855 resultados para adaptable communications
Resumo:
Abstract not available
Resumo:
Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.
Resumo:
Tämän tutkimuksen tavoitteena on tunnistaa sisältömarkkinoinnin mahdollisuuksia ja haasteita digitaalisessa markkinointiviestinnässä. Lisäksi tavoitteena on antaa yksiselitteinen määritelmä sisältömarkkinoinnille sekä selvittää, miten se eroaa muista markkinointiviestinnän keinoista. Sisältömarkkinointi on strateginen markkinointiviestinnän keino, johon kuuluu asiakkaan kannalta mielenkiintoisen ja hyödyllisen sisällön tuottaminen ja jakaminen. Sisältömarkkinointi tarjoaa keinon muodostaa brändimielikuvia luonnollisin keinoin ilman mainoksen leimaa, jota osa kuluttajista välttelee tietoisesti jopa mainosten esto-ohjelmien avulla. Perinteiset markkinointiviestinnän keinot pyrkivät usein lyhyen aikavälin myyntituloksiin, kun taas sisältömarkkinointi pyrkii maksimoimaan asiakkaan koko elinkaaren arvon. Onnistunut sisältömarkkinointi vaatii yrityksiltä kärsivällisyyttä sekä asiakkaiden kokonaisvaltaista tuntemista.
Resumo:
Dans cette étude, nous brosserons d'abord un tableau de la situation historique et actuelle de l'influence des parents sur l'école. Puis, nous analyserons certaines données recueillies auprès des parents de notre organisation, la Commission scolaire des Cèdres. Et enfin, nous ferons des recommandations concrètes visant l'amélioration des communications parents-écoles dans notre organisation dans le but de mieux répondre aux besoins de l'élève. Quand nous parlerons de l'influence des parents sur l'école, nous voudrons parler du type d'influence qu'à un client sur un fournisseur de services plutôt que de l'influence qu'a le supérieur hiérarchique sur son subalterne. Donc, nous ne présenterons pas la relation parent-école comme une relation de pouvoir, mais plutôt comme une communication productive entre une organisation de services et un client. Il s'agit d'une recherche-action qui vise à faire des recommandations opérationnelles découlant de besoins bien identifiés.
Resumo:
Bikeshares promote healthy lifestyles and sustainability among commuters, casual riders, and tourists. However, the central pillar of modern systems, the bike station, cannot be easily integrated into a compact college campus. Fixed stations lack the flexibility to meet the needs of college students who make quick, short-distance trips. Additionally, the necessary cost of implementing and maintaining each station prohibits increasing the number of stations for user convenience. Therefore, the team developed a stationless bikeshare based on a smartlock permanently attached to bicycles in the system. The smartlock system design incorporates several innovative approaches to provide usability, security, and reliability that overcome the limitations of a station centered design. A focus group discussion allowed the team to receive feedback on the early lock, system, and website designs, identify improvements and craft a pleasant user experience. The team designed a unique, two-step lock system that is intuitive to operate while mitigating user error. To ensure security, user access is limited through near field ii communications (NFC) technology connected to a mechatronic release system. The said system relied on a NFC module and a servo working through an Arduino microcontroller coded in the Arduino IDE. To track rentals and maintain the system, each bike is fitted with an XBee module to communicate with a scalable ZigBee mesh network. The network allows for bidirectional, real-time communication with a Meteor.js web application, which enables user and administrator functions through an intuitive user interface available on mobile and desktop. The development of an independent smartlock to replace bike stations is essential to meet the needs of the modern college student. With the goal of creating a bikeshare that better serves college students, Team BIKES has laid the framework for a system that is affordable, easily adaptable, and implementable on any university expressing an interest in bringing a bikeshare to its campus.
Resumo:
Communicating at a high data rate through the ocean is challenging. Such communications must be acoustic in order to travel long distances. The underwater acoustic channel has a long delay spread, which makes orthogonal frequency division multiplexing (OFDM) an attractive communication scheme. However, the underwater acoustic channel is highly dynamic, which has the potential to introduce significant inter-carrier interference (ICI). This thesis explores a number of means for mitigating ICI in such communication systems. One method that is explored is directly adapted linear turbo ICI cancellation. This scheme uses linear filters in an iterative structure to cancel the interference. Also explored is on-off keyed (OOK) OFDM, which is a signal designed to avoid ICI.
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Resumo:
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we combine two previously proposed approaches to introduce a new distributed and compressed MIKEY mode for the Internet of Things. Indeed, relying on a cooperative approach, a set of third parties is used to discharge the constrained nodes from heavy computational operations. Doing so, the preshared mode is used in the constrained part of network, while the public key mode is used in the unconstrained part of the network. Furthermore, to mitigate the communication cost we introduce a new header compression scheme that reduces the size of MIKEY’s header from 12 Bytes to 3 Bytes in the best compression case. Preliminary results show that our proposed mode is energy preserving whereas its security properties are preserved untouched.
Resumo:
This note contains three presentations given by Mr A. Krempf, J. Risbec and Nguyèn-Công-Tiêu from the Oceanographic Institute of Indochine, at the 4th Pacific Science Congress, held in Java on May-June 1929.
Resumo:
The 5th Pacific Science Congress was held at Victoria and Vancouver (Canada) in June 1933. Six scientists from the Oceanographic Institute of Indochina were at the Conference to present their contributions published in the present note.
Resumo:
Call Level Interfaces (CLI) play a key role in business tiers of relational and on some NoSQL database applications whenever a fine tune control between application tiers and the host databases is a key requirement. Unfortunately, in spite of this significant advantage, CLI are low level API, this way not addressing high level architectural requirements. Among the examples we emphasize two situations: a) the need to decouple or not to decouple the development process of business tiers from the development process of application tiers and b) the need to automatically adapt business tiers to new business and/or security needs at runtime. To tackle these CLI drawbacks, and simultaneously keep their advantages, this paper proposes an architecture relying on CLI from which multi-purpose business tiers components are built, herein referred to as Adaptable Business Tier Components (ABTC). Beyond the reference architecture, this paper presents a proof of concept based on Java and Java Database Connectivity (an example of CLI).
Resumo:
Call Level Interfaces (CLI) are low level API that play a key role in database applications whenever a fine tune control between application tiers and the host databases is a key requirement. Unfortunately, in spite of this significant advantage, CLI were not designed to address organizational requirements and contextual runtime requirements. Among the examples we emphasize the need to decouple or not to decouple the development process of business tiers from the development process of application tiers and also the need to automatically adapt to new business and/or security needs at runtime. To tackle these CLI drawbacks, and simultaneously keep their advantages, this paper proposes an architecture relying on CLI from which multi-purpose business tiers components are built, herein referred to as Adaptable Business Tier Components (ABTC). This paper presents the reference architecture for those components and a proof of concept based on Java and Java Database Connectivity (an example of CLI).
Resumo:
Se describe el uso de tecnología en forma de presentaciones de multimedia para facilitar la enseñanza de las Normas para el Aprendizaje de una Lengua Extranjera del Concilio Americano para la Enseñanza de Lenguas extranjeras. Las normas abarcan las comunicaciones, las culturas, las conexiones, las comparaciones y las comunidades. El estudiantado universitario aprende a crear, con multimedia, presentaciones sobre un tema cultural en la lengua meta. El componente de aprendizaje por servicio comunitario se fundamenta en las presentaciones creadas para estudiantes de colegio, quienes tienen acceso a las presentaciones en un sitio web de la universidad.A description is provided of how the use of technology in the form of multimedia presentations enhances the teaching of the Five C Standards for Foreign Language Learning of the American Council on the Teaching of Foreign Languages: communications, cultures, connections, comparisons, and communities. University students learn to create multimedia presentations on a cultural topic in the target language. The service-learning component provides the multimedia presentations for middle-school students who access them from the university website.
Resumo:
Mode of access: Internet.
Resumo:
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2014