832 resultados para role based access control
Resumo:
This talk addresses the problem of controlling a heating ventilating and air conditioning system with the purpose of achieving a desired thermal comfort level and energy savings. The formulation uses the thermal comfort, assessed using the predicted mean vote (PMV) index, as a restriction and minimises the energy spent to comply with it. This results in the maintenance of thermal comfort and on the minimisation of energy, which in most operating conditions are conflicting goals requiring some sort of optimisation method to find appropriate solutions over time. In this work a discrete model based predictive control methodology is applied to the problem. It consists of three major components: the predictive models, implemented by radial basis function neural networks identifed by means of a multi-objective genetic algorithm [1]; the cost function that will be optimised to minimise energy consumption and provide adequate thermal comfort; and finally the optimisation method, in this case a discrete branch and bound approach. Each component will be described, with a special emphasis on a fast and accurate computation of the PMV indices [2]. Experimental results obtained within different rooms in a building of the University of Algarve will be presented, both in summer [3] and winter [4] conditions, demonstrating the feasibility and performance of the approach. Energy savings resulting from the application of the method are estimated to be greater than 50%.
Resumo:
Dissertação de Mestrado apresentado ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Auditoria, sob orientação da Doutora Alcina Augusta de Sena Portugal Dias
Resumo:
Wireless sensor networks (WSNs) emerge as underlying infrastructures for new classes of large-scale networked embedded systems. However, WSNs system designers must fulfill the quality-of-service (QoS) requirements imposed by the applications (and users). Very harsh and dynamic physical environments and extremely limited energy/computing/memory/communication node resources are major obstacles for satisfying QoS metrics such as reliability, timeliness, and system lifetime. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major source of QoS degradation in WSNs-the ldquohidden node problem.rdquo In wireless contention-based medium access control (MAC) protocols, when two nodes that are not visible to each other transmit to a third node that is visible to the former, there will be a collision-called hidden-node or blind collision. This problem greatly impacts network throughput, energy-efficiency and message transfer delays, and the problem dramatically increases with the number of nodes. This paper proposes H-NAMe, a very simple yet extremely efficient hidden-node avoidance mechanism for WSNs. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of non-hidden nodes that scales to multiple clusters via a cluster grouping strategy that guarantees no interference between overlapping clusters. Importantly, H-NAMe is instantiated in IEEE 802.15.4/ZigBee, which currently are the most widespread communication technologies for WSNs, with only minor add-ons and ensuring backward compatibility with their protocols standards. H-NAMe was implemented and exhaustively tested using an experimental test-bed based on ldquooff-the-shelfrdquo technology, showing that it increases network throughput and transmission success probability up to twice the values obtained without H-NAMe. H-NAMe effectiveness was also demonstrated in a target tracking application with mobile robots - over a WSN deployment.
Resumo:
We focus on large-scale and dense deeply embedded systems where, due to the large amount of information generated by all nodes, even simple aggregate computations such as the minimum value (MIN) of the sensor readings become notoriously expensive to obtain. Recent research has exploited a dominance-based medium access control(MAC) protocol, the CAN bus, for computing aggregated quantities in wired systems. For example, MIN can be computed efficiently and an interpolation function which approximates sensor data in an area can be obtained efficiently as well. Dominance-based MAC protocols have recently been proposed for wireless channels and these protocols can be expected to be used for achieving highly scalable aggregate computations in wireless systems. But no experimental demonstration is currently available in the research literature. In this paper, we demonstrate that highly scalable aggregate computations in wireless networks are possible. We do so by (i) building a new wireless hardware platform with appropriate characteristics for making dominance-based MAC protocols efficient, (ii) implementing dominance-based MAC protocols on this platform, (iii) implementing distributed algorithms for aggregate computations (MIN, MAX, Interpolation) using the new implementation of the dominance-based MAC protocol and (iv) performing experiments to prove that such highly scalable aggregate computations in wireless networks are possible.
Resumo:
The IEEE 802.15.4 is the most widespread used protocol for Wireless Sensor Networks (WSNs) and it is being used as a baseline for several higher layer protocols such as ZigBee, 6LoWPAN or WirelessHART. Its MAC (Medium Access Control) supports both contention-free (CFP, based on the reservation of guaranteed time-slots GTS) and contention based (CAP, ruled by CSMA/CA) access, when operating in beacon-enabled mode. Thus, it enables the differentiation between real-time and best-effort traffic. However, some WSN applications and higher layer protocols may strongly benefit from the possibility of supporting more traffic classes. This happens, for instance, for dense WSNs used in time-sensitive industrial applications. In this context, we propose to differentiate traffic classes within the CAP, enabling lower transmission delays and higher success probability to timecritical messages, such as for event detection, GTS reservation and network management. Building upon a previously proposed methodology (TRADIF), in this paper we outline its implementation and experimental validation over a real-time operating system. Importantly, TRADIF is fully backward compatible with the IEEE 802.15.4 standard, enabling to create different traffic classes just by tuning some MAC parameters.
Resumo:
In this paper, we address the problem of sharing a wireless channel among a set of sporadic message streams where a message stream issues transmission requests with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements static-priority scheduling, supports a large number of priority levels and is fully distributed. It is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But, unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. The evaluation of the protocol with real embedded computing platforms is presented to show that the proposed protocol is in fact collision-free and prioritized. We measure the response times of our implementation and show that the response-time analysis developed for the protocol offers an upper bound on the response times.
Resumo:
Consider the problem of scheduling sporadic message transmission requests with deadlines. For wired channels, this has been achieved successfully using the CAN bus. For wireless channels, researchers have recently proposed a similar solution; a collision-free medium access control (MAC) protocol that implements static-priority scheduling. Unfortunately no implementation has been reported, yet. We implement and evaluate it to find that the implementation indeed is collision-free and prioritized. This allows us to develop schedulability analysis for the implementation. We measure the response times of messages in our implementation and find that our new response-time analysis indeed offers an upper bound on the response times. This enables a new class of wireless real-time systems with timeliness guarantees for sporadic messages and it opens-up a new research area: schedulability analysis for wireless networks.
Resumo:
In today’s healthcare paradigm, optimal sedation during anesthesia plays an important role both in patient welfare and in the socio-economic context. For the closed-loop control of general anesthesia, two drugs have proven to have stable, rapid onset times: propofol and remifentanil. These drugs are related to their effect in the bispectral index, a measure of EEG signal. In this paper wavelet time–frequency analysis is used to extract useful information from the clinical signals, since they are time-varying and mark important changes in patient’s response to drug dose. Model based predictive control algorithms are employed to regulate the depth of sedation by manipulating these two drugs. The results of identification from real data and the simulation of the closed loop control performance suggest that the proposed approach can bring an improvement of 9% in overall robustness and may be suitable for clinical practice.
Resumo:
In today’s healthcare paradigm, optimal sedation during anesthesia plays an important role both in patient welfare and in the socio-economic context. For the closed-loop control of general anesthesia, two drugs have proven to have stable, rapid onset times: propofol and remifentanil. These drugs are related to their effect in the bispectral index, a measure of EEG signal. In this paper wavelet time–frequency analysis is used to extract useful information from the clinical signals, since they are time-varying and mark important changes in patient’s response to drug dose. Model based predictive control algorithms are employed to regulate the depth of sedation by manipulating these two drugs. The results of identification from real data and the simulation of the closed loop control performance suggest that the proposed approach can bring an improvement of 9% in overall robustness and may be suitable for clinical practice.
Resumo:
Wireless body area networks (WBANs) are expected to play a significant role in smart healthcare systems. One of the most important attributes of WBANs is to increase network lifetime by introducing novel and low-power techniques on the energy-constrained sensor nodes. Medium access control (MAC) protocols play a significant role in determining the energy consumption in WBANs. Existing MAC protocols are unable to accommodate communication requirements in WBANs. There is a need to develop novel, scalable and reliable MAC protocols that must be able to address all these requirements in a reliable manner. In this special issue, we attracted high quality research and review papers on the recent advances in MAC protocols for WBANs.
Resumo:
O problema das afluências indevidas exerce um impacto considerável, não apenas sobre os sistemas de drenagem de águas residuais, mas também sobre o meio ambiente e as populações e infraestruturas presentes nas áreas de influência. Trata-se de um problema com consequências de dimensões técnica/estrutural, ambiental, social, económico-financeira e de saúde pública. Assim, a minimização das afluências indevidas deve constituir uma preocupação da gestão dos sistemas, visto que a mesma permite que a capacidade de transporte e tratamento instalada seja utilizada para as funções inicialmente planeadas (drenagem e tratamento das águas residuais domésticas) e inclui os benefícios de diminuir os custos associados, melhorar a eficiência dos serviços prestados e rentabilizar as infraestruturas existentes. Do ponto de vista económico, há a possibilidade de intervenção nos casos em que o custo de transporte e/ou tratamento do caudal associado às afluências indevidas é superior ao custo da sua eliminação. Neste sentido, um dos objetivos a atingir pela entidade gestora deverá ser o da redução gradual de afluências indevidas, numa perspetiva de custo-benefício. Neste contexto, o objetivo do presente trabalho - a definição preliminar das afluências indevidas ao Subsistema de Gaia Litoral (incluindo a estimativa dos custos associados) - assume uma importância elevada no controlo e redução dos caudais em excesso, visto que a mesma é parte integrante do plano de minimização de afluências indevidas. No decorrer do trabalho, foram implementados os métodos mais adequados ao tipo e natureza da informação utilizada, de forma a cumprir os objetivos estabelecidos inicialmente. Os resultados obtidos permitiram formular uma definição das afluências indevidas assente em volumes em excesso e seus custos, parâmetros de avaliação e indicadores de desempenho.
Resumo:
Among the environmental factors that can affect food intake is the extent of dietary variety available in the environment. Numerous studies have demonstrated that variety in a meal can increase the amount of food consumed in humans, rats, and other species. A physiological mechanism that has been demonstrated to affect food intake is the gut peptide cholecystokinin (CCK) which is released from the upper small intestine during the ingestion of food. Peripherally administered CCK has a robust inhibitory effect on the intake of a single-food meal. Thus, dietary variety and CCK both affect meal size, with dietary variety increasing intake and CCK decreasing intake. This raises the question ofhow dietary variety and CCK might interact to affect meal size. Previous studies of CCK's effects have focused on situations in which only one food was available for consumption. However, in an animal's natural environment it would frequently occur that the animal would come across a number of foods either simultaneously or in quick succession, thus providing the animal access to a variety of foods during a meal. Accordingly, the effect ofCCK on food intake in single-food and multiple-food meals was examined. It was found that food intake was greater in multiple-food than in single-food meals provided that foods in the multiplefood meal were presented either simultaneously or in increasing order of preference. When foods in the multiple-food meal were presented in decreasing order of preference, intake was similar to that observed in single-food meals. In addition, it was found that CCK inhibited food intake in a dose-dependent manner, and that its effects on food intake were similar regardless of meal type. Therefore, the inhibitory effects ofCCK were not diminished when a variety of foods were available for consumption. Furthermore, the finding that CCK did not differentially affect the intake of the two types of meals does not provide support for the recent-foods hypothesis which postulates that CCK decreases food intake by reducing the palatability of only recently consumed foods. However, it is consistent with the all-foods hypothesis, which predicts that CCK reduces food intake by decreasing the palatability of all foods. The 600 ng/kg dose of the CCK^-antagonist lorglumide significantly antagonized the inhibitory effect of exogenous CCK on food intake, and the magnitude of this effect was similar for both types of meal. These results suggest that exogenous CCK inhibits food intake through the activation ofCCK^ receptors. However, when administered by itself, the 600^ig/kg dose of lorglumide did not increase food intake in either single-food or multiple-food meals, suggesting that peripheral endogenous CCK may not play a major role in the control of food intake.
Resumo:
This thesis tested a model of neurovisceral integration (Thayer & Lane, 2001) wherein parasympathetic autonomic regulation is considered to play a central role in cognitive control. We asked whether respiratory sinus arrhythmia (RSA), a parasympathetic index, and cardiac workload (rate pressure product, RPP) would influence cognition and whether this would change with age. Cognitive control was measured behaviourally and electrophysiologically through the error-related negativity (ERN) and error positivity (Pe). The ERN and Pe are thought to be generated by the anterior cingulate cortex (ACC), a region involved in regulating cognitive and autonomic control and susceptible to age-related change. In Study 1, older and younger adults completed a working memory Go/NoGo task. Although RSA did not relate to performance, higher pre-task RPP was associated with poorer NoGo performance among older adults. Relations between ERN/Pe and accuracy were indirect and more evident in younger adults. Thus, Study 1 supported the link between cognition and autonomic activity, specifically, cardiac workload in older adults. In Study 2, we included younger adults and manipulated a Stroop task to clarify conditions under which associations between RSA and performance will likely emerge. We varied task parameters to allow for proactive versus reactive strategies, and motivation was increased via financial incentive. Pre-task RSA predicted accuracy when response contingencies required maintenance of a specific item in memory. Thus, RSA was most relevant when performance required proactive control, a metabolically costly strategy that would presumably be more reliant on autonomic flexibility. In Study 3, we included older adults and examined RSA and proactive control in an additive factors framework. We maintained the incentive and measured fitness. Higher pre-task RSA among older adults was associated with greater accuracy when proactive control was needed most. Conversely, performance of young women was consistently associated with fitness. Relations between ERN/Pe and accuracy were modest; however, isolating ACC activity via independent component analysis allowed for more associations with accuracy to emerge in younger adults. Thus, performance in both groups appeared to be differentially dependent on RSA and ACC activation. Altogether, these data are consistent with a neurovisceral integration model in the context of cognitive control.
Resumo:
The application of computer vision based quality control has been slowly but steadily gaining importance mainly due to its speed in achieving results and also greatly due to its non- destnictive nature of testing. Besides, in food applications it also does not contribute to contamination. However, computer vision applications in quality control needs the application of an appropriate software for image analysis. Eventhough computer vision based quality control has several advantages, its application has limitations as to the type of work to be done, particularly so in the food industries. Selective applications, however, can be highly advantageous and very accurate.Computer vision based image analysis could be used in morphometric measurements of fish with the same accuracy as the existing conventional method. The method is non-destructive and non-contaminating thus providing anadvantage in seafood processing.The images could be stored in archives and retrieved at anytime to carry out morphometric studies for biologists.Computer vision and subsequent image analysis could be used in measurements of various food products to assess uniformity of size. One product namely cutlet and product ingredients namely coating materials such as bread crumbs and rava were selected for the study. Computer vision based image analysis was used in the measurements of length, width and area of cutlets. Also the width of coating materials like bread crumbs was measured.Computer imaging and subsequent image analysis can be very effectively used in quality evaluations of product ingredients in food processing. Measurement of width of coating materials could establish uniformity of particles or the lack of it. The application of image analysis in bacteriological work was also done
Resumo:
In dieser Arbeit wird ein generisches Modell fuer synchrone Gruppenarbeit auf gemeinsamen Informationsraeumen entwickelt. Fuer die Entwicklung dieses Modells muessen die Grundfunktionen fuer Anwendungen der synchronen Gruppenarbeit realisiert werden. Neben der Modellierung des Datenraumes (Datenmodell) und der operationellen Schnittstelle (Interaktionsmodell), muessen Mechanismen fuer die Darstellung der Aktivitaeten der Gruppenmitglieder auf dem Informationsraum (Awareness), sowie fuer die Synchronisierung gleichzeitiger Zugriffe verschiedener Benutzer auf dem Datenraum realisiert werden (Nebenlaeufgkeitskontrolle). Das Grundproblem bei der Loesung der Nebenlaeufigkeit liegt bei der Aufgabe der Isolation aus den klassischen ACID-Transaktionen zu gunsten von Awareness. Die rapide Entwicklung von Techniken der mobilen Kommunikation ermoeglicht den Einsatz dieser Geraete fuer den Zugriff auf Daten im Internet. Durch UMTSund WLAN-Technologien koennen Mobilgeraete fuer Anwendungen ueber die reine Kommunikation hinaus eingesetzt werden. Eine natuerliche Folge dieser Entwicklung sind Anwendungen fuer die Zusammenarbeit mehrerer Benutzer. In der Arbeit wird daher auf die Unterstuetzung mobiler Geraete besonderen Wert gelegt. Die Interaktion der Benutzer auf den gemeinsamen Datenraum wird durch einfache Navigationsoperationen mit einem Cursor (Finger) realisiert, wobei der Datenraum durch XML-Dokumente dargestellt wird. Die Visualisierung basiert auf der Transformierung von XML-Dokumenten in andere XML-basierte Sprachen wie HTML oder SVG durch XSLT-Stylesheets. Awareness-Informationen werden, aehnlich dem Fokus/Nimbus-Modell, von der Interaktion der Benutzer und der Ermittlung der sichtbaren Objekte bei dem Benutzer hergeleitet. Fuer eine geeignete Kontrolle der Nebenlaeufigkeit wurde der Begriff der visuellen Transaktion eingefuehrt, wo die Auswirkungen einer Transaktion von anderen Benutzern (Transaktionen) beobachtet werden koennen. Die Synchronisierung basiert auf einem Sperrverfahren und der Einfuehrung der neuen W-Sperre und der Grundoperationen readV und writeV. Das Modell (Groupware-Server) wird in der Arbeit in einem Prototyp implementiert. Weiterhin wird eine Java-Anwendung sowohl auf einem Desktop PC als auch auf einem Pocket PC (iPAQ 3970) implementiert, welche die Einsetzbarkeit dieses Prototyps demonstriert.