887 resultados para Swift iOS Iphone SDK Marketcloud Api
Resumo:
A comprehensive forensic investigation of sensitive ecosystems in the Everglades Area is presented. Assessing the background levels of contamination in these ecosystems represents a vital resource to build up forensic evidence required to enforce future environmental crimes within the studied areas. This investigation presents the development and validation of a fractionation and isolation method for two families of herbicides commonly applied in the vicinity of the study area, including phenoxy acids like 2,4-D, MCPA, and silvex; as well as the most common triazine-based herbicides like atrazine, prometyne, simazine and related metabolites like DIA and DEA. Accelerated solvent extraction (ASE) and solid phase extraction (SPE) were used to isolate the analytes from abiotic matrices containing large amounts of organic material. Atmospheric-pressure ionization (API) with electrospray ionization in negative mode (ESP-), and Chemical Ionization in the positive mode (APCI+) were used to perform the characterization of the herbicides of interest.
Resumo:
Sono dette “challenged networks” quelle reti in cui lunghi ritardi, frequenti partizionamenti e interruzioni, elevati tassi di errore e di perdita non consentono l’impiego dei classici protocolli di comunicazione di Internet, in particolare il TCP/IP. Il Delay-/Disruption-Tolerant Networking (DTN) è una soluzione per il trasferimento di dati attraverso queste reti. L’architettura DTN prevede l’introduzione, sopra il livello di trasporto, del cosiddetto “bundle layer”, che si occupa di veicolare messaggi, o bundle, secondo l’approccio store-and-forward: ogni nodo DTN conserva persistentemente un bundle finché non si presenta l’opportunità di inoltrarlo al nodo successivo verso la destinazione. Il protocollo impiegato nel bundle layer è il Bundle Protocol, le cui principali implementazioni sono tre: DTN2, l’implementazione di riferimento; ION, sviluppata da NASA-JPL e più orientata alle comunicazioni spaziali; IBR-DTN, rivolta soprattutto a dispositivi embedded. Ciascuna di esse offre API che consentono la scrittura di applicazioni in grado di inviare e ricevere bundle. DTNperf è uno strumento progettato per la valutazione delle prestazioni in ambito DTN. La più recente iterazione, DTNperf_3, è compatibile sia con DTN2 che con ION nella stessa versione del programma, grazie all’introduzione di un “Abstraction Layer” che fornisce un’unica interfaccia per l’interazione con le diverse implementazioni del Bundle Protocol e che solo internamente si occupa di invocare le API specifiche dell’implementazione attiva. Obiettivo della tesi è estendere l’Abstraction Layer affinché supporti anche IBR-DTN, cosicché DTNperf_3 possa essere impiegato indifferentemente su DTN2, ION e IBR DTN. Il lavoro sarà ripartito su tre fasi: nella prima esploreremo IBR DTN e le sue API; nella seconda procederemo all’effettiva estensione dell’Abstraction Layer; nella terza verificheremo il funzionamento di DTNperf a seguito delle modifiche, sia in ambiente esclusivamente IBR-DTN, sia ibrido.
Resumo:
Hoy en día vivimos en una sociedad en la que las tecnologías son accesibles para gran parte de la población y las cuales tienen como finalidad, entre otras cosas, facilitar la vida de las personas en la medida de lo posible. Este proyecto busca hacer uso de esas tecnologías para facilitar la accesibilidad a textos para cualquiera que pueda tener dificultades con ellos, en mayor o menor medida. La finalidad de nuestro proyecto no es crear la aplicación para el uso directo de las personas sino desarrollar los servicios, y el acceso a los mismos, que faciliten la implementación de estas aplicaciones. Aún así en este proyecto se crea una aplicación de ejemplo para Android, en la cual se hace uso de los servicios como muestra de un posible uso de los mismos. Para facilitar el acceso a estos servicios y la comprensión de los mismos, en este proyecto se crea también una API web en la cual quedan todos ellos explicados, como acceder a ellos, su descripción, ejemplos de llamadas y de resultados de las llamadas, en definitiva, todo lo que pueda ayudar a un desarrollador interesado en ellos a utilizarlos sin mayor problema. Las aplicaciones posibles de estos servicios son de lo mas extensas. Así, por ejemplo, en un dispositivo móvil, si un usuario está leyendo un libro y no entiende una palabra o le resulta bastante complicada, tan solo tendría que sacar el móvil, introducir la palabra en una aplicación que llamara a uno de nuestros servicios y obtener el resultado requerido de esa palabra, de forma rápida y cómoda. El proyecto queda dividido en tres partes: el desarrollo de los servicios de accesibilidad, la web de la API explicando cada uno de estos servicios y una aplicación Android de ejemplo de utilización.
Resumo:
Aims. Long gamma-ray bursts (LGRBs) are associated with the deaths of massive stars and might therefore be a potentially powerful tool for tracing cosmic star formation. However, especially at low redshifts (z< 1.5) LGRBs seem to prefer particular types of environment. Our aim is to study the host galaxies of a complete sample of bright LGRBs to investigate the effect of the environment on GRB formation. Methods. We studied host galaxy spectra of the Swift/BAT6 complete sample of 14 z< 1 bright LGRBs. We used the detected nebular emission lines to measure the dust extinction, star formation rate (SFR), and nebular metallicity (Z) of the hosts and supplemented the data set with previously measured stellar masses M_*. The distributions of the obtained properties and their interrelations (e.g. mass-metallicity and SFR-M_* relations) are compared to samples of field star-forming galaxies. Results. We find that LGRB hosts at z< 1 have on average lower SFRs than if they were direct star formation tracers. By directly comparing metallicity distributions of LGRB hosts and star-forming galaxies, we find a good match between the two populations up to 12 +log (O/H)~8.4−8.5, after which the paucity of metal-rich LGRB hosts becomes apparent. The LGRB host galaxies of our complete sample are consistent with the mass-metallicity relation at similar mean redshift and stellar masses. The cutoff against high metallicities (and high masses) can explain the low SFR values of LGRB hosts. We find a hint of an increased incidence of starburst galaxies in the Swift/BAT6 z< 1 sample with respect to that of a field star-forming population. Given that the SFRs are low on average, the latter is ascribed to low stellar masses. Nevertheless, the limits on the completeness and metallicity availability of current surveys, coupled with the limited number of LGRB host galaxies, prevents us from investigating more quantitatively whether the starburst incidence is such as expected after taking into account the high-metallicity aversion of LGRB host galaxies.
Resumo:
Magnetism and magnetic materials have been playing a lead role in the day to day life of human beings. The human kind owes its gratitude to the ‘lodestone’ meaning ‘leading stone’ which lead to the discovery of nations and the onset of modern civilizations. If it was William Gilbert, who first stated that ‘earth was a giant magnet’, then it was the turn of Faraday who correlated electricity and magnetism. Magnetic materials find innumerable applications in the form of inductors, read and write heads, motors, storage devices, magnetic resonance imaging and fusion reactors. Now the industry of magnetic materials has almost surpassed the semiconductor industry and this speaks volumes about its importance. Extensive research is being carried out by scientists and engineers to remove obsolescence and invent new devices. Though magnetism can be categorized based on the response of an applied magnetic field in to diamagnetic, paramagnetic, ferromagnetic, ferrimagnetic and antiferromagnetic; it is ferrimagnetic, ferromagnetic and antiferromagnetic materials which have potential applications. The present thesis focusses on these materials, their composite structures and different ways and means to modify their properties for useful applications. In the past, metals like Fe, Ni and Co were sought after for various applications though iron was in the forefront because of its cost effectiveness and abundance. Later, alloys based on Fe and Ni were increasingly employed. They were used in magnetic heads and in inductors. Ferrites entered the arena and subsequently most of the newer applications were based on ferrites, a ferrimagnetic material, whose composition can be tuned to tailor the magnetic properties. In the late 1950s a new class of magnetic material emerged on the magnetic horizon and they were fondly known as metallic glasses. They are well known for their soft magnetic properties. They were synthesized in the form of melt spun ribbons and are amorphous in nature and they are projected to replace the crystalline counterparts.
Resumo:
Magnetism and magnetic materials have been playing a lead role in the day to day life of human beings. The human kind owes its gratitude to the ‘lodestone’ meaning ‘leading stone’ which lead to the discovery of nations and the onset of modern civilizations. If it was William Gilbert, who first stated that ‘earth was a giant magnet’, then it was the turn of Faraday who correlated electricity and magnetism. Magnetic materials find innumerable applications in the form of inductors, read and write heads, motors, storage devices, magnetic resonance imaging and fusion reactors. Now the industry of magnetic materials has almost surpassed the semiconductor industry and this speaks volumes about its importance. Extensive research is being carried out by scientists and engineers to remove obsolescence and invent new devices. Though magnetism can be categorized based on the response of an applied magnetic field in to diamagnetic, paramagnetic, ferromagnetic, ferrimagnetic and antiferromagnetic; it is ferrimagnetic, ferromagnetic and antiferromagnetic materials which have potential applications. The present thesis focusses on these materials, their composite structures and different ways and means to modify their properties for useful applications.
Resumo:
Los maestros deben fortalecer desde el currículo ambientes adecuados para que los estudiantes se apropien del manejo de las TIC (Tecnologías de la Información y Comunicación) y las involucren en el proceso de enseñanza - aprendizaje; favoreciendo con esto el desarrollo de los contenidos en todas las áreas -- Cuando se pretende hacer uso de las TIC para mejorar el aprendizaje significativo de los estudiantes, se evidencia la debilidad que tiene el maestro para realizar un seguimiento a las actividades informales que realiza el estudiante para comprender un tema o adquirir una competencia -- El primer acercamiento para mejorar esta problemática, es realizar una integración de un estándar educativo para llevar un control y registrar las actividades informales que el estudiante realice a través de Internet, empleando un sinnúmero de aplicaciones que la web ofrece -- Para el mejoramiento del proceso evaluativo de los estudiantes de la Institución Educativa San José, se implementará la integración del estándar Tin Can Api dentro de un prototipo para realizar seguimiento a las actividades informales que realicen los estudiantes con el fin de llevar un registro de experiencias de aprendizaje -- Teniendo en cuenta lo anterior el maestro debe estar preparado para utilizar metodologías apoyadas en las herramientas tecnológicas, así el aprendizaje se logra con mayor disfrute y calidad
Resumo:
Este artículo presenta el proceso de implementación de una API (Application Programming Interface) que permite la interacción del guante P5 de Essential Reality1 con un entorno virtual desarrollado en el lenguaje de programación Java y su librería Java 3D.2 Por otra parte, se describe un ejemplo implementado, haciendo uso de la API en cuestión. Con base en este ejemplo se presentan los resultados de la ejecución de pruebas de requerimientos de recursos físicos como la CPU y memoria física. Finalmente, se especifican las conclusiones y resultados obtenidos.
Resumo:
First published in 1897.
Resumo:
Nowadays there is almost no crime committed without a trace of digital evidence, and since the advanced functionality of mobile devices today can be exploited to assist in crime, the need for mobile forensics is imperative. Many of the mobile applications available today, including internet browsers, will request the user’s permission to access their current location when in use. This geolocation data is subsequently stored and managed by that application's underlying database files. If recovered from a device during a forensic investigation, such GPS evidence and track points could hold major evidentiary value for a case. The aim of this paper is to examine and compare to what extent geolocation data is available from the iOS and Android operating systems. We focus particularly on geolocation data recovered from internet browsing applications, comparing the native Safari and Browser apps with Google Chrome, downloaded on to both platforms. All browsers were used over a period of several days at various locations to generate comparable test data for analysis. Results show considerable differences not only in the storage locations and formats, but also in the amount of geolocation data stored by different browsers and on different operating systems.
Resumo:
This document presents GEmSysC, an unified cryptographic API for embedded systems. Software layers implementing this API can be built over existing libraries, allowing embedded software to access cryptographic functions in a consistent way that does not depend on the underlying library. The API complies to good practices for API design and good practices for embedded software development and took its inspiration from other cryptographic libraries and standards. The main inspiration for creating GEmSysC was the CMSIS-RTOS standard, which defines an unified API for embedded software in an implementation-independent way, but targets operating systems instead of cryptographic functions. GEmSysC is made of a generic core and attachable modules, one for each cryptographic algorithm. This document contains the specification of the core of GEmSysC and three of its modules: AES, RSA and SHA-256. GEmSysC was built targeting embedded systems, but this does not restrict its use only in such systems – after all, embedded systems are just very limited computing devices. As a proof of concept, two implementations of GEmSysC were made. One of them was built over wolfSSL, which is an open source library for embedded systems. The other was built over OpenSSL, which is open source and a de facto standard. Unlike wolfSSL, OpenSSL does not specifically target embedded systems. The implementation built over wolfSSL was evaluated in a Cortex- M3 processor with no operating system while the implementation built over OpenSSL was evaluated on a personal computer with Windows 10 operating system. This document displays test results showing GEmSysC to be simpler than other libraries in some aspects. These results have shown that both implementations incur in little overhead in computation time compared to the cryptographic libraries themselves. The overhead of the implementation has been measured for each cryptographic algorithm and is between around 0% and 0.17% for the implementation over wolfSSL and between 0.03% and 1.40% for the one over OpenSSL. This document also presents the memory costs for each implementation.
Resumo:
Se ha diseñado una aplicación móvil que permite examinar el riesgo de melanoma mediante el análisis de una foto. La memoria documenta la realización de una aplicación de servidor que forma parte de una solución de eHealth con un cliente ya desarrollado por un proyecto previo de fin de carrera en forma de una aplicación Android. La aplicación de servidor desarrollada expone una API de servicios web REST y presenta una arquitectura extensible dinámicamente mediante la implementación de un patrón plug-in.