887 resultados para Computer System Management


Relevância:

80.00% 80.00%

Publicador:

Resumo:

In 1974 Dr D M Bramwell published his research work at the University of Aston a part of which was the establishment of an elemental work study data base covering drainage construction. The Transport and Road Research Laboratory decided to, extend that work as part of their continuing research programme into the design and construction of buried pipelines by placing a research contract with Bryant Construction. This research may be considered under two broad categories. In the first, site studies were undertaken to validate and extend the data base. The studies showed good agreement with the existing data with the exception of the excavation trench shoring and pipelaying data which was amended to incorporate new construction plant and methods. An inter-active on-line computer system for drainage estimating was developed. This system stores the elemental data, synthesizes the standard time of each drainage operation and is used to determine the required resources and construction method of the total drainage activity. The remainder of the research was into the general topic of construction efficiency. An on-line command driven computer system was produced. This system uses a stochastic simulation technique, based on distributions of site efficiency measurements to evaluate the effects of varying performance levels. The analysis of this performance data quantities the variability inherent in construction and demonstrates how some of this variability can be reconciled by considering the characteristics of a contract. A long term trend of decreasing efficiency with contract duration was also identified. The results obtained from the simulation suite were compared to site records collected from current contracts. This showed that this approach will give comparable answers, but these are greatly affected by the site performance parameters.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

* This paper was made according to the program of fundamental scientific research of the Presidium of the Russian Academy of Sciences «Mathematical simulation and intellectual systems», the project "Theoretical foundation of the intellectual systems based on ontologies for intellectual support of scientific researches".

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Михаил Константинов, Весела Пашева, Петко Петков - Разгледани са някои числени проблеми при използването на компютърната система MATLAB в учебната дейност: пресмятане на тригонометрични функции, повдигане на матрица на степен, спектрален анализ на целочислени матрици от нисък ред и пресмятане на корените на алгебрични уравнения. Причините за възникналите числени трудности могат да се обяснят с особеностите на използваната двоичната аритметика с плаваща точка.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A cikk az informatika és a versenyképesség kapcsolatát vizsgálja. A Budapesti Corvinus Egyetem Versenyképesség Kutatási Programjának korábbi felmérései óta számos új technológia bukkant fel, illetve hazánkat is elérte a világméretű pénzügyi és gazdasági válság hatása. E kihívások tükrében érdemesnek tűnt újra megvizsgálni az információtechnológia (IT) szerepét a versenyképesség alakításában. / === / In this paper the relationship between information technology (IT) and competitiveness is tackled. Since the authors’ previous surveys within their Competitiveness Research Program several new technologies have emerged, and the influence of the word wide financial and economic crisis has reached Hungary as well. In the face of these challenges it is worth reexamining the role of IT in shaping the competitive position of companies. The structure of the paper is as follows. A brief theoretical introduction is provided before their research questionsare presented. After that, the paper contains an analysis on selected fields of the corporate IT function, namely IT infrastructure, IT applications, IT management and IT strategy. Based on this, conclusions are made both at the end of the main parts, and in the final section of the paper. As far as the final conclusions are concerned, the majority of respondents do not regard IT today as a source of sustainable or contestable competitive advantage, though the dominant opinion underlines that IT is a strategic necessity. Besides this, their research results suggest a kind of association between corporate performance and the maturity level of the IT function. However, even the best performing companies are not prepared yet to effectively respond to their own prediction that forecasts the strengthening role of IT as a competitive factor.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Az agilitás az elmúlt húsz év egyik fontos fogalma, amelyet több területen (gyártás, szoftverfejlesztés és projektmenedzsment) is több-kevesebb eredménnyel alkalmaztak. A hazai akadémiai diskurzus eddig mostohagyermekként kezelte e témákat, holott az érintett szakmák gyakorlati művelői számos alkalommal foglalkoztak velük. A szerző rövid áttekintést ad e területek fontosabb gondolatairól, majd ezek közül néhányat a vezetés-szervezés általánosabb tárgyalásmódjával vizsgál. Az agilis szemlélet mögött rejlő alapgondolatok egy része nem nevezhető újnak. A cikk az agilitás témájának pozicionálásával zárul. _____ The agility of is an important concept of the last twenty years, which is applied with more or less results in several areas (manufacturing, software development and project management) as well. The author gives a brief overview of the main ideas from these areas, and examines some of these with general aspects of leadership and management. The article concludes with the theme of the positioning of agility.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Néhány éve vonult be a köztudatba a cloud computing fogalom, mely ma már a szakirodalomban és az informatikai alkalmazásokban is egyre nagyobb teret foglal el. Ez az új IT-technológia a számítási felhő számítástechnikai szolgáltatásaihoz kapcsolódó ERP-rendszerek szabványosítását, elterjedését eredményezi. A szerzők cikkükben áttekintést adnak a cloud computing mai helyzetéről és a számítási felhőben működő adatfeldolgozó rendszerekkel (kiemelten ERP) kapcsolatos felhasználói elvárásokról, illetve kezdeti, németországi alkalmazási tapasztalatokról. Külön tárgyalják az ERP-rendszerek új kiválasztási céljait és kritériumait, melyek a felhőkörnyezet speciális lehetőségei miatt alakultak ki. _____ The concept of ‘Cloud’ as an IT notion emerged in the past years and proliferated within the business and IT professional community. The concept of cloud gained awareness both in the professional and scientific literature and in the practice of IT/IS world. The cloud has a profound impact on the Business Information Systems, especially on ERP systems. Indirectly, the cloud leads to a massive standardization on ERP systems and their services. In this paper, the authors provide a literature overview about the current situation of Cloud Computing and the requirements established by end-users against the other data processing facilities and systems, outstandingly the ERP systems. The majority of investigated cases are based on samples from Germany. Furthermore, the initial experiences of application are discussed. Separately, the recent selection objectives and criteria for ERP systems are investigated that came into existence because the appearance of Cloud in the IT environment.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Food service on a cruise ship presents some unique challenges. A review of food service in the cruise industry is presented along with some ideas on the future. The case is made for a change in traditional operations with a move toward greater use of computer-driven management techniques.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

An important issue of resource distribution is the fairness of the distribution. For example, computer network management wishes to distribute network resource fairly to its users. To describe the fairness of the resource distribution, a quantitative fairness score function was proposed in 1984 by Jain et al. The purpose of this paper is to propose a modified network sharing fairness function so that the users can be treated differently according to their priority levels. The mathematical properties are discussed. The proposed fairness score function keeps all the nice properties of and provides better performance when the network users have different priority levels.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this work it was developed mathematical resolutions taking as parameter maximum intensity values for the interference analysis of electric and magnetic fields and was given two virtual computer system that supports families of CDMA and WCDMA technologies. The first family were developed computational resources to solve electric and magnetic field calculations and power densities in Radio Base stations , with the use of CDMA technology in the 800 MHz band , taking into account the permissible values referenced by the Commission International Protection on non-Ionizing Radiation . The first family is divided into two segments of calculation carried out in virtual operation. In the first segment to compute the interference field radiated by the base station with input information such as radio channel power; Gain antenna; Radio channel number; Operating frequency; Losses in the cable; Attenuation of direction; Minimum Distance; Reflections. Said computing system allows to quickly and without the need of implementing instruments for measurements, meet the following calculated values: Effective Radiated Power; Sector Power Density; Electric field in the sector; Magnetic field in the sector; Magnetic flux density; point of maximum permissible exposure of electric field and power density. The results are shown in charts for clarity of view of power density in the industry, as well as the coverage area definition. The computer module also includes folders specifications antennas, cables and towers used in cellular telephony, the following manufacturers: RFS World, Andrew, Karthein and BRASILSAT. Many are presented "links" network access "Internet" to supplement the cable specifications, antennas, etc. . In the second segment of the first family work with more variables , seeking to perform calculations quickly and safely assisting in obtaining results of radio signal loss produced by ERB . This module displays screens representing propagation systems denominated "A" and "B". By propagating "A" are obtained radio signal attenuation calculations in areas of urban models , dense urban , suburban , and rural open . In reflection calculations are present the reflection coefficients , the standing wave ratio , return loss , the reflected power ratio , as well as the loss of the signal by mismatch impedance. With the spread " B" seek radio signal losses in the survey line and not targeted , the effective area , the power density , the received power , the coverage radius , the conversion levels and the gain conversion systems radiant . The second family of virtual computing system consists of 7 modules of which 5 are geared towards the design of WCDMA and 2 technology for calculation of telephone traffic serving CDMA and WCDMA . It includes a portfolio of radiant systems used on the site. In the virtual operation of the module 1 is compute-: distance frequency reuse, channel capacity with noise and without noise, Doppler frequency, modulation rate and channel efficiency; Module 2 includes computes the cell area, thermal noise, noise power (dB), noise figure, signal to noise ratio, bit of power (dBm); with the module 3 reaches the calculation: breakpoint, processing gain (dB) loss in the space of BTS, noise power (w), chip period and frequency reuse factor. Module 4 scales effective radiated power, sectorization gain, voice activity and load effect. The module 5 performs the calculation processing gain (Hz / bps) bit time, bit energy (Ws). Module 6 deals with the telephone traffic and scales 1: traffic volume, occupancy intensity, average time of occupancy, traffic intensity, calls completed, congestion. Module 7 deals with two telephone traffic and allows calculating call completion and not completed in HMM. Tests were performed on the mobile network performance field for the calculation of data relating to: CINP , CPI , RSRP , RSRQ , EARFCN , Drop Call , Block Call , Pilot , Data Bler , RSCP , Short Call, Long Call and Data Call ; ECIO - Short Call and Long Call , Data Call Troughput . As survey were conducted surveys of electric and magnetic field in an ERB , trying to observe the degree of exposure to non-ionizing radiation they are exposed to the general public and occupational element. The results were compared to permissible values for health endorsed by the ICNIRP and the CENELEC .

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Med begreppet "Internet of Things" menas att ett objekt ur den riktiga världen blir en del av internet. Tunabyggen i Borlänge planerar att implementera ett sådant informationssystem som med hjälp av sensorer och en ständig internetuppkoppling håller uppsikt över temperatur och luftfuktighet i utvalda lokaler. Det är ett enkelt system som till synes inte har så stora effekter på den nuvarande verksamheten. De ekonomiska effekterna går ofta att räkna på i förhand men effekterna på personal, miljö och rutiner kan glömmas bort. Vi har därför med detta examensarbete undersökt vilka inledande effekter som kan tänkas uppkomma efter implementering av ett nytt informationssystem med "Internet of Things" funktionalitet i en verksamhet. Detta sker inom kategorierna ekonomi, arbetsmiljö, miljöpåverkan och systemförvaltning. För att kunna besvara detta har vi gjort en fallstudie baserad på en scenariometodik som består av fyra faser. Fas 1, där vi fick vårt Case och skapade en förståelse för scenariofältet. Fas 2, där vi identifierade nyckelfaktorer. Detta har gjorts genom en litteraturstudie samt intervju med berörd personal på Tunabyggen. Fas 3, där analysen av dessa nyckelfaktorer skedde genom nulägesanalys och framtidsanalys av nyckelfaktorer. Fas 4, där vi genererade scenarier av de analyserade nyckelfaktorerna. Det har sedan gjorts en SWOT-analys för att belysa styrkor, svagheter, möjligheter och hot. Resultatet visar tydliga tecken på att det kommer att bli många effekter för Tunabyggen efter implementering av det nya informationssystemet som yttrar sig i alla kategorier. Slutsatsen är att vid implementation av ett informationssystem som detta är effekterna många. Detta är något som vi anser bör beaktas av alla verksamheter som har tankar på att införskaffa ett nytt informationssystem. De bör inte bara utvärdera informationssystem rent ekonomiskt utan borde ta i beaktning att det finns ett antal andra faktorer som har en avgörande roll om implementation av informationssystem ska bli lyckad.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este trabalho tem por objetivo relatar os resultados preliminares de uma experiência de integração curricular, em andamento na Escola de Informática da UCPel, na área de fundamentos matemáticos da Ciência da Computação. A concepção curricular da experiência está baseada nas idéias de Basil Bernstein sobre currículos de coleção e/ou integração, na idéia de desenvolvimento autônomo do aluno e na organização do ensino em forma semi-presencial (com apoio da Internet) e cooperativa (com apoio de softwares matemáticos).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As the amount of material on the World Wide Web continues to grow, users are discovering that the Web's embedded, hard-coded, links are difficult to maintain and update. Hyperlinks need a degree of abstraction in the way they are specified together with a sound underlying document structure and the property of separability from the documents they are linking. The case is made by studying the advantages of program/data separation in computer system architectures and also by re-examining some selected hypermedia systems that have already implemented separability. The prospects for introducing more abstract links into future versions of HTML and PDF, via emerging standards such as XPath, XPointer XLink and URN, are briefly discussed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Human operators are unique in their decision making capability, judgment and nondeterminism. Their sense of judgment, unpredictable decision procedures, susceptibility to environmental elements can cause them to erroneously execute a given task description to operate a computer system. Usually, a computer system is protected against some erroneous human behaviors by having necessary safeguard mechanisms in place. But some erroneous human operator behaviors can lead to severe or even fatal consequences especially in safety critical systems. A generalized methodology that can allow modeling and analyzing the interactions between computer systems and human operators where the operators are allowed to deviate from their prescribed behaviors will provide a formal understanding of the robustness of a computer system against possible aberrant behaviors by its human operators. We provide several methodology for assisting in modeling and analyzing human behaviors exhibited while operating computer systems. Every human operator is usually given a specific recommended set of guidelines for operating a system. We first present process algebraic methodology for modeling and verifying recommended human task execution behavior. We present how one can perform runtime monitoring of a computer system being operated by a human operator for checking violation of temporal safety properties. We consider the concept of a protection envelope giving a wider class of behaviors than those strictly prescribed by a human task that can be tolerated by a system. We then provide a framework for determining whether a computer system can maintain its guarantees if the human operators operate within their protection envelopes. This framework also helps to determine the robustness of the computer system under weakening of the protection envelopes. In this regard, we present a tool called Tutela that assists in implementing the framework. We then examine the ability of a system to remain safe under broad classes of variations of the prescribed human task. We develop a framework for addressing two issues. The first issue is: given a human task specification and a protection envelope, will the protection envelope properties still hold under standard erroneous executions of that task by the human operators? In other words how robust is the protection envelope? The second issue is: in the absence of a protection envelope, can we approximate a protection envelope encompassing those standard erroneous human behaviors that can be safely endured by the system? We present an extension of Tutela that implements this framework. The two frameworks mentioned above use Concurrent Game Structures (CGS) as models for both computer systems and their human operators. However, there are some shortcomings of this formalism for our uses. We add incomplete information concepts in CGSs to achieve better modularity for the players. We introduce nondeterminism in both the transition system and strategies of players and in the modeling of human operators and computer systems. Nondeterministic action strategies for players in \emph{i}ncomplete information \emph{N}ondeterministic CGS (iNCGS) is a more precise formalism for modeling human behaviors exhibited while operating a computer system. We show how we can reason about a human behavior satisfying a guarantee by providing a semantics of Alternating Time Temporal Logic based on iNCGS player strategies. In a nutshell this dissertation provides formal methodology for modeling and analyzing system robustness against both expected and erroneous human operator behaviors.