27 resultados para Ubiquitous Computing, Pervasive Computing, Internet of Things, Cloud Computing
Resumo:
The Internet of Things is a new paradigm where smart embedded devices and systems are connected to the Internet. In this context, Wireless Sensor Networks (WSN) are becoming an important alternative for sensing and actuating critical applications like industrial automation, remote patient monitoring and domotics. The IEEE 802.15.4 protocol has been adopted as a standard for WSN and the 6LoWPAN protocol has been proposed to overcome the challenges of integrating WSN and Internet protocols. In this paper, the mechanisms of header compression and fragmentation of IPv6 datagrams proposed in the 6LoWPAN standard were evaluated through field experiments using a gateway prototype and IEEE 802.15.4 nodes.
Resumo:
In this article, the authors investigate, from an interdisciplinary perspective, possible ethical implications of the presence of ubiquitous computing systems in human perception/action. The term ubiquitous computing is used to characterize information-processing capacity from computers that are available everywhere and all the time, integrated into everyday objects and activities. The contrast in approach to aspects of ubiquitous computing between traditional considerations of ethical issues and the Ecological Philosophy view concerning its possible consequences in the context of perception/action are the underlying themes of this paper. The focus is on an analysis of how the generalized dissemination of microprocessors in embedded systems, commanded by a ubiquitous computing system, can affect the behaviour of people considered as embodied embedded agents.
Resumo:
With the Big Data development and the growth of cloud computing and Internet of Things, data centers have been multiplying in Brazil and the rest of the world. Designing and running this sites in an efficient way has become a necessary challenge and to do so, it's essential a better understanding of its infrastructure. Thus, this paper presents a bibliography study using technical concepts in order to understand the specific needs related to this environment and the best forms address them. It discusses the data center infrastructure main systems, methods to improve their energy efficiency and their future trends
Resumo:
The widespread availability of wirelessly connected portable computers, smartphones and other mobile devices, and the pervasive presence of computer services in our everyday environment, has brought the prediction of Mark Weiser of future ubiquitous computer systems closer to reality. Some of these - ever-present, anywhere, anytime - ubiquitous computer services mean easier and pleasant lifestyles for many people, but the generalized availability of some classes of these softwares and computer services, known as virtual disguisers and Virtual Robots, can pose new ethical problems in a world of explosive growth of social networking sites. The objective of the present article is to investigate some of these problems, from an interdisciplinary philosophical perspective. Special emphasis shall be given to the potential impact on human conduct caused by disguisers and Virtual Robots. © 2011 IEEE.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
T he people’s daily lives are surrounded by computing devices, with increasing resources (sensors) and, with increasing processing. How these devices communicate is still not natural and This retards the growth of Ubiquitous Computing. This paper presents a way in which these devices can communicate using Jini technology and concepts of Service Oriented Architecture, applying these concepts in a test case of Ubiquitous Computing. To conduct the test case was constructed a fictitious system for management of a soccer championship, where users can interact with each other and with the system in a simplified way, have access to data in real time of the championship during the event. This communication is performed by services built using Jini technology, which were based on key SOA concepts, such as modularity and reusability
Resumo:
The objective of this study was to describe the behavior of Cebus nigritus kept in captivity. The work, carried out during the month of March 2008 at "Dr. Belrio Guimaraes Brandao" County Zoo in GarYa- SP and Monte Alegre Farm Ecological Park in Telemaco Borba- PR, included 48 hours of observations, divided equally in four daytime periods. The behavioral catalogue used was constituted of different categories such as: foraging, feeding, locomotion, rest, social interaction, physical care, alertness, manipulation of things, reproductive behavior and stereotyped behavior. Animals showed activities of foraging, feeding, and locomotion and social interaction in low percentages in the two morning periods; however, their frequencies increased in the afternoon. Other activities like physical care, alertness and stereotyped behavior appeared mainly in the two morning periods, but were reduced in the afternoon. The rest category was more evident early morning and late afternoon. Since the stereotypical behavior presented high percentages, this study recommends that the number of individuals be diversiied in the social organization of the groups and that environment enriching activities be developed in captivity, creating situations similar to the animal's natural habitat.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
We performed computer simulations of interstellar cloud-cloud collisions using the three-dimensional smoothed particle magnetohydrodynamics method. In order to study the role of the magnetic field on the process of collision-triggered fragmentation, we focused our attention on head-on supersonic collisions between two identical spherical molecular-clouds. Two extreme configurations of the magnetic field were adopted: parallel and perpendicular to the initial clouds motion. The initial magnetic field strength was approximately 12.0 muG. In the parallel case, much more of the collision debris were retained in the shocking region than in the non-magnetic case where gas escaped freely throughout the symmetry plane. Differently from the non-magnetic case, eddy-like vortices were formed. The regions of highest vorticity and the the regions of highest density are offset. We found clumps formation only in the parallel case, however, they were larger, hotter and less dense than in the analogous non-magnetic case. In the perpendicular case, the compressed field works as a magnetic wall, preventing a stronger compression of the colliding clouds. This last effect inhibits direct contact of the two clouds. In both cases, we found that the field lines show a chaotic aspect in large scales. Also, the field magnitude is considerably amplified in the shock layer. However, the field distribution is almost coherent in the higher density regions.
Resumo:
Computer experiments of interstellar cloud collisions were performed with a new smoothed-particle-hydrodynamics (SPH) code. The SPH quantities were calculated by using spatially adaptive smoothing lengths and the SPH fluid equations of motion were solved by means of a hierarchical multiple time-scale leapfrog. Such a combination of methods allows the code to deal with a large range of hydrodynamic quantities. A careful treatment of gas cooling by H, H(2), CO and H II, as well as a heating mechanism by cosmic rays and by H(2) production on grains surface, were also included in the code. The gas model reproduces approximately the typical environment of dark molecular clouds. The experiments were performed by impinging two dynamically identical spherical clouds onto each other with a relative velocity of 10 km s(-1) but with a different impact parameter for each case. Each object has an initial density profile obeying an r(-1)-law with a cutoff radius of 10 pc and with an initial temperature of 20 K. As a main result, cloud-cloud collision triggers fragmentation but in expense of a large amount of energy dissipated, which occurred in the head-on case only. Off-center collision did not allow remnants to fragment along the considered time (similar to 6 Myr). However, it dissipated a considerable amount of orbital energy. Structures as small as 0.1 pc, with densities of similar to 10(4) cm(-3), were observed in the more energetic collision.
Resumo:
Pós-graduação em Direito - FCHS
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Based on analyses of high-speed video recordings of cloud-to-ground lightning in Brazil and the USA, the characteristics of positive cloud-to-ground (+CG) leaders are presented. The high frame rates permitted the average, 2-dimensional speeds of development along the paths of the channels to be resolved with good accuracy. The values range from 0.3 to 6.0 x 10(5) ms(-1) with a mean of 2.7 x 10(5) ms(-1). Contrary to what is usually assumed, downward +CG leader speeds are similar to downward -CG leader speeds. Our observations also show that the speeds tend to increase by a factor of 1.1 to 6.5 as they approach the ground. The presence of short duration, recoil leaders (RLs) during the development of positive leaders reveal a highly branched structure that is not usually recorded when using conventional photographic and video cameras. The existence of the RLs may help to explain observations of UHF-VHF radiation during the development of +CG flashes.
Resumo:
O trabalho analisa artigos publicados em periódicos educacionais brasileiros entre 1930 e 1960, cujos temas são educação, democracia, filosofia, ciência e verdade, entre outros, desenvolvidos segundo concepções de Dewey. em todos, ocupam posição central as noções de mudança e transformação, em oposição a estabilidade, fixidez e permanência. O objetivo é mostrar a relevância da noção de mundo em movimento, tanto para os brasileiros quanto para Dewey.