876 resultados para Computing and software systems
Resumo:
Contiene las conclusiones y las reseñas de los trabajos presentados a los seminarios: "Ahorro y eficiencia en la asignación de recursos financieros: experiencias en América Latina", 25-27 enero 1989; y "Ahorro y financiamiento", 29 noviembre-1 diciembre 1989.
Resumo:
Includes bibliography
Resumo:
This issue of the FAL Bulletin describes how metro and railway systems contribute to sustainable mobility, looking at some of the current challenges and their technical solutions.
Resumo:
We have compared the results of the external irrigation technique with those of a double irrigation technique with continuous intermittent movement. Maximum thermal measurements were made in the cortical part of 10 samples of bovine ribs during osteotomy to simulate the preparation of a surgical bed for the installation of dental implants at a depth of 10 mm Twenty specimens were drilled for each group: external irrigation and continuous movement (control group 1, CG1); external irrigation and intermittent movement (control group 2, CG2); double irrigation and continuous movement (test group 1, TG1); and double irrigation and intermittent movement (test group 2, TG2). The double irrigation technique gave significantly better results regardless of the drilling movement used. Thermal increases between samples was 19.2% in group CG1, 10.4% in CG2, 5.4% in TG1, and 3.4% in TG2. The double irrigation technique produced a significantly smaller increase in temperature in the cortical bone during both types of drilling (p = 0.001), which illustrated its greater efficiency compared with that of the external irrigation technique. (C) 2013 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The technologies are rapidly developing, but some of them present in the computers, as for instance their processing capacity, are reaching their physical limits. It is up to quantum computation offer solutions to these limitations and issues that may arise. In the field of information security, encryption is of paramount importance, being then the development of quantum methods instead of the classics, given the computational power offered by quantum computing. In the quantum world, the physical states are interrelated, thus occurring phenomenon called entanglement. This study presents both a theoretical essay on the merits of quantum mechanics, computing, information, cryptography and quantum entropy, and some simulations, implementing in C language the effects of entropy of entanglement of photons in a data transmission, using Von Neumann entropy and Tsallis entropy.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
As more reliance is placed on computing and networking systems, the need for redundancy increases. The Common Address Redundancy Protocol (CARP) protocol and OpenBSD’s pfsync utility provide a means by which to implement redundant routers and firewalls. This paper details how CARP and pfsync work together to provide this redundancy and explores the performance one can expect from the open source solutions. Two experiments were run: one showing the relationship between firewall state creation and state synchronization traffic and the other showing how TCP sessions are transparently maintained in the event of a router failure. Discussion of these simulations along with background information gives an overview of how OpenBSD, CARP, and pfsync can provide redundant routers and firewalls for today’s Internet.
Resumo:
Data-intensive Grid applications require huge data transfers between grid computing nodes. These computing nodes, where computing jobs are executed, are usually geographically separated. A grid network that employs optical wavelength division multiplexing (WDM) technology and optical switches to interconnect computing resources with dynamically provisioned multi-gigabit rate bandwidth lightpath is called a Lambda Grid network. A computing task may be executed on any one of several computing nodes which possesses the necessary resources. In order to reflect the reality in job scheduling, allocation of network resources for data transfer should be taken into consideration. However, few scheduling methods consider the communication contention on Lambda Grids. In this paper, we investigate the joint scheduling problem while considering both optical network and computing resources in a Lambda Grid network. The objective of our work is to maximize the total number of jobs that can be scheduled in a Lambda Grid network. An adaptive routing algorithm is proposed and implemented for accomplishing the communication tasks for every job submitted in the network. Four heuristics (FIFO, ESTF, LJF, RS) are implemented for job scheduling of the computational tasks. Simulation results prove the feasibility and efficiency of the proposed solution.
Resumo:
Data-intensive Grid applications require huge data transfers between grid computing nodes. These computing nodes, where computing jobs are executed, are usually geographically separated. A grid network that employs optical wavelength division multiplexing (WDM) technology and optical switches to interconnect computing resources with dynamically provisioned multi-gigabit rate bandwidth lightpath is called a Lambda Grid network. A computing task may be executed on any one of several computing nodes which possesses the necessary resources. In order to reflect the reality in job scheduling, allocation of network resources for data transfer should be taken into consideration. However, few scheduling methods consider the communication contention on Lambda Grids. In this paper, we investigate the joint scheduling problem while considering both optical network and computing resources in a Lambda Grid network. The objective of our work is to maximize the total number of jobs that can be scheduled in a Lambda Grid network. An adaptive routing algorithm is proposed and implemented for accomplishing the communication tasks for every job submitted in the network. Four heuristics (FIFO, ESTF, LJF, RS) are implemented for job scheduling of the computational tasks. Simulation results prove the feasibility and efficiency of the proposed solution.
Resumo:
Educational institutions of all levels invest large amounts of time and resources into instructional technology, with the goal of enhancing the educational effectiveness of the learning environment. The decisions made by instructors and institutions regarding the implementation of technology are guided by perceptions of usefulness held by those who are in control. The primary objective of this mixed methods study was to examine the student and faculty perceptions of technology being used in general education courses at a community college. This study builds upon and challenges the assertions of writers such as Prensky (2001a, 2001b) and Tapscott (1998) who claim that a vast difference in technology perception exists between generational groups, resulting in a diminished usefulness of technology in instruction. In this study, data were gathered through student surveys and interviews, and through faculty surveys and interviews. Analysis of the data used Kendall’s Tau test for correlation between various student and faculty variables in various groupings, and also typological analysis of the transcribed interview data. The analysis of the quantitative data revealed no relationship between age and perception of technology’s usefulness. A positive relationship was found to exist between the perception of the frequency of technology use and the perception of technology’s effectiveness, suggesting that both faculty members and students believed that the more technology is used, the more useful it is in instruction. The analysis of the qualitative data revealed that both faculty and students perceive technology to be useful, and that the most significant barriers to technology’s usefulness include faulty hardware and software systems,lack of user support, and lack of training for faculty. The results of the study suggest that the differences in perception of technology between generations that are proposed by Prensky may not exist when comparing adults from the younger generation with adults from the older generation. Further, the study suggests that institutions continue to invest in instructional technology, with a focus on high levels of support and training for faculty, and more universal availability of specific technologies, including web access, in class video, and presentation software. Adviser: Ronald Joekel
Resumo:
In this paper the precautionary principle is reviewed alongside the process of international implementation. Adoption of the precautionary principle is advocated to deal with energy choices as a mechanism to account for potential climate change impacts, notwithstanding the debate on scientific uncertainty on the links between solar activity, greenhouse gas concentration and climate. However, it is also recognized that the widespread application of the precautionary principle to energy choices does not seem to be taking place in the real world. Relevant concrete barriers are identified stemming from the intrinsic logic governing the hegemonic economic system, driving the energy choices by economic surplus and rent generation potential, the existence of social asymmetries inside and among societies as well as by the absence of democratic global governance mechanisms, capable of dealing with climate change issues. Such perception seems to have been reinforced by the outcome of the United Nations Climate Change Conference, held in Copenhagen in December 2009. (c) 2010 Elsevier Ltd. All rights reserved.
Resumo:
We examined achromatic contrast discrimination in asymptomatic carriers of 11778 Leber`s hereditary optic neuropathy (LHON 18 controls) and 18 age-match were also tested. To evaluate magnocellular (MC) and Parvocellular (PC) contrast discrimination, we used a version of Pokorny and Smith`s (1997) Pulsed/steady-pedestal paradigms (PPP/SPP) thought to be detected via PC and MC pathways, respectively. A luminance pedestal (four 1 degrees x 1 degrees squares) was presented on a 12 cd/m(2) surround. The luminance of one of the squares (trial square, TS) was randomly incremented for either 17 or 133 ms. Observers had to detect the TS, in a forced-choice task, at each duration, for three pedestal levels: 7, 12, 19 cd/m(2). In the SPP, the pedestal was fixed, and the TS was modulated. For the PPP, all four pedestal squares pulsed for 17 or 133 ms, and the TS was simultaneously incremented or decremented. We found that contrast discrimination thresholds of LHON carriers were significantly higher than controls` in the condition with the highest luminance of both paradigms, implying impaired contrast processing with no evidence of differential sensitivity losses between the two systems. Carriers` thresholds manifested significantly longer temporal integration than controls in the SPP, consistent with slowed MC responses. The SPP and PPP paradigms can identify contrast and temporal processing deficits in asymptomatic LHON carriers, and thus provide an additional tool for early detection and characterization of the disease.
Resumo:
Cannabinoid receptor 1 (CB1) agonists usually induce dose-dependent biphasic effects on anxiety-related responses. Low doses induce anxiolytic-like effects, whereas high doses are ineffective or anxiogenic, probably due to activation of Transient Receptor Potential Vanilloid Type 1 (TRPV1) channels. In this study we have investigated this hypothesis by verifying the effects of the CB1/TRPV1 agonist ACEA injected into the prelimbic medial prefrontal cortex (PL) and the participation of endocannabinoids in the anxiolytic-like responses induced by TRPV1 antagonism, using the elevated plus-maze (EPM) and the Vogel conflict test (VCT). Moreover, we verified the expression of these receptors in the PL by double labeling immunofluorescence. ACEA induced anxiolytic-like effect in the intermediate dose, which was attenuated by previous injection of AM251, a CB1 receptor antagonist. The higher and ineffective ACEA dose caused anxiogenic- and anxiolytic-like effects, when injected after AM251 or the TRPV1 antagonist 6-iodonordihydrocapsaicin (6-I-CPS), respectively. Higher dose of 6-I-CPS induced anxiolytic-like effects both in the EPM and the VCT, which were prevented by previous administration of AM251. In addition, immunofluorescence showed that CB1 and TRPV1 receptors are closely located in the PL These results indicate that the endocannabinoid and endovanilloid systems interact in the PL to control anxiety-like behavior. (C) 2012 Elsevier Ltd. All rights reserved.