57 resultados para Android,Peer to Peer,Wifi,Mesh Network
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Tutkielman tavoitteena oli tutkia, millaista arvoa digitaalinen painatusmenetelmä tuo yrityksen arvoverkostoon. Teoriaosassa tavoite oli rakentaa digitaalipainatuksen arvoverkostoa tutkien kirjallisuutta liittyen arvoketju- ja arvoverkostoajatteluun. Myös aiemmat tutkimukset ja kirjallisuus liittyen digitaalipainatukseen rakensivat osaltaan teoreettisen viitekehyksen muodostumista. Aiemmat tutkimukset digitaalisen painomenetelmän mahdollisuuksista ovat hyvin tekniikkapainotteisia, siksi tämä tutkimus liittyy enemmän kaupallisiin mahdollisuuksiin. Empiirinen osio tutkimuksesta tehtiin kvalitatiivisena case -tutkimuksena, johon sisältyi yksi alayksikkö. Eli tutkittiin yhtä casea, jossa oli kaksi osapuolta. Tutkielma liittyy kiinteästi Stora Enson ja Valion väliseen digipainatus-projektiin, joka käynnistettiin helmikuussa 2001. Tutkielman teemahaastatteluihin valittiin henkilöt tästä projektiryhmästä. Projektiryhmän mielipiteitä ja havaintoja hyödyntäen pyrittiin löytämään tukea ja eroavaisuuksia teoriaosan muodostamaan viitekehykseen ja informaatioon. Empiirinen osuus tuki teoriaosassa esittämiä väittämiä hyvin, mutta myös muutamia uusia havaintoja esiintyi. Tutkimusongelmaan löydettiin monia vastauksia: digitaalipainatus luo arvoa yrityksen jakeluketjuun vähentämällä varastoja ja nopeuttamalla toimituksia. Jäätelöpakkausten markkinointi on aivan uuden haasteen edessä, koska mahdollisuudet kasvavat digitaalipainatuksen myötä huomattavasti. Kartongin valmistajalle arvo tulee parempien tuotteiden kautta, joista saa myös paremman tuoton. Digitaalipainatuksen arvoverkostossa tulee tapahtumaan muutoksia jatkossa, eri osapuolten roolit saattavat muuttua radikaalisti. Kuka hoitaa painatusta ja miten?
Resumo:
Human beings have always strived to preserve their memories and spread their ideas. In the beginning this was always done through human interpretations, such as telling stories and creating sculptures. Later, technological progress made it possible to create a recording of a phenomenon; first as an analogue recording onto a physical object, and later digitally, as a sequence of bits to be interpreted by a computer. By the end of the 20th century technological advances had made it feasible to distribute media content over a computer network instead of on physical objects, thus enabling the concept of digital media distribution. Many digital media distribution systems already exist, and their continued, and in many cases increasing, usage is an indicator for the high interest in their future enhancements and enriching. By looking at these digital media distribution systems, we have identified three main areas of possible improvement: network structure and coordination, transport of content over the network, and the encoding used for the content. In this thesis, our aim is to show that improvements in performance, efficiency and availability can be done in conjunction with improvements in software quality and reliability through the use of formal methods: mathematical approaches to reasoning about software so that we can prove its correctness, together with the desirable properties. We envision a complete media distribution system based on a distributed architecture, such as peer-to-peer networking, in which different parts of the system have been formally modelled and verified. Starting with the network itself, we show how it can be formally constructed and modularised in the Event-B formalism, such that we can separate the modelling of one node from the modelling of the network itself. We also show how the piece selection algorithm in the BitTorrent peer-to-peer transfer protocol can be adapted for on-demand media streaming, and how this can be modelled in Event-B. Furthermore, we show how modelling one peer in Event-B can give results similar to simulating an entire network of peers. Going further, we introduce a formal specification language for content transfer algorithms, and show that having such a language can make these algorithms easier to understand. We also show how generating Event-B code from this language can result in less complexity compared to creating the models from written specifications. We also consider the decoding part of a media distribution system by showing how video decoding can be done in parallel. This is based on formally defined dependencies between frames and blocks in a video sequence; we have shown that also this step can be performed in a way that is mathematically proven correct. Our modelling and proving in this thesis is, in its majority, tool-based. This provides a demonstration of the advance of formal methods as well as their increased reliability, and thus, advocates for their more wide-spread usage in the future.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Työn tarkoituksena on selvittää minkälaisen verkoston Aker Yards Oy, kokonaistoimittajat ja kokonaistoimittajien alihankkijat muodostavat. Lisäksi arvioidaan verkostoriskit, joita Aker Yards Oy kohtaa toimiessaan verkostossa. Tutkimus suoritettiin tekemällä kysely verkostossa oleville kokonaistoimittajille sekä haastattelemalla kuutta henkilöä Aker Yards Oy:stä. Suhteita ja verkostoa analysoitiin tutkimalla verkoston yksittäisiä toimijoita sekä näiden välisiä suhteita. Riskejä analysoitiin tarkastelemalla niiden tunnistettuja syitä. Työn tuloksena on verkostokuva, joka piirrettiin kyselytulosten perusteella. Suhteiden ja verkoston analyysillä päädyttiin tehtäviin, joita Aker Yards Oy:n johdon tulisi toteuttaa, jotta verkostosta ja yksittäisistä toimittajista saataisiin irti mahdollisimman paljon. Lisäksi suhteita ja verkostoa käsiteltiin niiden tuloksellisen johtamisen näkökulmasta. Riskianalyysista saatiin tuloksena uhkaavimpien riskien arviointi.
Resumo:
Tässä diplomityössä on oletettu että neljännen sukupolven mobiiliverkko on saumaton yhdistelmä olemassa olevia toisen ja kolmannen sukupolven langattomia verkkoja sekä lyhyen kantaman WLAN- ja Bluetooth-radiotekniikoita. Näiden tekniikoiden on myös oletettu olevan niin yhteensopivia ettei käyttäjä havaitse saanti verkon muuttumista. Työ esittelee neljännen sukupolven mobiiliverkkoihin liittyvien tärkeimpien langattomien tekniikoiden arkkitehtuurin ja perustoiminta-periaatteet. Työ kuvaa eri tekniikoita ja käytäntöjä tiedon mittaamiseen ja keräämiseen. Saatuja transaktiomittauksia voidaan käyttää tarjottaessa erilaistettuja palvelutasoja sekä verkko- ja palvelukapasiteetin optimoimisessa. Lisäksi työssä esitellään Internet Business Information Manager joka on ohjelmistokehys hajautetun tiedon keräämiseen. Sen keräämää mittaustietoa voidaan käyttää palvelun tason seurannassa j a raportoinnissa sekä laskutuksessa. Työn käytännön osuudessa piti kehittää langattoman verkon liikennettä seuraava agentti joka tarkkailisi palvelun laatua. Agentti sijaitsisi matkapuhelimessa mitaten verkon liikennettä. Agenttia ei kuitenkaan voitu toteuttaa koska ohjelmistoympäristö todettiin vajaaksi. Joka tapauksessa työ osoitti että käyttäjän näkökulmasta tietoa kerääville agenteille on todellinen tarve.
Resumo:
This master’s thesis is focused on power supply network disturbances and their effects on the frequency converter – one of the components of modern process crane electrical system. The most critical disturbance types, their causes and the effect they bring to crane electrical system was determined in this work. Variety of protective devices used for mitigation of disturbances is investigated. Device protection solutions for the frequency converter used in crane applications are presented. Analyses of the power supply requirements for frequency converter and various components of crane electrical system were carried out and as a result the crane power supply requirements list that guarantees normal crane operation was built. This list is to be included in crane projects for troubleshooting purposes in order to determine potentially dangerous network.
Resumo:
The purpose of this thesis is to investigate projects funded in European 7th framework Information and Communication Technology- work programme. The research has been limited to issue ”Pervasive and trusted network and service infrastructure” and the aim is to find out which are the most important topics into which research will concentrate in the future. The thesis will provide important information for the Department of Information Technology in Lappeenranta University of Technology. First in this thesis will be investigated what are the requirements for the projects which were funded in “Pervasive and trusted network and service infrastructure” – programme 2007. Second the projects funded according to “Pervasive and trusted network and service infrastructure”-programme will be listed in to tables and the most important keywords will be gathered. Finally according to the keyword appearances the vision of the most important future topics will be defined. According to keyword-analysis the wireless networks are in important role in the future and core networks will be implemented with fiber technology to ensure fast data transfer. Software development favors Service Oriented Architecture (SOA) and open source solutions. The interoperability and ensuring the privacy are in key role in the future. 3D in all forms and content delivery are important topics as well. When all the projects were compared, the most important issue was discovered to be SOA which leads the way to cloud computing.
Resumo:
Tämän pro gradu-tutkimuksen tarkoituksena oli tutkia monen toimijan sosiaalipalvelukehittäjäverkoston toimivuutta ja sen toimivuuteen vaikuttavia tekijöitä. Aihetta lähestyttiin erilaisten teoreettisten kokonaisuuksien kautta, joiden avulla saatiin luotua tutkimukselle pohja. Viitekehys tutkimukselle luotiin yhdistäen erilaisia teoreettisia aihealueita verkostoista, verkostojen johtamisesta ja palveluista. Tutkimuksessa korostuu motivaation, yhteisen, tarpeeseen perustuvan tavoitteen, sitoutumisen ja orkestroinnin merkitys verkostotoiminnassa hyvän lopputuloksen aikaansaamiseksi. Tutkimuksen empiirisessä osuudessa tehty kvalitatiivinen case-tutkimus keskittyy tiettyyn verkostoon, joka on Socomin koordinoimana kehittänyt Kaakkois-Suomen alueelle uudenlaista sosiaalipalvelua liittyen henkilökohtaiseen apuun. Verkosto on monen toimijan verkosto, jonka jäsenet edustavat erilaisia tahoja ja organisaatioita. Tutkimuksen perusteella verkosto on toiminut hyvin ja tehokkaasti ja saanut luotua toimivan sosiaalipalvelun. Verkosto tukee kirjallisuuskatsauksessa löydettyjen tekijöiden, kuten verkosto-orkestroinnin, sitoutumisen ja yhteisen päämäärän, vaikutusta verkoston toimintaan ja lopputulokseen.
Resumo:
Value network has been studied greatly in the academic research, but a tool for value network mapping is missing. The objective of this study was to design a tool (process) for value network mapping in cross-sector collaboration. Furthermore, the study addressed a future perspective of collaboration, aiming to map the value network potential. During the study was investigated and pondered how to get the full potential of collaboration, by creating new value in collaboration process. These actions are parts of mapping process proposed in the study. The implementation and testing of the mapping process were realized through a case study of cross-sector collaboration in welfare services for elderly in the Eastern Finland. Key representatives in elderly care from public, private and third sectors were interviewed and a workshop with experts from every sector was also conducted in this regard. The value network mapping process designed in this study consists of specific steps that help managers and experts to understand how to get a complex value network map and how to enhance it. Furthermore, it make easier the understanding of how new value can be created in collaboration process. The map can be used in order to motivate participants to be engaged with responsibility in collaboration and to be fully committed in their interactions. It can be also used as a motivator tool for those organizations that intend to engage in collaboration process. Additionally, value network map is a starting point in many value network analyses. Furthermore, the enhanced value network map can be used as a performance measurement tool in cross-sector collaboration.
Resumo:
Increasing renewable energy utilization is a challenge that is tried to be solved in different ways. One of the most promising options for renewable energy is different biomasses, and the bioenergy field offers numerous emerging business opportunities. The actors in the field have rarely all the needed know-how and resources for exploiting these opportunities, and thus it is reasonable to seize them in cooperation. Networking is not an easy task to carry out, however, and in addition to its advantages for the firms engaged, it sets numerous challenges as well. The development of a network is a result of several steps firms need to take. In order to gain optimal advantage of their networks, firms need to weigh out with whom, why and how they should cooperate. In addition, everything does not depend on the firms themselves, as several factors in the external environment set their own enablers and barriers for cooperation. The formation of a network around a business opportunity is thus a multiphase process. The objective of this thesis is to depict this process via a step-by-step analysis and thus increase understanding on the whole development path from an entrepreneurial opportunity to a successful business network. The empirical evidence has been gathered by discussing the opportunities of animal manure refinement to biogas and forest biomass utilization for heating in Finland. The thesis comprises two parts. The first part provides an overview of the study, and the second part includes five research publications. The results reveal that it is essential to identify and analyze all the steps in the development process of a network, and several frameworks are used in the thesis to analyze these steps. The frameworks combine the views of theory and practical experiences of empirical study, and thus give new multifaceted views for the discussion on SME networking. The results indicate that the ground for cooperation should be investigated adequately by taking account of the preconditions in all the three contexts in which the actors operate: the social context, the region and the institutional environment. In case the project advances to exploitation, the assets and objectives of the actors should be paired off, which sets a need for relationships and sub-networks differing in breadth and depth. Different relationships and networks require different kinds of maintenance and management. Moreover, the actors should have the capability to change the formality or strategy of the relationships if needed. The drivers for these changes come along with the changing environment, which causes changes in the objectives of the actors and this way in the whole network. Bioenergy as the empirical field of the study represents well an industrial field with many emerging opportunities, a motley group of actors, and sensitivity for fast changes.
Resumo:
This research is the continuation and a joint work with a master thesis that has been done in this department recently by Hemamali Chathurangani Yashika Jayathunga. The mathematical system of the equations in the designed Heat Exchanger Network synthesis has been extended by adding a number of equipment; such as heat exchangers, mixers and dividers. The solutions of the system is obtained and the optimal setting of the valves (Each divider contains a valve) is calculated by introducing grid-based optimization. Finding the best position of the valves will lead to maximization of the transferred heat in the hot stream and minimization of the pressure drop in the cold stream. The aim of the following thesis will be achieved by practicing the cost optimization to model an optimized network.
Resumo:
This study focuses on understanding the internationalisation of small and medium-sized enterprises (SMEs) from an emerging market to a developed market. In particular, it examines the internationalisation process of a firm in the clothing and textile manufacturing industry in Ghana. Theoretically, the study is limited to the network internationalisation approach (e.g. Johanson & Mattsson, 1988; Johanson & Vahlne, 2009) and the industrial network approach (Håkansson & Snehota, 1995). Methodologically, a qualitative abductive case study approach is employed. The research process relies on a longitudinal method involving primary and secondary data and critical event analysis. Primary data has been collected from relevant informants at two different times in the internationalisation process. The research findings highlight the significance of both domestic and foreign business relationships in the internationalisation of an SME from an emerging African market to a developed country market. They show the greater importance of exogenous critical events than has been found in the research regarding firms in developed countries. Institutional actors were essential in the network and as sources of exogenous critical events. In addition, the successful SME should possess unique resources in the form of an entrepreneurial spirit, sufficient knowledge of internationalisation, and specific product knowledge. Theoretically, the present study contributes to business network research through providing an understanding of the process of developing network relationships and their impact in an African context. By focusing on SMEs, a contribution has been made in relation to the advancement of SME research. This research reveals empirical insight into SME internationalisation in a setting where an SME is internationalising to a developed country market from a newly emerging African market. Methodologically, the study provides an example of longitudinal research based on abductive methodology. The results provide implications for firms, managers, and policy-makers within the industry, especially on how to manage and use network relationships to promote SME internationalisation from newly emerging markets.
Resumo:
Summary: Identifying contextuality in learning - contexts linked to adult learners in network-based learning
Resumo:
Yritykset ovat pakotettuja erilaisiin yhteistyömuotoihin pärjätäkseen kiristyvässä kilpailussa. Yhteistyösuhteet kulkevat eri nimillä riippuen teollisuuden alasta ja siitä, missä kohtaa toimitusketjua ne toteutuvat, mutta periaatteessa kaikki pohjautuvat samaan ideaan kuin Vendor Managed Inventory (VMI); varastoon jakysyntään liittyvä tieto jaetaan toimitusketjun eri osapuolien kesken, jotta tuotanto, jakelu ja varastonhallinta olisi mahdollista optimoida. Vendor Managed Inventory on ideana yksinkertainen, mutta vaatii onnistuakseen paljon. Perusolettamus on, että toimittajan on kyettävä hallinnoimaan asiakkaan varastoa paremmin kuin asiakas itse. Tämä ei kuitenkaan ole mahdollista ilman riittävää yhteistyötä, oikeanlaista informaatiota tai sopivia tuoteominaisuuksia. Tämän työn tarkoitus on esitellä kriittiset menestystekijät valmistajan kannalta, kun näkyvyys todelliseen kysyntään on heikko ja kyseessäolevat tuotteet ovat ominaisuuksiltaan toimintamalliin huonosti soveltuvia. VMItoimintamallin soveltuvuus matkapuhelimia valmistavan yrityksen liiketoimintaan, sekä sen vaikutus asiakasyhteistyöhön, kannattavuuteen ja toiminnan tehostamiseen on myös tutkittu.