930 resultados para High-speed video
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
Use of ICN’s Internet and data services have continued to increase exponentially, which reflects the capacity needed for greater access to high-speed Internet (Broadband). Users are incorporating more web-based applications, which uses larger amounts of bandwidth; such as transmitting hospital MRIs, video streaming, and web-based systems.
Resumo:
The Iowa Communications Network (ICN) is the country’s premier distance learning and state government Network, committed to providing Iowans with convenient, equal access to education, government and healthcare. The Network makes it possible for Iowans, physically separated by location, to interact in an efficient, creative, and cost-effective manner. ICN provides high-speed Internet, data, video conferencing, and voice (phone) services to authorized users, under Code of Iowa, which includes: K-12 schools, higher education, hospitals, state and federal government, National Guard armories, and libraries.
Resumo:
The highway system in the State of Iowa includes many grade separation structures constructed to provide maximum safety and mobility to road users on intersecting roadways. However, these structures can present possible safety concerns for traffic passing underneath due to close proximity of piers and abutments. Shielding of these potential hazards has been a design consideration for many years. This study examines historical crash experience in the State of Iowa to address the advisability of shielding bridge piers and abutments as well as other structure support elements considering the offset from the traveled way. A survey of nine Midwestern states showed that six states had bridge pier shielding practices consistent with those in Iowa. Data used for the analyses include crash data (2001 to 2007) from the Iowa Department of Transportation (Iowa DOT), the Iowa DOT’s Geographic Information Management System (GIMS) structure and roadway data (2006) obtained from the Office of Transportation Data, and shielding and offset data for the bridges of interest. Additionally, original crash reports and the Iowa DOT video log were also utilized as needed. Grade-separated structures over high-speed, multilane divided Interstate and primary highways were selected for analysis, including 566 bridges over roadways with a speed limit of at least 45 mph. Bridges that met the criteria for inclusion in the study were identified for further analysis using crash data. The study also included economic analysis for possible shielding improvement.
Resumo:
Network neutrality is a growing policy controversy. Traffic management techniques affect not only high-speed, high-money content, but by extension all other content too. Internet regulators and users may tolerate much more discrimination in the interests of innovation. For instance, in the absence of regulatory oversight, ISPs could use Deep Packet Inspection (DPI) to block some content altogether, if they decide it is not to the benefit of ISPs, copyright holders, parents or the government. ISP blocking is currently widespread in controlling spam email, and in some countries in blocking sexually graphic illegal images. In 1999 this led to scrutiny of foreclosure of Instant Messaging and video and cable-telephony horizontal merger. Fourteen years later, there were in 2013 net neutrality laws implemented in Slovenia, the Netherlands, Chile and Finland, regulation in the United States and Canada , co-regulation in Norway, and self-regulation in Japan, the United Kingdom and many other European countries . Both Germany and France in mid-2013 debated new net neutrality legislation, and the European Commission announced on 11 September 2013 that it would aim to introduce legislation in early 2014. This paper analyses these legal developments, and in particular the difficulty in assessing reasonable traffic management and ‘specialized’ (i.e. unregulated) faster services in both EU and US law. It also assesses net neutrality law against the international legal norms for user privacy and freedom of expression
Resumo:
The regulation of speed limits in the US had been centralized at the federal level since 1974, until decisions were devolved to the states in 1995. However, the centralization debate has reemerged in recent years. Here, we conduct the first econometric analysis of the determinants of speed limit laws. By using economic, geographic and political variables, our results suggest that geography -which affects private mobility needs and preferences- is the main factor influencing speed limit laws. We also highlight the role played by political ideology, with Republican constituencies being associated with higher speed limits. Furthermore, we identify the presence of regional and time dependence effects. By contrast, poor road safety outcomes do not impede the enactment of high speed limits. Overall, we present the first evidence of the role played by geographical, ideological and regional characteristics, which provide us with a better understanding of the formulation of speed limit policies.
Resumo:
Cutting of thick section stainless steel and mild steel, and medium section aluminium using the high power ytterbium fibre laser has been experimentally investigated in this study. Theoretical models of the laser power requirement for cutting of a metal workpiece and the melt removal rate were also developed. The calculated laser power requirement was correlated to the laser power used for the cutting of 10 mm stainless steel workpiece and 15 mm mild steel workpiece using the ytterbium fibre laser and the CO2 laser. Nitrogen assist gas was used for cutting of stainless steel and oxygen was used for mild steel cutting. It was found that the incident laser power required for cutting at a given cutting speed was lower for fibre laser cutting than for CO2 laser cutting indicating a higher absorptivity of the fibre laser beam by the workpiece and higher melting efficiency for the fibre laser beam than for the CO2 laser beam. The difficulty in achieving an efficient melt removal during high speed cutting of the 15 mmmild steel workpiece with oxygen assist gas using the ytterbium fibre laser can be attributed to the high melting efficiency of the ytterbium fibre laser. The calculated melt flow velocity and melt film thickness correlated well with the location of the boundary layer separation point on the 10 mm stainless steel cut edges. An increase in the melt film thickness caused by deceleration of the melt particles in the boundary layer by the viscous shear forces results in the flow separation. The melt flow velocity increases with an increase in assist gas pressure and cut kerf width resulting in a reduction in the melt film thickness and the boundary layer separation point moves closer to the bottom cut edge. The cut edge quality was examined by visual inspection of the cut samples and measurement of the cut kerf width, boundary layer separation point, cut edge squareness (perpendicularity) deviation, and cut edge surface roughness as output quality factors. Different regions of cut edge quality in 10 mm stainless steel and 4 mm aluminium workpieces were defined for different combinations of cutting speed and laserpower.Optimization of processing parameters for a high cut edge quality in 10 mmstainless steel was demonstrated
Resumo:
The thesis focuses on efficient design methods and reconfiguration architectures suitable for higher performance wireless communication .The work presented in this thesis describes the development of compact,inexpensive and low power communication devices that are robust,testable and capable of handling multiple communication standards.A new multistandard Decimation Filter Design Toolbox is developed in MATLAB GUIDE environment.RNS based dual-mode decimation filters reconfigurable for WCDMA/WiMAX and WCDMA/WLANa standards are designed and implemented.It offers high speed operation with lesser area requirement and lower dynamic power dissipation.A novel sigma-delta based direct analog-to-residue converter that reduces the complexity of RNS conversion circuitry is presented.The performance of an OFDM communication system with a new RRNS-convolutional concatenated coding is analysed and improved BER performance is obtained under different channel conditions. Easily testable MAC units for filters are presented using Reed-Muller logic for realization.
Resumo:
n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.
Resumo:
We present a first overview of flows in the high latitude ionosphere observed at 15 s resolution using the U.K.-Polar EISCAT experiment. Data are described from experiments conducted on two days, 27 October 1984 and 29 August 1985, which together span the local times between about 0200 and 2130MLT and cover five different regions of ionospheric flow. With increasing local time, these are: the dawn auroral zone flow cell, the dayside region of low background flows equatorward of the flow cells, the dusk auroral zone flow cell, the boundary region between the dusk auroral zone and the polar cap, and the evening polar cap. Flows in both the equatorward and poleward portions of the auroral zone cells appear to be relatively smooth, while in the central region of high speed flow considerable variations are generally present. These have the form of irregular fluctuations on a wide range of time scales in the early morning dawn cell, and impulsive wave-like variations with periods of a few minutes in the afternoon dusk cell. In the dayside region between the flow cells, the ionosphere is often essentially stagnant for long intervals, but low amplitude ULF waves with a period of about 5 min can also occur and persist for many cycles. These conditions are punctuated at one to two hour intervals by sudden ‘flow burst’ events with impulsively generated damped wave trains. Initial burst flows are generally directed poleward and can peak at line-of-sight speeds in excess of 1 km s^{−1} after perhaps 45 s. Flows in the polar cap are reasonably smooth on time scales of a few minutes and show no evidence for the presence of ULF waves. Under most, but not all, of the above conditions, the beam-swinging algorithm used to determine background vector flows should produce meaningful results. Comparison of these flow data with simultaneous plasma and magnetic field measurements in the solar wind, made by the AMPTE IRM and UKS spacecraft, emphasizes the strong control exerted on high latitude flows by the north-south component of the IMF.
Resumo:
The aim of this thesis project is to develop the Traffic Sign Recognition algorithm for real time. Inreal time environment, vehicles move at high speed on roads. For the vehicle intelligent system itbecomes essential to detect, process and recognize the traffic sign which is coming in front ofvehicle with high relative velocity, at the right time, so that the driver would be able to pro-actsimultaneously on instructions given in the Traffic Sign. The system assists drivers about trafficsigns they did not recognize before passing them. With the Traffic Sign Recognition system, thevehicle becomes aware of the traffic environment and reacts according to the situation.The objective of the project is to develop a system which can recognize the traffic signs in real time.The three target parameters are the system’s response time in real-time video streaming, the trafficsign recognition speed in still images and the recognition accuracy. The system consists of threeprocesses; the traffic sign detection, the traffic sign recognition and the traffic sign tracking. Thedetection process uses physical properties of traffic signs based on a priori knowledge to detect roadsigns. It generates the road sign image as the input to the recognition process. The recognitionprocess is implemented using the Pattern Matching algorithm. The system was first tested onstationary images where it showed on average 97% accuracy with the average processing time of0.15 seconds for traffic sign recognition. This procedure was then applied to the real time videostreaming. Finally the tracking of traffic signs was developed using Blob tracking which showed theaverage recognition accuracy to 95% in real time and improved the system’s average response timeto 0.04 seconds. This project has been implemented in C-language using the Open Computer VisionLibrary.
Resumo:
O Mercado Acionário Americano evoluiu rapidamente na última década. Este tornou-se uma arquitetura aberta em que participantes com tecnologia inovadora podem competir de forma eficaz. Várias mudanças regulatórias e inovações tecnológicas permitiram mudanças profundas na estrutura do mercado. Essas mudanças, junto com o desenvolvimento tecnológico de redes de alta velocidade, agiu como um catalisador, dando origem a uma nova forma de negociação, denominada Negociação em Alta Frequência (HFT). As empresas de HFT surgiram e se apropriaram em larga escala do negócio de formação de mercado, no fornecimento de liquidez. Embora HFT tem crescido massivamente, ao longo dos últimos quatro anos, HFT perdeu rentabilidade significativamente, uma vez que mais empresas aderiram ao setor reduzindo as margens. Portanto, diante deste contexto, esta tese buscou apresentar uma breve revisão sobre a atividade de HFT, seguida de uma análise dos limites deste setor, bem como, das características do macroambiente do HFT. Para tanto, a tese realizou uma extensa revisão do histórico literário, documentos públicos qualitativos, tais como, jornais, atas de reunião e relatórios oficiais. A tese empregou um ferramental de análise, Barreiras de Entrada e Mobilidade (Porter, 1980); Modelos de Evolução Setorial (McGahan, 2004); Estrutura do Setor de Informação Intensiva (Sampler, 1998), para analisar os limites do setor de HFT. Adicionalmente, empregou as ferramentas de análise, Modelos de Evolução Setorial (McGahan, 2004) e PESTEL (JOHNSON, SCHOLES, and WHITTINGTON, 2011), para analisar o setor e o contexto que envolve o negócio de HFT. A análise concluiu que as empresas que empregam HFT para atuar e competir no mercado acionário, compoem um setor independente.
Resumo:
Nowadays, networks must support applications such as: distance learning, electronic commerce, access to Internet, Intranets and Extranets, voice over IP (Internet Protocol) and many others. These new applications, employing data, voice, and video traffic, require high bandwidth and Quality of Service (QoS). The ATM (Asynchronous Transfer Mode) technology, together with dynamic resource allocation methods, offers network connections that guarantee QoS parameters, such as minimum losses and delays. This paper presents a system that uses Network Management Functions together with dynamic resource allocation for provision of the end-to-end QoS parameters for rt-VBR connections.
Resumo:
Objective The aim of this study was to compare intrapulpal temperature increases produced by a high-speed high-torque (speed-increasing) handpiece, a high-speed low-torque handpiece (air-turbine) and an Er: YAG (Erbium: Yttrium-Aluminum-Garnet) laser. Subject and methods Thirty bovine incisors were reduced to a dentine thickness of 2.0 mm. Class V preparations were prepared to a depth of 1.5 mm, measured with a caliper or by a mark on the burs. A thermocouple was placed inside the pulp chamber to determine temperature increases (C). Analysis was performed on the following groups (n = 10) treated with: G1, low-torque handpiece; G2, high-torque handpiece; and G3, Er: YAG laser (2.94 mu m at 250 mJ/4 Hz), all with water cooling. The temperature increases were recorded with a computer linked to the thermocouples. Results The data were submitted to ANOVA and Tukey statistical test. The average temperature rises were: 1.92 +/- 0.80 degrees C for G1, 1.34 +/- 0.86 degrees C for G2, and 0.75 +/- 0.39 degrees C for G3. There were significant statistical differences among the groups (p = 0.095). All the groups tested did not have a change of temperature that exceeds the threshold of 5.5 degrees C. Conclusion Temperature response to the low and high torque handpieces seemed to be similar, however the Er: YAG laser generated a lower temperature rise.
Resumo:
An accurate estimate of machining time is very important for predicting delivery time, manufacturing costs, and also to help production process planning. Most commercial CAM software systems estimate the machining time in milling operations simply by dividing the entire tool path length by the programmed feed rate. This time estimate differs drastically from the real process time because the feed rate is not always constant due to machine and computer numerical controlled (CNC) limitations. This study presents a practical mechanistic method for milling time estimation when machining free-form geometries. The method considers a variable called machine response time (MRT) which characterizes the real CNC machine's capacity to move in high feed rates in free-form geometries. MRT is a global performance feature which can be obtained for any type of CNC machine configuration by carrying out a simple test. For validating the methodology, a workpiece was used to generate NC programs for five different types of CNC machines. A practical industrial case study was also carried out to validate the method. The results indicated that MRT, and consequently, the real machining time, depends on the CNC machine's potential: furthermore, the greater MRT, the larger the difference between predicted milling time and real milling time. The proposed method achieved an error range from 0.3% to 12% of the real machining time, whereas the CAM estimation achieved from 211% to 1244% error. The MRT-based process is also suggested as an instrument for helping in machine tool benchmarking.