13 resultados para Protocolos de roteamento

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) consists of distributed devices in an area in order to monitor physical variables such as temperature, pressure, vibration, motion and environmental conditions in places where wired networks would be difficult or impractical to implement, for example, industrial applications of difficult access, monitoring and control of oil wells on-shore or off-shore, monitoring of large areas of agricultural and animal farming, among others. To be viable, a WSN should have important requirements such as low cost, low latency, and especially low power consumption. However, to ensure these requirements, these networks suffer from limited resources, and eventually being used in hostile environments, leading to high failure rates, such as segmented routing, mes sage loss, reducing efficiency, and compromising the entire network, inclusive. This work aims to present the FTE-LEACH, a fault tolerant and energy efficient routing protocol that maintains efficiency in communication and dissemination of data.This protocol was developed based on the IEEE 802.15.4 standard and suitable for industrial networks with limited energy resources

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There are some approaches that take advantage of unused computational resources in the Internet nodes - users´ machines. In the last years , the peer-to-peer networks (P2P) have gaining a momentum mainly due to its support for scalability and fault tolerance. However, current P2P architectures present some problems such as nodes overhead due to messages routing, a great amount of nodes reconfigurations when the network topology changes, routing traffic inside a specific network even when the traffic is not directed to a machine of this network, and the lack of a proximity relationship among the P2P nodes and the proximity of these nodes in the IP network. Although some architectures use the information about the nodes distance in the IP network, they use methods that require dynamic information. In this work we propose a P2P architecture to fix the problems afore mentioned. It is composed of three parts. The first part consists of a basic P2P architecture, called SGrid, which maintains a relationship of nodes in the P2P network with their position in the IP network. Its assigns adjacent key regions to nodes of a same organization. The second part is a protocol called NATal (Routing and NAT application layer) that extends the basic architecture in order to remove from the nodes the responsibility of routing messages. The third part consists of a special kind of node, called LSP (Lightware Super-Peer), which is responsible for maintaining the P2P routing table. In addition, this work also presents a simulator that validates the architecture and a module of the Natal protocol to be used in Linux routers

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is a study descriptive cross-sectional and quantitative approaches, which aimed to analyze the association between hospital infection rate for insertion, maintenance of central venous catheter and the breakdown of protocols (rules and routines) by health professionals assisting patients in the ICU of a university hospital in Natal / RN. The process of data collection was through observation with structured form, refers to medical records and structured questionnaires with health professionals. The results were organized, tabulated, categorized and analyzed using SPSS 14.0. The characterization of the subjects was performed using descriptive and inferential statistics, taking into account the nature of the variables, with analysis of variance (ANOVA) and Spearman correlation test, it was a discussion of the information obtained, considering the mean, standard deviation, coefficient of variance and standard error. The variables that showed a higher level of correlation were treated with the application of significance tests. As the results, 71% of participants were female and 29% male, age ranged from 18 to 85 years (52.6 ± 22.5). The insertion, there was a variation from 0 to 5 errors (1.2 ± 1.4), during maintenance, the average was 2.3 ± 0.9 errors, ranging from 0 to 4. During the insertion and maintenance of CVC, patients who had been an infection ranging from 2 to 9 mistakes (4.2 ± 1.7), since those who did not show the variation goes from 0 to 5 errors (2, 8 ± 1.5). The correlation coefficient between the risk of infection throughout the process and the risk of infection at the insertion showed strong and significant (r = 0.845 p = 0.000) and in relation to risk of infection in maintenance was moderate and significant (r = 0.551 p = 0.001). The mistakes made by professionals in the procedures for insertion and maintenance of the catheter, associated with other conditions, shown as a risk factor for the of IH

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper aims to propose a hybrid meta-heuristics for the Heterogeneous Fleet Vehicle Routing Problem (HVRP), which is a combinatorial optimization problem NP-hard, and is characterized by the use of a limited fleet consists of different vehicles with different capacities. The hybrid method developed makes use of a memetic algorithm associated with the component optimizer Vocabulary Building. The resulting hybrid meta-heuristic was implemented in the programming language C + + and computational experiments generated good results in relation to meta-heuristic applied in isolation, proving the efficiency of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents metaheuristic strategies based on the framework of evolutionary algorithms (Genetic and Memetic) with the addition of Technical Vocabulary Building for solving the Problem of Optimizing the Use of Multiple Mobile Units Recovery of Oil (MRO units). Because it is an NP-hard problem, a mathematical model is formulated for the problem, allowing the construction of test instances that are used to validate the evolutionary metaheuristics developed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The advent of the Internet stimulated the appearance of several services. An example is the communication ones present in the users day-by-day. Services as chat and e-mail reach an increasing number of users. This fact is turning the Net a powerful communication medium. The following work explores the use of communication conventional services into the Net infrastructure. We introduce the concept of communication social protocols applied to a shared virtual environment. We argue that communication tools have to be adapted to the Internet potentialities. To do that, we approach some theories of the Communication area and its applicability in a virtual environment context. We define multi-agent architecture to support the offer of these services, as well as, a software and hardware platform to support the accomplishment of experiments using Mixed Reality. Finally, we present the obtained results, experiments and products

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents a packet manipulation tool developed to realize tests in industrial devices that implements TCP/IP-based communication protocols. The tool was developed in Python programming language, as a Scapy extension. This tool, named IndPM- Industrial Packet Manipulator, can realize vulnerability tests in devices of industrial networks, industrial protocol compliance tests, receive server replies and utilize the Python interpreter to build tests. The Modbus/TCP protocol was implemented as proof-of-concept. The DNP3 over TCP protocol was also implemented but tests could not be realized because of the lack of resources. The IndPM results with Modbus/TCP protocol show some implementation faults in a Programmable Logic Controller communication module frequently utilized in automation companies

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The public illumination system of Natal/RN city presents some recurring problems in the aspect of monitoring, since currently is not possible to detect in real time the light bulbs which are on throughout the day, or those which are off or burned out, at night. These factors depreciate the efficiency of the services provided, as well as, the use of energetic resources, because there is energetic waste and, consequently, financial resources that could be applied at the own public system illumination. The purpose of the work is create a prototype in substitution to the currently photoelectric relays used at public illumination, that have the same function, as well others: turn on or off the light bulbs remotely (control flexibility by the use of specifics algorithms supervisory), checking the light bulbs status (on or off) and wireless communication with the system through the ZigBee® protocol. The development steps of this product and the tests carried out are related as a way to validate and justify its use at the public illumination

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of wireless sensor and actuator networks in industry has been increasing past few years, bringing multiple benefits compared to wired systems, like network flexibility and manageability. Such networks consists of a possibly large number of small and autonomous sensor and actuator devices with wireless communication capabilities. The data collected by sensors are sent directly or through intermediary nodes along the network to a base station called sink node. The data routing in this environment is an essential matter since it is strictly bounded to the energy efficiency, thus the network lifetime. This work investigates the application of a routing technique based on Reinforcement Learning s Q-Learning algorithm to a wireless sensor network by using an NS-2 simulated environment. Several metrics like energy consumption, data packet delivery rates and delays are used to validate de proposal comparing it with another solutions existing in the literature

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis was performed in four chapters, at the theoretical level, focused mainly on electronic density. In the first chapter, we have applied an undergraduate minicourse of Diels-Alder reaction in Federal University of Rio Grande do Norte. By using computational chemistry tools students could build the knowledge by themselves and they could associate important aspects of physical-chemistry with Organic Chemistry. In the second chapter, we studied a new type of chemical bond between a pair of identical or similar hydrogen atoms that are close to electrical neutrality, known as hydrogen-hydrogen (H-H) bond. In this study performed with complexed alkanes, provides new and important information about their stability involving this type of interaction. We show that the H-H bond playing a secondary role in the stability of branched alkanes in comparison with linear or less branched isomers. In the third chapter, we study the electronic structure and the stability of tetrahedrane, substituted tetrahedranes and silicon and germanium parents, it was evaluated the substituent effect on the carbon cage in the tetrahedrane derivatives and the results indicate that stronger electron withdrawing groups (EWG) makes the tetrahedrane cage slightly unstable while slight EWG causes a greater instability in the tetrahedrane cage. We showed that the sigma aromaticity EWG and electron donating groups (EDG) results in decrease and increase, respectively, of NICS and D3BIA aromaticity indices. In addition, another factor can be utilized to explain the stability of tetra-tert-butyltetrahedrane as well as HH bond. GVB and ADMP were also used to explain the stability effect of the substituents bonded to the carbon of the tetrahedrane cage. In the fourth chapter, we performed a theoretical investigation of the inhibitory effect of the drug abiraterone (ABE), used in the prostate cancer treatment as CYP17 inhibitor, comparing the interaction energies and electron density of the ABE with the natural substrate, pregnenolone (PREG). Molecular dynamics and docking were used to obtain the CYP1ABE and CYP17-PREG complexes. From molecular dynamics was obtained that the ABE has higher diffusion trend water CYP17 binding site compared to the PREG. With the ONIOM (B3LYP:AMBER) method, we find that the interaction electronic energy of ABE is 21.38 kcal mol-1 more stable than PREG. The results obtained by QTAIM indicate that such stability is due a higher electronic density of interactions between ABE and CYP17

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A disponibilidade de cadáveres para estudo e pesquisa vinha sendo feita tradicionalmenteutilizando-se corpos não reclamados sem grandes formalidades. Com a complexidadejurídica, social, ética e moral dos tempos atuais, o simples encaminhamento dessescorpos ao Departamento de Morfologia da Universidade Federal do Rio Grande do Norte,passou a ser temido com o receio de transgredir a legislação penal. Isso desencadeouuma redução no número de cadáveres para as aulas práticas de Anatomia. Essarealidade levou o Departamento de Morfologia da Universidade Federal do Rio Grande doNorte a pesquisar mecanismos legais que solucionassem a escassez de cadáveres parao estudo e pesquisa. A metodologia utilizada constou de reuniões de discussão eapresentação de protocolos de aquisição de cadáveres com base na legislação vigente.Os resultados obtidos foram: (1) Publicação do provimento 093/2012 da CorregedoriaGeral da Justiça do Tribunal de Justiça do Estado do Rio Grande do Norte, que dispõesobre o registro de óbito dos cadáveres destinados às escolas de Medicina para fins deensino e pesquisa; (2) Elaboração de protocolos para aquisição de cadáveres nãoreclamados junto às instituições; (3) Programa de doadores voluntários na UniversidadeFederal do Rio Grande do Norte.Por fim, concluímos que o conhecimento das atribuiçõespor parte das instituições públicas e privada, bem como o programa de doação voluntáriaaumentaram a oferta de cadáveres para o ensino da Anatomia Humana na UniversidadeFederal do Rio Grande do Norte.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this randomized, blind and prospective clinical trial was to compare the pain, the edema, the mandibular movements, the masticatory efficiency and life quality, in the first 60 days after surgery using 2 different clinical protocols for myofunctional recovery, in patients who underwent orthognathic surgery. A sample of 19 patients was used and divided into 2 groups. The control group (CG) consisted of 10 patients who had postoperative rehabilitation guided by a standard protocol, conducted by the Service of Surgery and Traumatology Oral and Maxillofacial. In other hand, the experimental group (EC) totaled 9 patients who received the speech therapy rehabilitation protocol specialized, by professionals in the area. The variables pain, edema and mandibular movements were analyzed during 48h, 96h, 7 days, 14 days, 30 and 60 days post-surgery. The masticatory efficiency and the quality of life were classified with 60 days after surgery . The data were submitted an analysis of variance, Student's t-test and Fisher's independence, at the level of 5% probability. It was identified that patients of GE have benefited in the first 14 days(p<0,001), as they have had reported less pain than those in the CG. Significant statistics differences between groups for pain parameters (after 14 days) (p=0,065), edema(p=0,063), mandibular movements(p=0,068), masticatory efficiency(p=0,630) and the impact on quality of life (p=0,813) were not observed on this study. The speech therapy protocol for myofunctional recovery (EG), although it has not obtained statistical results superiors than the CG in the general context, presents itself as a viable alternative to conventional therapy assumed by many maxillofacial surgeons, allowing the surgeon to optimize time with patients in the period postoperatively.