952 resultados para user testing, usability testing, system integration, thinking aloud, card sorting
Resumo:
This paper describes two algorithms for adaptive power and bit allocations in a multiple input multiple output multiple-carrier code division multiple access (MIMO MC-CDMA) system. The first is the greedy algorithm, which has already been presented in the literature. The other one, which is proposed by the authors, is based on the use of the Lagrange multiplier method. The performances of the two algorithms are compared via Monte Carlo simulations. At present stage, the simulations are restricted to a single user MIMO MC-CDMA system, which is equivalent to a MIMO OFDM system. It is assumed that the system operates in a frequency selective fading environment. The transmitter has a partial knowledge of the channel whose properties are measured at the receiver. The use of the two algorithms results in similar system performances. The advantage of the Lagrange algorithm is that is much faster than the greedy algorithm. ©2005 IEEE
Resumo:
O objetivo central desta tese é investigar o potencial de transformação social da organização não-governamental, ligada a CNBB(Confederação Nacional dos Bispos do Brasil).- Pastoral da Criança - para a libertação de mulheres que lá atuam, das relações de dominação e opressões inerentes ao contexto kyriarchal. Esta pesquisa procura considerar o espaço religioso subjacente à organização em decorrência das influências das CEBs (Comunidades Eclesiais de Base) e do MRCC (Movimento de Renovação Católica Carismática). É feita pesquisa de campo na região de Curitiba com observações e entrevistas semi-estruturadas com doze mulheres atuando na Pastoral da Criança, valorizando-se a relação intersubjetiva entre pesquisadora e pessoas envolvidas na pesquisa. A análise qualitativa de dados em relação ao marco teórico feminista desenvolvido em Ciências Sociais pela sociologia, psicanálise e também a teologia, mostra o discurso das representações sociais das mulheres envolvidas, a percepção de suas próprias identidades e a importância da organização na construção de suas vidas. Nos traz a conclusão que a organização reproduz o perfil tradicional de mulheres na função materna e facilita a formação de redes comunitárias. Averigua-se que a Pastoral da Criança está vinculada ao sistema neoliberal de pensamento que reproduz os discursos de dominação do sistema kyriarchal da hierarquia da Igreja Católica e da medicina higienista. Essas instituições de apropriam da vida e dos corpos das mulheres e os reduzem às suas funções meramente biológicas, reprodutivas e de cuidados. A Pastoral da Criança é caracterizada por atividades que não consideram as causas estruturais da pobreza, mas apenas tentam amenizar os seus efeitos e conseqüências. Em suas capacitações, a organização usa a forma bancária de educação que reproduz as relações de dominação e dependência de mulheres pobres. A organização, mesmo com a estrutura da ideologia religiosa analisada, não está vinculada sistematicamente em um espaço religioso. Sugere-se em relação à situação da organização, a abertura das idéias e valores feministas nos campos da saúde e religião a fim de promover a libertação e empoderamento reais de mulheres pobres. Esta recomendação está ligada com a abertura, a necessidade de reflexão e de conhecimento, mostradas pelas mulheres entrevistadas durante a pesquisa de campo. Considera-se como limitação aos resultados da pesquisa, o local pesquisado por não ter influências de movimentos sociais.(AU)
Resumo:
The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.
Resumo:
Jackson System Development (JSD) is an operational software development method which addresses most of the software lifecycle either directly or by providing a framework into which more specialised techniques can fit. The method has two major phases: first an abstract specification is derived that is in principle executable; second the specification is implemented using a variety of transformations. The object oriented paradigm is based on data abstraction and encapsulation coupled to an inheritance architecture that is able to support software reuse. Its claims of improved programmer productivity and easier program maintenance make it an important technology to be considered for building complex software systems. The mapping of JSD specifications into procedural languages typified by Cobol, Ada, etc., involves techniques such as inversion and state vector separation to produce executable systems of acceptable performance. However, at present, no strategy exists to map JSD specifications into object oriented languages. The aim of this research is to investigate the relationship between JSD and the object oriented paradigm, and to identify and implement transformations capable of mapping JSD specifications into an object oriented language typified by Smalltalk-80. The direction which the transformational strategy follows is one whereby the concurrency of a specification is removed. Two approaches implementing inversion - an architectural transformation resulting in a simulated coroutine mechanism being generated - are described in detail. The first approach directly realises inversions by manipulating Smalltalk-80 system contexts. This is possible in Smalltalk-80 because contexts are first class objects and are accessible to the user like any other system object. However, problems associated with this approach are expounded. The second approach realises coroutine-like behaviour in a structure called a `followmap'. A followmap is the results of a transformation on a JSD process in which a collection of followsets is generated. Each followset represents all possible state transitions a process can undergo from the current state of the process. Followsets, together with exploitation of the class/instance mechanism for implementing state vector separation, form the basis for mapping JSD specifications into Smalltalk-80. A tool, which is also built in Smalltalk-80, supports these derived transformations and enables a user to generate Smalltalk-80 prototypes of JSD specifications.
Resumo:
The control needed in the management of a project was analysed with particular reference to the unique needs of the construction industry within the context of site management. This was explored further by analysing the various problems facing managers within the overall system and determining to what extent the organisation would benefit from an integrated mangement information system. Integration and management of information within the organisational units and the cycles of events that make up the main sub-system was suggested as the means of achieving this objective. A conceptual model of the flow of information was constructed within the whole process of project management by examining the type of information and documents which are generated for the production cycle of a project. This model was analysed with respect to the site managers' needs and the minimum requirements for an overall integrated system. The most tedious and time-consuming task facing the site manager is the determination of weekly production costs, calculation and preparation of interim certificates and valuation of variations occurring during the production stage and finally the settlement and preparation of supplier and sub-contractors' accounts. These areas where microcomputers could be of most help were identified and a number of packages were designed and implemented for various contractors. The gradual integration of stand-alone packages within the whole of the construction industry is a logical sequence to achieve integration of management system. The methods of doing this were analysed together with the resulting advantages and disadvantages.
Resumo:
Increasingly in the UK, companies that have traditionally considered themselves as manufacturers are being advised to now see themselves as service providers and to reconsider whether to have any production capability. A key challenge is to translate this strategy into a selection of product and service-centred activities within the company's supply chain networks. Strategic positioning is concerned with the choice of business activities a company carries out itself, compared to those provided by suppliers, partners, distributors and even customers. In practice, strategic positioning is directly impacted by such decisions as outsourcing, off-shoring, partnering, technology innovation, acquisition and exploitation. If companies can better understand their strategic positioning, they can make more informed decisions about the adoption of alternative manufacturing and supply chain activities. Similarly, they are more likely to reject those that, like off-shoring, are currently en vogue but are highly likely to erode competitive edge and business success. Our research has developed a new concept we call 'competitive space' as a means of appreciating the strategic positioning of companies, along with a structured decision process for managing competitive space. Our ideas about competitive space, along with the decision process itself, have been developed and tested on a range of manufacturers. As more and more manufacturers are encouraged to move towards system integration and a serviceable business model, the challenge is to identify the appropriate strategic position for their organisations, or in other words, to identify their optimum competitive space for manufacture.
Resumo:
Individuals often imitate each other to fall into the typical group, leading to a self-organized state of typical behaviors in a community. In this paper, we model self-organization in social tagging systems and illustrate the underlying interaction and dynamics. Specifically, we introduce a model in which individuals adjust their own tagging tendency to imitate the average tagging tendency. We found that when users are of low confidence, they tend to imitate others and lead to a self-organized state with active tagging. On the other hand, when users are of high confidence and are stubborn to change, tagging becomes inactive. We observe a phase transition at a critical level of user confidence when the system changes from one regime to the other. The distributions of post length obtained from the model are compared to real data, which show good agreement. © 2011 American Physical Society.
Resumo:
System efficiency and cost effectiveness are of critical importance for photovoltaic (PV) systems. This paper addresses the two issues by developing a novel three-port dc-dc converter for stand-alone PV systems, based on an improved Flyback-Forward topology. It provides a compact single-unit solution with a combined feature of optimized maximum power point tracking (MPPT), high step-up ratio, galvanic isolation, and multiple operating modes for domestic and aerospace applications. A theoretical analysis is conducted to analyze the operating modes followed by simulation and experimental work. This paper is focused on a comprehensive modulation strategy utilizing both PWM and phase-shifted control that satisfies the requirement of PV power systems to achieve MPPT and output voltage regulation. A 250-W converter was designed and prototyped to provide experimental verification in term of system integration and high conversion efficiency.
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown viruses quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives. ^
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown virus quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives.
Resumo:
The present research is carried out from the viewpoint of primarily space applications where human lives may be in danger if they are to work under these conditions. This work proposes to develop a one-degree-of-freedom (1-DOF) force-reflecting manual controller (FRMC) prototype for teleoperation, and address the effects of time delays commonly found in space applications where the control is accomplished via the earth-based control stations. To test the FRMC, a mobile robot (PPRK) and a slider-bar were developed and integrated to the 1-DOF FRMC. The software developed in Visual Basic is able to telecontrol any platform that uses an SV203 controller through the internet and it allows the remote system to send feedback information which may be in the form of visual or force signals. Time delay experiments were conducted on the platform and the effects of time delay on the FRMC system operation have been studied and delineated.
Resumo:
Acknowledgements: This research was carried out through a grant from the EPSRC: Communities and Cultures Network+ EP/K003585 and forms part of the dot.rural Rural Digital Economy Research Hub EP/G066051
Resumo:
Acknowledgements: This research was carried out through a grant from the EPSRC: Communities and Cultures Network+ EP/K003585 and forms part of the dot.rural Rural Digital Economy Research Hub EP/G066051
Resumo:
Semiconductor chip packaging has evolved from single chip packaging to 3D heterogeneous system integration using multichip stacking in a single module. One of the key challenges in 3D integration is the high density interconnects that need to be formed between the chips with through-silicon-vias (TSVs) and inter-chip interconnects. Anisotropic Conductive Film (ACF) technology is one of the low-temperature, fine-pitch interconnect method, which has been considered as a potential replacement for solder interconnects in line with continuous scaling of the interconnects in the IC industry. However, the conventional ACF materials are facing challenges to accommodate the reduced pad and pitch size due to the micro-size particles and the particle agglomeration issue. A new interconnect material - Nanowire Anisotropic Conductive Film (NW-ACF), composed of high density copper nanowires of ~ 200 nm diameter and 10-30 µm length that are vertically distributed in a polymeric template, is developed in this work to tackle the constrains of the conventional ACFs and serves as an inter-chip interconnect solution for potential three-dimensional (3D) applications.
Resumo:
Visual cluster analysis provides valuable tools that help analysts to understand large data sets in terms of representative clusters and relationships thereof. Often, the found clusters are to be understood in context of belonging categorical, numerical or textual metadata which are given for the data elements. While often not part of the clustering process, such metadata play an important role and need to be considered during the interactive cluster exploration process. Traditionally, linked-views allow to relate (or loosely speaking: correlate) clusters with metadata or other properties of the underlying cluster data. Manually inspecting the distribution of metadata for each cluster in a linked-view approach is tedious, specially for large data sets, where a large search problem arises. Fully interactive search for potentially useful or interesting cluster to metadata relationships may constitute a cumbersome and long process. To remedy this problem, we propose a novel approach for guiding users in discovering interesting relationships between clusters and associated metadata. Its goal is to guide the analyst through the potentially huge search space. We focus in our work on metadata of categorical type, which can be summarized for a cluster in form of a histogram. We start from a given visual cluster representation, and compute certain measures of interestingness defined on the distribution of metadata categories for the clusters. These measures are used to automatically score and rank the clusters for potential interestingness regarding the distribution of categorical metadata. Identified interesting relationships are highlighted in the visual cluster representation for easy inspection by the user. We present a system implementing an encompassing, yet extensible, set of interestingness scores for categorical metadata, which can also be extended to numerical metadata. Appropriate visual representations are provided for showing the visual correlations, as well as the calculated ranking scores. Focusing on clusters of time series data, we test our approach on a large real-world data set of time-oriented scientific research data, demonstrating how specific interesting views are automatically identified, supporting the analyst discovering interesting and visually understandable relationships.