822 resultados para Neighborhood networking
Resumo:
In recent years, XML has been accepted as the format of messages for several applications. Prominent examples include SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This XML usage is understandable, as the format itself is a well-accepted standard for structured data, and it has excellent support for many popular programming languages, so inventing an application-specific format no longer seems worth the effort. Simultaneously with this XML's rise to prominence there has been an upsurge in the number and capabilities of various mobile devices. These devices are connected through various wireless technologies to larger networks, and a goal of current research is to integrate them seamlessly into these networks. These two developments seem to be at odds with each other. XML as a fully text-based format takes up more processing power and network bandwidth than binary formats would, whereas the battery-powered nature of mobile devices dictates that energy, both in processing and transmitting, be utilized efficiently. This thesis presents the work we have performed to reconcile these two worlds. We present a message transfer service that we have developed to address what we have identified as the three key issues: XML processing at the application level, a more efficient XML serialization format, and the protocol used to transfer messages. Our presentation includes both a high-level architectural view of the whole message transfer service, as well as detailed descriptions of the three new components. These components consist of an API, and an associated data model, for XML processing designed for messaging applications, a binary serialization format for the data model of the API, and a message transfer protocol providing two-way messaging capability with support for client mobility. We also present relevant performance measurements for the service and its components. As a result of this work, we do not consider XML to be inherently incompatible with mobile devices. As the fixed networking world moves toward XML for interoperable data representation, so should the wireless world also do to provide a better-integrated networking infrastructure. However, the problems that XML adoption has touch all of the higher layers of application programming, so instead of concentrating simply on the serialization format we conclude that improvements need to be made in an integrated fashion in all of these layers.
Resumo:
This paper reports on a study to evaluate technology-based processes for assessment moderation. The aim was to evaluate standard features found in an institutional Learning Management System, and their compatibility with the values and practices of a large teaching team. The process used an online discussion board forum for tutors, the paring of more experienced tutors with those new to the process, and further meetings conducted in both face-to-face and web conferencing environments. Online rubrics were used for assessing student work and the provision of feedback. A focus group conducted after marking was concluded and the analysis of the discussion board forum demonstrated a strong community of practice with a shared understanding of assessment requirements.
Resumo:
Australian education is undergoing national reform at many levels. The school sector, where preservice teachers will be employed, are adjusting to the demands of the National Curriculum and improving teacher quality through the National Professional Standards for Teachers. In addition, the university sector, where pre-service teachers are prepared, is undergoing its own education reform through the introduction of a demand-driven system and ensuring quality for tertiary education interns through the Higher Education Standards Framework. In moving to prepare preservice teachers for the school system; universities are grappling with the double-barreled approach to teacher quality; quality within the university course and quality within the student teachers being prepared. Through a collaborative partnership including university lecturers, Department of Education central administration staff, school principals, school coordinators, practicum supervisors, mentor teachers and pre-service teachers; the stakeholders have formed an online community of learners engaging in reflective practice who are committed to improving teacher quality. This online community not only links the key stakeholders within the project, it facilitates the nexus between theory and practice often missing in our pre-service teacher placements. This paper reports preliminary data about an initiative to ensure final year pre-service teachers are aspiring to meet the graduate professional standards through the use of an innovative online community.
Resumo:
The research reported in this paper documents the use of Web2.0 applications with six Western Australian schools that are considered to be regional and/or remote. With a population of two million people within an area of 2,525,500 square kilometres Western Australia has a number of towns that are classified as regional and remote. Each of the three education systems have set up telecommunications networks to improve learning opportunities for students and administrative services for staff through a virtual private network (VPN) with access from anywhere, anytime and ultimately reduce the feeling of professional and social dislocation experienced by many teachers and students in the isolated communities. By using Web2.0 applications including video conferencing there are enormous opportunities to close the digital divide within the broad directives of the Networking the Nation plan. The Networking the Nation plan aims to connect all Australians regardless of where they are hence closing the digital divide between city and regional living. Email and Internet facilities have greatly improved in rural, regional and remote areas supporting every day school use of the Internet. This study highlights the possibilities and issues for advanced telecommunications usage of Web2.0 applications discussing the research undertaken with these schools. (Contains 1 figure and 3 tables.)
Resumo:
The Politics of Pulp Investment and the Brazilian Landless Movement (MST) The paper industry has been moving more heavily to the global South at the beginning of the 21st century. In a number of cases the rural populations of the global South have engaged in increasingly important resistance in their scuffle with the large-scale tree plantation-relying pulp investment model. The resistance had generally not yet managed to slow down Southern industrial tree plantation expansion until 2004. After all, even the MST, perhaps the strongest of the Southern movements, has limited power in comparison to the corporations pushing for plantation expansion. This thesis shows how, even against these odds, depending on the mechanisms of contention and case-specific conflict dynamics, in some cases the movements have managed to slow and even reverse plantation expansion. The thesis is based on extensive field research in the Brazilian countryside. It outlines a new theory of contentious agency promotion, emphasizing its importance in the shaping of corporate resource exploitation. The thesis includes a Qualitative Comparative Analysis of resistance influence on the economic outcomes of all (14) Brazilian large-scale pulp projects between 2004-2008. The central hypothesis of the thesis is that corporate resource exploitation can be slowed down more effectively and likely when the resistance is based on contentious agency. Contentious agency is created by the concatenation of five mutually supporting mechanisms of contention: organizing and politicizing a social movement; heterodox framing of pulp projects; protesting; networking; and embedding whilst maintaining autonomy. The findings suggest that contentious agency can slow or even reverse the expansion of industrial plantations, whereas when contentious agency promotion was inactive, fast or even unchecked plantation expansion was always the outcome. The rule applied to all the assessed 14 pulp conflict cases. The hypothesis gained strong support even in situations where corporate agency promotion was simultaneously active. In previous studies on social movements, there has been a lack of contributions that help us understand the causal mechanisms of contention influencing economic outcomes. The thesis answers to the call by merging a Polanyian analysis of the political economy with the Dynamics of Contention research program and making a case for the impact of contentious agency on capital accumulation. The research concludes that an efficient social movement can utilize mechanisms of contention to promote the potential of activism among its members and influence investment outcomes. Protesting, for example via pioneering land occupations, seemed to be particularly important. Until now, there has been no comprehensive theory on when and how contentious agency can slow down or reverse the expansion of corporate resource exploitation. The original contribution of this research is to provide such a theory, and utilize it to offer an extensive explanation on the conflicts over pulp investment in Brazil, the globalization of the paper industry, and slowing of industrial plantation expansion in the global South.
Resumo:
This article charts the development of the 'Create a Better Online You' (CBOY) project. The focus of CBOY was the social media skills of undergraduate students at QUT. While many students will have encountered 'cybersafety' training in primary or secondary school, however, a comprehensive environmental scan revealed little in the way of social media resources targeted at undergraduate students. In particular, there was little to no focus on the ways in which social media could be used strategically to develop a positive online reputation and enhance chances of employability post tertiary education. The resources created as part of CBOY were the result of a comprehensive literature review, environmental scan, interviews with key internal and external stakeholders, and in discussion with undergraduate students at Queensland University of Technology (QUT). Following the comprehensive environmental scan, it appears that CBOY represents one of the first free, openly accessible, interactive resources targeting the social media skills of undergraduates.
Resumo:
As one of the most widely used wireless network technologies, IEEE 802.11 wireless local area networks (WLANs) have found a dramatically increasing number of applications in soft real-time networked control systems (NCSs). To fulfill the real-time requirements in such NCSs, most of the bandwidth of the wireless networks need to be allocated to high-priority data for periodic measurements and control with deadline requirements. However, existing QoS-enabled 802.11 medium access control (MAC) protocols do not consider the deadline requirements explicitly, leading to unpredictable deadline performance of NCS networks. Consequentially, the soft real-time requirements of the periodic traffic may not be satisfied, particularly under congested network conditions. This paper makes two main contributions to address this problem in wireless NCSs. Firstly, a deadline-constrained MAC protocol with QoS differentiation is presented for IEEE 802.11 soft real-time NCSs. It handles periodic traffic by developing two specific mechanisms: a contention-sensitive backoff mechanism, and an intra-traffic-class QoS differentiation mechanism. Secondly, a theoretical model is established to describe the deadline-constrained MAC protocol and evaluate its performance of throughput, delay and packet-loss ratio in wireless NCSs. Numerical studies are conducted to validate the accuracy of the theoretical model and to demonstrate the effectiveness of the new MAC protocol.
Resumo:
This paper addresses an output feedback control problem for a class of networked control systems (NCSs) with a stochastic communication protocol. Under the scenario that only one sensor is allowed to obtain the communication access at each transmission instant, a stochastic communication protocol is first defined, where the communication access is modelled by a discrete-time Markov chain with partly unknown transition probabilities. Secondly, by use of a network-based output feedback control strategy and a time-delay division method, the closed-loop system is modeled as a stochastic system with multi time-varying delays, where the inherent characteristic of the network delay is well considered to improve the control performance. Then, based on the above constructed stochastic model, two sufficient conditions are derived for ensuring the mean-square stability and stabilization of the system under consideration. Finally, two examples are given to show the effectiveness of the proposed method.
Resumo:
Distributed Collaborative Computing services have taken over centralized computing platforms allowing the development of distributed collaborative user applications. These applications enable people and computers to work together more productively. Multi-Agent System (MAS) has emerged as a distributed collaborative environment which allows a number of agents to cooperate and interact with each other in a complex environment. We want to place our agents in problems whose solutions require the collation and fusion of information, knowledge or data from distributed and autonomous information sources. In this paper we present the design and implementation of an agent based conference planner application that uses collaborative effort of agents which function continuously and autonomously in a particular environment. The application also enables the collaborative use of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web service. The premise of the application is that it allows autonomous agents interacting with web and grid services to plan a conference as a proxy to their owners (humans). © 2005 IEEE.
Resumo:
This paper asks a new question: how we can use RFID technology in marketing products in supermarkets and how we can measure its performance or ROI (Return-on-Investment). We try to answer the question by proposing a simulation model whereby customers become aware of other customers' real-time shopping behavior and may hence be influenced by their purchases and the levels of purchases. The proposed model is orthogonal to sales model and can have the similar effects: increase in the overall shopping volume. Managers often struggle with the prediction of ROI on purchasing such a technology, this simulation sets to provide them the answers of questions like the percentage of increase in sales given real-time purchase information to other customers. The simulation is also flexible to incorporate any given model of customers' behavior tailored to particular supermarket, settings, events or promotions. The results, although preliminary, are promising to use RFID technology for marketing products in supermarkets and provide several dimensions to look for influencing customers via feedback, real-time marketing, target advertisement and on-demand promotions. Several other parameters have been discussed including the herd behavior, fake customers, privacy, and optimality of sales-price margin and the ROI of investing in RFID technology for marketing purposes. © 2010 Springer Science+Business Media B.V.
Resumo:
Human age is surrounded by assumed set of rules and behaviors imposed by local culture and the society they live in. This paper introduces software that counts the presence of a person on the Internet and examines the activities he/she conducts online. The paper answers questions such as how "old" are you on the Internet? How soon will a newbie be exposed to adult websites? How long will it take for a new Internet user to know about social networking sites? And how many years a user has to surf online to celebrate his/her first "birthday" of Internet presence? Paper findings from a database of 105 school and university students containing their every click of first 24 hours of Internet usage are presented. The findings provide valuable insights for Internet Marketing, ethics, Internet business and the mapping of Internet life with real life. Privacy and ethical issues related to the study have been discussed at the end. © Springer Science+Business Media B.V. 2010.
Resumo:
We obtained the images of the eastern part of the solar corona in the Fe xiv 530.3 nm (green) and Fe x 637.4 nm (red) coronal emission lines during the total solar eclipse of 29 March 2006 at Manavgat, Antalya, Turkey. The images were obtained using a 35 cm Meade telescope equipped with a Peltier-cooled 2k x 2k CCD and 0.3 nm pass-band interference filters at the rates of 2.95 s (exposure times of 100 ms) and 2.0 s (exposure times of 300 ms) in the Fe xiv and Fe x emission lines,respectively. The analysis of the data indicates intensity variations at some locations with period of strongest power around 27 s for the green line and 20 s for the red line. These results confirm earlier findings of variations in the continuum intensity with periods in the range of 5 to 56 s by Singh et al. (Solar Phys. 170, 235, 1997). The wavelet analysis has been used to identify significant intensity oscillations at all pixels within our field of view. Significant oscillations with high probability estimates were detected for some locations only. These locations seem to follow the boundary of an active region and in the neighborhood, rather than within the loops themselves. These intensity oscillations may be caused by fast magneto-sonic waves in the solar corona and partly account for heating of the plasma in the corona.
Resumo:
In this paper, we consider non-linear transceiver designs for multiuser multi-input multi-output (MIMO) down-link in the presence of imperfections in the channel state information at the transmitter (CSIT). The base station (BS) is equipped with multiple transmit antennas and each user terminal is equipped with multiple receive antennas. The BS employs Tomlinson-Harashima precoding (THP) for inter-user interference pre-cancellation at the transmitter. We investigate robust THP transceiver designs based on the minimization of BS transmit power with mean square error (MSE) constraints, and balancing of MSE among users with a constraint on the total BS transmit power. We show that these design problems can be solved by iterative algorithms, wherein each iteration involves a pair of convex optimization problems. The robustness of the proposed algorithms to imperfections in CSIT is illustrated through simulations.
Resumo:
Generating discriminative input features is a key requirement for achieving highly accurate classifiers. The process of generating features from raw data is known as feature engineering and it can take significant manual effort. In this paper we propose automated feature engineering to derive a suite of additional features from a given set of basic features with the aim of both improving classifier accuracy through discriminative features, and to assist data scientists through automation. Our implementation is specific to HTTP computer network traffic. To measure the effectiveness of our proposal, we compare the performance of a supervised machine learning classifier built with automated feature engineering versus one using human-guided features. The classifier addresses a problem in computer network security, namely the detection of HTTP tunnels. We use Bro to process network traffic into base features and then apply automated feature engineering to calculate a larger set of derived features. The derived features are calculated without favour to any base feature and include entropy, length and N-grams for all string features, and counts and averages over time for all numeric features. Feature selection is then used to find the most relevant subset of these features. Testing showed that both classifiers achieved a detection rate above 99.93% at a false positive rate below 0.01%. For our datasets, we conclude that automated feature engineering can provide the advantages of increasing classifier development speed and reducing development technical difficulties through the removal of manual feature engineering. These are achieved while also maintaining classification accuracy.
Resumo:
While journalism scholarship on Twitter has expanded significantly in recent years, journalists’ use of the social networking platform for self-promotion and branding has only recently received attention. Yet, as Twitter is becoming important for journalists to build economic and social capital, journalistic branding is increasingly relevant to study. This article reports the results from a study of 4189 Australian journalists’ Twitter accounts to examine their approaches to self-presentation and branding in their profile information. We find that journalists self-identify primarily through professional characteristics, but a significant number also mix this with personal information. Yet, they are also wary of providing personal information, with one-third including a disclaimer that their views are their own. Whereas only small differences could be found along gender lines, more significant differences existed in terms of whether journalists worked in metropolitan or regional areas and the nature of their employers’ main platform of distribution.