947 resultados para Science communication
Resumo:
There is an increasing appreciation of the polymicrobial nature of bacterial infections associated with Cystic Fibrosis (CF) and of the important role for interactions in influencing bacterial virulence and response to therapy. Patients with CF are co-infected with Pseudomonas aeruginosa, Burkholderia cenocepacia and Stenotrophomonas maltophilia. These latter bacteria produce signal molecules of the diffusible signal factor (DSF) family, which are cis-2-unsaturated fatty acids. Previous studies showed that DSF from S. maltophilia leads to altered biofilm formation and increased tolerance to antibiotics in P. aeruginosa and that these responses require the P. aeruginosa sensor kinase PA1396. The work in this thesis aims of further elucidate the influence and mechanism of DSF signalling on P. aeruginosa and examine the role that such interspecies signalling play in infection of the CF airway. Next generation sequencing technologies targeting the 16S ribosomal RNA gene were applied to DNA and RNA isolated from sputum taken from cohorts of CF and non-CF subjects to characterise the bacterial community. In parallel, metabolomics analysis of sputum provided insight into the environment of the CF airway. This analysis revealed a number of observations including; that differences in metabolites occur in sputum taken from clinically stable CF patients and those with exacerbation and DNA- and RNA-based methods suggested that a strong relationship existed between the abundance of specific strict anaerobes and fluctuations in the level of metabolites during exacerbation. DSF family signals were also detected in the sputum and a correlation with the presence of DSFproducing organisms was observed. To examine the signal transduction mechanisms used by P. aeruginosa, bioinformatics with site directed mutagenesis were employed to identify signalling partners for PA1396. A pathway suggesting a role for a number of proteins in the regulation of several factors following DSF recognition by PA1396 were observed.
Resumo:
High volumes of data traffic along with bandwidth hungry applications, such as cloud computing and video on demand, is driving the core optical communication links closer and closer to their maximum capacity. The research community has clearly identifying the coming approach of the nonlinear Shannon limit for standard single mode fibre [1,2]. It is in this context that the work on modulation formats, contained in Chapter 3 of this thesis, was undertaken. The work investigates the proposed energy-efficient four-dimensional modulation formats. The work begins by studying a new visualisation technique for four dimensional modulation formats, akin to constellation diagrams. The work then carries out one of the first implementations of one such modulation format, polarisation-switched quadrature phase-shift keying (PS-QPSK). This thesis also studies two potential next-generation fibres, few-mode and hollow-core photonic band-gap fibre. Chapter 4 studies ways to experimentally quantify the nonlinearities in few-mode fibre and assess the potential benefits and limitations of such fibres. It carries out detailed experiments to measure the effects of stimulated Brillouin scattering, self-phase modulation and four-wave mixing and compares the results to numerical models, along with capacity limit calculations. Chapter 5 investigates hollow-core photonic band-gap fibre, where such fibres are predicted to have a low-loss minima at a wavelength of 2μm. To benefit from this potential low loss window requires the development of telecoms grade subsystems and components. The chapter will outline some of the development and characterisation of these components. The world's first wavelength division multiplexed (WDM) subsystem directly implemented at 2μm is presented along with WDM transmission over hollow-core photonic band-gap fibre at 2μm. References: [1]P. P. Mitra, J. B. Stark, Nature, 411, 1027-1030, 2001 [2] A. D. Ellis et al., JLT, 28, 423-433, 2010.
Resumo:
The pervasive use of mobile technologies has provided new opportunities for organisations to achieve competitive advantage by using a value network of partners to create value for multiple users. The delivery of a mobile payment (m-payment) system is an example of a value network as it requires the collaboration of multiple partners from diverse industries, each bringing their own expertise, motivations and expectations. Consequently, managing partnerships has been identified as a core competence required by organisations to form viable partnerships in an m-payment value network and an important factor in determining the sustainability of an m-payment business model. However, there is evidence that organisations lack this competence which has been witnessed in the m-payment domain where it has been attributed as an influencing factor in a number of failed m-payment initiatives since 2000. In response to this organisational deficiency, this research project leverages the use of design thinking and visualisation tools to enhance communication and understanding between managers who are responsible for managing partnerships within the m-payment domain. By adopting a design science research approach, which is a problem solving paradigm, the research builds and evaluates a visualisation tool in the form of a Partnership Management Canvas. In doing so, this study demonstrates that when organisations encourage their managers to adopt design thinking, as a way to balance their analytical thinking and intuitive thinking, communication and understanding between the partners increases. This can lead to a shared understanding and a shared commitment between the partners. In addition, the research identifies a number of key business model design issues that need to be considered by researchers and practitioners when designing an m-payment business model. As an applied research project, the study makes valuable contributions to the knowledge base and to the practice of management.
Resumo:
This dissertation examines the role of communications technology in social change. It examines secondary data on contemporary China arguing that many interpretations of events in China are unsuitable at best and at worst conceptually damages our understanding of social change in China. This is especially the case in media studies under the ‘democratic framework’. It proposes that there is an alternative framework in studying the media and social change. This alternative conceptual framework is termed a zone of interpretative development offering a means by which to discuss events that take place in a mediated environment. Taking a theoretical foundation using the philosophy of Mikhail Bakhtin this dissertation develops a platform with which to understand communication technology from an anthropological perspective. Three media events from contemporary China are examined. The first examines the Democracy Wall event and the implications of using a public sphere framework. The second case examines the phenomenon of the Grass Mud Horse, a symbol that has gained popular purchase as a humorous expression of political dissatisfaction and develops the problems seen in the first case but with some solutions. Using a modification of Lev Vygotskiĭ’s zone of proximal development this symbol is understood as an expression of the collective recognition of a shared experience. In the second example from the popular TV talent show contests in China further expressions of collective experience are introduced. With the evidence from these media events in contemporary China this dissertation proposes that we can understand certain modes of communication as occurring in a zone of interpretative development. This proposed anthropological feature of social change via communication and technology can fruitfully describe meaning-formation in society via the expression and recognition of shared experiences.
Resumo:
The influence of communication technology on group decision-making has been examined in many studies. But the findings are inconsistent. Some studies showed a positive effect on decision quality, other studies have shown that communication technology makes the decision even worse. One possible explanation for these different findings could be the use of different Group Decision Support Systems (GDSS) in these studies, with some GDSS better fitting to the given task than others and with different sets of functions. This paper outlines an approach with an information system solely designed to examine the effect of (1) anonymity, (2) voting and (3) blind picking on decision quality, discussion quality and perceived quality of information.
Resumo:
In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.
Resumo:
The possibility of arbitrarily "adding" and "subtracting" single photons to and from a light field may give access to a complete engineering of quantum states and to fundamental quantum phenomena. We experimentally implemented simple alternated sequences of photon creation and annihilation on a thermal field and used quantum tomography to verify the peculiar character of the resulting light states. In particular, as the final states depend on the order in which the two actions are performed, we directly observed the noncommutativity of the creation and annihilation operators, one of the cardinal concepts of quantum mechanics, at the basis of the quantum behavior of light. These results represent a step toward the full quantum control of a field and may provide new resources for quantum information protocols
Resumo:
The technical challenges in the design and programming of signal processors for multimedia communication are discussed. The development of terminal equipment to meet such demand presents a significant technical challenge, considering that it is highly desirable that the equipment be cost effective, power efficient, versatile, and extensible for future upgrades. The main challenges in the design and programming of signal processors for multimedia communication are, general-purpose signal processor design, application-specific signal processor design, operating systems and programming support and application programming. The size of FFT is programmable so that it can be used for various OFDM-based communication systems, such as digital audio broadcasting (DAB), digital video broadcasting-terrestrial (DVB-T) and digital video broadcasting-handheld (DVB-H). The clustered architecture design and distributed ping-pong register files in the PAC DSP raise new challenges of code generation.
Resumo:
Insects of the order Hymenoptera are biologically and economically important members of natural and agro ecosystems and exhibit diverse biologies, mating systems, and sex pheromones. We review what is known of their sex pheromone chemistry and function, paying particular emphasis to the Hymenoptera Aculeata (primarily ants, bees, and sphecid and vespid wasps), and provide a framework for the functional classification of their sex pheromones. Sex pheromones often comprise multicomponent blends derived from numerous exocrine tissues, including the cuticle. However, very few sex pheromones have been definitively characterized using bioassays, in part because of the behavioral sophistication of many Aculeata. The relative importance of species isolation versus sexual selection in shaping sex pheromone evolution is still unclear. Many species appear to discriminate among mates at the level of individual or kin/colony, and they use antiaphrodisiacs. Some orchids use hymenopteran sex pheromones to dupe males into performing pseudocopulation, with extreme species specificity.
Resumo:
In many passerine species, males sing more than one distinct song type. Commonly, songs are assigned to different song types or song categories based on phonological and syntactical dissimilarities. However, temporal aspects, such as song length and song rate, also need to be considered to understand the possible functions of different songs. Common nightingales (Luscinia megarhynchos) have large vocal repertoires of different song types but their songs additionally can be grouped into two distinct categories (particular groups of song types): whistle songs and nonwhistle songs. Whistle songs are hypothesised to be important to attract migrating females. We studied temporal properties of whistle songs and nonwhistle songs and examined the relationship between those song parameters and song output parameters, such as song rate and song length. To investigate how song parameters vary among males, we calculated the coefficients of variation for different song traits. We found that the variation in the proportion of whistle songs was significantly higher among males than variation in other song parameters. Furthermore, the proportion of whistle songs was negatively correlated with other sona output patterns. These findings suggest that the production of whistle songs might be constrained and/or that whistle songs and their succeeding pauses may act as a functional unit in communication.
Effects of territorial intrusions on eavesdropping neighbors: communication networks in nightingales
Resumo:
Animal communication often occurs in communication networks in which multiple signalers and receivers are within signaling range of each other. In such networks, individuals can obtain information on the quality and motivation of territorial neighbors by eavesdropping on their signaling interactions. In songbirds, extracting information from interactions involving neighbors is thought to be an important factor in the evolution of strategies of territory defense. In a playback experiment with radio-tagged nightingales Luscinia megarhynchos we here demonstrate that territorial males use their familiar neighbors' performance in a vocal interaction with an unfamiliar intruder as a standard for their own response. Males were attracted by a vocal interaction between their neighbor and a simulated stranger and intruded into the neighbor's territory. The more intensely the neighbor had interacted with playback, the earlier the intrusions were made, indicating that males eavesdropped on the vocal contest involving a neighbor. However, males never intruded when we had simulated by a second playback that the intruder had retreated and sang outside the neighbor's territory. These results suggest that territorial males use their neighbors' singing behavior as an early warning system when territorial integrity is threatened. Simultaneous responses by neighboring males towards unfamiliar rivals are likely to be beneficial to the individuals in maintaining territorial integrity.