25,774 research outputs found

    The Design of a System Architecture for Mobile Multimedia Computers

    Get PDF
    This chapter discusses the system architecture of a portable computer, called Mobile Digital Companion, which provides support for handling multimedia applications energy efficiently. Because battery life is limited and battery weight is an important factor for the size and the weight of the Mobile Digital Companion, energy management plays a crucial role in the architecture. As the Companion must remain usable in a variety of environments, it has to be flexible and adaptable to various operating conditions. The Mobile Digital Companion has an unconventional architecture that saves energy by using system decomposition at different levels of the architecture and exploits locality of reference with dedicated, optimised modules. The approach is based on dedicated functionality and the extensive use of energy reduction techniques at all levels of system design. The system has an architecture with a general-purpose processor accompanied by a set of heterogeneous autonomous programmable modules, each providing an energy efficient implementation of dedicated tasks. A reconfigurable internal communication network switch exploits locality of reference and eliminates wasteful data copies

    If you are late, you are Beyond help : Disinformation and Authorities in Social Media

    Get PDF
    Fast paced, seemingly vast and ever-growing social media is a challenging environment for public authorities to communicate optimally. One challenge is malicious disinformation, which is intentionally disseminated to deceive and cause harm to citizens and authorities. It is known that exceptional circumstances create opportunities for malicious actors to negatively influence democratic societies. Disinformation is often designed to cause uncertainty towards information that public authorities offer and to decrease the overall trust in public authorities. The aim of disinformation is often to cause polarisation in society and to weaken national security. Furthermore, in a crisis, it is essential that authorities are able to deliver official information quickly, clearly and accurately to citizens. Communication between authorities and citizens in time-sensitive situations is typically online. One challenge to public authorities is how they can mitigate and repair the effects of disinformation and information influencing in complex and time-sensitive circumstances. In this article, our aim is to describe the challenges that public authorities face when communicating in social media spaces where disinformation is present. The empirical data, including 16 government official interviews, was collected in September 2021. The main theme of the interviews was related to how situational awareness about disinformation is formed in their organisations. Our research questions focus on how public authorities detect and counter disinformation in social media and what kind of problems and pressures they have when communicating in such environments. This study follows a qualitative design and the data was analysed using inductive content analysis. This study is part of larger project related to counterforces and the detection of disinformation. The results will provide a broader understanding of how different types of public authorities, from health to security organisations, and from agencies to ministries, communicate in complex environments such as social media

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    E-Learning as a Cultural Artifact. An empirical study of Iranian Virtual Institutions

    Get PDF
    Choice, design and use of technology in education settings can be dependent on culturally embedded norms, i.e., assumptions about the nature of knowledge, ways of communications, kinds of teaching and learning strategies\ud and methods, etc. By discussing the culturally inscribed norms in this article, it is argued that on the design and use of e-learning in the perspective of globalization it is critically important to recognize, understand and thus take into account the cultural situatedness. Drawing on the literature, we present a model of culturalpedagogical paradigms in higher education in general and e-learning in particular. We use this model to explore cultural-pedagogical orientations in Iranian Virtual Institutions as an instance of a developing country. This is done in a comparative perspective, looking for similarities of the teacher’s and learner’s points of view

    Visualisation techniques, human perception and the built environment

    Get PDF
    Historically, architecture has a wealth of visualisation techniques that have evolved throughout the period of structural design, with Virtual Reality (VR) being a relatively recent addition to the toolbox. To date the effectiveness of VR has been demonstrated from conceptualisation through to final stages and maintenance, however, its full potential has yet to be realised (Bouchlaghem et al, 2005). According to Dewey (1934), perceptual integration was predicted to be transformational; as the observer would be able to ‘engage’ with the virtual environment. However, environmental representations are predominately focused on the area of vision, regardless of evidence stating that the experience is multi sensory. In addition, there is a marked lack of research exploring the complex interaction of environmental design and the user, such as the role of attention or conceptual interpretation. This paper identifies the potential of VR models to aid communication for the Built Environment with specific reference to human perception issues

    High performance computing of explicit schemes for electrofusion jointing process based on message-passing paradigm

    Get PDF
    The research focused on heterogeneous cluster workstations comprising of a number of CPUs in single and shared architecture platform. The problem statements under consideration involved one dimensional parabolic equations. The thermal process of electrofusion jointing was also discussed. Numerical schemes of explicit type such as AGE, Brian, and Charlies Methods were employed. The parallelization of these methods were based on the domain decomposition technique. Some parallel performance measurement for these methods were also addressed. Temperature profile of the one dimensional radial model of the electrofusion process were also given
    • 

    corecore