944 resultados para Intranets (Computer networks) -- Design and construction
Resumo:
Purpose – Construction projects usually suffer delays, and the causes of these delays and its cost overruns have been widely discussed, the weather being one of the most recurrent. The purpose of this paper is to analyze the influence of climate on standard construction work activities through a case study. Design/methodology/approach – By studying the extent at which some weather variables impede outdoor work from being effectively executed, new maps and tables for planning for delays are presented. In addition, a real case regarding the construction of several bridges in southern Chile is analyzed. Findings – Few studies have thoroughly addressed the influences of major climatic agents on the most common outdoor construction activities. The method detailed here provides a first approximation for construction planners to assess to what extent construction productivity will be influenced by the climate. Research limitations/implications – Although this study was performed in Chile, the simplified method proposed is entirely transferable to any other country, however, other weather or combinations of weather variables could be needed in other environments or countries. Practical implications – The implications will help reducing the negative social, economic and environmental outcomes that usually emerge from project delays. Originality/value – Climatic data were processed using extremely simple calculations to create a series of quantitative maps and tables that would be useful for any construction planner to decide the best moment of the year to start a project and, if possible, where to build it.
Resumo:
One of the main aims of this thesis is to design an optimized commercial Photovoltaic (PV) system in Barbados from several variables such as racking type, module type and inverter type based on practicality, technical performance as well as financial returns to the client. Detailed simulations are done in PVSYST and financial models are used to compare different systems and their viability. Once the preeminent system is determined from a financial and performance perspective a detailed design is done using PVSYST and AutoCAD to design the most optimal PV system for the customer. In doing so, suitable engineering drawings are generated which are detailed enough for construction of the system. Detailed cost with quotes from relevant manufacturers, suppliers and estimators become instrumental in determining Balance of System Costs in addition to total project cost. The final simulated system is suggested with a PV capacity of 425kW and an inverter output of 300kW resulting in an array oversizing of 1.42. The PV system has a weighted Performance Ratio of 77 %, a specific yield of 1467 kWh/kWp and a projected annual production of 624 MWh/yr. This system is estimated to offset approximately 28 % of Carlton’s electrical load annually. Over the course of 20 years the PV system is projected to produce electricity at a cost of $0.201USD/kWh which is significantly lower than the $0.35 USD/kWh paid to the utility at the time of writing this thesis. Due to the high cost of electricity on the island, an attractive Feed-In-Tariff is not necessary to warrant the installation of a commercial System which over a lifetime which produces electricity at less than 60% of the cost to the user purchasing electricity from the utility. A simple payback period of 5.4 years, a return on investment of 17 % without incentives, in addition to an estimated diversion of 6840 barrels of oil or 2168 tonnes of CO2 further provides compelling justification for the installation of a commercial Photovoltaic System not only on Carlton A-1 Supermarket, but also island wide as well as regionally where most electricity supplies are from imported fossil fuels.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
This thesis focuses on the adaptation of formal education to people’s technology- use patterns, theirtechnology-in-practice, where the ubiquitous use of mobile technologies is central. The research question is: How can language learning practices occuring in informal learning environments be effectively integrated with formal education through the use of mobile technology? The study investigates the technical, pedagogical, social and cultural challenges involved in a design science approach. The thesis consists of four studies. The first study systematises MALL (mobile-assisted language learning) research. The second investigates Swedish and Chinese students’ attitudes towards the use of mobile technology in education. The third examines students’ use of technology in an online language course, with a specific focus on their learning practices in informal learning contexts and their understanding of how this use guides their learning. Based on the findings, a specifically designed MALL application was built and used in two courses. Study four analyses the app use in terms of students’ perceived level of self-regulation and structuration. The studies show that technology itself plays a very important role in reshaping peoples’ attitudes and that new learning methods are coconstructed in a sociotechnical system. Technology’s influence on student practices is equally strong across borders. Students’ established technologies-in-practice guide the ways they approach learning. Hence, designing effective online distance education involves three interrelated elements: technology, information, and social arrangements. This thesis contributes to mobile learning research by offering empirically and theoretically grounded insights that shift the focus from technology design to design of information systems.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Design and analysis of an efficient neural network model for solving nonlinear optimization problems
Resumo:
This paper presents an efficient approach based on a recurrent neural network for solving constrained nonlinear optimization. More specifically, a modified Hopfield network is developed, and its internal parameters are computed using the valid-subspace technique. These parameters guarantee the convergence of the network to the equilibrium points that represent an optimal feasible solution. The main advantage of the developed network is that it handles optimization and constraint terms in different stages with no interference from each other. Moreover, the proposed approach does not require specification for penalty and weighting parameters for its initialization. A study of the modified Hopfield model is also developed to analyse its stability and convergence. Simulation results are provided to demonstrate the performance of the proposed neural network.
Resumo:
The isotypes of RAR and RXR are retinoic acid and retinoid X acid receptors, respectively, whose ligand-binding domain contains the ligand-dependent activation function, with distinct pharmacological targets for retinoids, involved in the treatment of various cancers and skin diseases. Due to the major challenge which cancer treatment and cure still imposes after many decades to the international scientific community, there is actually considerable interest in new ligands with increased bioactivity. We have focused on the retinoid acid receptor, which is considered an interesting target for drug design. In this work, we carried out density functional geometry optimizations, and different docking procedures. We performed screening in a large database (hundreds of thousands of molecules which we optimized at the AM1 level) yielding a set of potential bioactive ligands. A new ligand was selected and optimized at the B3LYP/6-31G* level. A flexible docking program was used to investigate the interactions between the receptor and the new ligand. The result of this work is compared with several crystallographic ligands of RAR. Our theoretically more bioactive new-ligand indicates stronger and more hydrogen bonds as well as hydrophobic interactions with the receptor. (c) 2005 Wiley Periodicals, Inc.
Resumo:
The necessity of adapting the standardized fan models to conditions of higher temperature has emerged due to the growth of concerning referring to the consequences of the gas expelling after the Mont Blanc tunnel accident in Italy and France, where even though, with 100 fans in operation, 41 people died. However, since then, the defied solutions have pointed to aerodynamic disadvantages or have seemed nonappropriate in these conditions. The objective of this work is to present an alternative to the market standard fans considering a new technology in constructing blades. This new technology introduces the use of the stainless steel AISI 409 due to its good adaptation to temperatures higher than 400°C, particularly exposed to temperatures of gas exhaust from tunnels in fire situation. Furthermore, it presents a very good resistance to corrosion and posterior welding and pressing, due to its alloyed elements. The innovation is centered in the process of a deep drawing of metallic shells and posterior welding, in order to keep the ideal aerodynamic superficies for the fan ideal performance. On the other hand, the finite element method, through the elasto-plastic software COSMOS permitted the verification of the thickness and structural stability of the blade in relation to the aerodynamic efforts established in the project. In addition, it is not advisable the fabrication of blades with variable localized thickness not even, non-uniform ones, due to the verified concentration of tensions and the difficulties observed in the forming. In this way, this study recommends the construction of blades with uniform variations of thickness. © 2007 Springer.
Resumo:
Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling is very expensive, several works attempt to handle intrusion detection with traditional clustering algorithms. In this paper, we introduce a new pattern recognition technique called Optimum-Path Forest (OPF) clustering to this task. Experiments on three public datasets have showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, since it outperformed some state-of-the-art unsupervised techniques. © 2012 IEEE.
Resumo:
Evolutionary algorithms have been widely used for Artificial Neural Networks (ANN) training, being the idea to update the neurons' weights using social dynamics of living organisms in order to decrease the classification error. In this paper, we have introduced Social-Spider Optimization to improve the training phase of ANN with Multilayer perceptrons, and we validated the proposed approach in the context of Parkinson's Disease recognition. The experimental section has been carried out against with five other well-known meta-heuristics techniques, and it has shown SSO can be a suitable approach for ANN-MLP training step.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
This paper describes a case of a rehabilitation involving Computer Aided Design/Computer Aided Manufacturing (CAD-CAM) system in implant supported and dental supported prostheses using zirconia as framework. The CAD-CAM technology has developed considerably over last few years, becoming a reality in dental practice. Among the widely used systems are the systems based on zirconia which demonstrate important physical and mechanical properties of high strength, adequate fracture toughness, biocompatibility and esthetics, and are indicated for unitary prosthetic restorations and posterior and anterior framework. All the modeling was performed by using CAD-CAM system and prostheses were cemented using resin cement best suited for each situation. The rehabilitation of the maxillary arch using zirconia framework demonstrated satisfactory esthetic and functional results after a 12-month control and revealed no biological and technical complications. This article shows the important of use technology CAD/CAM in the manufacture of dental prosthesis and implant-supported.
Resumo:
Today, many leading organizations are undertaking extensive research on a very broad range of new and evolving optical networking technologies. These efforts carry particular significance, especially in light of the “postbubble” dynamics of the optical networking market and have led to the investigation of various cost-efficient optical technologies. Today’s telecom carriers operate several independent optical domains based on diverse technologies, control solutions, standards, and protocols, making interdomain and intercarrier interworking extremely difficult. Standardized interworking across diverse multigranularity network interfaces, and interoperability across disparate vendor equipments and carrier domains are crucial to provisioning end-to-end services and achieving cost-efficient network operation. Needless to say, having an interoperable and standard control plane across multidomain optical networks can benefit carriers through the availability of a wide selection of network elements, platforms, and multiple vendor solutions resulting in faster deployment and reduced CAPEX and OPEX charges.
Resumo:
The elimination of all external incisions is an important step in reducing the invasiveness of surgical procedures. Natural Orifice Translumenal Endoscopic Surgery (NOTES) is an incision-less surgery and provides explicit benefits such as reducing patient trauma and shortening recovery time. However, technological difficulties impede the widespread utilization of the NOTES method. A novel robotic tool has been developed, which makes NOTES procedures feasible by using multiple interchangeable tool tips. The robotic tool has the capability of entering the body cavity through an orifice or a single incision using a flexible articulated positioning mechanism and once inserted is not constrained by incisions, allowing for visualization and manipulations throughout the cavity. Multiple interchangeable tool tips of the robotic device initially consist of three end effectors: a grasper, scissors, and an atraumatic Babcock clamp. The tool changer is capable of selecting and switching between the three tools depending on the surgical task using a miniature mechanism driven by micro-motors. The robotic tool is remotely controlled through a joystick and computer interface. In this thesis, the following aspects of this robotic tool will be detailed. The first-generation robot is designed as a conceptual model for implementing a novel mechanism of switching, advancing, and controlling the tool tips using two micro-motors. It is believed that this mechanism achieves a reduction in cumbersome instrument exchanges and can reduce overall procedure time and the risk of inadvertent tissue trauma during exchanges with a natural orifice approach. Also, placing actuators directly at the surgical site enables the robot to generate sufficient force to operate effectively. Mounting the multifunctional robot on the distal end of an articulating tube provides freedom from restriction on the robot kinematics and helps solve some of the difficulties otherwise faced during surgery using NOTES or related approaches. The second-generation multifunctional robot is then introduced in which the overall size is reduced and two arms provide 2 additional degrees of freedom, resulting in feasibility of insertion through the esophagus and increased dexterity. Improvements are necessary in future iterations of the multifunctional robot; however, the work presented is a proof of concept for NOTES robots capable of abdominal surgical interventions.
Resumo:
In this thesis we study three combinatorial optimization problems belonging to the classes of Network Design and Vehicle Routing problems that are strongly linked in the context of the design and management of transportation networks: the Non-Bifurcated Capacitated Network Design Problem (NBP), the Period Vehicle Routing Problem (PVRP) and the Pickup and Delivery Problem with Time Windows (PDPTW). These problems are NP-hard and contain as special cases some well known difficult problems such as the Traveling Salesman Problem and the Steiner Tree Problem. Moreover, they model the core structure of many practical problems arising in logistics and telecommunications. The NBP is the problem of designing the optimum network to satisfy a given set of traffic demands. Given a set of nodes, a set of potential links and a set of point-to-point demands called commodities, the objective is to select the links to install and dimension their capacities so that all the demands can be routed between their respective endpoints, and the sum of link fixed costs and commodity routing costs is minimized. The problem is called non- bifurcated because the solution network must allow each demand to follow a single path, i.e., the flow of each demand cannot be splitted. Although this is the case in many real applications, the NBP has received significantly less attention in the literature than other capacitated network design problems that allow bifurcation. We describe an exact algorithm for the NBP that is based on solving by an integer programming solver a formulation of the problem strengthened by simple valid inequalities and four new heuristic algorithms. One of these heuristics is an adaptive memory metaheuristic, based on partial enumeration, that could be applied to a wider class of structured combinatorial optimization problems. In the PVRP a fleet of vehicles of identical capacity must be used to service a set of customers over a planning period of several days. Each customer specifies a service frequency, a set of allowable day-combinations and a quantity of product that the customer must receive every time he is visited. For example, a customer may require to be visited twice during a 5-day period imposing that these visits take place on Monday-Thursday or Monday-Friday or Tuesday-Friday. The problem consists in simultaneously assigning a day- combination to each customer and in designing the vehicle routes for each day so that each customer is visited the required number of times, the number of routes on each day does not exceed the number of vehicles available, and the total cost of the routes over the period is minimized. We also consider a tactical variant of this problem, called Tactical Planning Vehicle Routing Problem, where customers require to be visited on a specific day of the period but a penalty cost, called service cost, can be paid to postpone the visit to a later day than that required. At our knowledge all the algorithms proposed in the literature for the PVRP are heuristics. In this thesis we present for the first time an exact algorithm for the PVRP that is based on different relaxations of a set partitioning-like formulation. The effectiveness of the proposed algorithm is tested on a set of instances from the literature and on a new set of instances. Finally, the PDPTW is to service a set of transportation requests using a fleet of identical vehicles of limited capacity located at a central depot. Each request specifies a pickup location and a delivery location and requires that a given quantity of load is transported from the pickup location to the delivery location. Moreover, each location can be visited only within an associated time window. Each vehicle can perform at most one route and the problem is to satisfy all the requests using the available vehicles so that each request is serviced by a single vehicle, the load on each vehicle does not exceed the capacity, and all locations are visited according to their time window. We formulate the PDPTW as a set partitioning-like problem with additional cuts and we propose an exact algorithm based on different relaxations of the mathematical formulation and a branch-and-cut-and-price algorithm. The new algorithm is tested on two classes of problems from the literature and compared with a recent branch-and-cut-and-price algorithm from the literature.