To see the other types of publications on this topic, follow the link: Architectures à passage de messages.

Journal articles on the topic 'Architectures à passage de messages'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Architectures à passage de messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pym, Anthony. "On the passage of transcendent messages." FORUM / Revue internationale d’interprétation et de traduction / International Journal of Interpretation and Translation 14, no. 1 (August 4, 2016): 123–43. http://dx.doi.org/10.1075/forum.14.1.07pym.

Full text
Abstract:
Abstract Translation is one way texts are accorded transcendence, understood as material transfer from a site of utterance. Although frequently construed as a quality of texts or auctorial virtue, transcendence is enacted by receivers (including translators) pulling texts across time and space, transforming them accordingly. Study of a war-commemoration text attributed to Atatürk shows this happening in its transfer to Australia. The historical authorship of the text has been contested, and analysis of its various translations and interpretations reveals competing interests, strategic omissions, distributed intercultural agency, and inscriptions. However, the historians involved in the debate, in both Turkey and Australia, have not sufficiently considered translation analysis, which can find some justification for the questioned text. Further, an ethics of cross-cultural communication might question the translation as an appeal to resolution based not just on the commonness of human suffering but also the shared concealment of guilt.
APA, Harvard, Vancouver, ISO, and other styles
2

Hobley, Janet. "Rites of passage, moving into management: practice architectures and professionalism." Research in Post-Compulsory Education 24, no. 4 (October 2, 2019): 424–38. http://dx.doi.org/10.1080/13596748.2019.1654686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Orhan, Orhan, and Huseyin Goren. "Largely Scalable Wireless Network Formation Architectures for Internet of Things." International Research Journal of Electronics and Computer Engineering 3, no. 4 (December 29, 2017): 17. http://dx.doi.org/10.24178/irjece.2017.3.4.17.

Full text
Abstract:
As number of mobile devices increases with Internet of Things (IoT) capability and power consumption is important in multi hop communication, there is need of considering network formation architectures inIoT networks.In this work power levels of nodes, urgency of messages to be transmitted are not taken into consideration, a general approach considered with all nodes with same power levels and no priority for messages to be sent.Another assumption is all nodes are on the same 2D plane. Multi hop wireless network architectures studied and scalable, best performing architecture which is hypercubic network architecture is highlighted for IoT networks. Especially for large number of nodes needs to be considered hypercubic architecture performs much better than mesh, tree and ring kind of architectures in terms of dilation and number of connections. The simulation results are based on a simulator developed on C++ program. The results are showed that Hypercubic architecture with logarithmic dilation is much better than other network types. Cube Connected Cycles (CCC)based network architecture (which is derivative of Hypercube) can be preferred, especially when a constant degree is needed, in communication technologies such as Bluetooth. As a future work, a network architecture study can be made which takes energy levels and urgency of messages to be sent.
APA, Harvard, Vancouver, ISO, and other styles
4

BARRETT, R. F., C. T. VAUGHAN, S. D. HAMMOND, and D. ROWETH. "REDUCING THE BULK IN THE BULK SYNCHRONOUS PARALLEL MODEL." Parallel Processing Letters 23, no. 04 (December 2013): 1340010. http://dx.doi.org/10.1142/s0129626413400100.

Full text
Abstract:
For over two decades the dominant means for enabling portable performance of computational science and engineering applications on parallel processing architectures has been the bulk-synchronous parallel programming (BSP) model. Code developers, motivated by performance considerations to minimize the number of messages transmitted, have typically pursued a strategy of aggregating message data into fewer, larger messages. Emerging and future high-performance architectures, especially those seen as targeting Exascale capabilities, provide motivation and capabilities for revisiting this approach. In this paper we explore alternative configurations within the context of a large-scale complex multi-physics application and a proxy that represents its behavior, presenting results that demonstrate some important advantages as the number of processors increases in scale.
APA, Harvard, Vancouver, ISO, and other styles
5

Alasadi, Emad, and Hamed S. Al-Raweshidy. "SSED: Servers Under Software-Defined Network Architectures to Eliminate Discovery Messages." IEEE/ACM Transactions on Networking 26, no. 1 (February 2018): 104–17. http://dx.doi.org/10.1109/tnet.2017.2763131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

González-García, A. César, Benito Vilas-Estévez, Elías López-Romero, and Patricia Mañana-Borrazás. "Domesticating Light and Shadows in the Neolithic: The Dombate Passage Grave (A Coruña, Spain)." Cambridge Archaeological Journal 29, no. 2 (December 6, 2018): 327–43. http://dx.doi.org/10.1017/s0959774318000562.

Full text
Abstract:
Research on the Neolithic monuments and dwellings of Atlantic Europe has shown that plays of light and colour were tools for the social and symbolic construction of the world. The integration of the architectures into the surrounding landscape and the incorporation of the surrounding landscape into the architectures were an essential part of this logic. In this context, recent research in the megalithic passage grave of Dombate has evidenced an unusual physical manifestation of sunlight, which interacts with the decorated back stone. The light-and-shadow phenomenon occurs at sunrise during the period of winter solstice. In this paper we discuss the particulars of this phenomenon and we argue that sunlight when it penetrates the passage and chamber at sunrise on these dates may have dictated how the art was located and applied to the structural stone. Such differentiation seems to have had important cultural and ritual significance and encoded/embedded meaning for the tomb builders and may have implications for the consideration of the symbolic dimension of similar architectures in Atlantic Europe.
APA, Harvard, Vancouver, ISO, and other styles
7

Figueira, Jorge, and Bruno Gil. "Biographies of Power: Personalities and Architectures." Joelho Revista de Cultura Arquitectonica, no. 8 (December 26, 2017): 170–200. http://dx.doi.org/10.14195/1647-8681_8_11.

Full text
Abstract:
This section displays the work produced by the students of the Department of Architecture of the University of Coimbra (DARQ, UC) for the courses History of Architecture III and History of Architecture IV in the academic year 2016-2017. The main theme for the practical works of both course units was Biographies of Power: Personalities and Architectures. The work was exhibited in the gallery of DARQ, UC in September 2017. The works presented for Biographies of Power: Personalities were focused on the passage of testimony between Louis Sullivan and F. L. Wright. While they crucially contributed to the identity of a modern and American architecture, they carried out a professional and personal relationship that was also guided by the measurement of forces. The work done by the students for Biographies of Power: Architectures resulted from an observation of a set of buildings that goes beyond their architectural and physical contours, or which precisely searches for their actual description, in the light of any ideology that is ultimately represented or even reinforced by its own architectural condition.
APA, Harvard, Vancouver, ISO, and other styles
8

TAGSOLD, CHRISTIAN. "Modernity, space and national representation at the Tokyo Olympics 1964." Urban History 37, no. 2 (July 6, 2010): 289–300. http://dx.doi.org/10.1017/s0963926810000362.

Full text
Abstract:
ABSTRACT:The 1964 Tokyo Olympics acted as a rite of passage for post-war Japan, symbolizing the modernization of the city and the country. This was reflected by the space and architecture of the venues. Urban development of Olympic cities has been scrutinized recently but the symbolic implications have been touched upon only in passing, most especially in Tokyo's case. This article will show how symbolic layers of architecture and space aimed at linking history and modernity while bypassing the highly problematic legacy of ultra-nationalism and World War II. An important hub for transmitting this message was the Meiji Shrine dedicated to the first emperor of modern Japan. The hallmark building of the 1964 Games, Kenzo Tange's National Gymnasium, interacted with the shrine by way of an architectonic axis connecting them. This contrasted with the different spatial styles evident at the 1960 Olympics in Rome and 1972 Olympics in Munich, which testified to their different relationships to the national past. While developing infrastructure such as canalization and traffic was very important for Tokyo, symbolic revitalization of the city's fabric was equally crucial.
APA, Harvard, Vancouver, ISO, and other styles
9

Kemp, P. S. "Meta-analyses, Metrics and Motivation: Mixed Messages in the Fish Passage Debate." River Research and Applications 32, no. 10 (October 2, 2016): 2116–24. http://dx.doi.org/10.1002/rra.3082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Womick, Jake, John Eckelkamp, Sam Luzzo, Sarah J. Ward, S. Glenn Baker, Alison Salamun, and Laura A. King. "Exposure to authoritarian values leads to lower positive affect, higher negative affect, and higher meaning in life." PLOS ONE 16, no. 9 (September 15, 2021): e0256759. http://dx.doi.org/10.1371/journal.pone.0256759.

Full text
Abstract:
Five studies tested the effect of exposure to authoritarian values on positive affect (PA), negative affect (NA), and meaning in life (MIL). Study 1 (N = 1,053) showed that simply completing a measure of right-wing authoritarianism (vs. not) prior to rating MIL led to higher MIL. Preregistered Study 2 (N = 1,904) showed that reading speeches by real-world authoritarians (e.g., Adolf Hitler) led to lower PA, higher NA, and higher MIL than a control passage. In preregistered Studies 3 (N = 1,573) and 4 (N = 1,512), Americans read authoritarian, egalitarian, or control messages and rated mood, MIL, and evaluated the passages. Both studies showed that egalitarian messages led to better mood and authoritarian messages led to higher MIL. Study 5 (N = 148) directly replicated these results with Canadians. Aggregating across studies (N = 3,401), moderational analyses showed that meaning in life, post manipulation, was associated with more favorable evaluations of the authoritarian passage. In addition, PA was a stronger predictor of MIL in the egalitarian and control conditions than in the authoritarian condition. Further results showed no evidence that negative mood (or disagreement) spurred the boost in MIL. Implications and future directions are discussed.
APA, Harvard, Vancouver, ISO, and other styles
11

Leskelä, Lasse, and Hoa Ngo. "First passage percolation on sparse random graphs with boundary weights." Journal of Applied Probability 56, no. 2 (June 2019): 458–71. http://dx.doi.org/10.1017/jpr.2019.30.

Full text
Abstract:
AbstractA large and sparse random graph with independent exponentially distributed link weights can be used to model the propagation of messages or diseases in a network with an unknown connectivity structure. In this article we study an extended setting where, in addition, the nodes of the graph are equipped with nonnegative random weights which are used to model the effect of boundary delays across paths in the network. Our main results provide approximative formulas for typical first passage times, typical flooding times, and maximum flooding times in the extended setting, over a time scale logarithmic with respect to the network size.
APA, Harvard, Vancouver, ISO, and other styles
12

Adnan, Muhammad, Jawaid Iqbal, Abdul Waheed, Noor Ul Amin, Mahdi Zareei, Shidrokh Goudarzi, and Asif Umer. "On the Design of Efficient Hierarchic Architecture for Software Defined Vehicular Networks." Sensors 21, no. 4 (February 17, 2021): 1400. http://dx.doi.org/10.3390/s21041400.

Full text
Abstract:
Modern vehicles are equipped with various sensors, onboard units, and devices such as Application Unit (AU) that support routing and communication. In VANETs, traffic management and Quality of Service (QoS) are the main research dimensions to be considered while designing VANETs architectures. To cope with the issues of QoS faced by the VANETs, we design an efficient SDN-based architecture where we focus on the QoS of VANETs. In this paper, QoS is achieved by a priority-based scheduling algorithm in which we prioritize traffic flow messages in the safety queue and non-safety queue. In the safety queue, the messages are prioritized based on deadline and size using the New Deadline and Size of data method (NDS) with constrained location and deadline. In contrast, the non-safety queue is prioritized based on First Come First Serve (FCFS) method. For the simulation of our proposed scheduling algorithm, we use a well-known cloud computing framework CloudSim toolkit. The simulation results of safety messages show better performance than non-safety messages in terms of execution time.
APA, Harvard, Vancouver, ISO, and other styles
13

Fernandes, Silvio R., Ivan S. Silva, and Marcio Kreutz. "Packet-driven General Purpose Instruction Execution on Communication-based Architectures." Journal of Integrated Circuits and Systems 5, no. 1 (November 21, 2010): 53–66. http://dx.doi.org/10.29292/jics.v5i1.310.

Full text
Abstract:
In the last few years, the development of Multi-Core architectures was driven by the crescent advance in integration technology. In this scenario, when the number of cores increases, problems found on shared communication media, such as busses, can be addressed by using a network approach. This paper proposes the usage of communication capabilities of Networks-on-Chip (NoCs) to execute general purpose instructions. The main idea behind this approach is to allow networks-on-chip architectures to execute general purpose instructions inside each router architecture. This paper addresses the main architectural concerns involved on creating datapaths for routers as well as the programming model suggested to pack instructions on messages. Simulation results on two case studies illustrate the benefits of the proposed architecture when compared to an equivalent NoC-based MP-SoC.
APA, Harvard, Vancouver, ISO, and other styles
14

Kim, DaeYoub. "Group-Interest-Based Verifiable CCN." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/9202151.

Full text
Abstract:
To solve various problems of the Internet, content centric networking (CCN), one of information centric networking architectures (ICN), provides both an in-network content caching scheme and a built-in content verification scheme. However, a user is still asked to generate many request messages when retrieving fragmented content through CCN. This model can seriously increase the amount of network traffic. Furthermore, when receiving content, a user is asked to verify the received content before using it. This verification process can cause a serious service delay. To improve such inefficiencies, this paper proposes a transmission process to handle request messages at one time. Also, it suggests an efficient content verification method using both hash chains and Merkel-hash tree.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Ya Ping, and J. G. Wang. "Integrated Flat Plate Heat Pipe-Pulsation Heat Pipe for the High-Flux Electronics Cooling." Advanced Materials Research 960-961 (June 2014): 389–93. http://dx.doi.org/10.4028/www.scientific.net/amr.960-961.389.

Full text
Abstract:
A trend towards increasingly dense and compact architectures has led to unmanageably high heat fluxes in electronic components. A novel heat pipe will be developed. Heat pipe designed is based on the flat plate heat pipe and pulsation heat pipe effective combination. Channel quantity is greatly increased ,as well as compact and homogeneous red copper pulsation plank is severed as the wick,dense and connected channels are served as the passage of the working fluid.
APA, Harvard, Vancouver, ISO, and other styles
16

Tahir, Ari Shawkat. "Design and Implementation of RSA Algorithm using FPGA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 12 (September 22, 2015): 6361–67. http://dx.doi.org/10.24297/ijct.v14i12.1737.

Full text
Abstract:
RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet. The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a new architecture and modeling has been proposed for RSA public key algorithm, the suggested system uses 1024-bit RSA encryption/decryption for restricted system. The system uses the multiply and square algorithm to perform modular operation. The design has been described by VHDL and simulated by using Xilinx ISE 12.2 tool. The architectures have been implemented on reconfigurable platforms FPGAs. Accomplishment when implemented on Xilinx_Spartan3 (device XC3S50, package PG208, speed -4) which confirms that the proposed architectures have minimum hardware resource, where only 29% of the chip resources are used for RSA algorithm design with realizable operating clock frequency of 68.573 MHz.
APA, Harvard, Vancouver, ISO, and other styles
17

Kroustalli, A., and D. Deligianni. "Carbon Nanotube Surface Regular Topography Improves Cell Response, Depending on Cell Passage." Bone and Tissue Regeneration Insights 7 (January 2016): BTRI.S30485. http://dx.doi.org/10.4137/btri.s30485.

Full text
Abstract:
Through mediation of integrin clustering, nanoscale surface structure of carbon nanotubes (CNTs) directly affects cell binding and subsequent behavior. The influence of morphological structures on proliferation, differentiation, and organization of focal adhesions and cytoskeleton of human mesenchymal stem cells (hMSCs) was studied. The following two surface morphologies were fabricated and examined: a random network multiwalled carbon nanotubes film (RNCNT) and a vertically aligned multiwalled carbon nanotube (VACNT) film. hMSCs adhered and spread earlier on both CNT surfaces than on control. A statistically significantly increased number of attached cells were observed on VACNT surfaces. No CNT substrate enhanced differentiation, but both maintained the differentiation property of hMSCs. VACNTs recruited vinculin from the cytoplasm for the formation of focal adhesion complexes earlier in comparison to RNCNT. There is still disparity on how nanostructures regulate the progression toward an osteoblastic phenotype. It is necessary to explore various architectures in order to understand how they initiate osteoinductive or proliferating signals.
APA, Harvard, Vancouver, ISO, and other styles
18

Groce, Nora, Nita Mawar, and Marina Macnamara. "Inclusion of AIDS educational messages in rites of passage ceremonies: Reaching young people in tribal communities." Culture, Health & Sexuality 8, no. 4 (July 1, 2006): 303–15. http://dx.doi.org/10.1080/13691050600772810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ledesma, Pablo, Peyman Jafary, Sami Repo, Amelia Álvarez, Francisco Ramos, Davide Della Giustina, and Alessio Dedè. "Event-Based Simulation of a Decentralized Protection System Based on Secured GOOSE Messages." Energies 13, no. 12 (June 23, 2020): 3250. http://dx.doi.org/10.3390/en13123250.

Full text
Abstract:
A new simulation library is developed on OMNeT++ to model faults in distribution systems. The proposed library makes it possible to calculate the status of lines and busbars from the point of view of a protection system, enabling the modeling of overcurrents, power outages and fault passage indicators. The library is applied to model a decentralized protection system based on the exchange of IEC 61850 Generic Object Oriented Substation Events (GOOSE) messages between intelligent electronic devices responsible for the operation of circuit breakers and disconnectors. The time needed to secure and transmit GOOSE messages over the Internet is characterized and included in the model. Several studies are carried out to analyze the effect of different parameters, such as GOOSE retransmission times and failure rates of switching devices and communication channels, on the performance of the protection system.
APA, Harvard, Vancouver, ISO, and other styles
20

Ziehn, Jens R., Masoud Roschani, Miriam Ruf, Dennis Bruestle, Jürgen Beyerer, and Melanie Helmer. "Imaging vehicle-to-vehicle communication using visible light." Advanced Optical Technologies 9, no. 6 (December 16, 2020): 339–48. http://dx.doi.org/10.1515/aot-2020-0038.

Full text
Abstract:
AbstractWith advances in automated and connected driving, secure communication is increasingly becoming a safety-critical function. Injection of manipulated radio messages into traffic can cause severe accidents in the foreseeable future, and can currently be achieved without having to manipulate on-board vehicle systems directly, for example by hijacking cellphones instead and using these as senders. Thereby, large-scale attacks on vehicles can be executed remotely, and target relatively vulnerable devices. To mitigate remaining vulnerabilities in current automotive security architectures, this paper proposes a secondary communication channel using vehicle head and taillights. In contrast to existing approaches, this method allows both to achieve a sufficient data rate and to extract the angular position of the sender, by means of an imaging process which only requires close-to-market, cost-efficient technology. Through this, injecting false messages by masquerading as a different sender is considerably more challenging: The receiver can verify a message’s source position with the supposed position of the sender, e.g. by using on-board sensors or communicated information. Thereby, reliably faking both the communicated messages and the position of the sender will require direct manipulation of on-board vehicle systems, raising the security level of the function accordingly, and precluding low-threshold, wide-range attacks.
APA, Harvard, Vancouver, ISO, and other styles
21

Ridolfo, Alessandro. "Generation of Photon Pairs in the Light-Matter Ultrastrong Coupling Regime: From Casimir Radiation to Stimulated Raman Adiabatic Passage." Proceedings 12, no. 1 (July 23, 2019): 37. http://dx.doi.org/10.3390/proceedings2019012037.

Full text
Abstract:
The ultrastrong coupling regime of light-matter interaction is achieved when the coupling strength is a significant fraction of the natural frequencies of the noninteracting parts. Physics in this regime has recently attracted great interest, both theoretically and experimentally being a fruitful platform to test fundamental quantum mechanics in a new non-perturbative regime, and for applications to quantum technologies.Here we discuss the generation of photon-pair states, which is a distinctive feature of this new regime, and interesting new dynamicsl effects both in optomechanics and in circuit-QED architectures.
APA, Harvard, Vancouver, ISO, and other styles
22

Becker, Karin, Jim Pruyne, Sharad Singhal, Andre Lopes, and Dejan Milojicic. "Automatic Determination of Compatibility in Evolving Services." International Journal of Web Services Research 8, no. 1 (January 2011): 21–40. http://dx.doi.org/10.4018/jwsr.2011010102.

Full text
Abstract:
A major advantage of Service-Oriented Architectures (SOA) is composition and coordination of loosely coupled services. Because the development lifecycles of services and clients are de-coupled, multiple service versions must be maintained to support older clients. Typically versions are managed within the SOA by updating service descriptions using conventions on version numbers and namespaces. In all cases, the compatibility among services descriptions must be evaluated, which can be hard, error-prone and costly if performed manually, particularly for complex descriptions. In this paper, the authors describe a method to automatically determine when two service descriptions are backward compatible. The authors describe a case study to illustrate version compatibility information in a SOA environment and present initial performance overheads. By automatically exploring compatibility information, a) service developers can assess the impact of proposed changes; b) proper versioning requirements can be put in client implementations guaranteeing that incompatibilities will not occur during run-time; and c) messages exchanged in the SOA can be validated to ensure that only expected messages or compatible ones are exchanged.
APA, Harvard, Vancouver, ISO, and other styles
23

Barletta, Vita Santa, Danilo Caivano, Antonella Nannavecchia, and Michele Scalera. "A Kohonen SOM Architecture for Intrusion Detection on In-Vehicle Communication Networks." Applied Sciences 10, no. 15 (July 23, 2020): 5062. http://dx.doi.org/10.3390/app10155062.

Full text
Abstract:
The diffusion of connected devices in modern vehicles involves a lack in security of the in-vehicle communication networks such as the controller area network (CAN) bus. The CAN bus protocol does not provide security systems to counter cyber and physical attacks. Thus, an intrusion-detection system to identify attacks and anomalies on the CAN bus is desirable. In the present work, we propose a distance-based intrusion-detection network aimed at identifying attack messages injected on a CAN bus using a Kohonen self-organizing map (SOM) network. It is a power classifier that can be trained both as supervised and unsupervised learning. SOM found broad application in security issues, but was never performed on in-vehicle communication networks. We performed two approaches, first using a supervised X–Y fused Kohonen network (XYF) and then combining the XYF network with a K-means clustering algorithm (XYF–K) in order to improve the efficiency of the network. The models were tested on an open source dataset concerning data messages sent on a CAN bus 2.0B and containing large traffic volume with a low number of features and more than 2000 different attack types, sent totally at random. Despite the complex structure of the CAN bus dataset, the proposed architectures showed a high performance in the accuracy of the detection of attack messages.
APA, Harvard, Vancouver, ISO, and other styles
24

Al-Marshoud, Mishri Saleh, Ali H. Al-Bayatti, and Mehmet Sabir Kiraz. "Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs." Electronics 10, no. 11 (May 30, 2021): 1302. http://dx.doi.org/10.3390/electronics10111302.

Full text
Abstract:
Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system’s infrastructure introduce the potential for attacks that lessen safety and weaken passengers’ privacy. The purpose of short-lived anonymous identities, called “pseudo-identities”, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles’ privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters’ (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.’s scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity “certificate”. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.’s scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives’ effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones’ symmetric keys by generating a fresh one for each communication through a Diffie–Hellman key exchange.
APA, Harvard, Vancouver, ISO, and other styles
25

Von Isenburg, Megan. "College Students in an Experimental Study Took Longer to Achieve Comprehension when Instant Messaging while Reading." Evidence Based Library and Information Practice 5, no. 3 (September 27, 2010): 46. http://dx.doi.org/10.18438/b8sd01.

Full text
Abstract:
A Review of: Bowman, L. L., Levine, L. E., Waite, B. M., & Gendron, M. (2010). Can students really multitask? An experimental study of instant messaging while reading. Computers & Education, 54, 927-931. Objective – To examine the effects of multitasking while doing school work. The experiment specifically measured total time spent reading a simulated textbook passage and tested comprehension in students who received instant messages before reading, while reading, or not at all. Design – Experimental design in which one group of students read an online text while receiving and responding to instant messages. Comparison groups either received instant messages (IMs) prior to reading the text passage or did not receive any IMs during the task. Setting – General psychology department at Central Connecticut State University, United States. Subjects – Eighty-nine college students enrolled in general psychology courses. The participants included 43 women and 46 men and were between 17 and 46 years old. Most students were full time students (91%), most were European / White (74%) and in their first (46%) or second (33%) year of college. Participants’ academic majors represented all the schools in the university. Methods – Researchers created a simulated environment in which a passage from a psychology textbook was displayed on five consecutive screens. For the experimental group, an IM appeared on each of the five screens preceded by an alert sound. Messages were written to reflect the types of questions students might ask each other when they first meet, such as “What do you like to do in your spare time?” Subjects were randomized to three situations: receiving IMs before reading, receiving IMs during reading, or not receiving any IMs. Subjects were told that they would either receive IMs before reading, while reading, or not at all. Messages received during reading appeared one per screen after a specified time spent on each page (after 17, 15, 29, 20 and 26 seconds, respectively.) Students could take as long as necessary to read the passage and to respond to IMs. After reading the passage, students were given a multiple choice test with 25 questions to determine reading comprehension and retention. Students also completed a demographic questionnaire to measure their typical instant messaging behaviour, including the amount of time they spend each week instant messaging, how often IM software is on when their computer is on, and how often IM software is on when they are studying. Both of these activities took place on the same computers used for the reading experiment. Students were additionally asked to comment on the clarity of instructions, the representativeness of the task to their typical IM experiences, and the interest and similarity to normal coursework of the reading itself. These questions were asked on paper rather than on the computer. Software recorded the lengths of time each student spent in reading the passage, reading and responding to IMs, and answering the online questions. For those students who received IMs during reading, the time spent from receipt of each IM to each response was subtracted from the total reading time. Main Results – There were no differences in test performance between the three groups. Statistically significant differences were found in the amount of time that students took to complete the reading: students who instant messaged during reading took significantly longer to read the online text than those students who instant messaged before reading and those who did not IM, even when time spent receiving and responding to IMs was subtracted from the totals. Students who instant messaged before reading took the least amount of time in the exercise. Further statistical analysis revealed no significant differences in the time spent instant messaging between the two IM groups. Responses to the demographic questions indicate that students spend a mean 7.5 hours instant messaging per week, that 67% of students have IM software on “sometimes,” “often,” or “very often” while the computer is on and 62% of the time while studying. Analysis indicated that none of the IM use variables were correlated with test performance or reading time and that there were no significant differences between the experimental groups according to prior IM use. Responses from the 77 students who answered the questions about the experiment itself are also included, though not all of these students answered each question. Seventy students (99%) agreed or strongly agreed that instructions were clear. Seventy-one percent of the 52 students that received IMs agreed or strongly agreed that they were realistic, and 75% agreed or strongly agreed that they responded to IMs in a typical manner. Sixty-two students (82%) agreed or strongly agreed that the text was similar to those assigned for actual coursework, and 39 students (51%) agreed or strongly agreed that the passage was interesting. Students commented on the authenticity of the experiment in free text responses such as, “I responded how I would have to anyone,” and “they were questions that anyone I don’t know might ask.” Conclusion – This experimental study suggests that students who IM while reading will perform as well but take longer to complete the task than those who do not IM while reading or those students who IM before reading.
APA, Harvard, Vancouver, ISO, and other styles
26

Shourov, Chowdhury Erfan, Mahasweta Sarkar, Arash Jahangiri, and Christopher Paolini. "Deep Learning Architectures for Skateboarder–Pedestrian Surrogate Safety Measures." Future Transportation 1, no. 2 (September 12, 2021): 387–413. http://dx.doi.org/10.3390/futuretransp1020022.

Full text
Abstract:
Skateboarding as a method of transportation has become prevalent, which has increased the occurrence and likelihood of pedestrian–skateboarder collisions and near-collision scenarios in shared-use roadway areas. Collisions between pedestrians and skateboarders can result in significant injury. New approaches are needed to evaluate shared-use areas prone to hazardous pedestrian–skateboarder interactions, and perform real-time, in situ (e.g., on-device) predictions of pedestrian–skateboarder collisions as road conditions vary due to changes in land usage and construction. A mechanism called the Surrogate Safety Measures for skateboarder–pedestrian interaction can be computed to evaluate high-risk conditions on roads and sidewalks using deep learning object detection models. In this paper, we present the first ever skateboarder–pedestrian safety study leveraging deep learning architectures. We view and analyze state of the art deep learning architectures, namely the Faster R-CNN and two variants of the Single Shot Multi-box Detector (SSD) model to select the correct model that best suits two different tasks: automated calculation of Post Encroachment Time (PET) and finding hazardous conflict zones in real-time. We also contribute a new annotated data set that contains skateboarder–pedestrian interactions that has been collected for this study. Both our selected models can detect and classify pedestrians and skateboarders correctly and efficiently. However, due to differences in their architectures and based on the advantages and disadvantages of each model, both models were individually used to perform two different set of tasks. Due to improved accuracy, the Faster R-CNN model was used to automate the calculation of post encroachment time, whereas to determine hazardous regions in real-time, due to its extremely fast inference rate, the Single Shot Multibox MobileNet V1 model was used. An outcome of this work is a model that can be deployed on low-cost, small-footprint mobile and IoT devices at traffic intersections with existing cameras to perform on-device inferencing for in situ Surrogate Safety Measurement (SSM), such as Time-To-Collision (TTC) and Post Encroachment Time (PET). SSM values that exceed a hazard threshold can be published to an Message Queuing Telemetry Transport (MQTT) broker, where messages are received by an intersection traffic signal controller for real-time signal adjustment, thus contributing to state-of-the-art vehicle and pedestrian safety at hazard-prone intersections.
APA, Harvard, Vancouver, ISO, and other styles
27

Al mojamed, Mohammad. "Integrating Mobile Ad Hoc Networks with the Internet Based on OLSR." Wireless Communications and Mobile Computing 2020 (October 23, 2020): 1–16. http://dx.doi.org/10.1155/2020/8810761.

Full text
Abstract:
Although a standalone and isolated mobile ad hoc network (MANET) is practical in many scenarios, integration with the Internet is much more advantageous. The integration of a MANET with the Internet provides MANET users with Internet access and hence increases the scope of the MANET application. In addition, the Internet can benefit from this integration by an extension of the network coverage area. However, the integration of heterogeneous networks raises many issues. To overcome the incompatibilities between different architectures, gateways are used. This paper proposes a lightweight integration scheme for a MANET and the wider Internet, based on the optimized link state routing (OLSR). OLSR routing messages are reengineered and optimized to meet the needs of integration without involving additional routing messages for gateway discovery. The compulsory registration of a MANET node with a gateway node in a traditional integration is not required in the proposed approach, meaning that nodes can move freely within the local MANET with no disruption in the connection to another node in the external network. The proposed system is evaluated using the OMNET++ network simulator and is compared to another existing system. The simulation results demonstrate the validity of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
28

BHATELÉ, ABHINAV, and LAXMIKANT V. KALÉ. "QUANTIFYING NETWORK CONTENTION ON LARGE PARALLEL MACHINES." Parallel Processing Letters 19, no. 04 (December 2009): 553–72. http://dx.doi.org/10.1142/s0129626409000419.

Full text
Abstract:
In the early years of parallel computing research, significant theoretical studies were done on interconnect topologies and topology aware mapping for parallel computers. With the deployment of virtual cut-through, wormhole routing and faster interconnects, message latencies reduced and research in the area died down. This article shows that network topology has become important again with the emergence of very large supercomputers, typically connected as a 3D torus or mesh. It presents a quantitative study on the effect of contention on message latencies on torus and mesh networks. Several MPI benchmarks are used to evaluate the effect of hops (links) traversed by messages, on their latencies. The benchmarks demonstrate that when multiple messages compete for network resources, link occupancy or contention can increase message latencies by up to a factor of 8 times on some architectures. Results are shown for three parallel machines – ANL's IBM Blue Gene/P (Surveyor), RNL's Cray XT4 (Jaguar) and PSC's Cray XT3 (BigBen). Findings in this article suggest that application developers should now consider interconnect topologies when mapping tasks to processors in order to obtain the best performance on large parallel machines.
APA, Harvard, Vancouver, ISO, and other styles
29

Lete, Nerea, Andoni Beristain, and Alejandro García-Alonso. "Survey on virtual coaching for older adults." Health Informatics Journal 26, no. 4 (August 1, 2020): 3231–49. http://dx.doi.org/10.1177/1460458220926894.

Full text
Abstract:
Virtual coaching has emerged as a promising solution to extend independent living for older adults. A virtual coach system is an always-attentive personalized system that continuously monitors user’s activity and surroundings and delivers interventions – that is, intentional messages – in the appropriate moment. This article presents a survey of different approaches in virtual coaching for older adults, from the less technically supported tools to the latest developments and future avenues for research. It focuses on the technical aspects, especially on software architectures, user interaction and coaching personalization. Nevertheless, some aspects from the fields of personality/social psychology are also presented in the context of coaching strategies. Coaching is considered holistically, including matters such as physical and cognitive training, nutrition, social interaction and mood.
APA, Harvard, Vancouver, ISO, and other styles
30

Taraszkiewicz, Antoni, Karol Grębowski, Karolina Taraszkiewicz, and Jarosław Przewłócki. "Medieval Bourgeois Tenement Houses as an Archetype for Contemporary Architectural and Construction Solutions: The Example of Historic Downtown Gdańsk." Buildings 11, no. 3 (February 25, 2021): 80. http://dx.doi.org/10.3390/buildings11030080.

Full text
Abstract:
The basic urban tissue of medieval European cities consisted of brick townhouses. In the cities of northern Europe, these tenements were characterised by a block based on an elongated rectangular plan, covered with a gable roof with a ridge oriented perpendicularly to the street. The side walls of the tenement house were common for both neighbours and constituted a basic structural element. The gable façades were not loaded with ceilings, providing freedom in shaping them. The aim of this work is to determine the reasons why this method of shaping tenement houses in historical city centres has survived to the present day, becoming an archetype for contemporary architectural and construction solutions, despite the passage of time, numerous historical events, war damage, changing architectural styles, fashions and building techniques and technologies. The historical centre of Gdańsk has become the research material in this paper, where by means of such methods as historical source material analysis (iconographic), observation (operationalisation of preserved historical objects), comparative analysis of completed contemporary investments, and 3D modelling of structural systems, an attempt has been made to determine the main factors determining contemporary architectural and structural solutions. The reason for the extraordinary durability of this type of construction model can be found in the enormous rationality and efficiency of this solution. It allows for very intensive use of land, easy access of all front elevations to the main communication routes, cheapness of construction resulting from small spans and use of common structural walls for the neighbouring buildings, ease of shaping gable elevations, and fire safety. Aesthetic considerations are probably also important here, although it should be assumed that their significance began to grow only in the second half of the 19th century. However, it seems that the most important factor which made the model of the mediaeval bourgeois tenement house become an archetype for contemporary architectural and construction solutions is the timeless message contained in this model, a specific code allowing it to be unambiguously identified as a form of urban house—a place of safe living and at the same time a visible sign of the rich history of European cities, an element creating their cultural and spatial identity, a component of the living, constantly transforming urban fabric.
APA, Harvard, Vancouver, ISO, and other styles
31

홍석순 and Woo Young Chun. "Effects of Online Reviews on Judgments of a Product: The Role of Correction Messages and the Passage of Time." 한국심리학회지: 사회및성격 24, no. 3 (August 2010): 91–107. http://dx.doi.org/10.21193/kjspp.2010.24.3.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Maldonado, R. F., E. Villaver, A. J. Mustill, M. Chávez, and E. Bertone. "Do instabilities in high-multiplicity systems explain the existence of close-in white dwarf planets?" Monthly Notices of the Royal Astronomical Society: Letters 501, no. 1 (December 3, 2020): L43—L48. http://dx.doi.org/10.1093/mnrasl/slaa193.

Full text
Abstract:
ABSTRACT We investigate the origin of close-in planets and related phenomena orbiting white dwarfs (WDs), which are thought to originate from orbits more distant from the star. We use the planetary architectures of the 75 multiple-planet systems (four, five, and six planets) detected orbiting main-sequence stars to build 750 dynamically analogous templates that we evolve to the WD phase. Our exploration of parameter space, although not exhaustive, is guided and restricted by observations and we find that the higher the multiplicity of the planetary system, the more likely it is to have a dynamical instability (losing planets, orbit crossing, and scattering), that eventually will send a planet (or small object) through a close periastron passage. Indeed, the fraction of unstable four- to six-planet simulations is comparable to the 25–50${{\ \rm per\ cent}}$ fraction of WDs having atmospheric pollution. Additionally, the onset of instability in the four- to six-planet configurations peaks in the first Gyr of the WD cooling time, decreasing thereafter. Planetary multiplicity is a natural condition to explain the presence of close-in planets to WDs, without having to invoke the specific architectures of the system or their migration through the von Zeipel–Lidov–Kozai effects from binary companions or their survival through the common envelope phase.
APA, Harvard, Vancouver, ISO, and other styles
33

Cumino, Pedro, Kaled Maciel, Thaís Tavares, Helder Oliveira, Denis Rosário, and Eduardo Cerqueira. "Cluster-Based Control Plane Messages Management in Software-Defined Flying Ad-Hoc Network." Sensors 20, no. 1 (December 21, 2019): 67. http://dx.doi.org/10.3390/s20010067.

Full text
Abstract:
Collaboration between multiple Unmanned Aerial Vehicles (UAVs) to establish a Flying Ad-hoc Network (FANET) is a growing trend since future applications claim for more autonomous and rapidly deployable systems. In this context, Software-Defined Networking FANET (SDN-FANET ) separates the control and data plane and provides network programmability, which considers a centralized controller to perform all FANET control functions based on global UAV context information, such as UAV positions, movement trajectories, residual energy, and others. However, control message dissemination in an SDN-FANET with low overhead and high performance is not a trivial task due to FANET particular characteristics, i.e., high mobility, failures in UAV to UAV communication, and short communication range. With this in mind, it is essential to predict UAV information for control message dissemination as well as consider hierarchical network architecture, reducing bandwidth consumption and signaling overhead. In this article, we present a Cluster-bAsed control Plane messages management in sOftware-defined flying ad-hoc NEtwork, called CAPONE. Based on UAV contextual information, the controller can predict UAV information without control message transmission. In addition, CAPONE divides the FANET into groups by computing the number of clusters using the Gap statistics method, which is input for a Fuzzy C-means method to determine the group leader and members. In this way, CAPONE reduces the bandwidth consumption and signaling overhead, while guaranteeing the control message delivering in FANET scenarios. Extensive simulations are used to show the gains of the CAPONE in terms of Packet Delivery Ratio, overhead, and energy compared to existing SDN-FANET architectures.
APA, Harvard, Vancouver, ISO, and other styles
34

Waheed, Mohammed Abbas, Azzad Bader Saeed, and Thanaa Hussein Abd. "Signalling load reduction in 5G network based on cloud radio access network architecture." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5127. http://dx.doi.org/10.11591/ijece.v11i6.pp5127-5136.

Full text
Abstract:
The rapid growth of both mobile users and application numbers has caused a huge load on the core network (CN). This is attributed to the large numbers of control messages circulating between CN entities for each communication or service request, however, making it imperative to develop innovative designs to handle this load. Consequently, a variety of proposed architectures, including a software defined network (SDN) paradigm focused on the separation of control and data plans, have been implemented to make networks more flexible. Cloud radio access network (C-RAN) architecture has been suggested for this purpose, which is based on separating base band units (BBU) from several base stations and assembling these in one place. In this work, a novel approach to realize this process is based on SDN and C-RAN, which also distributes the control elements of the CN and locates them alongside the BBU to obtain the lowest possible load. The performance of this proposed architecture was evaluated against traditional architecture using MATLAB simulation, and. the results of this assessment indicated a major reduction in signalling load as compared to that seen in the traditional architecture. Overall, the number of signalling messages exchanged between control entities was decreased by 53.19 percent as compared to that seen in the existing architecture.
APA, Harvard, Vancouver, ISO, and other styles
35

Czyz, Ewa K., Alejandra Arango, Nathaniel Healy, Cheryl A. King, and Maureen Walton. "Augmenting Safety Planning With Text Messaging Support for Adolescents at Elevated Suicide Risk: Development and Acceptability Study." JMIR Mental Health 7, no. 5 (May 25, 2020): e17345. http://dx.doi.org/10.2196/17345.

Full text
Abstract:
Background Suicide is the second leading cause of death among adolescents. A critical need exists for developing promising interventions for adolescents after psychiatric hospitalization who are at a high risk of experiencing repeated suicidal behaviors and related crises. The high-risk period following psychiatric hospitalization calls for cost-effective and scalable continuity of care approaches to support adolescents’ transition from inpatient care. Text messages have been used to improve a wide range of behavioral and health outcomes and may hold promise as an accessible continuity of care strategy for youth at risk of suicide. Objective In this study of 40 adolescents at elevated suicide risk, we report on the iterative development and acceptability of a text-based intervention designed to encourage adaptive coping and safety plan adherence in the high-risk period following psychiatric hospitalization. Methods Adolescents (aged 13-17 years) who were hospitalized because of last-month suicide attempts or last-week suicidal ideation took part in either study phase 1 (n=25; 19/25, 76% female), wherein message content was developed and revised on the basis of feedback obtained during hospitalization, or study phase 2 (n=15; 11/15, 73% female), wherein text messages informed by phase 1 were further tested and refined based on feedback obtained daily over the course of a month after discharge (n=256 observations) and during an end-of-study phone interview. Results Quantitative and qualitative feedback across the 2 study phases pointed to the acceptability of text-based support. Messages were seen as having the potential to be helpful with the transition after hospitalization, with adolescents indicating that texts may serve as reminders to use coping strategies, contribute to improvement in mood, and provide them with a sense of encouragement and hope. At the same time, some adolescents expressed concerns that messages may be insufficient for all teens or circumstances. In phase 2, the passage of time did not influence adolescents’ perception of messages in the month after discharge (P=.74); however, there were notable daily level associations between the perception of messages and adolescents’ affect. Specifically, higher within-person (relative to adolescents’ own average) anger was negatively related to liking text messages (P=.005), whereas within-person positive affect was associated with the perception of messages as more helpful (P=.04). Conclusions Text-based support appears to be an acceptable continuity of care strategy to support adolescents’ transition after hospitalization. The implications of study findings are discussed. Future work is needed to evaluate the impact of text-based interventions on suicide-related outcomes.
APA, Harvard, Vancouver, ISO, and other styles
36

Sarika, Dr S. "Browser Security Attacks and Detection Techniques: A Case of Tabnabbing." Science & Technology Journal 8, no. 1 (January 1, 2020): 33–41. http://dx.doi.org/10.22232/stj.2020.08.01.03.

Full text
Abstract:
Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
37

Bianchi, Valentina, Filippo Savi, Ilaria De Munari, Davide Barater, Giampaolo Buticchi, and Giovanni Franceschini. "Minimization of Network Induced Jitter Impact on FPGA-Based Control Systems for Power Electronics through Forward Error Correction." Electronics 9, no. 2 (February 6, 2020): 281. http://dx.doi.org/10.3390/electronics9020281.

Full text
Abstract:
In modular distributed architectures, the adoption of a communication method that is at the same time robust and has a low and predictable latency is of utmost importance in order to support the required system dynamics. The aim of this paper is to evaluate the consequences of the random jitter on machine drives distributed control, caused by the messages’ re-transmission in case of an error in the received data. To achieve this goal, two different Forward Error Correction (FEC) techniques are introduced in the chosen protocol, so that the recipient of the message can correct random errors without the need of any additional round trip delays needed to request and obtain a re-transmission. Experimentally validated simulations are used to evaluate the impact of random network derived jitter on a real world closed loop control system for distributed power electronic converters.
APA, Harvard, Vancouver, ISO, and other styles
38

DEHNE, FRANK, ANDREAS FABRI, and ANDREW RAU-CHAPLIN. "SCALABLE PARALLEL COMPUTATIONAL GEOMETRY FOR COARSE GRAINED MULTICOMPUTERS." International Journal of Computational Geometry & Applications 06, no. 03 (September 1996): 379–400. http://dx.doi.org/10.1142/s0218195996000241.

Full text
Abstract:
We study scalable parallel computational geometry algorithms for the coarse grained multicomputer model: p processors solving a problem on n data items, were each processor has O(n/p)≫O(1) local memory and all processors are connected via some arbitrary interconnection network (e.g. mesh, hypercube, fat tree). We present O(Tsequential/p+Ts(n, p)) time scalable parallel algorithms for several computational geometry problems. Ts(n, p) refers to the time of a global sort operation. Our results are independent of the multicomputer’s interconnection network. Their time complexities become optimal when Tsequential/p dominates Ts(n, p) or when Ts(n, p) is optimal. This is the case for several standard architectures, including meshes and hypercubes, and a wide range of ratios n/p that include many of the currently available machine configurations. Our methods also have some important practical advantages: For interprocessor communication, they use only a small fixed number of one global routing operation, global sort, and all other programming is in the sequential domain. Furthermore, our algorithms use only a small number of very large messages, which greatly reduces the overhead for the communication protocol between processors. (Note however, that our time complexities account for the lengths of messages.) Experiments show that our methods are easy to implement and give good timing results.
APA, Harvard, Vancouver, ISO, and other styles
39

Margat, Aurore, Benoît Pétré, Jean-François d’Ivernois, Pierre Lombrail, Johann Cailhol, and Rémi Gagnayre. "COVID-19 : Proposition d’un modèle d’éducation d’urgence." Education Thérapeutique du Patient - Therapeutic Patient Education 12, no. 1 (2020): 10402. http://dx.doi.org/10.1051/tpe/2020003.

Full text
Abstract:
La crise sanitaire actuelle rappelle tout l’enjeu de la communication des messages de prévention et de leur compréhension par la population. Si les messages sur les gestes barrières ont été conçus pour être facilement compris, il n’en reste pas moins que le passage du traitement de l’information à la mise en œuvre d’un comportement de santé représente un véritable défi. Pour obtenir des changements de comportements de santé face à l’épidémie, il est impératif de proposer une « éducation d’urgence », couplée à une stratégie d’information, en particulier pour aider les personnes les plus vulnérables et démunies. Dans ce contexte, le Laboratoire Éducations et Pratiques de Santé (LEPS UR 3412) de l’Université Sorbonne Paris Nord a conçu une intervention éducative brève pour les personnes concernées par le COVID-19. Cette intervention (30 min à 1 h) s’adosse à trois champs de pratiques : l’éducation thérapeutique de sortie d’hôpital dite ETP-SH, la littératie en santé et l’identité-logement. Les différentes phases de cette intervention sont proches de celles de celles de l’ETP-SH : un diagnostic éducatif suivi de la négociation des applications possibles avec la personne, une phase d’échanges interactifs, la vérification permanente de la compréhension par la personne et la planification d’une séance téléphonique planifiée à distance.
APA, Harvard, Vancouver, ISO, and other styles
40

Bott, Oliver, Christian Kohl, Christian Lovis, Sebastian Garde, and Petra Knaup. "Section 2: Patient Records: Electronic Patient Records: Moving from Islands and Bridges towards Electronic Health Records for Continuity of Care." Yearbook of Medical Informatics 16, no. 01 (August 2007): 34–46. http://dx.doi.org/10.1055/s-0038-1638520.

Full text
Abstract:
SummaryElectronic patient record (EPR) systems are increasingly used and have matured sufficiently so as to contribute to high quality care and efficient patient management. Our objective is to summarize current trends and major achievements in the field of EPR in the last year and to discuss their future prospects.Integrating health data from a variety of sources in a comprehensive EPR is a major prerequisite for e-health and eresearch. Current research continues to elaborate architectures, technologies and security concepts. To achieve semantic interoperability standards are developed on different levels, including basic data types, messages, services, architectures, terminologies, ontologies, scope and presentation of EPR content. Standards development organisations have started to harmonize their work to arrive at a consensus standard for EPR systems. Integrating the health care enterprise as a whole will optimize efficient use of resources, logistics and scheduling.The past few years have seen a myriad of developments of EPR systems. However, it is still a long way, until EPR systems can flexibly fulfill all user requirements and an EHR will become broadly accepted. Semantic interoperability will be a key to successful EPR use, especially to avoid double data entries and to better integrate data recording within local workflows. The patient will become an empowered partner, not only by giving him access to his health data. All this will result in enormous quantities of data. Thus, time has come to determine how relevant data can be presented to the stakeholders adequately.
APA, Harvard, Vancouver, ISO, and other styles
41

Rojas-Lizana, Isolda, and Emily Hannah. "Manipulación del género gramatical y sexual en la traducción española de un cuento de Oscar Wilde." Babel. Revue internationale de la traduction / International Journal of Translation 59, no. 3 (December 31, 2013): 310–31. http://dx.doi.org/10.1075/babel.59.3.04roj.

Full text
Abstract:
Translation as a cultural process can be used in various ways to suppress or promote ideologies. Within the framework of Critical Studies in Translation, this article examines the presence of the phenomenon of manipulation; that is, deliberate alteration of central topics and messages for ideological purposes, in the Spanish translation of the story The Happy Prince by Oscar Wilde. It proposes that Wilde’s specific intent in using the fairy tale genre to battle heterosexism (the belief that heterosexuality is the only norm) is not transmitted in any of the Spanish versions of the story, since its English publication in 1888 to the twenty-first century.<p> The analysis proves that all twelve translations of the story found, included the famous translation by Jorge Luis Borges in 1910, manipulate the sex and sexuality of the characters by taking advantage of the commonly perceived ambiguities between the grammatical and cultural gender in Spanish. This is done in such a way that one of the messages of the story, the redemption of homosexual love and its acceptance by God, is omitted entirely to become, and promote, the standard and conventional view of sexuality that dominates contemporary Western tradition. The article finishes by pointing out the linguistic choices that need to be considered for a new translation of the story and provides the translation of a passage as an example.<p>
APA, Harvard, Vancouver, ISO, and other styles
42

Vatta, Francesca, Alessandro Soranzo, Massimiliano Comisso, Giulia Buttazzoni, and Fulvio Babich. "A Survey on Old and New Approximations to the Function ϕ(x) Involved in LDPC Codes Density Evolution Analysis Using a Gaussian Approximation." Information 12, no. 5 (May 17, 2021): 212. http://dx.doi.org/10.3390/info12050212.

Full text
Abstract:
Low Density Parity Check (LDPC) codes are currently being deeply analyzed through algorithms that require the capability of addressing their iterative decoding convergence performance. Since it has been observed that the probability distribution function of the decoder’s log-likelihood ratio messages is roughly Gaussian, a multiplicity of moderate entanglement strategies to this analysis has been suggested. The first of them was proposed in Chung et al.’s 2001 paper, where the recurrent sequence, characterizing the passage of messages between variable and check nodes, concerns the function ϕ(x), therein specified, and its inverse. In this paper, we review this old approximation to the function ϕ(x), one variant on it obtained in the same period (proposed in Ha et al.’s 2004 paper), and some new ones, recently published in two 2019 papers by Vatta et al. The objective of this review is to analyze the differences among them and their characteristics in terms of accuracy and computational complexity. In particular, the explicitly invertible, not piecewise defined approximation of the function ϕ(x), published in the second of the two abovementioned 2019 papers, is shown to have less relative error in any x than most of the other approximations. Moreover, its use conducts to an important complexity reduction, and allows better Gaussian approximated thresholds to be obtained.
APA, Harvard, Vancouver, ISO, and other styles
43

Hidayat, Elvin Atmaja. "Menggali Relevansi Teologis Berdasarkan Analisis Naratif Atas Kisah “Kelahiran Samuel” Dalam 1 Samuel 1:1-28." DISKURSUS - JURNAL FILSAFAT DAN TEOLOGI STF DRIYARKARA 17, no. 1 (April 9, 2018): 79–101. http://dx.doi.org/10.36383/diskursus.v17i1.184.

Full text
Abstract:
Abstrak: Kitab Suci merupakan Sabda Allah yang menjadi tumpuan hidup dan sumber kebenaran bagi umat beriman. Posisinya begitu agung dan penting. Sayangnya, banyak umat Kristiani yang kesulitan untuk memahami isi Kitab Suci. Artikel ini bertujuan untuk memperkenalkan salah satu metode menafsirkan Kitab Suci yang relatif mudah untuk digunakan oleh semua kalangan, yakni metode Analisis Naratif. Dalam artikel ini, metode tersebut akan digunakan untuk menganalisis perikop tentang “Kelahiran Samuel” (1 Samuel 1:1-28). Melalui analisis atas teks ini pula, hendak dipaparkan beberapa pesan teologis yang dapat meng- inspirasi kehidupan umat beriman. Secara praktis, artikel ini berikhtiar menunjukkan bahwa metode analisis naratif cukup berjasa dalam mem- permudah umat Kistiani menafsirkan atau menggali pesan-pesan teologis dari teks-teks alkitabiah. Kata-kata Kunci: Analisis Naratif, Kitab Suci, kelahiran Samuel, iman, doa, pesan teologis. Abstract: Holy Bible (Scripture) is the Word of God. It is the foundation of life and the source of truth for the faithful. Its position is very great and important, but unfortunately, many Christians find it difficult to understand the content of Scripture. This article would like to introduce one method of interpreting Scripture that is relatively easy to be used by all circles, the method of Narrative Analysis. In this article, the method will be used to analyze the passage about “Birth of Samuel” (1 Samuel 1:1-28). Through the analysis of this text, the writer also offers some theological messages that can inspire the life of faith. Practically, it can be argued that the method of narrative analysis is meritorious in facilitating Christian people to interpret or explore theological messages of biblical texts. Keywords: Narrative analysis, scripture (holy bible), Samuel’s birth, faith, prayer, theological messages.
APA, Harvard, Vancouver, ISO, and other styles
44

Alt, V. V., M. S. Chekusov, S. P. Isakova, and E. A. Balushkina. "Epistemological Foundations of the Digital Technologies Used in Agriculture in Siberia." Agricultural Machinery and Technologies 15, no. 1 (March 24, 2021): 16–23. http://dx.doi.org/10.22314/2073-7599-2021-15-1-16-23.

Full text
Abstract:
The authors substantiated the necessity for an epistemological approach to determining the main messages in the digitalization application by agricultural producers, taking into account natural and climatic, commodity-production and social factors.(Research purpose) To formulate the main messages when applying digital technologies in agricultural production, which determine epistemological approaches to their systematic use and allow increasing grain production by 2-3 times on the example of JSC Sokolovo.(Materials and methods) The authors applied a system analysis to agricultural production objects as to information field when describing them in the information space.(Results and discussion) The authors found that agricultural production objects were in an objective multiplicative relationship. Based on the results, a communication scheme between objects in agro-industrial production, reflecting their dialectical commonality was developed. They presented production objects as a resource characterized by a certain set of parameters and values. They showed the multiplicative nature of the resources relationship, describing the nature of the dependence by the method of passage to the limit. The authors identified general information requirements for solving the agriculture problems, crop production and for the means of processing this information in the amount of more than 2 petaflops. They established the necessary resolution for managing technical processes - less than 3 centimeters.(Conclusions) The authors proposed a paradigm for information support of technological processes in agricultural production. They confirmed the legitimacy of this approach to the paradigm formation by creating more than 20 databases. They gave examples of increasing the efficiency of grain production in the Novosibirsk region. The epistemological principles were based on the formulated six messages of information digital technologies, which made it possible to use them in more than 247 520 different combinations and apply to the whole farms variety, depending on their capabilities and desires.
APA, Harvard, Vancouver, ISO, and other styles
45

Haider, Shahab, Ziaul Haq Abbas, Ghulam Abbas, Muhammad Waqas, Shanshan Tu, and Wei Zhao. "A Novel Cross-Layer V2V Architecture for Direction-Aware Cooperative Collision Avoidance." Electronics 9, no. 7 (July 8, 2020): 1112. http://dx.doi.org/10.3390/electronics9071112.

Full text
Abstract:
The death toll due to highway crashes is increasing at an alarming rate across the globe. Vehicular Ad Hoc Networks (VANETs) have emerged as a promising solution to prevent crashes by enabling collision avoidance applications. However, a robust and stable collision avoidance application is a cross-layer problem that must address a number of key challenges across all layers of a VANET communication architecture. This paper presents and evaluates a novel VANET protocol suite, named Direction-Aware Vehicular Collision Avoidance (DVCA), which covers application, security services, network, and link layers. DVCA is a vehicle-to-vehicle communication architecture that provides enhanced collision probability computation and adaptive preventive measures for cooperative collision avoidance on bi-directional highways. Moreover, DVCA enables secure, in-time, and reliable dissemination of warning messages, which provides adequate time for vehicles to prevent collisions. Simulation and analytical results demonstrate reasonable reduction in collisions by DVCA, as compared with eminent VANET communication architectures.
APA, Harvard, Vancouver, ISO, and other styles
46

Rico, Mariano, Óscar Corcho, José Antonio Macías, and David Camacho. "A Tool Suite to Enable Web Designers, Web Application Developers and End-users to Handle Semantic Data." International Journal on Semantic Web and Information Systems 6, no. 3 (July 2010): 38–60. http://dx.doi.org/10.4018/ijswis.2010070103.

Full text
Abstract:
Current web application development requires highly qualified staff, dealing with an extensive number of architectures and technologies. When these applications incorporate semantic data, the list of skill requirements becomes even larger, leading to a high adoption barrier for the development of semantically enabled Web applications. This paper describes VPOET, a tool focused mainly on two types of users: web designers and web application developers. By using this tool, web designers do not need specific skills in semantic web technologies to create web templates to handle semantic data. Web application developers incorporate those templates into their web applications, by means of a simple mechanism based in HTTP messages. End-users can use these templates through a Google Gadget. As web designers play a key role in the system, an experimental evaluation has been conducted, showing that VPOET provides good usability features for a representative group of web designers in a wide range of competencies in client-side technologies, ranging from amateur HTML developers to professional web designers.
APA, Harvard, Vancouver, ISO, and other styles
47

Kumar, Vijay. "Cloud Functions Using Server less Computing." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 418–19. http://dx.doi.org/10.22214/ijraset.2021.37986.

Full text
Abstract:
Abstract: Cloud Function in the simplest words is a Function-as-a-Service (FaaS). FaaS is actually a family of the serverless computing category. “Serverless” means that the user can focus on its application logic without dealing with infrastructure at all. Painless development, deployment, and maintenance of a web API is still not a turn-key solution, although modern web application frameworks have improved dramatically in the last few years. Serverless is without any doubt a game-changer. The event-driven approach combined with a scalable and robust cloud ecosystem offered by the main top cloud vendors opens endless opportunities. Cloud Functions is Google Cloud’s event-driven serverless compute platform. FaaS is a real NoOps technology, it completely abstracts away servers. Cloud Functions are developed with the sole purpose to build event-driven architectures. These can react to events like file changes in storage, messages in the queue, or any HTTP request. Index Terms: Cloud Computing, Serverless Technology, Function as a Service, Lambda Functions and Functions
APA, Harvard, Vancouver, ISO, and other styles
48

Salamon, Andi, Jennifer Sumsion, and Linda Harrison. "Infants draw on ‘emotional capital’ in early childhood education contexts: A new paradigm." Contemporary Issues in Early Childhood 18, no. 4 (December 2017): 362–74. http://dx.doi.org/10.1177/1463949117742771.

Full text
Abstract:
Research about infants’ capacity to communicate using cries, smiles and sophisticated emotional strategies to connect with adults in their lives has predominantly emerged from the field of developmental psychology, with relatively limited attention to how babies enact such communicative practices with key adults in naturalistic settings. This article examines the emotional communicative practices infants use with educators in early childhood education and care contexts. Drawing on data from a study about educators’ conceptions of infants’ capabilities, the article frames babies’ intentional use of emotionally evocative communication as ‘emotional capital’. Transcripts of digital videos, pictures and written observations are used to illustrate how infants actively draw on reserves of emotional capital to guide the course of their relationship with educators, affording a view into how these efforts to communicate emotional messages are understood and met by their educators. Drawing on the theory of practice architectures, implications for the relationships that develop between infants and their primary carers/educators are discussed. Concluding thoughts acknowledge infants’ agency and active contribution to the dynamics within those relationships.
APA, Harvard, Vancouver, ISO, and other styles
49

Binder, Patrick, Nikolas D. Schnellbächer, Thomas Höfer, Nils B. Becker, and Ulrich S. Schwarz. "Optimal ligand discrimination by asymmetric dimerization and turnover of interferon receptors." Proceedings of the National Academy of Sciences 118, no. 37 (September 10, 2021): e2103939118. http://dx.doi.org/10.1073/pnas.2103939118.

Full text
Abstract:
In multicellular organisms, antiviral defense mechanisms evoke a reliable collective immune response despite the noisy nature of biochemical communication between tissue cells. A molecular hub of this response, the interferon I receptor (IFNAR), discriminates between ligand types by their affinity regardless of concentration. To understand how ligand type can be decoded robustly by a single receptor, we frame ligand discrimination as an information-theoretic problem and systematically compare the major classes of receptor architectures: allosteric, homodimerizing, and heterodimerizing. We demonstrate that asymmetric heterodimers achieve the best discrimination power over the entire physiological range of local ligand concentrations. This design enables sensing of ligand presence and type, and it buffers against moderate concentration fluctuations. In addition, receptor turnover, which drives the receptor system out of thermodynamic equilibrium, allows alignment of activation points for ligands of different affinities and thereby makes ligand discrimination practically independent of concentration. IFNAR exhibits this optimal architecture, and our findings thus suggest that this specialized receptor can robustly decode digital messages carried by its different ligands.
APA, Harvard, Vancouver, ISO, and other styles
50

Kosheleva, O. D., and N. V. Prashcheruk. "On the Metaplot of Reading Aloud in the Novels by F. M. Dostoevsky." Izvestia Ural Federal University Journal Series 1. Issues in Education, Science and Culture 27, no. 2 (2021): 102–9. http://dx.doi.org/10.15826/izv1.2021.27.2.034.

Full text
Abstract:
The article is devoted to the four episodes of reading the passages from Holy Scripture in the F. M. Dostoevsky’s novels. These include The Raising of Lazarus in “Crime and Punishment”, Messages to the Angel of the Laodocian Church in “Demons” and the Marriage at Cana in “The Brothers Karamazov”. There are several shared characteristics of the content and structure in noted episodes. First of all, there are always heroes-who-read and heroes-who-listen. Secondly, while heroes-who-read are usually having a strong faith, heroes-who-listen are facing the crisis of belief. Finally, each passage is meant to be an allegory, by which the readers are trying to point a new way in life for listeners, and motivate them to work on themselves instead of giving them ready answers. In conclusion, all of the above-mentioned episodes could be summarized into a metaplot of reading in the F. M. Dostoevsky’s novels.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography