935 resultados para socio-technical network


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Twitter and other social networking sites play an ever more present role in the spread of current events. The dynamics of information dissemination through digital network structures are still relatively unexplored, however. At what time an issue is taken up by whom? Who forwards a message when to whom else? What role do individual communication participants, existing digital communities or the technical foundations of each network platform play in the spread of news? In this chapter we discuss, using the example of a video on a current sociopolitical issue in Australia that was shared on Twitter, a number of new methods for the dynamic visualisation and analysis of communication processes. Our method combines temporal and spatial analytical approaches and provides new insights into the spread of news in digital networks. [Social media dienen immer häufger als Disseminationsmechanismen für Medieninhalte. Auf Twitter ermöglicht besonders die Retweet-Funktion den schnellen und weitläufgen Transfer von Nachrichten. In diesem Beitrag etablieren neue methodische Ansätze zur Erfassung, Visualisierung und Analyse von Retweet-Ketten. Insbesondere heben wir hervor, wie bestehende Netzwerkanalysemethoden ergänzt werden können, um den Ablauf der Weiterleitung sowohl temporal als auch spatial zu erfassen. Unsere Fallstudie demonstriert die verbreitung des videoclips einer am 9. Oktober 2012 spontan gehaltenen Wutrede der australischen Premierministerin Julia Gillard, in der sie Oppositionsführer Tony Abbott als Frauenhasser brandmarkte. Durch die Erfassung von Hintergrunddaten zu den jeweiligen NutzerInnen, die sich an der Weiterleitung des Videoclips beteiligten, erstellen wir ein detailliertes Bild des Disseminationsablaufs im vorliegenden Fall. So lassen sich die wichtigsten AkteurInnen und der Ablauf der Weiterleitung darstellen und analysieren. Daraus entstehen Einblicke in die allgemeinen verbreitungsmuster von Nachrichten auf Twitter].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Close attention to technical quality or image optimization in transthoracic echocardiography (TTE) is important for the acquisition of high-quality diagnostic images and to ensure that measurements are accurately performed. For this purpose, the echocardiographer must be familiar with all the controls on the ultrasound machine that can be manipulated to optimize the two-dimensional (2D) images, color Doppler images, and spectral Doppler traces...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Japanese law is going ‘pop’. Since the turn of the century, Japanese popular culture, especially prime-time television, has dedicated more time to legal themes, characters and settings. Lawyers, overwhelmingly women, are the heroes in both dramatic and comedic television series (Nakamura, 2007). Courtroom battles are the scene for plot developments (Ishikawa, 2004). Practising lawyers are the new celebrities, joining actors and singers on the light entertainment talk show circuit. To be sure, law is not a new thematic preoccupation on Japanese network television. Nor is it one that has become so dominant that it overshadows more traditional genres such as workplace romantic comedies, coming-of-age dramas or family soap operas (eg, Dissanayake, 2012, p._194). But, its growing presence on the silver screen in twenty-first-century Japan is a trend that merits analysis. The purpose of this chapter is to explore that socio-legal significance. This presents theoretical and empirical challenges. Theoretically, is there explanatory potential in the link between law and popular culture in Japan? Empirically, does the greater embrace of law-related characters, plots and scenes in prime-time television series since 2001 provide compelling evidence of changing popular attitudes to law and legal process among Japanese viewers? The inspiration for both the title and theme of this chapter comes from Sherwin’s When Law Goes Pop (2000). But it departs from Sherwin in how it defines and analyses the issues. For Sherwin, ‘pop’ means ‘implosion’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Based on protein molecular dynamics, we investigate the fractal properties of energy, pressure and volume time series using the multifractal detrended fluctuation analysis (MF-DFA) and the topological and fractal properties of their converted horizontal visibility graphs (HVGs). The energy parameters of protein dynamics we considered are bonded potential, angle potential, dihedral potential, improper potential, kinetic energy, Van der Waals potential, electrostatic potential, total energy and potential energy. The shape of the h(q)h(q) curves from MF-DFA indicates that these time series are multifractal. The numerical values of the exponent h(2)h(2) of MF-DFA show that the series of total energy and potential energy are non-stationary and anti-persistent; the other time series are stationary and persistent apart from series of pressure (with H≈0.5H≈0.5 indicating the absence of long-range correlation). The degree distributions of their converted HVGs show that these networks are exponential. The results of fractal analysis show that fractality exists in these converted HVGs. For each energy, pressure or volume parameter, it is found that the values of h(2)h(2) of MF-DFA on the time series, exponent λλ of the exponential degree distribution and fractal dimension dBdB of their converted HVGs do not change much for different proteins (indicating some universality). We also found that after taking average over all proteins, there is a linear relationship between 〈h(2)〉〈h(2)〉 (from MF-DFA on time series) and 〈dB〉〈dB〉 of the converted HVGs for different energy, pressure and volume.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many studies have shown that we can gain additional information on time series by investigating their accompanying complex networks. In this work, we investigate the fundamental topological and fractal properties of recurrence networks constructed from fractional Brownian motions (FBMs). First, our results indicate that the constructed recurrence networks have exponential degree distributions; the average degree exponent 〈λ〉 increases first and then decreases with the increase of Hurst index H of the associated FBMs; the relationship between H and 〈λ〉 can be represented by a cubic polynomial function. We next focus on the motif rank distribution of recurrence networks, so that we can better understand networks at the local structure level. We find the interesting superfamily phenomenon, i.e., the recurrence networks with the same motif rank pattern being grouped into two superfamilies. Last, we numerically analyze the fractal and multifractal properties of recurrence networks. We find that the average fractal dimension 〈dB〉 of recurrence networks decreases with the Hurst index H of the associated FBMs, and their dependence approximately satisfies the linear formula 〈dB〉≈2-H, which means that the fractal dimension of the associated recurrence network is close to that of the graph of the FBM. Moreover, our numerical results of multifractal analysis show that the multifractality exists in these recurrence networks, and the multifractality of these networks becomes stronger at first and then weaker when the Hurst index of the associated time series becomes larger from 0.4 to 0.95. In particular, the recurrence network with the Hurst index H=0.5 possesses the strongest multifractality. In addition, the dependence relationships of the average information dimension 〈D(1)〉 and the average correlation dimension 〈D(2)〉 on the Hurst index H can also be fitted well with linear functions. Our results strongly suggest that the recurrence network inherits the basic characteristic and the fractal nature of the associated FBM series.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The safety and performance of bridges could be monitored and evaluated by Structural Health Monitoring (SHM) systems. These systems try to identify and locate the damages in a structure and estimate their severities. Current SHM systems are applied to a single bridge, and they have not been used to monitor the structural condition of a network of bridges. This paper propose a new method which will be used in Synthetic Rating Procedures (SRP) developed by the authors of this paper and utilizes SHM systems for monitoring and evaluating the condition of a network of bridges. Synthetic rating procedures are used to assess the condition of a network of bridges and identify their ratings. As an additional part of the SRP, the method proposed in this paper can continuously monitor the behaviour of a network of bridges and therefore it can assist to prevent the sudden collapses of bridges or the disruptions to their serviceability. The method could be an important part of a bridge management system (BMS) for managers and engineers who work on condition assessment of a network of bridges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With recent economic growth in Oman there is increased use of heavy vehicles, presenting an increase in heavy vehicle crashes, associated fatalities and injuries. Vehicle defects cause a significant number of heavy vehicle crashes in Oman and increase the likelihood of fatalities. The aim of this study is to explore factors contributing to driving with vehicle defects in the Omani heavy vehicle industry. A series of qualitative participants observations were conducted in Oman with 49 drivers. These observations also involved discussion and interviews with drivers. The observations occurred at two road-side locations where heavy vehicle drivers gather for eating, resting, vehicle check-up, etc. Data collection was conducted over a three week period. The data was analysed using thematic analysis. A broad number of factors were identified as contributing to the driving of vehicles with defects. Participants indicated that tyres and vehicle mechanical faults were a common issue in the heavy vehicle industry. Participants regularly reported that their companies use cheap, poor quality standards parts and conducted minimal maintenance. Drivers also indicated that they felt powerless to resist company pressure to drive vehicles with known faults. In addition, drivers reported that traffic police were generally in effective and lacked skill to appropriately conduct roadside inspection on trucks. Further, participants stated that it was possible for companies to avoid being fined during annual or roadside vehicle inspections if members of the company knew the traffic police officer conducting the inspection. Moreover, fines issued by police are generally directed to the individual driver rather than being applied to the company, thus providing no incentive for companies to address vehicle faults. The implications of the findings are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This contribution is a long-term study of the evolving use of the organization-wide groupware in a service network. We are describing the practices related to organization-wide groupware in conjunction with local groupware-related practices and how they have proceeded since the organization was established. In the discussion of these practices we are focussing on issues such as: 1. tendencies for proliferation and integration, 2. local appropriations of a variety of systems, 3. creative appropriations, including the creation of a unique heterogeneous groupware fabric, 4. the design strategy of multiple parallel experimental use an; 5. the relation between disparate local meanings and successful computer supported cooperative practice. As an overarching theme we are exploring the explanatory value of the concepts of objectification and appropriation as compared to the concepts of design vs. use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sensor networks for environmental monitoring present enormous benefits to the community and society as a whole. Currently there is a need for low cost, compact, solar powered sensors suitable for deployment in rural areas. The purpose of this research is to develop both a ground based wireless sensor network and data collection using unmanned aerial vehicles. The ground based sensor system is capable of measuring environmental data such as temperature or air quality using cost effective low power sensors. The sensor will be configured such that its data is stored on an ATMega16 microcontroller which will have the capability of communicating with a UAV flying overhead using UAV communication protocols. The data is then either sent to the ground in real time or stored on the UAV using a microcontroller until it lands or is close enough to enable the transmission of data to the ground station.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rights of individuals to self-determination and participation in social, political and economic life are recognised and supported by Articles 1, 3 and 25 of the International Covenant on Civil and Political Rights 1966.4 Article 1 of the United Nations’ Human Rights Council’s Resolution on the Promotion and Protection of Human Rights on the Internet of July 2012 confirms individuals have the same rights online as offline. Access to the internet is essential and as such the UN: Calls upon all States to promote and facilitate access to the Internet and international cooperation aimed at the development of media and information and communications facilities in all countries (Article 3) Accordingly, access to the internet per se is a fundamental human right, which requires direct State recognition and support.5 The obligations of the State to ensure its citizens are able, and are enabled, to access the internet, are not matters that should be delegated to commercial parties. Quite simply – access to the internet, and high-speed broadband, by whatever means are “essential services” and therefore “should be treated as any other utility service”...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a new load distribution strategy called `send-and-receive' for scheduling divisible loads, in a linear network of processors with communication delay. This strategy is designed to optimally utilize the network resources and thereby minimizes the processing time of entire processing load. A closed-form expression for optimal size of load fractions and processing time are derived when the processing load originates at processor located in boundary and interior of the network. A condition on processor and link speed is also derived to ensure that the processors are continuously engaged in load distributions. This paper also presents a parallel implementation of `digital watermarking problem' on a personal computer-based Pentium Linear Network (PLN) topology. Experiments are carried out to study the performance of the proposed strategy and results are compared with other strategies found in literature.