909 resultados para computer-mediated communications
Resumo:
For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been focused on cooperative embedded devices in order to extend environment perception. Handling an extended perception range is important in order to provide enough information for both path planning and co-pilot algorithms which need to anticipate events. To carry out such applications, simulation has been widely used. Simulation is efficient to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new and modular architecture built with the SiVIC simulator and the RTMaps™ multi-sensors prototyping platform. A set of improvements, implemented in SiVIC, are introduced in order to take into account IVC modelling and vehicles’ control. These 2 aspects have been tuned with on-road measurements to improve the realism of the scenarios. The results obtained from a freeway emergency braking scenario are discussed.
Resumo:
Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities. Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a “conversation between the past and the future” (Fairclough, 2012, xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yugambeh elders and an Aboriginal principal. The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Using conversations with Indigenous elders and material artifacts as an entry point for storytelling; iii. Dadirri – spiritual listening in the yarning circle to develop storytelling (Ungunmerr-Baumann, 2002); and iv. Writing and publicly sharing oral histories through digital scrapbooking shared via social media. The program aligned with the Australian National Curriculum English (ACARA, 2012), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a multi-age primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students’ digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. The findings demonstrate that Indigenous children’s use of media production reflects “shifting and negotiated identities” in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, xv). It demonstrated how the children’s experiences of culture are layered over time, as successive generations inherit, interweave, and hear others’ cultural stories or maps. It also demonstrated how the children’s production of narratives through multimedia can provide a platform for the flow and reconstruction of performative collective memories and “lived traces of a common past” (Giaccardi, 2012). It disrupts notions of cultural reductionism and racial incommensurability that fix and homogenize Indigenous practices within and against a dominant White norm. Recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production.
Resumo:
Nedd4-2, a HECT (homologous with E6-associated protein C-terminus)-type ubiquitin protein ligase, has been implicated in regulating several ion channels, including Navs (voltage-gated sodium channels). In Xenopus oocytes Nedd4-2 strongly inhibits the activity of multiple Navs. However, the conditions under which Nedd4-2 mediates native Nav regulation remain uncharacterized. Using Nedd4-2-deficient mice, we demonstrate in the present study that in foetal cortical neurons Nedd4-2 regulates Navs specifically in response to elevated intracellular Na(+), but does not affect steady-state Nav activity. In dorsal root ganglia neurons from the same mice, however, Nedd4-2 does not control Nav activities. The results of the present study provide the first physiological evidence for an essential function of Nedd4-2 in regulating Navs in the central nervous system.
Resumo:
This paper presents a distributed communication based active power curtailment (APC) control scheme for grid connected photovoltaic (PV) systems to address voltage rise. A simple distribution feeder model is presented and simulated using MATLAB. The resource sharing based control scheme proposed is shown to be effective at reducing voltage rise during times of peak generation and low load. Simulations also show the even distribution of APC using simple communications. Simulations demonstrate the versatility of the proposed control method under major communication failure conditions. Further research may lead to possible applications in coordinated electric vehicle (EV) charging.
Resumo:
Background and purpose Phosphodiesterases PDE3 and/or PDE4 control ventricular effects of catecholamines in several species but their relative effects in failing human ventricle are unknown. We investigated whether the PDE3-selective inhibitor cilostamide (0.3-1μM) or PDE4 inhibitor rolipram (1-10μM) modified the positive inotropic and lusitropic effects of catecholamines in human failing myocardium. Experimental approach Right and left ventricular trabeculae from freshly explanted hearts of 5 non-β-blocker-treated and 15 metoprolol-treated patients with terminal heart failure were paced to contract at 1Hz. The effects of (-)-noradrenaline, mediated through β1-adrenoceptors (β2-adrenoceptors blocked with ICI118551), and (-)-adrenaline, mediated through β2-adrenoceptors (β1-adrenoceptors blocked with CGP20712A), were assessed in the absence and presence of PDE inhibitors. Catecholamine potencies were estimated from –logEC50s. Key results Cilostamide did not significantly potentiate the inotropic effects of the catecholamines in non-β-blocker-treated patients. Cilostamide caused greater potentiation (P=0.037) of the positive inotropic effects of (-)-adrenaline (0.78±0.12 log units) than (-)-noradrenaline (0.47±0.12 log units) in metoprolol-treated patients. Lusitropic effects of the catecholamines were also potentiated by cilostamide. Rolipram did not affect the inotropic and lusitropic potencies of (-)-noradrenaline or (-)-adrenaline on right and left ventricular trabeculae from metoprolol-treated patients. Conclusions and implications Metoprolol induces a control by PDE3 of ventricular effects mediated through both β1- and β2-adrenoceptors, thereby further reducing sympathetic cardiostimulation in patients with terminal heart failure. Concurrent therapy with a PDE3 blocker and metoprolol could conceivably facilitate cardiostimulation evoked by adrenaline through β2-adrenoceptors. PDE4 does not appear to reduce inotropic and lusitropic effects of catecholamines in failing human ventricle.
Resumo:
Spectrum sensing of multiple primary user channels is a crucial function in cognitive radio networks. In this paper we propose an optimal, sensing resource allocation algorithm for multi-channel cooperative spectrum sensing. The channel target is implemented as an objective and constraint to ensure a pre-determined number of empty channels are detected for secondary user network operations. Based on primary user traffic parameters, we calculate the minimum number of primary user channels that must be sensed to satisfy the channel target. We implement a hybrid sensing structure by grouping secondary user nodes into clusters and assign each cluster to sense a different primary user channels. We then solve the resource allocation problem to find the optimal sensing configuration and node allocation to minimise sensing duration. Simulation results show that the proposed algorithm requires the shortest sensing duration to achieve the channel target compared to existing studies that require long sensing and cannot guarantee the target.
Resumo:
Because of their limited number of senior positions and fewer alternative career paths, small businesses have a more difficult time attracting and retaining skilled information systems (IS) staff and are thus dependent upon external expertise. Small businesses are particularly dependent on outside expertise when first computerizing. Because small businesses suffer from severe financial constraints. it is often difficult to justify the cost of custom software. Hence. for many small businesses, engaging a consultant to help with identifying suitable packaged software and related hardware, is their first critical step toward computerization. This study explores the importance of proactive client involvement when engaging a consultant to assist with computer system selection in small businesses. Client involvement throughout consultant engagement is found to be integral to project success and frequently lacking due to misconceptions of small businesses regarding their role. Small businesses often overestimate the impact of consultant and vendor support in achieving successful computer system selection and implementation. For consultant engagement to be successful, the process must be viewed as being directed toward the achievement of specific organizational results where the client accepts responsibility for direction of the process.
Resumo:
Increasingly the fields of Human Computer Interaction (HCI) and art are intersecting. Interactive artworks are being evaluated by HCI methods and artworks are being created that employ and repurpose technology for interactive environments. In this paper we steer a path between empirical and critical–theoretical traditions, and discuss HCI research and art works that also span this divide. We address concerns about ‘new’ ethnography raised by Crabtree et al. (2009) in “Ethnography Considered Harmful”, a critical essay that positions ethnographic and critical-theoretical views at odds with each other. We propose a mediated view for understanding interactions within open-ended interactive artworks that values both perspectives as we navigate boundaries between art practice and HCI.
Resumo:
We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Resumo:
WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 stream cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 213.5 keystream bits and with a negligible error probability. Also, we investigate the security of WG-7 against algebraic attacks. An algebraic key recovery attack on this cipher is proposed. The attack allows to recover both the internal state and the secret key with the time complexity about 2/27.
Resumo:
Boolean functions and their Möbius transforms are involved in logical calculation, digital communications, coding theory and modern cryptography. So far, little is known about the relations of Boolean functions and their Möbius transforms. This work is composed of three parts. In the first part, we present relations between a Boolean function and its Möbius transform so as to convert the truth table/algebraic normal form (ANF) to the ANF/truth table of a function in different conditions. In the second part, we focus on the special case when a Boolean function is identical to its Möbius transform. We call such functions coincident. In the third part, we generalize the concept of coincident functions and indicate that any Boolean function has the coincidence property even it is not coincident.
Resumo:
The mechanisms involved in the control of embryonic stem (ES) cell differentiation are yet to be fully elucidated. However, it has become clear that the family of fibroblast growth factors (FGFs) are centrally involved. In this study we examined the role of the FGF receptors (FGFRs 1-4) during osteogenesis in murine ES cells. Single cells were obtained after the formation of embryoid bodies, cultured on gelatin-coated plates, and coaxed to differentiate along the osteogenic lineage. Upregulation of genes was analyzed at both the transcript and protein levels using gene array, relative-quantitative PCR (RQ-PCR), and Western blotting. Deposition of a mineralized matrix was evaluated with Alizarin Red staining. An FGFR1-specific antibody was generated and used to block FGFR1 activity in mES cells during osteogenic differentiation. Upon induction of osteogenic differentiation in mES cells, all four FGFRs were clearly upregulated at both the transcript and protein levels with a number of genes known to be involved in osteogenic differentiation including bone morphogenetic proteins (BMPs), collagen I, and Runx2. Cells were also capable of depositing a mineralized matrix, confirming the commitment of these cells to the osteogenic lineage. When FGFR1 activity was blocked, a reduction in cell proliferation and a coincident upregulation of Runx2 with enhanced mineralization of cultures was observed. These results indicate that FGFRs play critical roles in cell recruitment and differentiation during the process of osteogenesis in mES cells. In particular, the data indicate that FGFR1 plays a pivotal role in osteoblast lineage determination.
Resumo:
Polarisation diversity is a technique to improve the quality of mobile communications, but its reliability is suboptimal because it depends on the mobile channel and the antenna orientations at both ends of the mobile link. A method to optimise the reliability is established by minimising the dependency on antenna orientations. While the mobile base station can have fixed antenna orientation, the mobile terminal is typically a handheld device with random orientations. This means orientation invariance needs to be established at the receiver in the downlink, and at the transmitter in the uplink. This research presents separate solutions for both cases, and is based on the transmission of an elliptically polarised signal synthesised from the channel statistics. Complete receiver orientation invariance is achieved in the downlink. Effects of the transmitter orientation are minimised in the uplink.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.