920 resultados para personal communications service networks


Relevância:

40.00% 40.00%

Publicador:

Resumo:

From the perspective of network, a project team’s social capital consists of conduits network, and resource exchange network. Prior research intensively studies the effect of the structure of conduits network on the team’s performance, assuming knowledge transfer is the causal mechanism linking conduits network to performance. This paper attempts to explore the interrelations between conduits network and knowledge network, and further distinguish the different influence between various conduit networks, and hypothesizes that a project team’s knowledge network mediates the effect of various conduit networks on the team’s performance. This research can enrich our knowledge of disparate influence of the various conduit networks on knowledge transfer, and imply some management practices to enhance the organization’s social capital, and hence improve the organization’s performance.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper presents a novel algorithm for the gateway placement problem in Backbone Wireless Mesh Networks (BWMNs). Different from existing algorithms, the new algorithm incrementally identifies gateways and assigns mesh routers to identified gateways. The new algorithm can guarantee to find a feasible gateway placement satisfying Quality-of-Service (QoS) constraints, including delay constraint, relay load constraint and gateway capacity constraint. Experimental results show that its performance is as good as that of the best of existing algorithms for the gateway placement problem. But, the new algorithm can be used for BWMNs that do not form one connected component, and it is easy to implement and use.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

There is a growing interest in and support for education for sustainability in Australian schools. Australian Government schemes such as the Australian Sustainable Schools Initiative (AuSSI), along with strategies such as Educating for a Sustainable Future: A National Environmental Education Statement for Australian Schools(NEES(Australian Government and Curriculum Corporation (2005) and Living Sustainably: The Australian Government’s National Action Plan for Education for Sustainability (Australian Government 2009), recognise the need and offer support for education for sustainability in Australian schools. The number of schools that have engaged with AuSSI indicates that this interest also exists within Australian schools. Despite this, recent research indicates that pre-service teacher education institutions and programs are not doing all they can to prepare teachers for teaching education for sustainability or for working within sustainable schools. The education of school teachers plays a vital role in achieving changes in teaching and learning in schools. Indeed, the professional development of teachers in education for sustainability has been identified as ‘the priority of priorities’. Much has been written about the need to ‘reorient teacher education towards sustainability’. Teacher education is seen as a key strategy that is yet to be effectively utilised to embed education for sustainability in schools. Mainstreaming sustainability in Australian schools will not be achieved without the preparation of teachers for this task. The Mainstreaming Sustainability model piloted in this study seeks to engage a range of stakeholder organisations and key agents of change within a system to all work simultaneously to bring about a change, such as the mainstreaming of sustainability. The model is premised on the understanding that sustainability will be mainstreamed within teacher education if there is engagement with key agents of change across the wider teacher education system and if the key agents of change are ‘deeply’ involved in making the change. The model thus seeks to marry broad engagement across a system with the active participation of stakeholders within that system. Such a systemic approach is a way of bringing together diverse viewpoints to make sense of an issue and harness that shared interpretation to define boundaries, roles and relationships leading to a better defined problem that can be acted upon more effectively. Like action research, the systemic approach is also concerned with modelling change and seeking plausible solutions through collaboration between stakeholders. This is important in ensuring that outcomes are useful to the researchers/stakeholders and the system being researched as it creates partnerships and commitments to the outcomes by stakeholder participants. The study reported on here examines whether the ‘Mainstreaming Sustainability’ model might be effective as a means to mainstream sustainability in pre-service teacher education. This model, developed in an earlier study, was piloted in the Queensland teacher education system in order to examine its effectiveness in creating organisational and systemic change. The pilot project in Queensland achieved a number of outcomes. The project: • provided useful insights into the effectiveness of the Mainstreaming Sustainability model in bringing about change while also building research capacity within the system • developed capacities within the teacher education community: o developing competencies in education for sustainability o establishing more effective interactions between decision-makers and other stakeholders o establishing a community of inquiry • changed teaching and learning approaches used in participating teacher education institutions through: o curriculum and resource development o the adoption of education for sustainability teaching and learning processes o the development of institutional policies • improved networks within the teacher education system through: o identifying key agents of change within the system o developing new, and building on existing, partnerships between schools, teacher education institutions and government agencies • engaged relevant stakeholders such as government agencies and non-government organisations to understand and support the change Our findings indicate that the Mainstreaming Sustainability model is able to facilitate organisational and systemic change – over time – if: • the individuals involved have the conceptual and personal capacities needed to facilitate change, that is, to be a key agent of change • stakeholders are engaged as participants in the process of change, not simply as ‘interested parties’ • there is a good understanding of systemic change and the opportunities for leveraging change within systems. In particular, in seeking to mainstream sustainability in pre-service teacher education in Queensland it has become clear that one needs to build capacity for change within participants such as knowledge of education for sustainability, conceptual skills in systemic thinking, action research and organisational change, and leadership skills. It is also of vital importance that key agents of change – those individuals who are ‘hubs’ within a system and can leverage for change across a wide range of the system – are identified and engaged with as early as possible. Key agents of change can only be correctly identified, however, if the project leaders and known participants have clearly identified the boundary to their system as this enables the system, sub-system and environment of the system to be understood. Through mapping the system a range of key organisations and stakeholders will be identified, including government and nongovernment organisations, teacher education students, teacher education academics, and so on. On this basis, key agents of change within the system and sub-system can be identified and invited to assist in working for change. A final insight is that it is important to have time – and if necessary the funding to ‘buy time’ – in seeking to bring about system-wide change. Seeking to bring about system-wide change is an ambitious project, one that requires a great deal of effort and time. These insights provide some considerations for those seeking to utilise the Mainstreaming Sustainability model to bring about change within and across a pre-service teacher education system.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The first Workshop on Service-Oriented Business Networks and Ecosystems (SOBNE ’09) is held in conjunction with the 13th IEEE International EDOC Conference on 2 September 2009 in Auckland, New Zealand. The SOBNE ’09 program includes 9 peer-reviewed papers (7 full and 2 short papers) and an open discussion session. This introduction to the Proceedings of SOBNE ’09 starts with a brief background of the motivation for the workshop. Next, it contains a short description of the peer-reviewed papers, and finally, after some concluding statements and the announcement of the winners of the Best Reviewer Award and the Most Promising Research Award, it lists the members of the SOBNE ’09 Program Committee and external reviewers of the workshop submissions.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

High-speed broadband internet access is widely recognised as a catalyst to social and economic development, having a significant impact on global economy. Rural Australia’s inherent dispersed population over a large geographical area make the delivery of efficient, well-maintained and cost-effective internet a challenging task. The novel and highly-efficient Multi-User-Single-Antenna for MIMO (MUSA-MIMO) broadband wireless communication technology can effectively be used to deliver wireless broadband access to rural areas. This research aims to develop for the first time, an efficient and accurate algorithm for the tracking and prediction of Channel State Information (CSI) at the transmitter, by characterising time variation effects of the wireless communication channel on the performance of a highly-efficient MUSA-MIMO technology particularly suited for rural communities, improving their quality of life and economic prosperity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys used between times t1 and t2. In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.’s scheme, and Nilsson et al.’s scheme is given.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Natural disasters and deliberate, willful damage to telecommunication infrastructure can result in a loss of critical voice and data services. This loss of service hinders the ability for efficient emergency response and can cause delays leading to loss of life. Current mobile devices are generally tied to one network operator. When a disaster is of significant impact, that network operator cannot be relied upon to provide service and coverage levels that would normally exist. While some operators have agreements with other operators to share resources (such as network roaming) these agreements are contractual in nature and cannot be activated quickly in an emergency. This paper introduces Fourth Generation (4G) wireless networks. 4G networks are highly mobile and heterogeneous, which makes 4G networks highly resilient in times of disaster.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Classrooms of the 21st century are complex systems. They support diverse learners from varied contexts and function in a “messy” bricolage of policy contexts. This complexity is also evident in the nature of teaching and learning deployed in these classrooms. There is also, in current contexts, a general expectation that teachers will support students to construct, rather than simply receive knowledge. This process of constructing knowledge requires a focus on critical thinking in complex social and real world contexts (see also Elen & Clarebout, 2001; Yang, Chang & Hsu 2008). Critical thinking, which involves the identification and evaluation of multiple perspectives when making decisions, is a process of knowing – a tool of wisdom (Kuhn & Udell, 2001). Schommer-Aikens, Bird and Bakken (2010) refer to classrooms that encourage critical thinking as “epistemologically based” in which “the teacher encourages his/her students to look for connections among concepts within the text, with their prior knowledge, and with concepts found in the world beyond themselves” (p. 48).

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services technologies. This paper describes experiments involving several denial of service vulnerabilities in well-known web services platforms, including Java Metro, Apache Axis, and Microsoft .NET. The results both confirm and deny the presence of some of the most well-known vulnerabilities in web services technologies. Specifically, major web services platforms appear to cope well with attacks that target memory exhaustion. However, attacks targeting CPU-time exhaustion are still effective, regardless of the victim’s platform.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, weighted fair rate allocation for ATM available bit rate (ABR) service is discussed with the concern of the minimum cell rate (MCR). Weighted fairness with MCR guarantee has been discussed recently in the literature. In those studies, each ABR virtual connection (VC) is first allocated its MCR, then the remaining available bandwidth is further shared among ABR VCs according to their weights. For the weighted fairness defined in this paper, the bandwidth is first allocated according to each VC's weight; if a VC's weighted share is less than its MCR, it should be allocated its MCR instead of the weighted share. This weighted fairness with MCR guarantee is referred to as extended weighted (EXW) fairness. Certain theoretical issues related to EXW, such as its global solution and bottleneck structure, are first discussed in the paper. A distributed explicit rate allocation algorithm is then proposed to achieve EXW fairness in ATM networks. The algorithm is a general-purpose explicit rate algorithm in the sense that it can realise almost all the fairness principles proposed for ABR so far whilst only minor modifications may be needed.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A high performance, low computational complexity rate-based flow control algorithm which can avoid congestion and achieve fairness is important to ATM available bit rate service. The explicit rate allocation algorithm proposed by Kalampoukas et al. is designed to achieve max–min fairness in ATM networks. It has several attractive features, such as a fixed computational complexity of O(1) and the guaranteed convergence to max–min fairness. In this paper, certain drawbacks of the algorithm, such as the severe overload of an outgoing link during transient period and the non-conforming use of the current cell rate field in a resource management cell, have been identified and analysed; a new algorithm which overcomes these drawbacks is proposed. The proposed algorithm simplifies the rate computation as well. Compared with Kalampoukas's algorithm, it has better performance in terms of congestion avoidance and smoothness of rate allocation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We describe a novel two stage approach to object localization and tracking using a network of wireless cameras and a mobile robot. In the first stage, a robot travels through the camera network while updating its position in a global coordinate frame which it broadcasts to the cameras. The cameras use this information, along with image plane location of the robot, to compute a mapping from their image planes to the global coordinate frame. This is combined with an occupancy map generated by the robot during the mapping process to track the objects. We present results with a nine node indoor camera network to demonstrate that this approach is feasible and offers acceptable level of accuracy in terms of object locations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study investigated changes in pre-service teachers’ personal epistemologies as they engaged in an integrated teaching program. Personal epistemology refers to individual beliefs about the nature of knowing and knowledge and has been shown to influence teaching practice. An integrated approach to teaching, based on both an implicit and explicit focus on personal epistemology, was developed by an academic team within a Bachelor of Education (Early Childhood). The teaching program integrated content across four units of study, modelling personal epistemologies implicitly through collaborative reflexive practice. The students were also required to engage in explicit reflections on their personal epistemologies. Quantitative measures of personal epistemology were collected at the beginning and end of the semester using the Epistemological Beliefs Survey (EBS) to assess changes across the teaching period. Results indicated that pre-service teachers’ epistemological beliefs about the integration of knowledge became more sophisticated over the course of the teaching period. Qualitative data included pre-service teachers’ responses to open ended questions and field experience journal reflections about their perceptions of the teaching program and were collected at the end of the semester. These data showed that pre-service teachers held different conceptions about learning as integration, which provided a more nuanced understanding of the EBS data. Understanding pre-service teachers’ epistemological beliefs provides promising directions for teacher preparation and professional enrichment.