Macro Practice and Policy in Cyberspace: Teaching with Computer Simulation and the Internet at the Baccalaureate Level

Author(s):  
Colleen Galambos ◽  
Charles Edward Neal
2018 ◽  
Vol 7 (2.21) ◽  
pp. 194
Author(s):  
R Caroline Kalaiselvi ◽  
S Mary Vennila

The Internet of Things (IoT) prompts can administered by gathering data from little sensor gadgets. As of late, stockpiling less detecting gadgets have been utilized to actualize IoT administrations.  They rely upon conveyed programming from a system server to work benefit capacities and IoT administrations are in view of gathered client data. In this way, it is critical to keep up trusted associations aid programming conveyance or information transmission. In the event that a system association is deceitful, stable information transmission can't be accomplished. Dishonest information associations cause numerous issues in IoT administrations. In this manner, this paper proposes a product refresh strategy in trusted association of IoT organizing. The technique utilizes Low Power Wide Area Network (LPWAN) as long-go IoT organizing innovation and utilizations a portable edge cloud to enhance registering effectiveness in an entrance arrange that comprises of IoT gadgets with lacking assets. In the strategy, the versatile edge cloud is coordinated into a door, and forms detecting information and remote programming updates of LPWAN. IoT gadgets can get programming capacities from the versatile edge cloud. The proposed strategy investigates measurable data about associations in a get to arrange and decides the LPWAN put stock in associations. At that point, programming updates can be performed over the confided in association. Utilizing trusted associations prompts an expanded bundle conveyance rate and decreased transmission vitality utilization. The strategy is contrasted with at present accessible frameworks through PC recreation and through computer simulation and this method’s efficiency is validated. 


Author(s):  
Xiaorui Hu ◽  
Zhangxi Lin ◽  
Han Zhang

Escrow is an emerging trust service in online consumer-to-consumer auction markets in preventing Internet fraud. This chapter studies the effect of traders’ perceived risk on the adoption of online escrow service (OES). This research establishes decision-making models for both the honest trader and the monopolist OES provider. Perceived risk rate (PRR), a dynamic measure of perceived risk for online traders, is introduced to link the two decision-making models together. A calculative model for PRR is proposed, and the primary outcomes from the computer simulation for PRR measurement are presented. This chapter reveals that OES adoption is positively correlated to the estimated level of traders’ PRR. A higher PRR definitely leads to a higher OES adoption rate and hence reduces the Internet fraud in the auction markets. In addition, an overestimate of PRR leads to higher adoption rate, lower defrauding rate, and higher fraud blocking rate.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Kiyomichi Nakai ◽  
Yusuke Isobe ◽  
Chiken Kinoshita ◽  
Kazutoshi Shinohara

Induced spinodal decomposition under electron irradiation in a Ni-Au alloy has been investigated with respect to its basic mechanism and confirmed to be caused by the relaxation of coherent strain associated with modulated structure. Modulation of white-dots on structure images of modulated structure due to high-resolution electron microscopy is reduced with irradiation. In this paper the atom arrangement of the modulated structure is confirmed with computer simulation on the structure images, and the relaxation of the coherent strain is concluded to be due to the reduction of phase-modulation.Structure images of three-dimensional modulated structure along <100> were taken with the JEM-4000EX high-resolution electron microscope at the HVEM Laboratory, Kyushu University. The transmitted beam and four 200 reflections with their satellites from the modulated structure in an fee Ni-30.0at%Au alloy under illumination of 400keV electrons were used for the structure images under a condition of the spherical aberration constant of the objective lens, Cs = 1mm, the divergence of the beam, α = 3 × 10-4 rad, underfocus, Δf ≃ -50nm and specimen thickness, t ≃ 15nm. The CIHRTEM code was used for the simulation of the structure image.


2019 ◽  
Vol 3 (6) ◽  
pp. 723-729
Author(s):  
Roslyn Gleadow ◽  
Jim Hanan ◽  
Alan Dorin

Food security and the sustainability of native ecosystems depends on plant-insect interactions in countless ways. Recently reported rapid and immense declines in insect numbers due to climate change, the use of pesticides and herbicides, the introduction of agricultural monocultures, and the destruction of insect native habitat, are all potential contributors to this grave situation. Some researchers are working towards a future where natural insect pollinators might be replaced with free-flying robotic bees, an ecologically problematic proposal. We argue instead that creating environments that are friendly to bees and exploring the use of other species for pollination and bio-control, particularly in non-European countries, are more ecologically sound approaches. The computer simulation of insect-plant interactions is a far more measured application of technology that may assist in managing, or averting, ‘Insect Armageddon' from both practical and ethical viewpoints.


Sign in / Sign up

Export Citation Format

Share Document