794 resultados para Microwave communication systems
Resumo:
Background Miscommunication in the healthcare sector can be life-threatening. The rising number of migrant patients and foreign-trained staff means that communication errors between a healthcare practitioner and patient when one or both are speaking a second language are increasingly likely. However, there is limited research that addresses this issue systematically. This protocol outlines a hospital-based study examining interactions between healthcare practitioners and their patients who either share or do not share a first language. Of particular interest are the nature and efficacy of communication in language-discordant conversations, and the degree to which risk is communicated. Our aim is to understand language barriers and miscommunication that may occur in healthcare settings between patients and healthcare practitioners, especially where at least one of the speakers is using a second (weaker) language. Methods/Design Eighty individual interactions between patients and practitioners who speak either English or Chinese (Mandarin or Cantonese) as their first language will be video recorded in a range of in- and out-patient departments at three hospitals in the Metro South area of Brisbane, Australia. All participants will complete a language background questionnaire. Patients will also complete a short survey rating the effectiveness of the interaction. Recordings will be transcribed and submitted to both quantitative and qualitative analyses to determine elements of the language used that might be particularly problematic and the extent to which language concordance and discordance impacts on the quality of the patient-practitioner consultation. Discussion Understanding the role that language plays in creating barriers to healthcare is critical for healthcare systems that are experiencing an increasing range of culturally and linguistically diverse populations both amongst patients and practitioners. The data resulting from this study will inform policy and practical solutions for communication training, provide an agenda for future research, and extend theory in health communication.
Resumo:
While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance
Resumo:
Network topology and routing are two important factors in determining the communication costs of big data applications at large scale. As for a given Cluster, Cloud, or Grid system, the network topology is fixed and static or dynamic routing protocols are preinstalled to direct the network traffic. Users cannot change them once the system is deployed. Hence, it is hard for application developers to identify the optimal network topology and routing algorithm for their applications with distinct communication patterns. In this study, we design a CCG virtual system (CCGVS), which first uses container-based virtualization to allow users to create a farm of lightweight virtual machines on a single host. Then, it uses software-defined networking (SDN) technique to control the network traffic among these virtual machines. Users can change the network topology and control the network traffic programmingly, thereby enabling application developers to evaluate their applications on the same system with different network topologies and routing algorithms. The preliminary experimental results through both synthetic big data programs and NPB benchmarks have shown that CCGVS can represent application performance variations caused by network topology and routing algorithm.
Resumo:
Interest in the area of collaborative Unmanned Aerial Vehicles (UAVs) in a Multi-Agent System is growing to compliment the strengths and weaknesses of the human-machine relationship. To achieve effective management of multiple heterogeneous UAVs, the status model of the agents must be communicated to each other. This paper presents the effects on operator Cognitive Workload (CW), Situation Awareness (SA), trust and performance by increasing the autonomy capability transparency through text-based communication of the UAVs to the human agents. The results revealed a reduction in CW, increase in SA, increase in the Competence, Predictability and Reliability dimensions of trust, and the operator performance.
Resumo:
In this paper, we present a decentralized dynamic load scheduling/balancing algorithm called ELISA (Estimated Load Information Scheduling Algorithm) for general purpose distributed computing systems. ELISA uses estimated state information based upon periodic exchange of exact state information between neighbouring nodes to perform load scheduling. The primary objective of the algorithm is to cut down on the communication and load transfer overheads by minimizing the frequency of status exchange and by restricting the load transfer and status exchange within the buddy set of a processor. It is shown that the resulting algorithm performs almost as well as a perfect information algorithm and is superior to other load balancing schemes based on the random sharing and Ni-Hwang algorithms. A sensitivity analysis to study the effect of various design parameters on the effectiveness of load balancing is also carried out. Finally, the algorithm's performance is tested on large dimensional hypercubes in the presence of time-varying load arrival process and is shown to perform well in comparison to other algorithms. This makes ELISA a viable and implementable load balancing algorithm for use in general purpose distributed computing systems.
Resumo:
For point to point multiple input multiple output systems, Dayal-Brehler-Varanasi have proved that training codes achieve the same diversity order as that of the underlying coherent space time block code (STBC) if a simple minimum mean squared error estimate of the channel formed using the training part is employed for coherent detection of the underlying STBC. In this letter, a similar strategy involving a combination of training, channel estimation and detection in conjunction with existing coherent distributed STBCs is proposed for noncoherent communication in Amplify-and-Forward (AF) relay networks. Simulation results show that the proposed simple strategy outperforms distributed differential space-time coding for AF relay networks. Finally, the proposed strategy is extended to asynchronous relay networks using orthogonal frequency division multiplexing.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
Multiprocessor systems which afford a high degree of parallelism are used in a variety of applications. The extremely stringent reliability requirement has made the provision of fault-tolerance an important aspect in the design of such systems. This paper presents a review of the various approaches towards tolerating hardware faults in multiprocessor systems. It. emphasizes the basic concepts of fault tolerant design and the various problems to be taken care of by the designer. An indepth survey of the various models, techniques and methods for fault diagnosis is given. Further, we consider the strategies for fault-tolerance in specialized multiprocessor architectures which have the ability of dynamic reconfiguration and are suited to VLSI implementation. An analysis of the state-óf-the-art is given which points out the major aspects of fault-tolerance in such architectures.
Resumo:
This project was a step forward in improving the voltage profile of traditional low voltage distribution networks with high photovoltaic generation or high peak demand. As a practical and economical solution, the developed methods use a Dynamic Voltage Restorer or DVR, which is a series voltage compensator, for continuous and communication-less power quality enhancement. The placement of DVR in the network is optimised in order to minimise its power rating and cost. In addition, new approaches were developed for grid synchronisation and control of DVR which are integrated with the voltage quality improvement algorithm for stable operation.
Resumo:
Abstract is not available.
Resumo:
Developing countries in Asia and the Pacific are rapidly reaching middle income economic status. Their competitive advantage is shifting from labor-intensive industries and natural resource-based economies to knowledge-based economies that innovate and create new products and services. Early adoption of information and communication technology (ICT) can allow countries to leapfrog over the traditional development pathway into production of knowledge-based products and services. Since higher education institutions (HEIs) are considered a primary engine of economic growth, adoption of ICT is imperative for securing competitive advantage. ICT is thought to be one of the fastest growing industries and is frequently heralded as a transforming influence on higher education systems globally and, consequently, is enhancing the competitive advantage of countries. It is increasingly becoming evident that an institution-wide ICT strategy covering all evolving functions of competitive HEIs is necessary. Such a system may be designed as an integrated platform but implemented in phases.
Resumo:
In 2001 a scoping study (phase I) was commissioned to determine and prioritise the weed issues of cropping systems with dryland cotton. The main findings were that the weed flora was diverse, cropping systems complex, and weeds had a major financial and economical impact. Phase II 'Best weed management strategies for dryland cropping systems with cotton' focused on improved management of the key weeds, bladder ketmia, sowthistle, fleabane, barnyard grass and liverseed grass.In Phase III 'Improving management of summer weeds in dryland cropping systems with cotton', more information on the seed-bank dynamics of key weeds was gained in six pot and field studies. The studies found that these characteristics differed between species, and even climate in the case of bladder ketmia. Species such as sowthistle, fleabane and barnyard grass emerged predominately from the surface soil. Sweet summer grass was also in this category but also had a significant proportion emerging from 5 cm depth. Bladder ketmia in central Queensland emerged mainly from the top 2 cm, whereas in southern Queensland it emerged mainly from 5 cm. Liverseed grass had its highest emergence from 5 cm below the surface. In all cases the persistence of seed increased with increasing soil depth. Fleabane was also found to be sensitive to soil type with no seedlings emerging in the self-mulching black vertisol soil. A strategic tillage trial showed that burial of fleabane seed, using a disc or chisel plough, to a depth of greater than 2 cm can significantly reduce subsequent fleabane emergence. In contrast, tillage increased barnyard grass emergence and tended to decrease persistence. This research showed that weed management plans can not be blanketed across all weed species, rather they need to be targeted for each main weed species.This project has also resulted in an increased knowledge of how to manage fleabane from the eight experiments; one in wheat, two in sorghum, one in cotton and three in fallow on double knock. For summer crops, the best option is to apply a highly effective fallow treatment prior to sowing the crops. For winter crops, the strategy is the integration of competitive crops, residual herbicide followed by a knockdown to control survivors. This project explored further the usefulness of the double knock tactic for weed control and preventing seed set. Two field and one pot experiments have shown that this tactic was highly effective for fleabane control. Paraquat products provided good control when followed by glyphosate. When 2, 4-D was added in a tank mix with glyphosate and followed by paraquat products, 99-100% control was achieved in all cases. The ideal follow-up times for paraquat products after glyphosate were 5-7 days. The preferred follow-up times for 2, 4-D after glyphosate were on the same day and one day later. The pot trial, which compared a population from a cropping field with previous glyphosate exposure and a population from a non-cropping area with no previous glyphosate herbicide exposure, showed that the pervious herbicide exposure affected the response of fleabane to herbicidal control measures. The web-based brochure on managing fleabane has been updated.Knowledge on management of summer grasses and safe use of residual herbicides was derived from eight field and pot experiments. Residual grass and broadleaf weed control was excellent with atrazine pre-plant and at-planting treatments, provided rain was received within a short interval after application. Highly effective fallow treatments (cultivation and double knock), not only gave excellent grass control in the fallow, also gave very good control in the following cotton. In the five re-cropping experiments, there were no adverse impacts on cotton from atrazine, metolachlor, metsulfuron and chlorsulfuron residues following use in previous sorghum, wheat and fallows. However, imazapic residues did reduce cotton growth.The development of strategies to reduce the heavy reliance on glyphosate in our cropping systems, and therefore minimise the risk of glyphosate resistance development, was a key factor in the research undertaken. This work included identifying suitable tactics for summer grass control, such as double knock with glyphosate followed by paraquat and tillage. Research on fleabane also concentrated on minimising emergence through tillage, and applying the double knock tactic. Our studies have shown that these strategies can be used to prevent seed set with the goal of driving down the seed bank. Utilisation of the strategies will also reduce the reliance on glyphosate, and therefore reduce the risk of glyphosate resistance developing in our cropping systems.Information from this research, including ecological and management data were collected from an additional eight paddock monitoring sites, was also incorporated into the Weeds CRC seed bank model "Weed Seed Wizard", which will be able to predict the impact of different management options on weed populations in cotton and grain farming systems. Extensive communication activities were undertaken throughout this project to ensure adoption of the new strategies for improved weed management and reduced risk for glyphosate resistance.
Resumo:
This paper recasts the multiple data path assignment problem solved by Torng and Wilhelm by the dynamic programming method [1] into a minimal covering problem following a switching theoretic approach. The concept of bus compatibility for the data transfers is used to obtain the various ways of interconnecting the circuit modules with the minimum number of buses that allow concurrent data transfers. These have been called the feasible solutions of the problem. The minimal cost solutions are obtained by assigning weights to the bus-compatible sets present in the feasible solutions. Minimization of the cost of the solution by increasing the number of buses is also discussed.