results also show that a saving in communicational energy of up to 12.5% can be achieved by changing the status of the wireless nodes during the course of operation. Copyright (C) 2009 G. A. Safdar and M. P. O'Neill (nee McLoone).
Resumo:
The concept of a body-to-body network, where smart communicating devices carried or worn by a person are used to form a wireless network with devices situated on other nearby persons. New innovations in this area will see the form factor of smart devices being modified, so that they may be worn on the human body or integrated into clothing, in the process creating a new generation of smart people. Applications of body-to-body networking will extend well beyond the support of cellular and Wi-Fi networks. They will also be used in short-range covert military applications, first responder applications, team sports and used to interconnect body area networks (BAN). Security will be a major issue as routing between multiple nodes will increase the risk of unauthorized access and compromise sensitive data. This will add complexity to the medium access layer (MAC) and network management. Antennas designed to operate in body centric communications systems may be broadly categorized as on- or off-body radiators, according to their radiation pattern characteristics when mounted on the human body.
Resumo:
Aims. This article is a report of a trial protocol to determine if improvizational music therapy leads to clinically significant improvement in communication and interaction skills for young people experiencing social, emotional or behavioural problems. Background. Music therapy is often considered an effective intervention for young people experiencing social, emotional or behavioural difficulties. However, this assumption lacks empirical evidence. Study design. Musicinmindisamulti-centredsingle-blindrandomizedcontrolledtrial involving 200 young people (aged 816 years) and their parents. Eligible participants willhaveaworkingdiagnosiswithintheambitofInternational ClassificationofDisease 10 Mental and Behavioural Disorders and will be recruited over 15 months from six centres within the Child and Adolescent Mental Health Services of a large health and social care trust in Northern Ireland. Participants will be randomly allocated in a 1:1 ratio to receive standard care alone or standard care plus 12 weekly music therapy sessions delivered by the Northern Ireland Music Therapy Trust. Baseline data will be collectedfromyoungpeopleandtheirparentsusingstandardizedoutcomemeasuresfor communicative and interaction skills (primary endpoint), self-esteem, social functioning, depressionandfamilyfunctioning.Follow-updatawillbecollected1and13 weeks afterthefinalmusictherapysession.Acost-effectivenessanalysiswillalsobecarriedout. Discussion. This study will be the largest trial to date examining the effect of music therapy on young people experiencing social, emotional or behavioural difficulties and will provide empirical evidence for the use of music therapy among this population. Trial registration. This study is registered in theISRCTNRegister,ISRCTN96352204. Ethical approval was gained in October 2010.
Insurgent Building: Spatial Practices of Resistance in the Bedouin-State Conflict in Southern Israel
Resumo:
In the con?ict between Bedouin representatives and government authorities in the southern Israeli Negev, the term insurgent building refers to the construction of buildings erected in the full expectation that they will be demolished by the Israeli police shortly thereafter. This article analyses how insurgent building is employed as a spatial practice by emerging political actors to claim contested Bedouin landownership. Importantly, insurgent building relies on the ability of media and advocacy organizations to mobilize behind the issue. Most of the relevant scholarship takes the interpretative categories advanced by these actors at face value. Following anthropological debates regarding objecti?cation and categorization, I examine the context of a speci?c case of insurgent building. Emerging political actors who employ insurgent building often rely on prede?ned ethnic categories and clear-cut peoplestate polarities. This case demonstrates the need for a more differentiated understanding of multilayered local dynamics than the one offered by mainstream linear interpretations. At a more abstract level, political actors contribute to the reproduction of the very categories against which they mobilize.
Resumo:
Background<br/>Little is known about interventions to help men and their partners cope with the after effects of prostate cancer treatment. The lack of in-depth descriptions of the intervention content is hindering the identification of which intervention (or component of an intervention) works.<br/><br/>Aim<br/>To describe the development and evaluation of the content of a self-management psychosocial intervention for men with prostate cancer and their partners.<br/><br/>Design<br/>A feasibility randomized controlled trial including structure, process, and outcome analysis.<br/><br/>Methods<br/>This 9-week intervention commences on completion of treatment and consists of three group and two telephone sessions. The intervention focuses on symptom management, sexual dysfunction, uncertainty management, positive thinking and couple communication. Forty-eight couples will be assigned to either the intervention or a control group receiving usual care. Participants will be assessed at baseline, immediately postintervention and at 1 and 6 months postintervention. Outcome measures for patients and caregivers include self-efficacy, quality of life, symptom distress, uncertainty, benefits of illness, health behaviour, and measures of couple communication and support. An additional caregiver assessment will be completed by the partner.<br/><br/>Discussion<br/>The main purpose of this feasibility study is to investigate the acceptability of the CONNECT programme to men with prostate cancer and their partners and to gain feedback from the participants and facilitators to make changes to and enhance the programme. Reasons why men do not want to participate will be collated to enhance recruitment in the future. We will also test recruitment strategies, randomization procedures, and the acceptability of the questionnaires. Ethical approval granted December 2010.
Resumo:
<p>We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each bad processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors private random bits.</p> <p>A good quorum is a set of O(logn) processors, which contains a majority of good processors. In this paper, we give a synchronous algorithm which uses polylogarithmic time and (vn) bits of communication per processor to bring all processors to agreement on a collection of n good quorums, solving Byzantine agreement as well. The collection is balanced in that no processor is in more than O(logn) quorums. This yields the first solution to Byzantine agreement which is both scalable and load-balanced in the full information model.</p> <p>The technique which involves going from situation where slightly more than 1/2 fraction of processors are good and and agree on a short string with a constant fraction of random bits to a situation where all good processors agree on n good quorums can be done in a fully asynchronous model as well, providing an approach for extending the Byzantine agreement result to this model.</p>
Resumo:
We address the propagation of a single photon pulse with two polarization components, i.e., a polarization qubit, in an inhomogeneously broadened "phaseonium" \Lambda-type three-level medium. We combine some of the non-trivial propagation effects characteristic for this kind of coherently prepared systems and the controlled reversible inhomogeneous broadening technique to propose several quantum information processing applications, such as a protocol for polarization qubit filtering and sieving as well as a tunable polarization beam splitter. Moreover, we show that, by imposing a spatial variation of the atomic coherence phase, an effcient quantum memory for the incident polarization qubit can be also implemented in \Lambda-type three-level systems.
Resumo:
In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.
Resumo:
The papers in this special issue focus on the topic of location awareness for radio and networks. Localization-awareness using radio signals stands to revolutionize the fields of navigation and communication engineering. It can be utilized to great effect in the next generation of cellular networks, mining applications, health-care monitoring, transportation and intelligent highways, multi-robot applications, first responders operations, military applications, factory automation, building and environmental controls, cognitive wireless networks, commercial and social network applications, and smart spaces. A multitude of technologies can be used in location-aware radios and networks, including GNSS, RFID, cellular, UWB, WLAN, Bluetooth, cooperative localization, indoor GPS, device-free localization, IR, Radar, and UHF. The performances of these technologies are measured by their accuracy, precision, complexity, robustness, scalability, and cost. Given the many application scenarios across different disciplines, there is a clear need for a broad, up-to-date and cogent treatment of radio-based location awareness. This special issue aims to provide a comprehensive overview of the state-of-the-art in technology, regulation, and theory. It also presents a holistic view of research challenges and opportunities in the emerging areas of localization.