935 resultados para Access (Computer Programs)
Resumo:
Consider the problem of sharing a wireless channel between a set of computer nodes. Hidden nodes exist and there is no base station. Each computer node hosts a set of sporadic message streams where a message stream releases messages with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements staticpriority scheduling. The MAC protocol allows multiple masters and is fully distributed. It neither relies on synchronized clocks nor out-of-band signaling; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. Our protocol has the key feature of not only being prioritized and collision-free but also dealing successfully with hidden nodes. This key feature enables schedulability analysis of sporadic message streams in multihop networks.
Resumo:
Search Optimization methods are needed to solve optimization problems where the objective function and/or constraints functions might be non differentiable, non convex or might not be possible to determine its analytical expressions either due to its complexity or its cost (monetary, computational, time,...). Many optimization problems in engineering and other fields have these characteristics, because functions values can result from experimental or simulation processes, can be modelled by functions with complex expressions or by noise functions and it is impossible or very difficult to calculate their derivatives. Direct Search Optimization methods only use function values and do not need any derivatives or approximations of them. In this work we present a Java API that including several methods and algorithms, that do not use derivatives, to solve constrained and unconstrained optimization problems. Traditional API access, by installing it on the developer and/or user computer, and remote API access to it, using Web Services, are also presented. Remote access to the API has the advantage of always allow the access to the latest version of the API. For users that simply want to have a tool to solve Nonlinear Optimization Problems and do not want to integrate these methods in applications, also two applications were developed. One is a standalone Java application and the other a Web-based application, both using the developed API.
Resumo:
OBJECTIVE To determine the prevalence and associated access factors for all continued-use prescription drugs and the ways in which they can be obtained.METHODS Data was obtained from the 2008 Household National Survey. The sample comprised 27,333 individuals above 60 years who reported that they used continued-use prescription drugs. A descriptive analysis and binary and multiple multinomial logistic regressions were performed.RESULTS 86.0% of the older adults had access to all the medication they needed, and among them, 50.7% purchased said medication. Those who obtained medication from the public health system were younger (60-64 years), did not have health insurance plans, and belonged to the lower income groups. It is remarkable that 14.0% of the subjects still had no access to any continued-use medication, and for those with more than four chronic diseases, this amount reached 22.0%. Those with a greater number of chronic diseases ran a higher risk of not having access to all the medication they needed.CONCLUSIONS There are some groups of older adults with an increased risk of not obtaining all the medication they need and of purchasing it. The results of this study are expected to contribute to guide programs and plans for access to medication in Brazil.
Resumo:
Even though Software Transactional Memory (STM) is one of the most promising approaches to simplify concurrent programming, current STM implementations incur significant overheads that render them impractical for many real-sized programs. The key insight of this work is that we do not need to use the same costly barriers for all the memory managed by a real-sized application, if only a small fraction of the memory is under contention lightweight barriers may be used in this case. In this work, we propose a new solution based on an approach of adaptive object metadata (AOM) to promote the use of a fast path to access objects that are not under contention. We show that this approach is able to make the performance of an STM competitive with the best fine-grained lock-based approaches in some of the more challenging benchmarks. (C) 2015 Elsevier Inc. All rights reserved.
Resumo:
Currently, due to the widespread use of computers and the internet, students are trading libraries for the World Wide Web and laboratories with simulation programs. In most courses, simulators are made available to students and can be used to proof theoretical results or to test a developing hardware/product. Although this is an interesting solution: low cost, easy and fast way to perform some courses work, it has indeed major disadvantages. As everything is currently being done with/in a computer, the students are loosing the “feel” of the real values of the magnitudes. For instance in engineering studies, and mainly in the first years, students need to learn electronics, algorithmic, mathematics and physics. All of these areas can use numerical analysis software, simulation software or spreadsheets and in the majority of the cases data used is either simulated or random numbers, but real data could be used instead. For example, if a course uses numerical analysis software and needs a dataset, the students can learn to manipulate arrays. Also, when using the spreadsheets to build graphics, instead of using a random table, students could use a real dataset based, for instance, in the room temperature and its variation across the day. In this work we present a framework which uses a simple interface allowing it to be used by different courses where the computers are the teaching/learning process in order to give a more realistic feeling to students by using real data. A framework is proposed based on a set of low cost sensors for different physical magnitudes, e.g. temperature, light, wind speed, which are connected to a central server, that the students have access with an Ethernet protocol or are connected directly to the student computer/laptop. These sensors use the communication ports available such as: serial ports, parallel ports, Ethernet or Universal Serial Bus (USB). Since a central server is used, the students are encouraged to use sensor values results in their different courses and consequently in different types of software such as: numerical analysis tools, spreadsheets or simply inside any programming language when a dataset is needed. In order to do this, small pieces of hardware were developed containing at least one sensor using different types of computer communication. As long as the sensors are attached in a server connected to the internet, these tools can also be shared between different schools. This allows sensors that aren't available in a determined school to be used by getting the values from other places that are sharing them. Another remark is that students in the more advanced years and (theoretically) more know how, can use the courses that have some affinities with electronic development to build new sensor pieces and expand the framework further. The final solution provided is very interesting, low cost, simple to develop, allowing flexibility of resources by using the same materials in several courses bringing real world data into the students computer works.
Resumo:
work presented in the context of the European Master’s program in Computational Logic, as the partial requirement for obtaining Master of Science degree in Computational Logic
Resumo:
A Web aproximou a humanidade dos seus pares a um nível nunca antes visto. Com esta facilidade veio também o cibercrime, o terrorismo e outros fenómenos característicos de uma sociedade tecnológica, plenamente informatizada e onde as fronteiras terrestres pouco importam na limitação dos agentes ativos, nocivos ou não, deste sistema. Recentemente descobriu-se que as grandes nações “vigiam” atentamente os seus cidadãos, desrespeitando qualquer limite moral e tecnológico, podendo escutar conversas telefónicas, monitorizar o envio e receção de e-mails, monitorizar o tráfego Web do cidadão através de poderosíssimos programas de monitorização e vigilância. Noutros cantos do globo, nações em tumulto ou envoltas num manto da censura perseguem os cidadãos negando-lhes o acesso à Web. Mais mundanamente, há pessoas que coagem e invadem a privacidade de conhecidos e familiares, vasculhando todos os cantos dos seus computadores e hábitos de navegação. Neste sentido, após o estudo das tecnologias que permitem a vigilância constante dos utilizadores da Web, foram analisadas soluções que permitem conceder algum anónimato e segurança no tráfego Web. Para suportar o presente estudo, foi efetuada uma análise das plataformas que permitem uma navegação anónima e segura e um estudo das tecnologias e programas com potencial de violação de privacidade e intrusão informática usados por nações de grande notoriedade. Este trabalho teve como objetivo principal analisar as tecnologias de monitorização e de vigilância informática identificando as tecnologias disponíveis, procurando encontrar potenciais soluções no sentido de investigar a possibilidade de desenvolver e disponibilizar uma ferramenta multimédia alicerçada em Linux e em LiveDVD (Sistema Operativo Linux que corre a partir do DVD sem necessidade de instalação). Foram integrados recursos no protótipo com o intuito de proporcionar ao utilizador uma forma ágil e leiga para navegar na Web de forma segura e anónima, a partir de um sistema operativo (SO) virtualizado e previamente ajustado para o âmbito anteriormente descrito. O protótipo foi testado e avaliado por um conjunto de cidadãos no sentido de aferir o seu potencial. Termina-se o documento com as conclusões e o trabalho a desenvolver futuramente.
Resumo:
ABSTRACT - The Patient Protection and Affordable Care Act shook the foundations of the US health system, offering all Americans access to health care by changing the way the health insurance industry works. As President Obama signed the Act on 23 March 2010, he said that it stood for “the core principle that everybody should have some basic security when it comes to their health care”. Unlike the U.S., the Article 64 of the Portuguese Constitution provides, since 1976, the right to universal access to health care. However, facing a severe economic crisis, Portugal has, under the supervision of the Troika, a tight schedule to implement measures to improve the efficiency of the National Health Service. Both countries are therefore despite their different situation, in a conjuncture of reform and the use of new health management measures. The present work, using a qualitative research methodology examines the Affordable Care Act in order to describe its principles and enforcement mechanisms. In order to describe the reality in Portugal, the Portuguese health system and the measures imposed by Troika are also analyzed. The intention of this entire analysis is not only to disclose the innovative U.S. law, but to find some innovative measures that could serve health management in Portugal. Essentially we identified the Exchanges and Wellness Programs, described throughout this work, leaving also the idea of the possibility of using them in the Portuguese national health system.
Resumo:
Recent empirical evidence has found that employment services and small-business assistance programmes are often successful at getting the unemployed back to work. Â One important concern of policy makers is to decide which of these two programmes is more effective and for whom. Â Using unusually rich (for transition economies) survey data and matching methods, I evaluate the relative effectiveness of these two programmes in Romania. Â While I find that employment services (ES) are, on average, more successful than a small-business assistance programme (SBA), estimation of heterogeneity effects reveals that, compared to non-participation, ES are effective for workers with little access to informal search channels, and SBA works for less-qualified workers and those living in rural areas. Â When comparing ES to SBA, I find that ES tend to be more efficient than SBA for workers without a high-school degree, and that the opposite holds for the more educated workers.
Resumo:
The MyHits web server (http://myhits.isb-sib.ch) is a new integrated service dedicated to the annotation of protein sequences and to the analysis of their domains and signatures. Guest users can use the system anonymously, with full access to (i) standard bioinformatics programs (e.g. PSI-BLAST, ClustalW, T-Coffee, Jalview); (ii) a large number of protein sequence databases, including standard (Swiss-Prot, TrEMBL) and locally developed databases (splice variants); (iii) databases of protein motifs (Prosite, Interpro); (iv) a precomputed list of matches ('hits') between the sequence and motif databases. All databases are updated on a weekly basis and the hit list is kept up to date incrementally. The MyHits server also includes a new collection of tools to generate graphical representations of pairwise and multiple sequence alignments including their annotated features. Free registration enables users to upload their own sequences and motifs to private databases. These are then made available through the same web interface and the same set of analytical tools. Registered users can manage their own sequences and annotations using only web tools and freeze their data in their private database for publication purposes.
Resumo:
Na,K-ATPase, the main active transport system for monovalent cations in animal cells, is responsible for maintaining Na(+) and K(+) gradients across the plasma membrane. During its transport cycle it binds three cytoplasmic Na(+) ions and releases them on the extracellular side of the membrane, and then binds two extracellular K(+) ions and releases them into the cytoplasm. The fourth, fifth, and sixth transmembrane helices of the alpha subunit of Na,K-ATPase are known to be involved in Na(+) and K(+) binding sites, but the gating mechanisms that control the access of these ions to their binding sites are not yet fully understood. We have focused on the second extracellular loop linking transmembrane segments 3 and 4 and attempted to determine its role in gating. We replaced 13 residues of this loop in the rat alpha1 subunit, from E314 to G326, by cysteine, and then studied the function of these mutants using electrophysiological techniques. We analyzed the results using a structural model obtained by homology with SERCA, and ab initio calculations for the second extracellular loop. Four mutants were markedly modified by the sulfhydryl reagent MTSET, and we investigated them in detail. The substituted cysteines were more readily accessible to MTSET in the E1 conformation for the Y315C, W317C, and I322C mutants. Mutations or derivatization of the substituted cysteines in the second extracellular loop resulted in major increases in the apparent affinity for extracellular K(+), and this was associated with a reduction in the maximum activity. The changes produced by the E314C mutation were reversed by MTSET treatment. In the W317C and I322C mutants, MTSET also induced a moderate shift of the E1/E2 equilibrium towards the E1(Na) conformation under Na/Na exchange conditions. These findings indicate that the second extracellular loop must be functionally linked to the gating mechanism that controls the access of K(+) to its binding site.
Resumo:
The reason for this study is to propose a new quantitative approach on how to assess the quality of Open Access University Institutional Repositories. The results of this new approach are tested in the Spanish University Repositories. The assessment method is based in a binary codification of a proposal of features that objectively describes the repositories. The purposes of this method are assessing the quality and an almost automatically system for updating the data of the characteristics. First of all a database was created with the 38 Spanish institutional repositories. The variables of analysis are presented and explained either if they are coming from bibliography or are a set of new variables. Among the characteristics analyzed are the features of the software, the services of the repository, the features of the information system, the Internet visibility and the licenses of use. Results from Spanish universities ARE provided as a practical example of the assessment and for having a picture of the state of the development of the open access movement in Spain.
Resumo:
Performance & Development Solutions (PDS) publishes a variety of newsletters that include some great information about our programs and services. Some of the topics you may find include: Upcoming Seminars Current events or news related to training Recognition of achievements How-to section
Resumo:
Performance & Development Solutions (PDS) publishes a variety of newsletters that include some great information about our programs and services. Some of the topics you may find include: Upcoming Seminars Current events or news related to training Recognition of achievements How-to section
Resumo:
Performance & Development Solutions (PDS) publishes a variety of newsletters that include some great information about our programs and services. Some of the topics you may find include: Upcoming Seminars Current events or news related to training Recognition of achievements How-to section