64 resultados para memory-based networks


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of the thesis was to evaluate business potential of wireless local area networks (WLAN, Wireless LAN). At first, the scope of business potential evaluation of technology was introduced. Next, a general framework of business potential evaluation of technology based on literature was presented. In addition, convergence of cellular networks and data networks was studied in order to get an insight of current situation of mobile telecommunications industry. Finally, wireless local area networks business potential was evaluated. A wireless local area network is a data communication system, which combines data connectivity with mobility and is implemented in unlicensed frequency bands, allowing new business opportunities to emerge. The main markets of WLAN are corporate networks, public area networks and access networks. At the moment the penetration of WLAN terminals is low which derives to low demand of wireless LAN services. In addition, unlicensed spectrum forces the teleoperators to set the service price relatively low. The business potential is in integrating wireless LANs to cellular networks and in offering value added services to end users. The future of wireless LAN is to be complementary network to cellular networks. In this vision cellular networks provide voice and low data services and broadband wireless networks enable multimedia services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tässä luomistyössä on esitetty tutkimus informaation suojaamisen menetelmien osalta paikallisissa ja ryhmäkuntaisissa verkoissa. Tutkimukseen kuuluu nykyaikaisten kryptagraafisten järjestelmien, Internetin/Intranetin ohjelmointikeinojen ja pääsyoikeuksien jakelumenetelmien analyysi. Tutkimusten perusteella on laadittu ohjelmiston prototyyppi HTML-tiedostojen suojaamista varten. Ohjelmiston laatimisprosessi on sisältänyt vaatimusten, järjestelmän ja suojelukomponenttien suunnittelun ja protytyypin testauksen. Ohjelmiston realisoinnin jälkeen kirjoitettiin käyttöohjeet. Ohjelmiston prototyyppi suojaa informaatiota HTML-tiedoston koko käytön aikana ja eri yrityksissä voidaan käyttää sitä pienien laajennuksien jälkeen.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli luoda erilaisia skenaariota paikka riippuvaisten palveluiden toimialan tulevaisuudesta. Tunnistamalla nykyisiä sekä tulevia alaa edistäviä ja rajoittavia tekijöitä kolme skenaariota luotiin, jotka mahdollisesti kuvaisivat paikka riippuvaisten palveluiden toimialaa viiden vuoden päästä: "Massa spämmaus", "Raju operaattori kilpailu - nousevia yksityisyyden huolia" sekä "Nokian ajama kolmannen sukupolven verkot tulevat ennen odotettua" Skenaarioiden luomiseksi ensimmäinen osa tutkimuksesta keskittyi erilaisiin skenaarioiden kirjoitus prosesseihin ja niissä huomioitaviin asioihin. Tutkimuksen tarkoituksiin sopiva skenaarion kirjoitusprosessi esiteltiin, minkä jälkeen| paikkariippuvaisten palveluiden toimialaa käsiteltiin. Lopuksi itse skenaariot esiteltiin ja nimettiin skenaarioiden teemojen mukaan. Tutkimuksen johtopäätös on, ettei toimialan tulevaisuutta voida ennustaa riittävällä varmuudella. Tutkimuksen arvo kuitenkin piilee sen antamassa ymmärryksessä liittyen tekijöihin, jotka tulevat päättämään alan tulevaisuuden sekä skenaariossa, joita nämä tekijät voivat muodostaa.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dioxins and furans, PCDD/Fs, are highly toxic substances formed in post combustion zones in furnaces. PCDD/F emissions are regulated by a waste incineration directive which relates also to co-incineration plants. Several observations of dioxin and furan enhancements in wet scrub- bers have been reported previously. This is thought to be due to the so-called "memory effect" which occurs when dioxins and furans absorb into plastic material in scrubbers and desorb when ambient circumstances alter significantly. At the co-incineration plant involved, dioxins and furans are controlled with a wet scrubber, the tower packing of which is made of plastic in which activated carbon particles are dispersed. This should avoid the memory effect and act as a dioxin and furan sink since dioxins and furans are absorbed irreversibly into the packing ma- terial. In this case, the tower packing in the scrubber is covered with a white layer that has been found to be mainly aluminium. The aim of this thesis was to determine the aluminium balance and the dioxin and furan behaviour in the scrubber and, thus, the impacts that the foul- ing has on dioxin and furan removal. The source of aluminium, reasons for fouling and further actions to minimize its impacts on dioxin and furan removal were also to be discovered. Measurements in various media around the scrubber and in fuels were made and a profile analysis of PCDD/F and mass balance calculations were carried out. PCDD/F content de- creased in the scrubber. The reduced PCDD/F was not discharged into scrubbing water. The removal mechanism seems to work in spite of the fouling, at least with low PCDD/F loads. Most of the PCDD/F in excess water originates from the Kymijoki River which is used as feeding water in the scrubber. Fouling turned out to consist mainly of aluminium hydroxides. Sludge combusted in the furnace was found to be a significant source of aluminium. Ways to minimize the fouling would be adjustment of pH to a proper lever, installation of a mechanical filter to catch the loose material from the scrubbing water and affecting the aluminium content of the sludge.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tämä diplomityö käsittelee sääntöpohjaisen verkkoon pääsyn hallinnan (NAC) ratkaisuja arkkitehtonisesta näkökulmasta. Työssä käydään läpi Trusted Computing Groupin, Microsoft Corporationin, Juniper Networksin sekä Cisco Systemsin NAC-ratkaisuja. NAC koostuu joukosta uusia sekä jo olemassa olevia teknologioita, jotka auttavat ennalta määriteltyyn sääntökantaan perustuen hallitsemaan suojattuun verkkoon pyrkivien laitteiden tietoliikenneyhteyksiä. Käyttäjän tunnistamisen lisäksi NAC pystyy rajoittamaan verkkoon pääsyä laitekohtaisten ominaisuuksien perusteella, esimerkiksi virustunnisteisiin ja käyttöjärjestelmäpäivityksiin liittyen ja paikkaamaan tietyin rajoituksin näissä esiintyviä puutteita verkkoon pääsyn sallimiseksi. NAC on verraten uusi käsite, jolta puuttuu tarkka määritelmä. Tästä johtuen nykymarkkinoilla myydään ominaisuuksiltaan puutteellisia tuotteita NAC-nimikkeellä. Standardointi eri valmistajien NAC-komponenttien yhteentoimivuuden takaamiseksi on meneillään, minkä perusteella ratkaisut voidaan jakaa joko avoimia standardeja tai valmistajakohtaisia standardeja noudattaviksi. Esitellyt NAC-ratkaisut noudattavat standardeja joko rajoitetusti tai eivät lainkaan. Mikään läpikäydyistä ratkaisuista ei ole täydellinen NAC, mutta Juniper Networksin ratkaisu nousee niistä potentiaalisimmaksi jatkokehityksen ja -tutkimuksen kohteeksi TietoEnator Processing & Networks Oy:lle. Eräs keskeinen ongelma NAC-konseptissa on työaseman tietoverkolle toimittama mahdollisesti valheellinen tietoturvatarkistuksen tulos, minkä perusteella pääsyä osittain hallitaan. Muun muassa tähän ongelmaan ratkaisuna voisi olla jo nykytietokoneista löytyvä TPM-siru, mikä takaa tiedon oikeellisuuden ja koskemattomuuden.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis evaluates methods for obtaining high performance in applications running on the mobile Java platform. Based on the evaluated methods, an optimization was done to a Java extension API running on top the Symbian operating system. The API provides location-based services for mobile Java applications. As a part of this thesis, the JNI implementation in Symbian OS was also benchmarked. A benchmarking tool was implemented in the analysis phase in order to implement extensive performance test set. Based on the benchmark results, it was noted that the landmarks implementation of the API was performing very slowly with large amounts of data. The existing implementation proved to be very inconvenient for optimization because the early implementers did not take performance and design issues into consideration. A completely new architecture was implemented for the API in order to provide scalable landmark initialization and data extraction by using lazy initialization methods. Additionally, runtime memory consumption was also an important part of the optimization. The improvement proved to be very efficient based on the measurements after the optimization. Most of the common API use cases performed extremely well compared to the old implementation. Performance optimization is an important quality attribute of any piece of software especially in embedded mobile devices. Typically, projects get into trouble with performance because there are no clear performance targets and knowledge how to achieve them. Well-known guidelines and performance models help to achieve good overall performance in Java applications and programming interfaces.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this thesis is to provide a business model framework that connects customer value to firm resources and explains the change logic of the business model. Strategic supply management and especially dynamic value network management as its scope, the dissertation is based on basic economic theories, transaction cost economics and the resource-based view. The main research question is how the changing customer values should be taken into account when planning business in a networked environment. The main question is divided into questions that form the basic research problems for the separate case studies presented in the five Publications. This research adopts the case study strategy, and the constructive research approach within it. The material consists of data from several Delphi panels and expert workshops, software pilot documents, company financial statements and information on investor relations on the companies’ web sites. The cases used in this study are a mobile multi-player game value network, smart phone and “Skype mobile” services, the business models of AOL, eBay, Google, Amazon and a telecom operator, a virtual city portal business system and a multi-play offering. The main contribution of this dissertation is bridging the gap between firm resources and customer value. This has been done by theorizing the business model concept and connecting it to both the resource-based view and customer value. This thesis contributes to the resource-based view, which deals with customer value and firm resources needed to deliver the value but has a gap in explaining how the customer value changes should be connected to the changes in key resources. This dissertation also provides tools and processes for analyzing the customer value preferences of ICT services, constructing and analyzing business models and business concept innovation and conducting resource analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The present study explores relationships between project marketers and their customers in project marketing context. The purpose of the study is to increase the understanding on supplier’s position in project marketing networks. Project marketing is representing a high volume in the international business, and the industrial network approach and the project marketing research cannot fully explain a supplier’s position in project marketing networks. Increased knowledge on project networks can also contribute to industrial marketing research more generally. Data for the present study was collected firstly during the pilot case study from project buyers in the paper and the steel industry in interviews. Secondly an entire project marketing case concerning a steel industry case was used as a data source. The data included interviews, correspondence between the supplier and the buyer, and project documents. The data of the pilot case was analysed with contents analysis, and in the case a deeper analysis based on the developed Stage Dimension framework was used. Supplier’s position in project marketing networks is a hierarchical and dynamic concept including a supplier’s position on the highest level. The dimensions of the position concept are the intermediate level, and the dimensions are based on the underlying components. Supplier’s position is composed from four organization related dimensions, and two individual actor related dimensions. The composition of the supplier’s position varies during the project marketing process, and consequently the relative importance of the dimensions is changing over the process. Supplier’s position in project marketing networks is shaped by incremental and radical changes. Radical changes are initiated by critical events. The study contributes to the research of industrial networks and project marketing. The theoretical contribution of the study is threefold: firstly it proposes a structure of the position concept in project marketing networks, secondly it proposes the Position Stage Dimension Component (PSDC) model for the development of supplier’s position during the project marketing process, and thirdly the study widens the critical event concept to cover the project marketing process both on the organizational and individual level. In addition to the theoretical contributions there are several managerial implications for planning and implementing marketing strategies in the project context.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The usual objectives that companies have for subcontracting are studied in this thesis. The case company’s objectives for contract manufacturing now and in the future are identified. The main objective of the thesis is to create a focused model for the structure and supply chain management in the contract manufacturing network. This model is made for case company’s certain profit center. The different possibilities and their advantages and disadvantages for the structure and supply chain management are examined trough a theoretical review of literature. The possibilities found are then examined from the case company’s point of view. The case company point of view is established based on the opinions of the case company’s representatives. The outcome of the thesis is that the star shaped structure with supply chain management centralized to case company would be the best choice for the case company to manage the contract manufacture network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Technology scaling has proceeded into dimensions in which the reliability of manufactured devices is becoming endangered. The reliability decrease is a consequence of physical limitations, relative increase of variations, and decreasing noise margins, among others. A promising solution for bringing the reliability of circuits back to a desired level is the use of design methods which introduce tolerance against possible faults in an integrated circuit. This thesis studies and presents fault tolerance methods for network-onchip (NoC) which is a design paradigm targeted for very large systems-onchip. In a NoC resources, such as processors and memories, are connected to a communication network; comparable to the Internet. Fault tolerance in such a system can be achieved at many abstraction levels. The thesis studies the origin of faults in modern technologies and explains the classification to transient, intermittent and permanent faults. A survey of fault tolerance methods is presented to demonstrate the diversity of available methods. Networks-on-chip are approached by exploring their main design choices: the selection of a topology, routing protocol, and flow control method. Fault tolerance methods for NoCs are studied at different layers of the OSI reference model. The data link layer provides a reliable communication link over a physical channel. Error control coding is an efficient fault tolerance method especially against transient faults at this abstraction level. Error control coding methods suitable for on-chip communication are studied and their implementations presented. Error control coding loses its effectiveness in the presence of intermittent and permanent faults. Therefore, other solutions against them are presented. The introduction of spare wires and split transmissions are shown to provide good tolerance against intermittent and permanent errors and their combination to error control coding is illustrated. At the network layer positioned above the data link layer, fault tolerance can be achieved with the design of fault tolerant network topologies and routing algorithms. Both of these approaches are presented in the thesis together with realizations in the both categories. The thesis concludes that an optimal fault tolerance solution contains carefully co-designed elements from different abstraction levels

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Deflection compensation of flexible boom structures in robot positioning is usually done using tables containing the magnitude of the deflection with inverse kinematics solutions of a rigid structure. The number of table values increases greatly if the working area of the boom is large and the required positioning accuracy is high. The inverse kinematics problems are very nonlinear, and if the structure is redundant, in some cases it cannot be solved in a closed form. If the structural flexibility of the manipulator arms is taken into account, the problem is almost impossible to solve using analytical methods. Neural networks offer a possibility to approximate any linear or nonlinear function. This study presents four different methods of using neural networks in the static deflection compensation and inverse kinematics solution of a flexible hydraulically driven manipulator. The training information required for training neural networks is obtained by employing a simulation model that includes elasticity characteristics. The functionality of the presented methods is tested based on the simulated and measured results of positioning accuracy. The simulated positioning accuracy is tested in 25 separate coordinate points. For each point, the positioning is tested with five different mass loads. The mean positioning error of a manipulator decreased from 31.9 mm to 4.1 mm in the test points. This accuracy enables the use of flexible manipulators in the positioning of larger objects. The measured positioning accuracy is tested in 9 separate points using three different mass loads. The mean positioning error decreased from 10.6 mm to 4.7 mm and the maximum error from 27.5 mm to 11.0 mm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

B2B document handling is moving from paper to electronic networks and electronic domain very rapidly. Moving, handling and transforming large electronic business documents requires a lot from the systems handling them. This paper explores new technologies such as SOA, event-driven systems and ESB and a scalable, event-driven enterprise service bus is created to demonstrate these new approaches to message handling. As an end result, we have a small but fully functional messaging system with several different components. This is the first larger Java-project done in-house, so on the side we developed our own set of best practices of Java development, setting up configurations, tools, code repositories and class naming and much more.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Polysialic acid is a carbohydrate polymer which consist of N-acetylneuraminic acid units joined by alpha2,8-linkages. It is developmentally regulated and has an important role during normal neuronal development. In adults, it participates in complex neurological processes, such as memory, neural plasticity, tumor cell growth and metastasis. Polysialic acid also constitutes the capsule of some meningitis and sepsis-causing bacteria, such as Escherichia coli K1, group B meningococci, Mannheimia haemolytica A2 and Moraxella nonliquefaciens. Polysialic acid is poorly immunogenic; therefore high affinity antibodies against it are difficult to prepare, thus specific and fast detection methods are needed. Endosialidase is an enzyme derived from the E. coli K1 bacteriophage, which specifically recognizes and degrades polysialic acid. In this study, a novel detection method for polysialic acid was developed based on a fusion protein of inactive endosialidase and the green fluorescent protein. It utilizes the ability of the mutant, inactive endosialidase to bind but not cleave polysialic acid. Sequencing of the endosialidase gene revealed that amino acid substitutions near the active site of the enzyme differentiate the active and inactive forms of the enzyme. The fusion protein was applied for the detection of polysialic acid in bacteria and neuroblastoma. The results indicate that the fusion protein is a fast, sensitive and specific reagent for the detection of polysialic acid. The use of an inactive enzyme as a specific molecular tool for the detection of its substrate represents an approach which could potentially find wide applicability in the specific detection of diverse macromolecules.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biology is turning into an information science. The science of systems biology seeks to understand the genetic networks that govern organism development and functions. In this study the chicken was used as a model organism in the study of B cell regulatory factors. These studies open new avenues for plasma cell research by connecting the down regulation of the B cell gene expression program directly to the initiation of plasma cell differentiation. The unique advantages of the DT40 avian B cell model system, specifically its high homologous recombination rate, were utilized to study gene regulation in Pax5 knock out cell lines and to gain new insights into the B cell to plasma cell transitions that underlie the secretion of antibodies as part of the adaptive immune response. The Pax5 transcription factor is central to the commitment, development and maintenance of the B cell phenotype. Mice lacking the Pax5 gene have an arrest in development at the pro-B lymphocyte stage while DT40 cells have been derived from cells at a more mature stage of development. The DT40 Pax5-/- cells exhibited gene expression similarities with primary chicken plasma cells. The expression of the plasma cell transcription factors Blimp-1 and XBP-1 were significantly upregulated while the expression of the germinal centre factor BCL6 was diminished in Pax5-/- cells, and this alteration was normalized by Pax5 re-introduction. The Pax5-deficient cells further manifested substantially elevated secretion of IgM into the supernatant, another characteristic of plasma cells. These results for the first time indicated that the downregulation of the Pax5 gene in B cells promotes plasma cell differentiation. Cross-species meta-analysis of chicken and mouse Pax5 gene knockout studies uncovers genes and pathways whose regulatory relationship to Pax5 has remained unchanged for over 300 million years. Restriction of the hematopoietic stem cell fate to produce T, B and NK cell lineages is dependent on the Ikaros and its molecular partners, the closely related Helios and Aiolos. Ikaros family members are zinc finger proteins which act as transcriptional repressors while helping to activate lymphoid genes. Helios in mice is expressed from the hematopoietic stem cell level onwards, although later in development its expression seems to predominate in the T cell lineage. This study establishes the emergence and sequence of the chicken Ikaros family members. Helios expression in the bursa of Fabricius, germinal centres and B cell lines suggested a role for Helios in the avian B-cell lineage, too. Phylogenetic studies of the Ikaros family connect the expansion of the Ikaros family, and thus possibly the emergence of the adaptive immune system, with the second round of genome duplications originally proposed by Ohno. Paralogs that have arisen as a result of genome-wide duplications are sometimes termed ohnologs – Ikaros family proteins appear to fit that definition. This study highlighted the opportunities afforded by the genome sequencing efforts and somatic cell reverse genetics approaches using the DT40 cell line. The DT40 cell line and the avian model system promise to remain a fruitful model for mechanistic insight in the post-genomic era as well.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this study is to explore how a new concept appears inscientific discussion and research, how it diffuses to other fields and out of the scientific communities, and how the networks are formed around the concept. Text and terminology take the interest of a reader in the digital environment. Texts create networks where the terminology used is dependent on the ideas, viewsand paradigms of the field. This study is based mainly on bibliographic data. Materials for bibliometric studies have been collected from different databases. The databases are also evaluated and their quality and coverage are discussed. The thesauri of those databases that have been selected for a more in depth study have also been evaluated. The material selected has been used to study how long and in which ways an innovative publication, which can be seen as a milestone in a specific field, influences the research. The concept that has been chosen as a topic for this research is Social Capital, because it has been a popular concept in different scientific fields as well as in everyday speech and the media. It seemed to be a `fashion concept´ that appeared in different situations at the Millennium. The growth and diffusion of social capital publications has been studied. The terms connected with social capital in different fields and different stages of the development have also been analyzed. The methods that have been used in this study are growth and diffusion analysis, content analysis, citation analysis, coword analysis and cocitation analysis. One method that can be used tounderstand and to interpret results of these bibliometric studies is to interview some key persons, who are known to have a gatekeeper position in the diffusion of the concept. Thematic interviews with some Finnish researchers and specialists that have influenced the diffusion of social capital into Finnish scientificand social discussions provide background information. iv The Milestone Publications on social capital have been chosen and studied. They give answers to the question "What is Social Capital?" By comparing citations to Milestone Publications with the growth of all social capital publications in a database, we can drawconclusions about the point at which social capital became generally approved `tacit knowledge´. The contribution of the present study lies foremost in understanding the development of network structures around a new concept that has diffused in scientific communities and also outside them. The network means both networks of researchers, networks of publications and networks of concepts that describe the research field. The emphasis has been on the digital environment and onthe socalled information society that we are now living in, but in this transitional stage, the printed publications are still important and widely used in social sciences and humanities. The network formation is affected by social relations and informal contacts that push new ideas. This study also gives new information about using different research methods, like bibliometric methods supported by interviews and content analyses. It is evident that interpretation of bibliometric maps presupposes qualitative information and understanding of the phenomena under study.