890 resultados para Interception of communications


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Simulation has been widely used to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new architecture built with the SiVIC simulator and the RTMaps™ multisensors prototyping platform. We introduce several improvements from a previous similar architecture, regarding IVC modelisation and vehicles’ control. It has been tuned with on-road measurements to improve fidelity. We discuss the results of a freeway emergency braking scenario (EEBL) implemented to validate our architecture’s capabilities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The structures of two ammonium salts of 3-carboxy-4-hydroxybenzenesulfonic acid (5-sulfosalicylic acid, 5-SSA) have been determined at 200 K. In the 1:1 hydrated salt, ammonium 3-carboxy-4-hydroxybenzenesulfonate monohydrate, NH4+·C7H5O6S-·H2O, (I), the 5-SSA- monoanions give two types of head-to-tail laterally linked cyclic hydrogen-bonding associations, both with graph-set R44(20). The first involves both carboxylic acid O-HOwater and water O-HOsulfonate hydrogen bonds at one end, and ammonium N-HOsulfonate and N-HOcarboxy hydrogen bonds at the other. The second association is centrosymmetric, with end linkages through water O-HOsulfonate hydrogen bonds. These conjoined units form stacks down c and are extended into a three-dimensional framework structure through N-HO and water O-HO hydrogen bonds to sulfonate O-atom acceptors. Anhydrous triammonium 3-carboxy-4-hydroxybenzenesulfonate 3-carboxylato-4-hydroxybenzenesulfonate, 3NH4+·C7H4O6S2-·C7H5O6S-, (II), is unusual, having both dianionic 5-SSA2- and monoanionic 5-SSA- species. These are linked by a carboxylic acid O-HO hydrogen bond and, together with the three ammonium cations (two on general sites and the third comprising two independent half-cations lying on crystallographic twofold rotation axes), give a pseudo-centrosymmetric asymmetric unit. Cation-anion hydrogen bonding within this layered unit involves a cyclic R33(8) association which, together with extensive peripheral N-HO hydrogen bonding involving both sulfonate and carboxy/carboxylate acceptors, gives a three-dimensional framework structure. This work further demonstrates the utility of the 5-SSA- monoanion for the generation of stable hydrogen-bonded crystalline materials, and provides the structure of a dianionic 5-SSA2- species of which there are only a few examples in the crystallographic literature.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Effective use of psychotherapeutic treatment in interpreter-assisted settings is well established; however, there has been little discussion of the use of psychodynamically-informed treatments in such settings. The literature suggests that therapy facilitated by interpreters is not conducive to psychodynamic approaches due to the presence of a third person, the perceived lack of intimacy, and the difficulties of working with translated material. However, transference, countertransference and other unconscious communications and responses necessarily occur in every therapeutic setting, including triadic therapy using interpreters. This paper describes a short-term (12 session) psychodynamically-oriented intervention with a 52-year old Cantonese-speaking man suffering from depression. A female, Chinese-born interpreter assisted in every session. The integral role of supervision in supporting a containing relationship between the therapist and the patient and the difficult emotional responses experienced by the interpreter is highlighted. The paper attempts to trace some of the unconscious communications that occurred during the therapy and demonstrates the feasibility of working psychodynamically in an interpreter-assisted setting.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter begins from the premise that, to date, television remains the dominant communications technology in the digital media sport environment. It argues that sports-related programming is often overlooked in favour of event coverage in the study of sports television. Analysis focuses on three areas - platform interaction, technological innovation, and content ecologies - and describes technological innovations arising from television coverage of sports, with a particular focus on online video, audience measurement, and 3D production and viewing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The surface formation energies of four low-indexed surfaces, including (001), (100), (110) and (011), of tin dioxide (SnO2) terminated by nonmetals (H, N, O, F, Cl, Br, and I) have been studied with the frameworks of density functional theory. A strong dependence of relative surface stabilities on surface atoms has been presented based on the calculations. Several instructions, in particular the selection of specific precursors and morphology controlling agents, have been further illustrated as a guideline for experimentalists.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information and communications technologies are a significant component of the healthcare domain and electronic health records play a major role within it. As a result, it is important that they are accepted en masse by healthcare professionals. How healthcare professionals perceive the usefulness of electronic health records and their attitudes towards them have been shown to have significant effects on their overall acceptance. This paper investigates the role of perceived usefulness and attitude on the intention to use electronic health records by future healthcare professionals using polynomial regression with response surface analysis. Results show that the relationship is more complex than predicted in prior research. The paper concludes that the predicting properties of the above determinants must be further investigated to clearly understand their role in predicting the intention to use electronic health records and in designing systems that are better adopted by healthcare professionals of the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we analyse the effects of highway traffic flow parameters like vehicle arrival rate and density on the performance of Amplify and Forward (AF) cooperative vehicular networks along a multi-lane highway under free flow state. We derive analytical expressions for connectivity performance and verify them with Monte-Carlo simulations. When AF cooperative relaying is employed together with Maximum Ratio Combining (MRC) at the receivers the average route error rate shows 10-20 fold improvement compared to direct communication. A 4-8 fold increase in maximum number of traversable hops can also be observed at different vehicle densities when AF cooperative communication is used to strengthen communication routes. However the theorical upper bound of maximum number of hops promises higher performance gains.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A range of authors from the risk management, crisis management, and crisis communications literature have proposed different models as a means of understanding components of crisis. A generic component of these sources has focused on preparedness practices before disturbance events and response practices during events. This paper provides a critical analysis of three key explanatory models of how crises escalate highlighting the strengths and limitations of each approach. The paper introduces an optimised conceptual model utilising components from the previous work under the four phases of pre-event, response, recovery, and post-event. Within these four phases, a ten step process is introduced that can enhance understanding of the progression of distinct stages of disturbance for different types of events. This crisis evolution framework is examined as a means to provide clarity and applicability to a range of infrastructure failure contexts and provide a path for further empirical investigation in this area.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to investigate information communications technologies (ICT)-mediated inclusion and exclusion in terms of sexuality through a study of a commercial social networking web site for gay men. Design/methodology/approach – The paper uses an approach based on technological inscription and the commodification of difference to study Gaydar, a commercial social networking site. Findings – Through the activities, events and interactions offered by Gaydar, the study identifies a series of contrasting identity constructions and market segmentations that are constructed through the cyclic commodification of difference. These are fuelled by a particular series of meanings attached to gay male sexualities which serve to keep gay men positioned as a niche market. Research limitations/implications – The research centres on the study of one, albeit widely used, web site with a very specific set of purposes. The study offers a model for future research on sexuality and ICTs. Originality/value – This study places sexuality centre stage in an ICT-mediated environment and provides insights into the contemporary phenomenon of social networking. As a sexualised object, Gaydar presents a semiosis of politicised messages that question heteronormativity while simultaneously contributing to the definition of an increasingly globalised, commercialised and monolithic form of gay male sexuality defined against ICT

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The recent Australian Convergence Review’s second principle states: “Australians should have access to and opportunities for participation in a diverse mix of services, voices, views and information”. However, in failing to define its own use and understanding of the terms ‘access’ and ‘participation’ the Convergence Review exposes itself to criticism. These terms would no doubt be made unambiguously clear should the Review’s recommendations move towards policy, and this paper contributes to this discussion by framing access and participation, from the perspective of the ‘produser’ (Bruns, 2008), around three separate but related issues: the failure to frame the discussion that will be undertaken by the Australian Law Reform Commission’s 2012 2013 Copyright Inquiry; the prioritising of the market over and above media accountability and the health of the public sphere; and the missed opportunity to develop a national framework for digital literacy and advanced digital citizenry.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The recognition and enforcement of foreign judgments is an aspect of private international law, and concerns situations where a successful party to litigation seeks to rely on a judgment obtained in one court, in a court in another jurisdiction. The most common example where the recognition and enforcement of foreign judgments may arise is where a party who has obtained a favourable judgment in one state or country may seek to recognise and enforce the judgment in another state or country. This occurs because there is no sufficient asset in the state or country where the judgment was rendered to satisfy that judgment. As technological advancements in communications over vast geographical distances have improved exponentially in recent years, there has been an increase in cross-border transactions, as well as litigation arising from these transactions. As a result, the recognition and enforcement of foreign judgments is of increasing importance, since a party who has obtained a judgment in cross-border litigation may wish to recognise and enforce the judgment in another state or country, where the defendant’s assets may be located without having to re-litigate substantive issues that have already been resolved in another court. The purpose of the study is to examine whether the current state of laws for the recognition and enforcement of foreign judgments in Australia, the United States and the European Community are in line with modern-commercial needs. The study is conducted by weighing two competing objectives between the notion of finality of litigation, which encourages courts to recognise and enforce judgments foreign to them, on the one hand, and the adequacy of protection to safeguard the recognition and enforcement proceedings, so that there would be no injustice or unfairness if a foreign judgment is recognised and enforced, on the other. The findings of the study are as follows. In both Australia and the United States, there is a different approach concerning the recognition and enforcement of judgments rendered by courts interstate or in a foreign country. In order to maintain a single and integrated nation, there are constitutional and legislative requirements authorising courts to give conclusive effects to interstate judgments. In contrast, if the recognition and enforcement actions involve judgments rendered by a foreign country’s court, an Australian or a United States court will not recognise and enforce the foreign judgment unless the judgment has satisfied a number of requirements and does not fall under any of the exceptions to justify its non-recognition and non-enforcement. In the European Community, the Brussels I Regulation which governs the recognition and enforcement of judgments among European Union Member States has created a scheme, whereby there is only a minimal requirement that needs to be satisfied for the purposes of recognition and enforcement. Moreover, a judgment that is rendered by a Member State and based on any of the jurisdictional bases set forth in the Brussels I Regulation is entitled to be recognised and enforced in another Member State without further review of its underlying jurisdictional basis. However, there are concerns as to the adequacy of protection available under the Brussels I Regulation to safeguard the judgment-enforcing Member States, as well as those against whom recognition or enforcement is sought. This dissertation concludes by making two recommendations aimed at improving the means by which foreign judgments are recognised and enforced in the selected jurisdictions. The first is for the law in both Australia and the United States to undergo reform, including: adopting the real and substantial connection test as the new jurisdictional basis for the purposes of recognition and enforcement; liberalising the existing defences to safeguard the application of the real and substantial connection test; extending the application of the Foreign Judgments Act 1991 (Cth) in Australia to include at least its important trading partners; and implementing a federal statutory scheme in the United States to govern the recognition and enforcement of foreign judgments. The second recommendation is to introduce a convention on jurisdiction and the recognition and enforcement of foreign judgments. The convention will be a convention double, which provides uniform standards for the rules of jurisdiction a court in a contracting state must exercise when rendering a judgment and a set of provisions for the recognition and enforcement of resulting judgments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.