983 resultados para File sharing applications
Resumo:
Energy systems worldwide are complex and challenging environments. Multi-agent based simulation platforms are increasing at a high rate, as they show to be a good option to study many issues related to these systems, as well as the involved players at act in this domain. In this scope the authors research group has developed three multi-agent systems: MASCEM, which simulates the electricity markets; ALBidS that works as a decision support system for market players; and MASGriP, which simulates the internal operations of smart grids. To take better advantage of these systems, their integration is mandatory. For this reason, is proposed the development of an upper-ontology which allows an easier cooperation and adequate communication between them. Additionally, the concepts and rules defined by this ontology can be expanded and complemented by the needs of other simulation and real systems in the same areas as the mentioned systems. Each system’s particular ontology must be extended from this top-level ontology.
Resumo:
A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems.
Resumo:
Despite the abundant literature in knowledge management, few empirical studies have explored knowledge management in connection with international assignees. This phenomenon has a special relevance in the Portuguese context, since (a) there are no empirical studies concerning this issue that involves international Portuguese companies; (b) the national business reality is incipient as far as internationalisation is concerned, and; (c) the organisational and national culture presents characteristics that are distinctive from the most highly studied contexts (e.g., Asia, USA, Scandinavian countries, Spain, France, The Netherlands, Germany, England and Russia). We examine the role of expatriates in transfer and knowledge sharing within the Portuguese companies with operations abroad. We focus specifically on expatriates’ role on knowledge sharing connected to international Portuguese companies and our findings take into account organizational representatives’ and expatriates’ perspectives. Using a comparative case study approach, we examine how three main dimensions influence the role of expatriates in knowledge sharing among headquarters and their subsidiaries (types of international assignment, reasons for using expatriation and international assignment characteristics). Data were collected using semi‐structured interviews to 30 Portuguese repatriates and 14 organizational representatives from seven Portuguese companies. The findings suggest that the reasons that lead Portuguese companies to expatriating employees are connected to: (1) business expansion needs; (2) control of international operations and; (3) transfer and knowledge sharing. Our study also shows that Portuguese companies use international assignments in order to positively respond to the increasingly decaying domestic market in the economic areas in which they operate. Evidence also reveals that expatriation is seen as a strategy to fulfill main organizational objectives through their expatriates (e.g., business internationalization, improvement of the coordination and control level of the units/subsidiaries abroad, replication of aspects of the home base, development and incorporation of new organizational techniques and processes). We also conclude that Portuguese companies have developed an International Human Resources Management strategy, based on an ethnocentric approach, typically associated with companies in early stages of internationalization, i.e., the authority and decision making are centered in the home base. Expatriates have a central role in transmitting culture and technical knowledge from company’s headquarters to the company’s branches. Based on the findings, the article will discuss in detail the main theoretical and managerial implications. Suggestions for further research will also be presented.
Resumo:
Trabalho apresentado no âmbito do Doutoramento em Informática, como requisito parcial para obtenção do grau de Doutor em Informática
Resumo:
Dissertation presented to obtain the Ph.D. degree in Chemistry
Resumo:
Com o advento da invenção do modelo relacional em 1970 por E.F.Codd, a forma como a informação era gerida numa base de dados foi totalmente revolucionada. Migrou‐se de sistemas hierárquicos baseados em ficheiros para uma base de dados relacional com tabelas relações e registos que simplificou em muito a gestão da informação e levou muitas empresas a adotarem este modelo. O que E.F.Codd não previu foi o facto de que cada vez mais a informação que uma base de dados teria de armazenar fosse de proporções gigantescas, nem que as solicitações às bases de dados fossem da mesma ordem. Tudo isto veio a acontecer com a difusão da internet que veio ligar todas as pessoas de qualquer parte do mundo que tivessem um computador. Com o número de adesões à internet a crescer, o número de sites que nela eram criados também cresceu (e ainda cresce exponencialmente). Os motores de busca que antigamente indexavam alguns sites por dia, atualmente indexam uns milhões de sites por segundo e, mais recentemente as redes sociais também estão a lidar com quantidades gigantescas de informação. Tanto os motores de busca como as redes sociais chegaram à conclusão que uma base de dados relacional não chega para gerir a enorme quantidade de informação que ambos produzem e como tal, foi necessário encontrar uma solução. Essa solução é NoSQL e é o assunto que esta tese vai tratar. O presente documento visa definir e apresentar o problema que as bases de dados relacionais têm quando lidam com grandes volumes de dados, introduzir os limites do modelo relacional que só até há bem pouco tempo começaram a ser evidenciados com o surgimento de movimentos, como o BigData, com o crescente número de sites que surgem por dia e com o elevado número de utilizadores das redes sociais. Será também ilustrada a solução adotada até ao momento pelos grandes consumidores de dados de elevado volume, como o Google e o Facebook, enunciando as suas características vantagens, desvantagens e os demais conceitos ligados ao modelo NoSQL. A presente tese tenciona ainda demonstrar que o modelo NoSQL é uma realidade usada em algumas empresas e quais as principias mudanças a nível programático e as boas práticas delas resultantes que o modelo NoSQL traz. Por fim esta tese termina com a explicação de que NoSQL é uma forma de implementar a persistência de uma aplicação que se inclui no novo modelo de persistência da informação.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Resumo:
Thesis for the Master degree in Structural and Functional Biochemistry
Resumo:
Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.
Resumo:
IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN. Its Medium Access control (MAC) layer assumes that the devices adhere to the standard’s rules and timers to assure fair access and sharing of the medium. However, wireless cards driver flexibility and configurability make it possible for selfish misbehaving nodes to take advantages over the other well-behaving nodes. The existence of selfish nodes degrades the QoS for the other devices in the network and may increase their energy consumption. In this paper we propose a green solution for selfish misbehavior detection in IEEE 802.11-based wireless networks. The proposed scheme works in two phases: Global phase which detects whether the network contains selfish nodes or not, and Local phase which identifies which node or nodes within the network are selfish. Usually, the network must be frequently examined for selfish nodes during its operation since any node may act selfishly. Our solution is green in the sense that it saves the network resources as it avoids wasting the nodes energy by examining all the individual nodes of being selfish when it is not necessary. The proposed detection algorithm is evaluated using extensive OPNET simulations. The results show that the Global network metric clearly indicates the existence of a selfish node while the Local nodes metric successfully identified the selfish node(s). We also provide mathematical analysis for the selfish misbehaving and derived formulas for the successful channel access probability.
Resumo:
Ecological Water Quality - Water Treatment and Reuse
Resumo:
A gold screen printed electrode (Au-SPE) was modified by merging Molecular Imprinting and Self-Assembly Monolayer techniques for fast screening cardiac biomarkers in point-of-care (POC). For this purpose, Myoglobin (Myo) was selected as target analyte and its plastic antibody imprinted over a glutaraldehyde (Glu)/cysteamine (Cys) layer on the gold-surface. The imprinting effect was produced by growing a reticulated polymer of acrylamide (AAM) and N,N′-methylenebisacrylamide (NNMBA) around the Myo template, covalently attached to the biosensing surface. Electrochemical impedance spectroscopy (EIS) and cyclic voltammetry (CV) studies were carried out in all chemical modification steps to confirm the surface changes in the Au-SPE. The analytical features of the resulting biosensor were studied by different electrochemical techniques, including EIS, square wave voltammetry (SWV) and potentiometry. The limits of detection ranged from 0.13 to 8 μg/mL. Only potentiometry assays showed limits of detection including the cut-off Myo levels. Quantitative information was also produced for Myo concentrations ≥0.2 μg/mL. The linear response of the biosensing device showed an anionic slope of ~70 mV per decade molar concentration up to 0.3 μg/mL. The interference of coexisting species was tested and good selectivity was observed. The biosensor was successfully applied to biological fluids.
Resumo:
Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática
Resumo:
Euromicro Conference on Digital System Design (DSD 2015), Funchal, Portugal.