954 resultados para software-defined network
Resumo:
Summary: The objective of this work was to evaluate the sperm motility of 13 Steindachneridion parahybae males using open-source software (ImageJ/CASA plugin). The sperm activation procedure and image capture were initiated after semen collection. Four experimental phases were defined from the videos captured of each male as follows: (i) standardization of a dialogue box generated by the CASA plugin within ImageJ; (ii) frame numbers used to perform the analysis; (iii) post-activation motility between 10 and 20 s with analysis at each 1 s; and (iv) post-activation motility between 10 and 50 s with analysis at each 10 s. The settings used in the CASA dialogue box were satisfactory, and the results were consistent. These analyses should be performed using 50 frames immediately after sperm activation because spermatozoa quickly lose their vigor. At 10 s post-activation, 89.1% motile sperm was observed with 107.2 μm s-1 curvilinear velocity, 83.6 μm s-1 average path velocity, 77.1 μm s-1 straight line velocity; 91.6% were of straightness and 77.1% of wobble. The CASA plugin within ImageJ can be applied in sperm analysis of the study species by using the established settings. © 2013 Blackwell Verlag GmbH.
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Ciência da Informação - FFC
Resumo:
Includes bibliography.
SW-V: modelo de streaming de software baseado em técnicas de virtualização e transporte peer-to-peer
Resumo:
Pós-graduação em Ciência da Computação - IBILCE
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
A crescente demanda por capacidade vem levando os padrões de comunicação sem-fio a prover suporte para a coexistência de macro e pico células. O backhaul, conexão entre a rede de acesso e o núcleo da rede, é de grande interesse neste contexto devido aos diversos desafios técnicos e financeiros envolvidos ao tentar satisfazer o crescente tráfego dos usuários. Fibra óptica e micro-ondas com linha de visada são as opções mais amplamente adotadas para o backhaul de macro-células. Contudo, em muitas situações de interesse prático, estas não são factíveis devido aos altos custos e logística envolvidos. Este trabalho avalia o backhaul de pico-células, focando primeiramente na utilização de cobre como backhaul. O simulador OPNET foi utilizado para avaliar os requerimentos de backhaul para redes móveis em cenários específicos considerando garantir qualidade de serviço para os diversos tipos de tráfego envolvidos. Assumindo demandas de tráfego para LTE e LTE-Advanced, as tecnologias VDSL2 e G.fast são avaliadas e os resultados mostram que mesmo com uma grande demanda de aplicações de vídeo de alta definição, estas tecnologias podem acomodar o tráfego no backhaul de pico-células. VDSL2 é capaz de prover as taxas requeridas para cenários de pico-células LTE, mas não é capaz de acomodar tráfego LTE-Advanced típico. Por outro lado, considerando as taxas atingidas com a tecnologia G.fast, o tráfego backhaul para pico-células LTE-Advanced pode ainda ser entregue com garantias de qualidade de serviço. Neste trabalho também é proposta uma solução para simulação de cenários contendo redes de acesso heterogêneas considerando backhaul LTE sem linha de visada. São demonstrados também os resultados de simulações no OPNET com o backhaul LTE proposto para validar a solução proposta como capaz de caracterizar o tráfego de ambas as tecnologias WiFi e LTE na rede de acesso de acordo com o tipo de serviço.
Resumo:
Este trabalho visa propor uma solução contendo um sistema de reconhecimento de fala automático em nuvem. Dessa forma, não há necessidade de um reconhecedor sendo executado na própria máquina cliente, pois o mesmo estará disponível através da Internet. Além do reconhecimento automático de voz em nuvem, outra vertente deste trabalho é alta disponibilidade. A importância desse tópico se d´a porque o ambiente servidor onde se planeja executar o reconhecimento em nuvem não pode ficar indisponível ao usuário. Dos vários aspectos que requerem robustez, tal como a própria conexão de Internet, o escopo desse trabalho foi definido como os softwares livres que permitem a empresas aumentarem a disponibilidade de seus serviços. Dentre os resultados alcançados e para as condições simuladas, mostrou-se que o reconhecedor de voz em nuvem desenvolvido pelo grupo atingiu um desempenho próximo ao do Google.
Resumo:
Topographical surfaces can be represented with a good degree of accuracy by means of maps. However these are not always the best tools for the understanding of more complex reliefs. In this sense, the greatest contribution of this work is to specify and to implement the architecture of an opensource software system capable of representing TIN (Triangular Irregular Network) based digital terrain models. The system implementation follows the object oriented programming and generic paradigms enabling the integration of various opensource tools such as GDAL, OGR, OpenGL, OpenSceneGraph and Qt. Furthermore, the representation core of the system has the ability to work with multiple topological data structures from which can be extracted, in constant time, all the connectivity relations between the entities vertices, edges and faces existing in a planar triangulation what helps enormously the implementation for real time applications. This is an important capability, for example, in the use of laser survey data (Lidar, ALS, TLS), allowing for the generation of triangular mesh models in the order of millions of points.
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
The hydroelectric power plant Hidroltuango represents a major expansion for the Colombian electrical system (with a total capacity of 2400 MW). This paper analyzes the possible interconnections and investments involved in connecting Hidroltuango, in order to strengthen the Colombian national transmission system. A Mixed Binary Linear Programming (MBLP) model was used to solve the Multistage Transmission Network Expansion Planning (MTEP) problem of the Colombian electrical system, taking the N-1 safety criterion into account. The N-1 safety criterion indicates that the transmission system must be expanded so that the system will continue to operate properly if an outage in a system element (within a pre-defined set of contingencies) occurs. The use of a MBLP model guaranteed the convergence with existing classical optimization methods and the optimal solution for the MTEP using commercial solvers. Multiple scenarios for generation and demand were used to consider uncertainties within these parameters. The model was implemented using the algebraic modeling language AMPL and solved using the commercial solver CPLEX. The proposed model was then applied to the Colombian electrical system using the planning horizon of 2018-2025. (C) 2014 Elsevier B.V. All rights reserved.
Resumo:
This paper analyses the scientific collaboration network formed by the Brazilian universities that investigate in dentistry area. The constructed network is based on the published documents in the Scopus (Elsevier) database covering a period of 10 (ten) years. It is used social network analysis as the best methodological approach to visualize the capacity for collaboration, dissemination and transmission of new knowledge among universities. Cohesion and density of the collaboration network is analyzed, as well as the centrality of the universities as key-actors and the occurrence of subgroups within the network. Data were analyzed using the software UCINET and NetDraw. The number of documents published by each university was used as an indicator of its scientific production.
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)