The acoustic environment of the southern resident killer whales in Haro Strait: Propagation modeling and analysis of field measurements

2005 ◽  
Vol 117 (4) ◽  
pp. 2526-2526
Author(s):  
Christopher Jones ◽  
Michael Wolfson
2012 ◽  
Vol 38 (5) ◽  
pp. 1047-1061 ◽  
Author(s):  
Yu Yao ◽  
Lei Guo ◽  
Hao Guo ◽  
Ge Yu ◽  
Fu-xiang Gao ◽  
...  

2019 ◽  
Vol 9 (24) ◽  
pp. 5551 ◽  
Author(s):  
Yue Wu ◽  
Qi Meng ◽  
Lei Li ◽  
Jingyi Mu

Previous studies have found that hospitals are often inadequately ventilated in the heating region of China, which causes an increased risk of negative impacts on patients. The complex interaction between thermal comfort and acoustics presents considerable challenges for designers. There is a wide range of literature covering the area of the interaction between the sound–thermal, sound–odor, and acoustic–visual influences, but a focused research on the sound –thermal influence on comfort in hospitals has not been published yet. This paper describes a series of field measurements and subjective evaluations that investigate the thermal comfort and acoustic performance of eighteen hospitals in China. The results showed that the thermal comfort in the monitored wards was mostly acceptable, but the temperatures tended to be much higher and the humidity much lower, in practice than they were designed to be in the heating season. The most significant conclusion is that a positive thermal stimulus can create a comfortable thermal environment, which can improve patients’ evaluation of the acoustics, while a negative stimulus has the opposite effect. A comfortable acoustic environment also caused patients to positively evaluate thermal comfort. Moreover, the relationship between thermal and sound effects in the overall evaluation showed that they are almost equal.


2015 ◽  
Vol 2015 ◽  
pp. 1-8
Author(s):  
Song He ◽  
Can Zhang ◽  
Wei Guo ◽  
Li-Dong Zhai

The integration of the Internet and Mobile networks results in huge amount of data, as well as security threat. With the fragile capacity of security protection, worms can propagate in the integration network and undermine the stability and integrity of data. The propagation of worm is a great security risk to massive amounts of data in the integration network. We propose a kind of worm propagating in big data environment named BD-Worm. BD-Worm consumes computing resources and gets privacy information of users, which causes huge losses to our working and living. This paper constructs an integration network topology model and designs the BD-Worm propagating in the big data environment. To analyze the propagation of BD-Worm, we conduct a simulation and provide some recommendations to contain the widespread of BD-Worm according to the simulation results.


2010 ◽  
Vol 18 (3) ◽  
pp. 858-870 ◽  
Author(s):  
Parbati Kumar Manna ◽  
Shigang Chen ◽  
Sanjay Ranka

Sign in / Sign up

Export Citation Format

Share Document