114 resultados para Virtual Machine
Resumo:
This research concerns virtual teams in the field of volunteer work. The developments in the area of information and communication technology have decreased their costs and made them easily accessible. As a result, it seems natural that also the voluntary organizations have adopted online tools and virtual teams as a part of their work modes. However, virtual teams have not received much research in this context, and one of the goals of this study was to begin closing that gap. The research had two main focus areas: the challenges that the volunteers face in the teams, and the leadership that the teams have. The study used a qualitative approach and semi-structured interviews. The interviews were conducted over Skype and email and included members from six different teams. The case organization was a European-wide student organization that widely utilized virtual teams in its work. The study identified three critical issues for managing the virtual teams. The first challenge was creating common ground for teamwork through electronic communication. Secondly, volunteering created challenges for the teams through variations in the level of commitment of the members, as some left the organization during the term of the team. Lastly, knowledge transfer was a challenge that came from changing the team members regularly each year. As for the second key topic, leadership in the teams was spread among the team members unevenly. The teams had a formal leader, but they exhibited signs of shared leadership, and the team members were able to influence the team through their own level of involvement. Especially the experience that a member had contributed the amount of influence she held. All in all, the challenges that the volunteers faced were similar to those of normal virtual teams. Volunteering brought additional challenges through the varying levels of commitment and the changing of the team members. Additionally, the role of the team leader was not as firm. The results of the study can be applied to other volunteer organizations that utilize virtual teams.
Resumo:
This research concerns virtual teams in the field of volunteer work. The developments in the area of information and communication technology have decreased their costs and made them easily accessible. As a result, it seems natural that also the voluntary organizations have adopted online tools and virtual teams as a part of their work modes. However, virtual teams have not received much research in this context, and one of the goals of this study was to begin closing that gap. The research had two main focus areas: the challenges that the volunteers face in the teams, and the leadership that the teams have. The study used a qualitative approach and semi-structured interviews. The interviews were conducted over Skype and email and included members from six different teams. The case organization was a European-wide student organization that widely utilized virtual teams in its work. The study identified three critical issues for managing the virtual teams. The first challenge was creating common ground for teamwork through electronic communication. Secondly, volunteering created challenges for the teams through variations in the level of commitment of the members, as some left the organization during the term of the team. Lastly, knowledge transfer was a challenge that came from changing the team members regularly each year. As for the second key topic, leadership in the teams was spread among the team members unevenly. The teams had a formal leader, but they exhibited signs of shared leadership, and the team members were able to influence the team through their own level of involvement. Especially the experience that a member had contributed the amount of influence she held. All in all, the challenges that the volunteers faced were similar to those of normal virtual teams. Volunteering brought additional challenges through the varying levels of commitment and the changing of the team members. Additionally, the role of the team leader was not as firm. The results of the study can be applied to other volunteer organizations that utilize virtual teams.
Resumo:
The last two decades have provided a vast opportunity to live and explore the compulsive imaginary world or virtual world through massively multiplayer online role-playing games (MMORPGs). MMORPG gives a wide range of opportunities to its users to participate with multi-players on the same platform, to communicate and to do real time actions. There is a virtual economy in these games which is largely player-driven. In-game currency provides its users to build up their Avatars, to buy or sell the necessary goods to play, survive in the games and so on. As a part of virtual economies generated through EVE Online, this thesis mainly focuses on how the prices of the minerals in EVE Online behave by applying the Jabłonska- Capasso-Morale (JCM) mathematical simulation model. It is to verify up to what degree the model can reproduce the virtual economy behavior. The model is applied to buy and sell prices of two minerals namely, isogen and morphite. The simulation results demonstrate that JCM model ts reasonably well to the mineral prices, which lets us conclude that virtual economies behave similarly to the real ones.
Resumo:
Axial-flux machines tend to have cooling difficulties since it is difficult to arrange continuous heat path between the stator stack and the frame. One important reason for this is that no shrink fitting of the stator is possible in an axial-flux machine. Using of liquid-cooled end shields does not alone solve this issue. Cooling of the rotor and the end windings may also be difficult at least in case of two-stator-single-rotor construction where air circulation in the rotor and in the end-winding areas may be difficult to arrange. If the rotor has significant losses air circulation via the rotor and behind the stator yokes should be arranged which, again, weakens the stator cooling. In this paper we study a novel way of using copper bars as extra heat transfer paths between the stator teeth and liquid cooling pools in the end shields. After this the end windings still suffer of low thermal conductivity and means for improving this by high-heat-conductance material was also studied. The design principle of each cooling system is presented in details. Thermal models based on Computational Fluid Dynamics (CFD) are used to analyse the temperature distribution in the machine. Measurement results are provided from different versions of the machine. The results show that significant improvements in the cooling can be gained by these steps.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
The objective of this study is to understand why virtual knowledge workers conduct autonomous tasks and interdependent problem solving tasks on virtual platforms. The study is qualitative case study including three case organizations that tap the knowledge of expert networks, and utilize virtual platforms in the work processes. Research data includes 15 interviews, that is, five experts from each case company. According to the findings there are some specific characteristics in motivation to work on tasks on online platforms. Autonomy, self-improvement, meaningful tasks, knowledge sharing, time management, variety of contacts, and variety of tasks, and projects motivate virtual knowledge workers. Factors that may enhance individuals’ engagement to work on tasks are trust, security of continuous task flow and income, feedback, meaningful tasks and tasks that contribute to self-improvement, flexibility and effectiveness in time management, and virtual tools that support social interaction. The results also indicate that there are some differences in individuals’ motivation based on the tasks’ nature. That is, knowledge sharing and variety of contacts motivated experts who worked on interdependent problem solving tasks. Then again, autonomy and variety of tasks motivated experts who worked on autonomous tasks.
Resumo:
In the traditional way, value is created by manufacturer or producer of a product without engaging the customers. So, traditionally value creation is a monopoly in the part of a manufacturer. After gathering all the raw materials the manufacturers are inserting value to a product. And the inserted value is recognized in the time of consuming the product. In the modern time though there is traditional way of value creation but with the increase of more educated, smart, and technically sound customers the idea of value creation has changed. Now, customers are also contributing in value creation as value co-creator even before the product is consumed. This scenario has been encountered in the thesis with the main purpose of how value is cocreated in smart phone operating systems. The purpose is further divided into the following supobjectives: o What is value co-creation in smart phone operating systems? o Who participates in value co-creation in smart phone operating systems? o What are the procedures that are involved in value co-creation in smart phone operating systems? The research was conducted as a qualitative desk study by observing two of the leading smart phone operating system providers. Data has been collected from the official discussion forum of both the operating system providers. Other general concepts relating to the purpose of the study has been encountered through literature review. The research findings reveal that customers and companies both together co-create value of anticipated level when they communicate and interact with each other. However, most of the time customer to customer interactions, dialogues and discussions that come out in the core conversation help the value co-creation. The value co-creation framework sets up the customer at the main focus of value creation theory. By nullifying the inherited notion that companies only create value within its boundary and provide it to their customers in exchange of currencies. Rationally, it has been commenced that the firms are merely compromising value propositions to its customers. But the value has been co-created in a point where offerings are combined and interacted with customers’ capabilities, knowledge, resources and perceptions. This new perspective has radically altered the prospect of firms towards its customers. Typically customers are now taking part in value cocreation as a crucial member.
Resumo:
The review of intelligent machines shows that the demand for new ways of helping people in perception of the real world is becoming higher and higher every year. This thesis provides information about design and implementation of machine vision for mobile assembly robot. The work has been done as a part of LUT project in Laboratory of Intelligent Machines. The aim of this work is to create a working vision system. The qualitative and quantitative research were done to complete this task. In the first part, the author presents the theoretical background of such things as digital camera work principles, wireless transmission basics, creation of live stream, methods used for pattern recognition. Formulas, dependencies and previous research related to the topic are shown. In the second part, the equipment used for the project is described. There is information about the brands, models, capabilities and also requirements needed for implementation. Although, the author gives a description of LabVIEW software, its add-ons and OpenCV which are used in the project. Furthermore, one can find results in further section of considered thesis. They mainly represented by screenshots from cameras, working station and photos of the system. The key result of this thesis is vision system created for the needs of mobile assembly robot. Therefore, it is possible to see graphically what was done on examples. Future research in this field includes optimization of the pattern recognition algorithm. This will give less response time for recognizing objects. Presented by author system can be used also for further activities which include artificial intelligence usage.