868 resultados para Medium access control protocol
Resumo:
El present projecte desenvolupa una aplicació de gestió d’espais i control d’accés per a la l’Edifici d’Estudiants-ETC de la Universitat Autònoma de Barcelona. Aquest edifici ofereix serveis a la comunitat universitària i compta amb un conjunt d’espais i equipaments ben divers: despatxos, sales de reunió, sales d’assaig, sala d’ordinadors, cinema i teatre. Els usuaris d’aquestes instal·lacions són els propis treballadors de l’edifici, alumnes dels cursos i tallers, estudiants beneficiaris d’algun servei i col·lectius d’estudiants. La gestió i l’assignació d’aquests espais, així com el control d’accés són realitzats manualment per part del personal de l’ETC a la recepció de l’edifici (anomenat Punt de Serveis). L’aplicació desenvolupada implementa els processos existents, tals com la gestió i reserva d’espais, l’inventari de claus o el control d’accés a les sales. Tanmateix introdueix nous processos i funcionalitats, com la gestió, reserva i cessió de material propietat de l’edifici.
Resumo:
Amb l’aparició de nous entorns en el món de la informàtica sorgeixen noves necessitats. Un d’aquests entorns és SESAR, un entorn que preveu l’ús massiu de transmissió de dades entre sistemes aeris. L’objecitu principal d’aquest projecte és aconseguir implementar el control d’accés per una aplicació en aquest entorn. El primer pas és dur a terme un estudi exhaustiu dels diferents elements que necessitem per desenvolupar el projecte, així com un anàlisi de l’entorn per extreure les característiques pel control d’accés. Després es presenta el seu disseny i implementació, que acompleix el seu objectiu de gestionar el control d’accés de l’aplicació de correu electrònic en aquest entorn.
Resumo:
The networking and digitalization of audio equipment has created a need for control protocols. These protocols offer new services to customers and ensure that the equipment operates correctly. The control protocols used in the computer networks are not directly applicable since embedded systems have resource and cost limitations. In this master's thesis the design and implementation of new loudspeaker control network protocols are presented. The protocol stack was required to be reliable, have short response times, configure the network automatically and support the dynamic addition and removal of loudspeakers. The implemented protocol stack was also required to be as efficient and lightweight as possible because the network nodes are fairly simple and lack processing power. The protocol stack was thoroughly tested, validated and verified. The protocols were formally described using LOTOS (Language of Temporal Ordering Specifications) and verified using reachability analysis. A prototype of the loudspeaker network was built and used for testing the operation and the performance of the control protocols. The implemented control protocol stack met the design specifications and proved to be highly reliable and efficient.
Resumo:
Tässä diplomityössä käsitellään henkilökohtaisen tiedon saannin kontrollointia ja tiedon kuvaamista. Työn käytännön osuudessa suunniteltiin XML –malli henkilökohtaisen tiedon kuvaamiseen. Henkilökohtaisten tietojen käyttäminen mahdollistaa henkilökohtaisen palvelun tarjoamisen ja myös palvelun automatisoinnin käyttäjälle. Henkilökohtaisen tiedon kuvaaminen on hyvin oleellista, jotta palvelut voivat kysellä ja ymmärtää tietoja. Henkilökohtaiseen tietoon vaikuttaa erilaisia tekijöitä, jotka on myös otettava huomioon tietoa kuvattaessa. Henkilökohtaisen tiedon leviäminen eri palveluiden tarjoajille tuo mukanaan myös riskejä. Henkilökohtaisen tiedon joutuminen väärän henkilön käsiin saattaa aiheuttaa vakaviakin ongelmia tiedon omistajalle. Henkilökohtaisen tiedon turvallisen ja luotettavan käytettävyyden kannalta onkin hyvin oleellista, että käyttäjällä on mahdollisuus kontrolloida kenelle hän haluaa luovuttaa mitäkin tietoa.
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
INTRODUCTION: Hyperglycemia is a metabolic alteration in major burn patients associated with complications. The study aimed at evaluating the safety of general ICU glucose control protocols applied in major burns receiving prolonged ICU treatment. METHODS: 15year retrospective analysis of consecutive, adult burn patients admitted to a single specialized centre. EXCLUSION CRITERIA: death or length of stay <10 days, age <16years. VARIABLES: demographic variables, burned surface (TBSA), severity scores, infections, ICU stay, outcome. Metabolic variables: total energy, carbohydrate and insulin delivery/24h, arterial blood glucose and CRP values. Analysis of 4 periods: 1, before protocol; 2, tight doctor driven; 3, tight nurse driven; 4, moderate nurse driven. RESULTS: 229 patients, aged 45±20 years (mean±SD), burned 32±20% TBSA were analyzed. SAPSII was 35±13. TBSA, Ryan and ABSI remained stable. Inhalation injury increased. A total of 28,690 blood glucose samples were analyzed: the median value remained unchanged with a narrower distribution over time. After the protocol initiation, the normoglycemic values increased from 34.7% to 65.9%, with a reduction of hypoglycaemic events (no extreme hypoglycemia in period 4). Severe hyperglycemia persisted throughout with a decrease in period 4 (9.25% in period 4). Energy and glucose deliveries decreased in periods 3 and 4 (p<0.0001). Infectious complications increased during the last 2 periods (p=0.01). CONCLUSION: A standardized ICU glucose control protocol improved the glycemic control in adult burn patients, reducing glucose variability. Moderate glycemic control in burns was safe specifically related to hypoglycemia, reducing the incidence of hypoglycaemic events compared to the period before. Hyperglycemia persisted at a lower level.
Resumo:
La presente monografía pretende analizar en qué medida el co-liderazgo sino-ruso de la Organización de Cooperación de Shanghái puede condicionar la hegemonía estadounidense en Asia Central. Esta investigación defiende que los objetivos del co-liderazgo sino-ruso de la OCS - garantizar un orden multipolar del Sistema Internacional; obtener el acceso, control y explotación de los recursos (naturales, minerales e hídricos); disminuir la influencia política y militar de Estados Unidos en dicho pivote geopolítico - evidencian una contraposición al código geopolítico estadounidense en Asia Central, lo cual genera un limitante a su proyecto de hegemonía en la región. Para sustentar lo anterior se utilizan categorías analíticas propias de la Geopolítica de autores como Zbigniew Brzezinski, Saul Cohen y Peter Taylor, las cuales se contrastan con las estrategias de Rusia, China y Estados Unidos en Asia Central.
Resumo:
The problems encountered by individuals with disabilities when accessing large public buildings is described and a solution based on the generation of virtual models of the built environment is proposed. These models are superimposed on a control network infrastructure, currently utilised in intelligent building applications such as lighting, heating and access control. The use of control network architectures facilitates the creation of distributed models that closely mirror both the physical and control properties of the environment. The model of the environment is kept local to the installation which allows the virtual representation of a large building to be decomposed into an interconnecting series of smaller models. This paper describes two methods of interacting with the virtual model, firstly a two dimensional aural representation that can be used as the basis of a portable navigational device. Secondly an augmented reality called DAMOCLES that overlays additional information on a user’s normal field of view. The provision of virtual environments offers new possibilities in the man-machine interface so that intuitive access to network based services and control functions can be given to a user.
Resumo:
The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and is widely used in consumer Mass Storage Devices (MSDs). While current consumer USB MSDs provide relatively high transmission speed and are convenient to carry, the use of USB MSDs has been prohibited in many commercial and everyday environments primarily due to security concerns. Security protocols have been previously proposed and a recent approach for the USB MSDs is to utilize multi-factor authentication. This paper proposes significant enhancements to the three-factor control protocol that now makes it secure under many types of attacks including the password guessing attack, the denial-of-service attack, and the replay attack. The proposed solution is presented with a rigorous security analysis and practical computational cost analysis to demonstrate the usefulness of this new security protocol for consumer USB MSDs.
Resumo:
We introduce a new end-to-end, sender side Transport Control Protocol called TCP HolyWood or in short TCP-HW. In a simulated wired environment, TCP HolyWood outperforms in average throughput, three of the more important TCP protocols ever made, we are talking about TCP Reno, TCP Westwood, and TCP Vegas; and in average jitter to TCP Reno and TCP Vegas too. In addition, according to Jain’s index, our proposal is as fair as TCP Reno, the Standard.
Resumo:
MEDEIROS, Adelardo A. D.A survey of control architectures for autonomous mobile robots. J. Braz. Comp. Soc., Campinas, v. 4, n. 3, abr. 1998 .Disponível em:
Resumo:
A quality control protocol for the analysis of propolis and its extracts is proposed in the present work. Propolis of Apis mellifera L. bees collected in beehives of an apiary located in the northwest of the Paraná State was triturated and submitted to the following analysis: particles medium size determination, loss of dry, ashes drift, waxes drift, drift of extractive (in water and in ethanol) and total flavonoids drift determination. Propolis ethanolic extracts (96 °GL) at 10% (w/w) and at 30% (w/w) were prepared and submitted to the determination of the pH, relative density, dry residue, alcoholic drift and total flavonoids drift determination. Propolis was analyzed, through High Performance Liquid Cromatography (HPLC). Comparing the obtained results with other works, it was observed that is possible to establish the intervals of values for parameters in order to evaluate the quality of a propolis sample and its extracts.
Resumo:
In this paper, remote laboratory experiment access is considered through the use of radio frequency identification (RFID) technology. Contactless smart cards are used widely in many applications from travel cards through to building access control and inventory tracking. However, their use is considered here for access to electronic engineering experimentation in a remote laboratory setting by providing the ability to interface experiments through this contactless (wireless) connection means. A case study design is implemented to demonstrate such a means by incorporating experiment data onto a contactless smart card and accessing this via a card reader and web server arrangement. © 2012 IEEE.
Resumo:
Objetivo: O presente trabalho, dividido em três estudos, teve como objetivo geral identificar e quantificar a liberação de componentes e avaliar a citotoxicidade e a biocompatibilidade de cimentos de ionômero de vidro (CIVs). Método: Para o estudo 1, extratos dos CIVs Vitrebond (VB), Fuji Lining LC (FL), Vitremer (VM), Fuji II LC (FII), Ketac Fil Plus (KF) e Ketac Molar Easymix (KM) foram obtidos pela imersão de corpos-de-prova em meio de cultura celular (DMEM). Esses extratos (n=9 por grupo) foram analisados por eletrodo específico quanto à presença de flúor e por espectrometria de absorção atômica quanto à presença de alumínio e zinco. HEMA e iodobenzeno foram identificados por CG/EM (n=6). Para o estudo 2, células MDPC-23 foram colocadas em contato com os extratos dos CIVs por 24 horas. Em seguida, foram avaliadas a atividade da desidrogenase succínica (SDH) (n=8), a produção de proteína total (PT) (n=8), a atividade da fosfatase alcalina (FAL) (n=8) e a morfologia celular (n=2). Para o estudo 3, tubos de polietileno (n=24 por grupo) foram preenchidos com os CIVs e implantados no tecido subcutâneo de 42 ratos. Como grupo controle foi utilizada a guta-percha. Após 7 ou 15 dias de pós-operatório, metade dos espécimes de cada grupo e período (n=6) foi preparada para análise histológica, e os demais (n=6) para análise da expressão de genes que codificam para IL-1? e TNF-?. Resultados: Os extratos de todos os CIVs apresentaram uma concentração de flúor significativamente maior do que o meio de cultura DMEM (controle), tendo o VB liberado maior quantidade, estatisticamente significante, do que os demais CIVs. O VB foi, também, o único material que liberou quantidades relativamente altas de alumínio e de zinco. O HEMA foi identificado nos extratos de todos os CIVs modificados por resina (VB, FL, VM e FII), e o iodobenzeno... (Resumo completo, clicar acesso eletrônico abaixo)