25,774 research outputs found
The Design of a System Architecture for Mobile Multimedia Computers
This chapter discusses the system architecture of a portable computer, called Mobile Digital Companion, which provides support for handling multimedia applications energy efficiently. Because battery life is limited and battery weight is an important factor for the size and the weight of the Mobile Digital Companion, energy management plays a crucial role in the architecture. As the Companion must remain usable in a variety of environments, it has to be flexible and adaptable to various operating conditions. The Mobile Digital Companion has an unconventional architecture that saves energy by using system decomposition at different levels of the architecture and exploits locality of reference with dedicated, optimised modules. The approach is based on dedicated functionality and the extensive use of energy reduction techniques at all levels of system design. The system has an architecture with a general-purpose processor accompanied by a set of heterogeneous autonomous programmable modules, each providing an energy efficient implementation of dedicated tasks. A reconfigurable internal communication network switch exploits locality of reference and eliminates wasteful data copies
If you are late, you are Beyond help : Disinformation and Authorities in Social Media
Fast paced, seemingly vast and ever-growing social media is a challenging environment for public authorities to communicate optimally. One challenge is malicious disinformation, which is intentionally disseminated to deceive and cause harm to citizens and authorities. It is known that exceptional circumstances create opportunities for malicious actors to negatively influence democratic societies. Disinformation is often designed to cause uncertainty towards information that public authorities offer and to decrease the overall trust in public authorities. The aim of disinformation is often to cause polarisation in society and to weaken national security. Furthermore, in a crisis, it is essential that authorities are able to deliver official information quickly, clearly and accurately to citizens. Communication between authorities and citizens in time-sensitive situations is typically online. One challenge to public authorities is how they can mitigate and repair the effects of disinformation and information influencing in complex and time-sensitive circumstances. In this article, our aim is to describe the challenges that public authorities face when communicating in social media spaces where disinformation is present. The empirical data, including 16 government official interviews, was collected in September 2021. The main theme of the interviews was related to how situational awareness about disinformation is formed in their organisations. Our research questions focus on how public authorities detect and counter disinformation in social media and what kind of problems and pressures they have when communicating in such environments. This study follows a qualitative design and the data was analysed using inductive content analysis. This study is part of larger project related to counterforces and the detection of disinformation. The results will provide a broader understanding of how different types of public authorities, from health to security organisations, and from agencies to ministries, communicate in complex environments such as social media
Options for Securing RTP Sessions
The Real-time Transport Protocol (RTP) is used in a large number of
different application domains and environments. This heterogeneity
implies that different security mechanisms are needed to provide
services such as confidentiality, integrity, and source
authentication of RTP and RTP Control Protocol (RTCP) packets
suitable for the various environments. The range of solutions makes
it difficult for RTP-based application developers to pick the most
suitable mechanism. This document provides an overview of a number
of security solutions for RTP and gives guidance for developers on
how to choose the appropriate security mechanism
E-Learning as a Cultural Artifact. An empirical study of Iranian Virtual Institutions
Choice, design and use of technology in education settings can be dependent on culturally embedded norms, i.e., assumptions about the nature of knowledge, ways of communications, kinds of teaching and learning strategies\ud
and methods, etc. By discussing the culturally inscribed norms in this article, it is argued that on the design and use of e-learning in the perspective of globalization it is critically important to recognize, understand and thus take into account the cultural situatedness. Drawing on the literature, we present a model of culturalpedagogical paradigms in higher education in general and e-learning in particular. We use this model to explore cultural-pedagogical orientations in Iranian Virtual Institutions as an instance of a developing country. This is done in a comparative perspective, looking for similarities of the teacherâs and learnerâs points of view
Visualisation techniques, human perception and the built environment
Historically, architecture has a wealth of visualisation techniques that have evolved throughout the period of structural design, with Virtual Reality (VR) being a relatively recent addition to the toolbox. To date the effectiveness of VR has been demonstrated from conceptualisation through to final stages and maintenance, however, its full potential has yet to be realised (Bouchlaghem et al, 2005). According to Dewey (1934), perceptual integration was predicted to be transformational; as the observer would be able to âengageâ with the virtual environment. However, environmental representations are predominately focused on the area of vision, regardless of evidence stating that the experience is multi sensory. In addition, there is a marked lack of research exploring the complex interaction of environmental design and the user, such as the role of attention or conceptual interpretation. This paper identifies the potential of VR models to aid communication for the Built Environment with specific reference to human perception issues
High performance computing of explicit schemes for electrofusion jointing process based on message-passing paradigm
The research focused on heterogeneous cluster workstations comprising of a number of CPUs in single and shared architecture platform. The problem statements under consideration involved one dimensional parabolic equations. The thermal process of electrofusion jointing was also discussed. Numerical schemes of explicit type such as AGE, Brian, and Charlies Methods were employed. The parallelization of these methods were based on the domain decomposition technique. Some parallel performance measurement for these methods were also addressed. Temperature profile of the one dimensional radial model of the electrofusion process were also given
- âŠ