978 resultados para Personal Control
Resumo:
El objetivo principal de este proyecto es la realización de un sistema, que permita a través de alguna herramienta accesible a cualquier usuario, poder interactuar con una base de datos que contenga un catálogo bien documentado de los objetos disponibles en el Museo Histórico de la Informática (MHI) perteneciente a la Escuela Técnica Superior de Ingenieros Informáticos (ETSIINF) de la Universidad Politécnica de Madrid (UPM). Hasta el momento, no existía inventario alguno, por lo que la contribución del trabajo que aquí se presenta, supone un gran avance en la organización de los fondos del Museo. Ello contribuirá al desarrollo del objetivo principal del MHI, que es la difusión de la historia de la informática, mediante un medio de los más usados hoy en día, internet. El trabajo realizado se presenta a lo largo de 10 capítulos. En los que se muestran, el análisis del problema, los requisitos y las distintas alternativas posibles de solución, así como la solución adoptada y su desarrollo, tanto en el diseño de la base de datos como de sitio Web que hace posible la visualización e interacción de la información. En el primer capítulo, se puede encontrar una breve introducción del proyecto. Se indican los objetivos, la motivación y el alcance del mismo. En el segundo capítulo, se muestran los requisitos del problema, se analizan las tecnologías, herramientas y lenguajes disponibles para diseñar bases de datos, y se propone la elección de una de las tecnologías, teniendo en cuenta las limitaciones del entorno en el cual se va a implantar la solución. En el tercer capítulo, se diseña la solución propuesta para el sistema. Primero se muestra el diseño de bajo nivel, que serán los cimientos y posteriormente se explica el diseño de alto nivel. Finalmente, se introduce el conjunto de pruebas que el sistema tendrá que pasar para garantizar su correcto funcionamiento. El cuarto capítulo, muestra todas las tecnologías, herramientas, lenguajes y plantillas utilizadas para la implementación de la WEB. Mientras que en el capítulo cinco, se pueden ver los resultados de las pruebas realizadas. En el capítulo seis, se evalúan los costes económicos de realización de proyecto y se presenta la agenda de actividades y tareas llevadas a cabo para su desarrollo. El séptimo capítulo, resume las contribuciones técnicas del proyecto tratadas en los capítulos anteriores, así como las conclusiones personales. Mientras que, el capítulo ocho, apunta una serie de trabajos futuros que se podrían realizarse utilizando como base este proyecto. El capítulo nueve contiene las referencias de la información que se han consultado y que se citan en el texto, y el décimo complementa este proceso de información, incluyendo un glosario de términos técnicos. El contenido de la memoria concluye con el manual de usuario para la administración de la base de datos, que se incluye en forma de anexo.---ABSTRACT---The main goal of this project is the development of a system that would allow through some accessible tool for any user to interact with a database that contains a well-documented objects available in the Computer History Museum's (MHI) catalog, which belongs to the School of Computer Engineers (ETSIINF) of the Polytechnic University of Madrid (UPM). So far, there was no inventory, so the contribution of the work presented here, is a breakthrough in the organization of the Museum's collections. This will contribute to the development of the main goal of the MHI, which is the diffusion of computer history, by means of the most used today, internet. The work is presented along 10 chapters. Which show the analysis of the problem, requirements, the different possible solutions and the solution adopted and its development, both in the design of the database and Web site, which enables the visualization and interaction of the information. In the first chapter, a brief introduction of the project is found. Objectives, motivation and scope of the project are specified. In the second chapter, the requirements of the problem are shown. Technologies, tools and languages available to design databases are analysed, and the choice of a technology is proposed, taking into account the limitations of the environment in which it will to implement the solution. In the third chapter, the proposed system solution is designed. First, low-level design, which will be the foundation of the project, is shown, and then the high-level design is explained. Finally, test suite, which the system will have to past to ensure their proper functioning, are introduced. The fourth chapter shows all technologies, tools, languages and templates used to implement the WEB. While in chapter five, the results of the tests are shown. The economic costs of development the project are evaluated in chapter six, and the schedule of activities and tasks carried out for this development are shown. The seventh chapter summarizes the technical contributions of the project discussed in previous chapters, as well as personal conclusions. While the eighth chapter, suggests future works that could be made, based on this project. Ninth chapter contains references to information that have been consulted and cited in the text, and the tenth chapter includes a glossary of technical terms, to complement that process of information. Finally an annex includes a user manual for managing the database.
Resumo:
Postprint
Resumo:
Postprint
Resumo:
The use of microprocessor-based systems is gaining importance in application domains where safety is a must. For this reason, there is a growing concern about the mitigation of SEU and SET effects. This paper presents a new hybrid technique aimed to protect both the data and the control-flow of embedded applications running on microprocessors. On one hand, the approach is based on software redundancy techniques for correcting errors produced in the data. On the other hand, control-flow errors can be detected by reusing the on-chip debug interface, existing in most modern microprocessors. Experimental results show an important increase in the system reliability even superior to two orders of magnitude, in terms of mitigation of both SEUs and SETs. Furthermore, the overheads incurred by our technique can be perfectly assumable in low-cost systems.
Resumo:
Mode of access: Internet.
Resumo:
Item 499-F-2
Resumo:
Mode of access: Internet.
Resumo:
This thesis reports the findings of three studies examining relationship status and identity construction in the talk of heterosexual women, from a feminist and social constructionist perspective. Semi-structured interviews were conducted with 12 women in study 1 and 13 women for study 2, between the ages of twenty and eighty-seven, discussing their experiences of relationships. All interviews were transcribed and analysed using discourse analysis, by hand and using the Nudist 6 program. The resulting themes create distinct age-related marital status expectations. Unmarried women were aware they had to marry by a ‘certain age’ or face a ‘lonely spinsterhood’. Through marriage women gained a socially accepted position associated with responsibility for others, self-sacrifice, a home-focused lifestyle and relational identification. Divorce was constructed as the consequence of personal faults and poor relationship care, reassuring the married of their own control over their status. Older unmarried women were constructed as deviant and pitiable, occupying social purgatory as a result of transgressing these valued conventions. Study 3 used repertory grid tasks, with 33 women, analysing transcripts and notes alongside numerical data using Web Grid II internet analysis tool, to produce principle components maps demonstrating the relationships between relationship terms and statuses. This study illuminated the consistency with which women of different ages and status saw marriage as their ideal living situation and outlined the domestic responsibilities associated. Spinsters and single-again women were defined primarily by their lack of marriage and by loneliness. This highlighted the devalued position of older unmarried women. The results of these studies indicated a consistent set of age-related expectations of relationship status, acknowledged by women and reinforced by their families and friends, which render many unmarried women deviant and fail to acknowledge the potential variety of women’s ways of living.
Resumo:
Orthogonal frequency division multiplexing (OFDM) is becoming a fundamental technology in future generation wireless communications. Call admission control is an effective mechanism to guarantee resilient, efficient, and quality-of-service (QoS) services in wireless mobile networks. In this paper, we present several call admission control algorithms for OFDM-based wireless multiservice networks. Call connection requests are differentiated into narrow-band calls and wide-band calls. For either class of calls, the traffic process is characterized as batch arrival since each call may request multiple subcarriers to satisfy its QoS requirement. The batch size is a random variable following a probability mass function (PMF) with realistically maximum value. In addition, the service times for wide-band and narrow-band calls are different. Following this, we perform a tele-traffic queueing analysis for OFDM-based wireless multiservice networks. The formulae for the significant performance metrics call blocking probability and bandwidth utilization are developed. Numerical investigations are presented to demonstrate the interaction between key parameters and performance metrics. The performance tradeoff among different call admission control algorithms is discussed. Moreover, the analytical model has been validated by simulation. The methodology as well as the result provides an efficient tool for planning next-generation OFDM-based broadband wireless access systems.
Resumo:
Given evidence of effects of mobile phone use on driving, and also legislation, many careful drivers refrain from answering their phones when driving. However, the distracting influence of a call on driving, even in the context of not answering, has not been examined. Furthermore, given that not answering may be contrary to an individual’s normal habits, this study examined whether distraction caused by the ignored call varies according to normal intention to answer whilst driving. That is, determining whether the effect is more than a simple matter of noise distraction. Participants were 27 young drivers (18-29 years), all regular mobile users. A Theory of Planned Behaviour questionnaire examined predictors of intention to refrain from answering calls whilst driving. Participants provided their mobile phone number and were instructed not to answer their phone if it were to ring during a driving simulation. The simulation scenario had seven hazards (e.g. car pulling out, pedestrian crossing) with three being immediately preceded by a call. Infractions (e.g. pedestrian collisions, vehicle collisions, speed exceedances) were significantly greater when distracted by call tones than with no distraction. Lower intention to ignore calls whilst driving correlated with a larger effect of distraction, as was feeling unable to control whether one answered whilst driving (Perceived Behavioural Control). The study suggests that even an ignored call can cause significantly increased infractions in simulator driving, with pedestrian collisions and speed exceedances being striking examples. Results are discussed in relation to cognitive demands of inhibiting normal behaviour and to drivers being advised to switch phones off whilst driving.
Resumo:
In this paper, a congestion control mechanism is presented for multiservice wireless OFDMA networks. The revenue rate and the user SNR's are used to partition the bandwidth in accordance with a complete partitioning structure. Moreover, through the use of our scheme the QoS of any ongoing connections can be satisfied. Results show that the revenue rate plays an important role in prioritizing the different services. © 2013 Springer Science+Business Media New York.
Resumo:
The Article suggests a possible approach to creation of the Intellectual Management System for human resources and personnel (during their professional tasks solving), and that could consider personal characteristics and psychological condition of the human resources as an “unreliable” element. The Article describes some elements of the Intellectual Management System: professional activity model and “unreliable” element (human resources) model.
Resumo:
This study was conducted to determine the effects of the Changing Lives Program intervention on troubled adolescents' feelings of personal expressiveness, believed to be one domain of positive identity development. Forty-three intervention and twenty nonintervention comparison control participants were given a battery of pre-, post-, and follow-up assessments including the Personally Expressive Questionnaire (Waterman, 1995), which was used to derive participants' feelings of personal expressiveness scores. Using Repeated Measures Analysis of Multivariate Analysis (RMANOVA), a significant four-way interaction of Time X Condition X Gender X Ethnicity was found relative to the Control, Roy's Ɵ = .166, F(2,47) = 3.899, p < .027 indicating that intervention participants' feelings of personal expressiveness did increase significantly relative to the control group. Furthermore, the results suggest differential outcomes based on ethnicity, suggesting the need for future study with respect to specificity of effects and mechanisms of identity formation in differing ethnic subgroups.
Resumo:
Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.
Resumo:
En una persona con movilidad reducida, el desplazamiento en una silla de ruedas con motor es equiparable a caminar, porque facilita la igualdad de acceso para: elegir y tomar decisiones, acceder a la información, participar en la educación, el empleo, el ocio y la vida familiar. Hasta hace pocos años, una persona que no podía propulsar una silla de ruedas manual y tampoco podía manejar el joystick de una silla de ruedas eléctrica, se veía obligado a que fuera otra persona quien le "llevara", o le cambiara de postura. Hoy en día las sillas de ruedas eléctricas han evolucionado tanto, que muchas personas pueden desplazarse, ponerse más erguidas, reclinarse o ponerse de pie en la silla, incluso sin el movimiento de las manos. El propósito de este documento es ofrecer asesoramiento sobre los aspectos a tener en cuenta al valorar el acceso más eficaz para controlar la silla de ruedas eléctrica y proporcionar información sobre los diferentes mandos de control y opciones de cambios de postura que hoy día están disponibles en el mercado nacional.