20 resultados para Functional Requirements for Authority Data (FRAD)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

(The Mark and Recapture Network: a Heliconius case study). The current pace of habitat destruction, especially in tropical landscapes, has increased the need for understanding minimum patch requirements and patch distance as tools for conserving species in forest remnants. Mark recapture and tagging studies have been instrumental in providing parameters for functional models. Because of their popularity, ease of manipulation and well known biology, butterflies have become model in studies of spatial structure. Yet, most studies on butterflies movement have focused on temperate species that live in open habitats, in which forest patches are barrier to movement. This study aimed to view and review data from mark-recapture as a network in two species of butterfly (Heliconius erato and Heliconius melpomene). A work of marking and recapture of the species was carried out in an Atlantic forest reserve located about 20km from the city of Natal (RN). Mark recapture studies were conducted in 3 weekly visits during January-February and July-August in 2007 and 2008. Captures were more common in two sections of the dirt road, with minimal collection in the forest trail. The spatial spread of captures was similar in the two species. Yet, distances between recaptures seem to be greater for Heliconius erato than for Heliconius melpomene. In addition, the erato network is more disconnected, suggesting that this specie has shorter traveling patches. Moving on to the network, both species have similar number of links (N) and unweighed vertices (L). However, melpomene has a weighed network 50% more connections than erato. These network metrics suggest that erato has more compartmentalized network and restricted movement than melpomene. Thus, erato has a larger number of disconnected components, nC, in the network, and a smaller network diameter. The frequency distribution of network connectivity for both species was better explained by a Power-law than by a random, Poissom distribution, showing that the Power-law provides a better fit than the Poisson for both species. Moreover, the Powerlaw erato is much better adjusted than in melpomene, which should be linked to the small movements that erato makes in the network

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This work treats of an implementation OFDMA baseband processor in hardware for LTE Downlink. The LTE or Long Term Evolution consist the last stage of development of the technology called 3G (Mobile System Third Generation) which offers an increasing in data rate and more efficiency and flexibility in transmission with application of advanced antennas and multiple carriers techniques. This technology applies in your physical layer the OFDMA technical (Orthogonal Frequency Division Multiple Access) for generation of signals and mapping of physical resources in downlink and has as base theoretical to OFDM multiple carriers technique (Orthogonal Frequency Division Multiplexing). With recent completion of LTE specifications, different hardware solutions have been developed, mainly, to the level symbol processing where the implementation of OFDMA processor in base band is commonly considered, because it is also considered a basic architecture of others important applications. For implementation of processor, the reconfigurable hardware offered by devices as FPGA are considered which shares not only to meet the high requirements of flexibility and adaptability of LTE as well as offers possibility of an implementation quick and efficient. The implementation of processor in reconfigurable hardware meets the specifications of LTE physical layer as well as have the flexibility necessary for to meet others standards and application which use OFDMA processor as basic architecture for your systems. The results obtained through of simulation and verification functional system approval the functionality and flexibility of processor implemented

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The traditional perimeter-based approach for computer network security (the castle and the moat model) hinders the progress of enterprise systems and promotes, both in administrators and users, the delusion that systems are protected. To deal with the new range of threats, a new data-safety oriented paradigm, called de-perimeterisation , began to be studied in the last decade. One of the requirements for the implementation of the de-perimeterised model of security is the definition of a safe and effective mechanism for federated identity. This work seeks to fill this gap by presenting the specification, modelling and implementation of a mechanism for federated identity, based on the combination of SAML and X.509 digital certificates stored in smart-cards, following the A3 standard of ICP-Brasil (Brazilian official certificate authority and PKI)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

According to the studies in Applied Linguistics, this thesis is based on an interdisciplinary perspective (Critical Discourse Analysis, Sociology towards Social Change, Cultural Studies and Systemic-Functional Linguistics). The overall objective of the research was to analyze the discourses of Elementary School teachers in the state of Sergipe, by means of the discursive representations of the social actors, the processes of subjectivity and their fragmented identities in the context of standardized evaluations before the requirements of globalized pedagogical practices, based on the result-based management. The critical analysis of such discourses was motivated by the rapid pace with which the demands of innovation become part of the classroom, aiming at reaching the target in what concerns the indexes of the rankings which characterize the globalized discourse of the national education management, like Ideb (Basic Education Development Index), which makes teachers change their discourses, become silent or keep resistant. The work was initially endorsed by the theoretical lines of the Critical Discourse Analysis (FAIRCLOUGH, 2001, 2006), and poses a proposal for such purpose: the ASCD Discourse Sociological and Communicative Approach (PEDROSA, 2012, 2013). This is an interpretative-qualitative study of the Critical Discourse Analysis (FAIRCLOUGH, 2001, 2003; RAMALHO ; RESENDE, 2011) and to carry it out, semi-structured interviews were used as instruments of data generation (BAUER; GASKELL, 2011; GILL, 2011). Its corpus is composed of thirteen accounts of teachers from the Elementary school who teach Portuguese and work in the fifteen schools which were chosen to be the universe of the research at the Regional Board of Education (02) in the state of Sergipe. Such narratives are related to their impressions, expectations and actions which favor the management of results to which they have to submit themselves. The analytical overview of sociological and discursive line comes from the pan-semiotic categories (Inclusion and Exclusion) which appear in the theory of Representation of Social Actors (VAN LEEUWEN, 1997, 2008). To present the processes of subjectivity of these teachers, this work is based on the socio-analytical proposal of the classification of the subjects, which stems from the individual s work in the Gestão Relacional de Si , which comes from the Applied Sociology (towards) Social Change (BAJOIT, 2006, 2009). The discursive analyses were guided word for word, in their majority, by having the Systemic Functional Grammar as their theoretical basis, specifically by the processes of the Transitivity System postulated by Halliday, (1985); Halliday and Mathiessen, (2004); Eggins (2004); Cunha and Souza (2011). The work makes the field of Cultural Studies emerge towards the dialogue and the presentation of the fragmented identities of the teachers in the context of late modernity (GIDDENS, 2002; HALL, 2011). The thesis promoted a reflection over the teacher s condition, who is immerse in this context of knowledge construction of the present Brazilian educational system, the standardized evaluations, the indexes of development, the targets and the rankings. The considerations and outcomes of such a research dealt with the teachers emerging social practices and the need of planned initial and continuing teacher education towards the new moment which is foreseeable

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Java Card technology allows the development and execution of small applications embedded in smart cards. A Java Card application is composed of an external card client and of an application in the card that implements the services available to the client by means of an Application Programming Interface (API). Usually, these applications manipulate and store important information, such as cash and confidential data of their owners. Thus, it is necessary to adopt rigor on developing a smart card application to improve its quality and trustworthiness. The use of formal methods on the development of these applications is a way to reach these quality requirements. The B method is one of the many formal methods for system specification. The development in B starts with the functional specification of the system, continues with the application of some optional refinements to the specification and, from the last level of refinement, it is possible to generate code for some programming language. The B formalism has a good tool support and its application to Java Card is adequate since the specification and development of APIs is one of the major applications of B. The BSmart method proposed here aims to promote the rigorous development of Java Card applications up to the generation of its code, based on the refinement of its formal specification described in the B notation. This development is supported by the BSmart tool, that is composed of some programs that automate each stage of the method; and by a library of B modules and Java Card classes that model primitive types, essential Java Card API classes and reusable data structures