946 resultados para co-operative advantage
Resumo:
Waste management is becoming, year after year, always more important both for the costs associated with it and for the ever increasing volumes of waste generated. The discussion on the fate of organic fraction of municipal solid waste (OFMSW) leads everyday to new solutions. Many alternatives are proposed, ranging from incineration to composting passing through anaerobic digestion. “For Biogas” is a collaborative effort, between C.I.R.S.A. and R.E.S. cooperative, whose main goal is to generate “green” energy from both biowaste and sludge anaerobic co-digestion. Specifically, the project include a pilot plant receiving dewatered sludge from both urban and agro-industrial sewage (DS) and the organic fraction of MSW (in 2/1 ratio) which is digested in absence of oxygen to produce biogas and digestate. Biogas is piped to a co-generation system producing power and heat reused in the digestion process itself, making it independent from the national grid. Digestate undergoes a process of mechanical separation giving a liquid fraction, introduced in the treatment plant, and a solid fraction disposed in landfill (in future it will be further processed to obtain compost). This work analyzed and estimated the impacts generated by the pilot plant in its operative phase. Once the model was been characterized, on the basis of the CML2001 methodology, a comparison is made with the present scenario assumed for OFMSW and DS. Actual scenario treats separately the two fractions: the organic one is sent to a composting plant, while sludge is sent to landfill. Results show that the most significant difference between the two scenarios is in the GWP category as the project "For Biogas" is able to generate “zero emission” power and heat. It also generates a smaller volume of waste for disposal. In conclusion, the analysis evaluated the performance of two alternative methods of management of OFMSW and DS, highlighting that "For Biogas" project is to be preferred to the actual scenario.
Resumo:
Das operative Torbelegungsproblem (TBP) z. B. an einem Distributions- oder Cross-dockingzentrum ist ein logistisches Problem, bei dem es gilt, an- und abfahrende Fahrzeuge zeitlich und räumlich so auf die Warenein- und -ausgangstore zu verteilen, dass eine mög-lichst kostengünstige Abfertigung ermöglicht wird. Bisherige Arbeiten, die sich mit dem TBP beschäftigen, lassen Aspekte der Kooperation außer Acht. Dieser Beitrag stellt ein Verfahren vor, durch das der Nachteil einseitig optimaler Torbelegungen überwunden werden kann. Dabei wird auf das Mittel der kombinatorischen Auktionen zurückgegriffen und das TBP als Allokationsproblem modelliert, bei dem Frachtführer um Bündel konsekutiver Einheitszeit-intervalle an den Toren konkurrieren. Mittels eines Vickrey-Clarke-Groves-Mechanismus wird einerseits die Anreizkompatibilität, andererseits die individuelle Rationalität des Auk-tionsverfahrens sichergestellt. Das Verfahren wurde in ILOG OPL Studio 3.6.1 implemen-tiert und die durch Testdaten gewonnenen Ergebnisse zeigen, dass die Laufzeiten gering genug sind, um das Verfahren für die operative (kurzfristige) Planung einzusetzen und so transportlogistische Prozesse für alle Beteiligten wirtschaftlicher zu gestalten.
Resumo:
One common assumption in interpreting ice-core CO(2) records is that diffusion in the ice does not affect the concentration profile. However, this assumption remains untested because the extremely small CO(2) diffusion coefficient in ice has not been accurately determined in the laboratory. In this study we take advantage of high levels of CO(2) associated with refrozen layers in an ice core from Siple Dome, Antarctica, to study CO(2) diffusion rates. We use noble gases (Xe/Ar and Kr/Ar), electrical conductivity and Ca(2+) ion concentrations to show that substantial CO(2) diffusion may occur in ice on timescales of thousands of years. We estimate the permeation coefficient for CO(2) in ice is similar to 4 x 10(-21) mol m(-1) s(-1) Pa(-1) at -23 degrees C in the top 287 m (corresponding to 2.74 kyr). Smoothing of the CO(2) record by diffusion at this depth/age is one or two orders of magnitude smaller than the smoothing in the firn. However, simulations for depths of similar to 930-950m (similar to 60-70 kyr) indicate that smoothing of the CO(2) record by diffusion in deep ice is comparable to smoothing in the firn. Other types of diffusion (e.g. via liquid in ice grain boundaries or veins) may also be important but their influence has not been quantified.
Resumo:
Embedded systems are commonly designed by specifying and developing hardware and software systems separately. On the contrary, the hardware/software (HW/SW) co-development exploits the trade-offs between hardware and software in a system through their concurrent design. HW/SW Codevelopment techniques take advantage of the flexibility of system design to create architectures that can meet stringent performance requirements with a shorter design cycle. This paper presents the work done within the scope of ESA HWSWCO (Hardware-Software Co-design) study. The main objective of this study has been to address the HW/SW co-design phase to integrate this engineering task as part of the ASSERT process (refer to [1]) and compatible with the existing ASSERT approach, process and tool, Advances in the automation of the design of HW and SW and the adoption of the Model Driven Architecture (MDA) [9] paradigm make possible the definition of a proper integration substrate and enables the continuous interaction of the HW and SW design paths.
Resumo:
Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.
Resumo:
In the last decades accumulated clinical evidence has proven that intra-operative radiation therapy (IORT) is a very valuable technique. In spite of that, planning technology has not evolved since its conception, being outdated in comparison to current state of the art in other radiotherapy techniques and therefore slowing down the adoption of IORT. RADIANCE is an IORT planning system, CE and FDA certified, developed by a consortium of companies, hospitals and universities to overcome such technological backwardness. RADIANCE provides all basic radiotherapy planning tools which are specifically adapted to IORT. These include, but are not limited to image visualization, contouring, dose calculation algorithms-Pencil Beam (PB) and Monte Carlo (MC), DVH calculation and reporting. Other new tools, such as surgical simulation tools have been developed to deal with specific conditions of the technique. Planning with preoperative images (preplanning) has been evaluated and the validity of the system being proven in terms of documentation, treatment preparation, learning as well as improvement of surgeons/radiation oncologists (ROs) communication process. Preliminary studies on Navigation systems envisage benefits on how the specialist to accurately/safely apply the pre-plan into the treatment, updating the plan as needed. Improvements on the usability of this kind of systems and workflow are needed to make them more practical. Preliminary studies on Intraoperative imaging could provide an improved anatomy for the dose computation, comparing it with the previous pre-plan, although not all devices in the market provide good characteristics to do so. DICOM.RT standard, for radiotherapy information exchange, has been updated to cover IORT particularities and enabling the possibility of dose summation with external radiotherapy. The effect of this planning technology on the global risk of the IORT technique has been assessed and documented as part of a failure mode and effect analysis (FMEA). Having these technological innovations and their clinical evaluation (including risk analysis) we consider that RADIANCE is a very valuable tool to the specialist covering the demands from professional societies (AAPM, ICRU, EURATOM) for current radiotherapy procedures.
Resumo:
The diffraction pattern of Fe3O4 (not shown) confirmed the presence of only one phase, corresponding to magnetite with a lattice parameter a = 8.357 Å and a crystallite size of 16.6 ± 0.2 nm. The diffraction pattern of MGNC (not shown) confirmed the presence of a graphitic phase, in addition to the metal phase, suggesting that Fe3O4 nanoparticles were successfully encapsulated within a graphitic structure during the synthesis of MGNC. The core-shell structure of MGNC is unequivocally demonstrated in the TEM micrograph shown in Fig. 1b. Characterization of the MGNC textural and surface chemical properties revealed: (i) stability up to 400 oC under oxidizing atmosphere; (ii) 27.3 wt.% of ashes (corresponding to the mass fraction of Fe3O4); (iii) a micro-mesoporous structure with a fairly well developed specific surface area (SBET = 330 m2 g-1); and (iv) neutral character (pHPZC = 7.1). In addition, the magnetic nature of MGNC (Fig. 2) is an additional advantage for possible implementation of in situ magnetic separation systems for catalyst recovery.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Mode of access: Internet.
Resumo:
Objective: To introduce a new technique for co-registration of Magnetoencephalography (MEG) with magnetic resonance imaging (MRI). We compare the accuracy of a new bite-bar with fixed fiducials to a previous technique whereby fiducial coils were attached proximal to landmarks on the skull. Methods: A bite-bar with fixed fiducial coils is used to determine the position of the head in the MEG co-ordinate system. Co-registration is performed by a surface-matching technique. The advantage of fixing the coils is that the co-ordinate system is not based upon arbitrary and operator dependent fiducial points that are attached to landmarks (e.g. nasion and the preauricular points), but rather on those that are permanently fixed in relation to the skull. Results: As a consequence of minimizing coil movement during digitization, errors in localization of the coils are significantly reduced, as shown by a randomization test. Displacement of the bite-bar caused by removal and repositioning between MEG recordings is minimal (∼0.5 mm), and dipole localization accuracy of a somatosensory mapping paradigm shows a repeatability of ∼5 mm. The overall accuracy of the new procedure is greatly improved compared to the previous technique. Conclusions: The test-retest reliability and accuracy of target localization with the new design is superior to techniques that incorporate anatomical-based fiducial points or coils placed on the circumference of the head. © 2003 International Federation of Clinical Neurophysiology. Published by Elsevier Ireland Ltd. All rights reserved.
Resumo:
Post-operative infections resulting from total hip arthroplasty are caused by bacteria such as Staphylococcus aureus and Pseudomonas aeruginosa entering the wound perioperatively or by haemetogenous spread from distant loci of infection. They can endanger patient health and require expensive surgical revision procedures. Gentamicin impregnated poly (methyl methacrylate) bone cement is traditionally used for treatment but is often removed due to harbouring bacterial growth, while bacterial resistance to gentamicin is increasing. The aim of this work was to encapsulate the antibiotics vancomycin, ciprofloxacin and rifampicin within sustained release microspheres composed of the biodegradable polymer poly (dl-lactide-co-glycolide) [PLCG] 75:25. Topical administration to the wound in hydroxypropylmethylcellulose gel should achieve high local antibiotic concentrations while the two week in vivo half life of PLCG 75:25 removes the need for expensive surgical retrieval operations. Unloaded and 20% w/w antibiotic loaded PLCG 75:25 microspheres were fabricated using a Water in Oil emulsification with solvent evaporation technique. Microspheres were spherical in shape with a honeycomb-like internal matrix and showed reproducible physical properties. The kinetics of in vitro antibiotic release into newborn calf serum (NCS) and Hank's balanced salt solution (HBSS) at 37°C were measured using a radial diffusion assay. Generally, the day to day concentration of each antibiotic released into NCS over a 30 day period was in excess of that required to kill St. aureus and Ps. auruginosa. Only limited microsphere biodegradation had occurred after 30 days of in vitro incubation in NCS and HBSS at 37°C. The moderate in vitro cytotoxicity of 20% w/w antibiotic loaded microspheres to cultured 3T3-L1 cells was antibiotic induced. In conclusion, generated data indicate the potential for 20% w/w antibiotic loaded microspheres to improve the present treatment regimens for infections occurring after total hip arthroplasty such that future work should focus on gaining industrial collaboration for commercial exploitation.
Resumo:
We present, for the first time, a detailed investigation of the impact of second order co-propagating Raman pumping on long-haul 100G WDM DP-QPSK coherent transmission of up to 7082 km using Raman fibre laser based configurations. Signal power and noise distributions along the fibre for each pumping scheme were characterised both numerically and experimentally. Based on these pumping schemes, the Q factor penalties versus co-pump power ratios were experimentally measured and quantified. A significant Q factor penalty of up to 4.15 dB was observed after 1666 km using symmetric bidirectional pumping, compared with counter-pumping only. Our results show that whilst using co-pumping minimises the intra-cavity signal power variation and amplification noise, the Q factor penalty with co-pumping was too great for any advantage to be seen. The relative intensity noise (RIN) characteristics of the induced fibre laser and the output signal, and the intra-cavity RF spectra of the fibre laser are also presented. We attribute the Q factor degradation to RIN induced penalty due to RIN being transferred from the first order fibre laser and second order co-pump to the signal. More importantly, there were two different fibre lasing regimes contributing to the amplification. It was random distributed feedback lasing when using counter-pumping only and conventional Fabry-Perot cavity lasing when using all bidirectional pumping schemes. This also results in significantly different performances due to different laser cavity lengths for these two classes of laser.
Resumo:
The authors identify the firm-specific core competencies that Panera Bread has relied on to achieve a competitive advantage in its business domain. The study illustrates how the company scans the dynamically changing environments and tailors their products and services in accordance with these changes.
Resumo:
A multistate molecular dyad containing flavylium and viologen units was synthesized and the pH dependent thermodynamics of the network completely characterized by a variety of spectroscopic techniques such as NMR, UV-vis and stopped-flow. The flavylium cation is only stable at acidic pH values. Above pH ≈ 5 the hydration of the flavylium leads to the formation of the hemiketal followed by ring-opening tautomerization to give the cis-chalcone. Finally, this last species isomerizes to give the trans-chalcone. For the present system only the flavylium cation and the trans-chalcone species could be detected as being thermodynamically stable. The hemiketal and the cis-chalcone are kinetic intermediates with negligible concentrations at the equilibrium. All stable species of the network were found to form 1 : 1 and 2 : 1 host : guest complexes with cucurbit[7]uril (CB7) with association constants in the ranges 10(5)-10(8) M(-1) and 10(3)-10(4) M(-1), respectively. The 1 : 1 complexes were particularly interesting to devise pH responsive bistable pseudorotaxanes: at basic pH values (≈12) the flavylium cation interconverts into the deprotonated trans-chalcone in a few minutes and under these conditions the CB7 wheel was found to be located around the viologen unit. A decrease in pH to values around 1 regenerates the flavylium cation in seconds and the macrocycle is translocated to the middle of the axle. On the other hand, if the pH is decreased to 6, the deprotonated trans-chalcone is neutralized to give a metastable species that evolves to the thermodynamically stable flavylium cation in ca. 20 hours. By taking advantage of the pH-dependent kinetics of the trans-chalcone/flavylium interconversion, spatiotemporal control of the molecular organization in pseudorotaxane systems can be achieved.