51 resultados para Requirement


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern factories are complex systems where advances in networking and information technologies are opening new ways towards higher efficiency. Such move is being driven by market rules with ever-increasing competition levels, in search for faster time-to-market, improved process yield, non-stop operations, flexible manufacturing and tighter supply-chain coupling. All these aims present a common requirement, i.e. a realtime flow of information, from the plant-floor up to the management, maintenance, suppliers and clients, to support accurate monitoring and control of the factory. This stresses the importance achieved by the communication infrastructure in modern manufacturing industry. This paper presents the authors view concerning the current trends in modern factory communication systems. It addresses the problems of seamlessly integrating different information flows with diverse requirements, mainly in terms of timeliness. In this aspect, the debate between event-triggered and time-triggered communication is revisited as well as the joint support for both types of traffic. Finally, a view of where factory communication systems are moving to is also presented, showing the impact of open and widely available technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technological developments are pulling fieldbus networks to support a new wide class of applications, such as industrial multimedia applications. To enable its use in this kind of applications the TCP/IP suite of protocols can be integrated within a fieldbus stack, leading to a dual-stack approach that is briefly outlined in the paper. One important requirement that must be fulfilled by this approach is that the hard real-time guarantees provided to the control-related traffic ("native" fieldbus traffic) are kept. At the same time it must also provide the desired quality of service (QoS) to IP applications. The focus of the paper is on how, in such a dual-stack approach, QoS can be efficiently provided to IP applications requiring quasi-constant bandwidth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes how MPEG-4 object based video (obv) can be used to allow selected objects to be inserted into the play-out stream to a specific user based on a profile derived for that user. The application scenario described here is for personalized product placement, and considers the value of this application in the current and evolving commercial media distribution market given the huge emphasis media distributors are currently placing on targeted advertising. This level of application of video content requires a sophisticated content description and metadata system (e.g., MPEG-7). The scenario considers the requirement for global libraries to provide the objects to be inserted into the streams. The paper then considers the commercial trading of objects between the libraries, video service providers, advertising agencies and other parties involved in the service. Consequently a brokerage of video objects is proposed based on negotiation and trading using intelligent agents representing the various parties. The proposed Media Brokerage Platform is a multi-agent system structured in two layers. In the top layer, there is a collection of coarse grain agents representing the real world players – the providers and deliverers of media contents and the market regulator profiler – and, in the bottom layer, there is a set of finer grain agents constituting the marketplace – the delegate agents and the market agent. For knowledge representation (domain, strategic and negotiation protocols) we propose a Semantic Web approach based on ontologies. The media components contents should be represented in MPEG-7 and the metadata describing the objects to be traded should follow a specific ontology. The top layer content providers and deliverers are modelled by intelligent autonomous agents that express their will to transact – buy or sell – media components by registering at a service registry. The market regulator profiler creates, according to the selected profile, a market agent, which, in turn, checks the service registry for potential trading partners for a given component and invites them for the marketplace. The subsequent negotiation and actual transaction is performed by delegate agents in accordance with their profiles and the predefined rules of the market.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Componentised systems, in particular those with fault confinement through address spaces, are currently emerging as a hot topic in embedded systems research. This paper extends the unified rate-based scheduling framework RBED in several dimensions to fit the requirements of such systems: we have removed the requirement that the deadline of a task is equal to its period. The introduction of inter-process communication reflects the need to communicate. Additionally we also discuss server tasks, budget replenishment and the low level details needed to deal with the physical reality of systems. While a number of these issues have been studied in previous work in isolation, we focus on the problems discovered and lessons learned when integrating solutions. We report on our experiences implementing the proposed mechanisms in a commercial grade OKL4 microkernel as well as an application with soft real-time and best-effort tasks on top of it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In beacon-enabled mode, IEEE 802.15.4 is ruled by the slotted CSMA/CA Medium Access Control (MAC) protocol. The standard slotted CSMA/CA mechanism does not provide any means of differentiated services to improve the quality of service for timecritical events (such as alarms, time slot reservation, PAN management messages etc.). In this paper, we present and discuss practical service differentiation mechanisms to improve the performance of slotted CSMA/CA for time-critical events, with only minor add-ons to the protocol. The contribution of our proposal is more practical than theoretical since our initial requirement is to leave the original algorithm of the slotted CSMA/CA unchanged, but rather tuning its parameters adequately according to the criticality of the messages. We present a simulation study based on an accurate model of the IEEE 802.15.4 MAC protocol, to evaluate the differentiated service strategies. Four scenarios with different settings of the slotted CSMA/CA parameters are defined. Each scenario is evaluated for FIFO and Priority Queuing. The impact of the hiddennode problem is also analyzed, and a solution to mitigate it is proposed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The IEEE 802.15.4 protocol proposes a flexible communication solution for Low-Rate Wireless Personal Area Networks (LR-WPAN) including wireless sensor networks (WSNs). It presents the advantage to fit different requirements of potential applications by adequately setting its parameters. When in beaconenabled mode, the protocol can provide timeliness guarantees by using its Guaranteed Time Slot (GTS) mechanism. However, power-efficiency and timeliness guarantees are often two antagonistic requirements in wireless sensor networks. The purpose of this paper is to analyze and propose a methodology for setting the relevant parameters of IEEE 802.15.4-compliant WSNs that takes into account a proper trade-off between power-efficiency and delay bound guarantees. First, we propose two accurate models of service curves for a GTS allocation as a function of the IEEE 802.15.4 parameters, using Network Calculus formalism. We then evaluate the delay bound guaranteed by a GTS allocation and express it as a function of the duty cycle. Based on the relation between the delay requirement and the duty cycle, we propose a power-efficient superframe selection method that simultaneously reduces power consumption and enables meeting the delay requirements of real-time flows allocating GTSs. The results of this work may pave the way for a powerefficient management of the GTS mechanism in an IEEE 802.15.4 cluster.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Typically common embedded systems are designed with high resource constraints. Static designs are often chosen to address very specific use cases. On contrast, a dynamic design must be used if the system must supply a real-time service where the input may contain factors of indeterminism. Thus, adding new functionality on these systems is often accomplished by higher development time, tests and costs, since new functionality push the system complexity and dynamics to a higher level. Usually, these systems have to adapt themselves to evolving requirements and changing service requests. In this perspective, run-time monitoring of the system behaviour becomes an important requirement, allowing to dynamically capturing the actual scheduling progress and resource utilization. For this to succeed, operating systems need to expose their internal behaviour and state, making it available to the external applications, usually using a run-time monitoring mechanism. However, such mechanism can impose a burden in the system itself if not wisely used. In this paper we explore this problem and propose a framework, which is intended to provide this run-time mechanism whilst achieving code separation, run-time efficiency and flexibility for the final developer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Basel III will have a significant impact on the European banking sector. In September 2010, supervisors of various countries adopted the new rules proposed by the prudential Committee on Banking Supervision to be applied to the business of credit institutions (hereinafter called ICs) in a phased manner from 2013, assuming to its full implementation by 2019. The purpose of this new regulation is to limit the excessive risk that these institutions took on the period preceding the global financial crisis of 2008. This new regulation is known in slang by Basel III. Depending on the requirement of Basel II for banks and their supervisors to assess the soundness and adequacy of internal risk measurement and credit management systems, the development of methodologies for the validation of internal and external evaluation systems is clearly an important issue . More specifically, there is a need to develop tools to validate the systems used to generate the parameters (such as PD, LGD, EAD and ratings of perceived risk) that serve as starting points for the IRB approach for credit risk. In this context, the work is composed of a number of approaches and tools used to evaluate the robustness of these elements IRB systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este artigo apresenta uma nova abordagem (MM-GAV-FBI), aplicável ao problema da programação de projectos com restrições de recursos e vários modos de execução por actividade, problema conhecido na literatura anglo-saxónica por MRCPSP. Cada projecto tem um conjunto de actividades com precedências tecnológicas definidas e um conjunto de recursos limitados, sendo que cada actividade pode ter mais do que um modo de realização. A programação dos projectos é realizada com recurso a um esquema de geração de planos (do inglês Schedule Generation Scheme - SGS) integrado com uma metaheurística. A metaheurística é baseada no paradigma dos algoritmos genéticos. As prioridades das actividades são obtidas a partir de um algoritmo genético. A representação cromossómica utilizada baseia-se em chaves aleatórias. O SGS gera planos não-atrasados. Após a obtenção de uma solução é aplicada uma melhoria local. O objectivo da abordagem é encontrar o melhor plano (planning), ou seja, o plano que tenha a menor duração temporal possível, satisfazendo as precedências das actividades e as restrições de recursos. A abordagem proposta é testada num conjunto de problemas retirados da literatura da especialidade e os resultados computacionais são comparados com outras abordagens. Os resultados computacionais validam o bom desempenho da abordagem, não apenas em termos de qualidade da solução, mas também em termos de tempo útil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a low-cost scaled model of a silo for drying and airing cereal grains. It allows the control and monitor of several parameters associated to the silo's operation, through a remote accessible infrastructure. The scaled model consists of a 2.50 m wide × 2.10 m long plant with all control and monitor capacities provided by micro-Web servers. An application running on the micro-Web servers enables storing all parameters in a data basis for later analysis. The implemented model aims to support a remote experimentation facility for technological education, research-oriented tutorials, and industrial applications. Given the low-cost requirement, this remote facility can be easily replicated in other institutions to support a network of remote labs, which encompasses the concurrent access of several users (e.g. students).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The application of mathematical methods and computer algorithms in the analysis of economic and financial data series aims to give empirical descriptions of the hidden relations between many complex or unknown variables and systems. This strategy overcomes the requirement for building models based on a set of ‘fundamental laws’, which is the paradigm for studying phenomena usual in physics and engineering. In spite of this shortcut, the fact is that financial series demonstrate to be hard to tackle, involving complex memory effects and a apparently chaotic behaviour. Several measures for describing these objects were adopted by market agents, but, due to their simplicity, they are not capable to cope with the diversity and complexity embedded in the data. Therefore, it is important to propose new measures that, on one hand, are highly interpretable by standard personal but, on the other hand, are capable of capturing a significant part of the dynamical effects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Relatório de Estágio

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mestrado em Engenharia Informática

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: A growing body of research suggests that vitamin D might play an important role in overall health. No data exist on vitamin D intake for the Azorean adolescent population. The purpose of this study was to assess vitamin D intake and investigate a possible association between vitamin D intake and cardiometabolic risk factors in Azorean adolescents. Methods: A cross-sectional school-based study was conducted on 496 adolescents (288 girls) aged 15–18 years from the Azorean Islands, Portugal. Anthropometric measurements (waist circumference and height), blood pressure (systolic), and plasma biomarkers [fasting glucose, insulin, total cholesterol (TC), high-density lipoprotein cholesterol (HDL-C), and triglycerides (TGs)] were measured to assess metabolic risk. Homeostasis model assessment (HOMA), TC-to-HDL-C ratio, and waist-to-height ratio were calculated. For each of these variables, a Z-score was computed by age and sex. A metabolic risk score was constructed by summing the Zscores of all individual risk factors. High risk was considered when the individual had ‡ 1 standard deviation(SD) of this score. Vitamin D intake was assessed with a semiquantitative food frequency questionnaire. Participants were classified into quartiles of vitamin D intake. Logistic regression was used to determine odds ratios for high cardiometabolic risk scores after adjusting for total energy intake, pubertal stage, fat mass percentage, and cardiorespiratory fitness. Results: Mean (SD) vitamin D intake was 5.8 (6.5) mg/day, and 9.1% of Azorean adolescents achieved the estimated average requirement of vitamin D (10 mg/day or 400 IU). Logistic regression showed that the odds ratio for a high cardiometabolic risk score was 3.35 [95% confidence interval (CI) 1.28–8.75] for adolescents in the lowest vitamin D intake quartile in comparison with those in the highest vitamin D intake quartile, even after adjustment for confounders. Conclusion: A lower level of vitamin D intake was associated with worse metabolic profile among Azorean adolescents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A aplicação do material compósito é neste momento bastante vasta, graças à combinação das suas características específicas, tais como, maior resistência específica e módulos específicos e melhor resistência à fadiga, quando comparados com os metais convencionais. Tais características, quando requeridas, tornam este material ideal para aplicações estruturais. Esta caminhada de sucesso iniciou desde muito cedo, quando o material compósito já era utilizado para fabrico de armas pelos mongóis e na construção civil pelos hebreus e egípcios, contudo, só a partir dos meados do século XX é que despertou interesses para aplicações mais modernas. Atualmente os materiais compósitos são utilizados em equipamentos domésticos, componentes elétricos e eletrónicos, passando por materiais desportivos, pela indústria automóvel e construção civil, até indústrias de grande exigência e visibilidade tecnológica como a aeronáutica, espacial e de defesa. Apesar das boas características apresentadas pelos materiais compósitos, no entanto, estes materiais têm tendência a perderem as suas propriedades quando submetidas a algumas operações de acabamento como a furação. A furação surge da necessidade de ligação de peças de um mesmo mecanismo. Os furos obtidos por este processo devem ser precisos e sem danos para garantir ligações de alta resistência e também precisas. A furação nos materiais compósitos é bastante complexa devido à sua heterogeneidade, anisotropia, sensibilidade ao calor e pelo facto de os reforços serem extremamente abrasivos. A operação de furação pode causar grandes danos na peça, como a delaminação a entrada, defeitos de circularidade do furo, danos de origem térmica e a delaminação à saída que se apresenta como o mais frequente e indesejável. Com base nesses pressupostos é que este trabalho foi desenvolvido de forma a tentar obter processos simples para determinação e previsão de danos em polímeros reforçados com fibras (de carbono neste caso) de forma a precavê-los. De forma a conseguir estes objetivos, foram realizados ensaios de início de delaminação segundo a proposta de Lachaud et al. e ensaios de pin-bearing segundo a proposta de Khashaba et al. Foram também examinadas extensões de danos de acordo com o modelo de Fator de delaminação ajustado apresentado por Davim et al. A partir dos ensaios, de pin-bearing, realizados foram analisadas influências do material e geometria da broca, do avanço utilizado na furação e de diferentes orientações de empilhamentos de placas na delaminação de laminados compósitos e ainda a influências dessas variáveis na força de rutura por pin-bearing. As principais conclusões tiradas daqui são que a delaminação aumenta com o aumento do avanço, o que já era esperado, as brocas em carboneto de tungsténio são as mais recomendas para a furação do material em causa e que a delaminação é superior para a placa cross-ply quando comparada com placas unidirecionais. Para a situação de ensaios de início de delaminação foram analisadas as influências da variação da espessura não cortada por baixo da broca/punção, de diferentes geometrias de brocas, da alteração de velocidade de ensaio e diferentes orientações de empilhamentos de placas na força de início de delaminação. Deste ensaio as principais conclusões são que a força de início de delaminação aumenta com o aumenta da espessura não cortada e a influência da velocidade de ensaio altera com a variação das orientações de empilhamento.