889 resultados para mobile environment, peer-to-peer, PeerHood, software security, vulnerabilities


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to investigate electricity supply solutions for an educationalcenter that is being built in Chonyonyo Tanzania. Off-grid power generation solutions andfurther optimization possibilities were studied for the case.The study was done for Engineers Without Borders in Sweden. Who are working withMavuno Project on the educational center. The school is set to start operating in year 2015with 40 girl students in the beginning. The educational center will help to improve genderequality by offering high quality education in a safe environment for girls in rural area.It is important for the system to be economically and environmentally sustainable. Thearea has great potential for photovoltaic power generation. Thus PV was considered as theprimary power generation and a diesel generator as a reliable backup. The system sizeoptimization was done with HOMER. For the simulations HOMER required componentdata, weather data and load data. Common components were chose with standardproperties, the loads were based on load estimations from year 2011 and the weather datawas acquired from NASA database. The system size optimization result for this base casewas a system with 26 kW PW; 5.5 kW diesel generator, 15 kW converter and 112 T-105batteries. The initial cost of the system was 55 875 €, the total net present cost 92 121 €and the levelized cost of electricity 0.264 €/kWh.In addition three optimization possibilities were studied. First it was studied how thesystem should be designed and how it would affect the system size to have night loads(security lights) use DC and could the system then be extended in blocks. As a result it wasfound out that the system size could be decreased as the inverter losses would be avoided.Also the system extension in blocks was found to be possible. The second study was aboutinverter stacking where multiple inverters can work as one unit. This type of connectionallows only the required number of inverters to run while shutting down the excess ones.This would allow the converter-unit to run with higher efficiency and lower powerconsumption could be achieved. In future with higher loads the system could be easilyextendable by connecting more inverters either in parallel or series depending on what isneeded. Multiple inverters would also offer higher reliability than using one centralizedinverter. The third study examined how the choice of location for a centralized powergeneration affects the cable sizing for the system. As a result it was found that centralizedpower generation should be located close to high loads in order to avoid long runs of thickcables. Future loads should also be considered when choosing the location. For theeducational center the potential locations for centralized power generation were found outto be close to the school buildings and close to the dormitories.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Small-scale enterprises face difficulties in fulfilling the regulations for organising Systematic Work Environment Management. This study compared three groups of small-scale manufacturing enterprises with and without support for implementing the provision. Two implementation methods, supervised and network method, were used. The third group worked according to their own ideas. Twenty-three enterprises participated. The effects of the implementation were evaluated after one year by semi-structured dialogue with the manager and safety representative. Each enterprise was classified on compliance with ten demands concerning the provision. The work environment was estimated by the WEST-method. Impact of the implementation on daily work was also studied. At the follow-up, the enterprises in the supervised method reported slightly more improvements in the fulfilment of the demands in the provision than the enterprises in the network method and the enterprises working on their own did. The effect of the project reached the employees faster in the enterprises with the supervised method. In general, the work environment improved to some extent in all enterprises. Extensive support to small-scale enterprises in terms of advise and networking aimed to fulfil the regulations of Systematic Work Environment Management had limited effect especially considering the cost of applying these methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is an empirical study about factors that motivate pupils to speak English as a foreign language. The aim of this study is to investigate when pupils in the classroom situation, in Grades 4-6 in a school in Sweden, are motivated to speak English as a foreign language, and why they are motivated to speak English in these situations. To implement this study, questionnaires and interviews have been chosen as methods. 51 pupils in Grades 4-6 took part of the study. Since being able to communicate orally in a foreign language is of great advantage for one, and creates opportunities both for work and for study abroad, it is important for pupils to learn how to communicate orally in English. It is important to be able to use the language. In the English curriculum in Swedish schools, speaking English is a skill pupils must possess. Since this is the requirement it is important that teachers in Sweden relate to this. Many pupils do not like to speak in front of the rest of the class and some pupils only like to speak in informal situations. Therefore, teachers must use various strategies to create a willingness to communicate among pupils and various strategies to motivate them to speak English. The results show that pupils are motivated to use the language in class when they have recently been abroad. It also shows that they are motivated when they can decide the topic and speak about something they are interested in.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Being able to ask questions about the provenance of some data requires documentation on each influence on that data's existence and content. Much software exists, and is being developed, for which there is no provenance-awareness, i.e. at best, the data it outputs can be connected to its inputs, but with no record of intermediate processing. Further, where some record of processing does exist, e.g. as logs, it is not in a form easily connected with that of other processes. We would like to enable compiled software to record useful documentation without requiring prior manual adaptation. In this paper, we present an approach to adapting source code from its original form without manual manipulation, to record information on data provenance during execution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

O objetivo da pesquisa atém-se primeiramente em elaborar um protocolo que permita analisar, por meio de um conjunto de indicadores, o processo de reutilização de software no desenvolvimento de sistemas de informação modelando objetos de negócios. O protocolo concebido compõe-se de um modelo analítico e de grades de análise, a serem empregadas na classificação e tabulação dos dados obtidos empiricamente. Com vistas à validação inicial do protocolo de análise, realiza-se um estudo de caso. A investigação ocorre num dos primeiros e, no momento, maior projeto de fornecimento de elementos de software reutilizáveis destinados a negócios, o IBM SANFRANCISCO, bem como no primeiro projeto desenvolvido no Brasil com base no por ele disponibilizado, o sistema Apontamento Universal de Horas (TIME SHEET System). Quanto à aplicabilidade do protocolo na prática, este se mostra abrangente e adequado à compreensão do processo. Quanto aos resultados do estudo de caso, a análise dos dados revela uma situação em que as expectativas (dos pesquisadores) de reutilização de elementos de software orientadas a negócio eram superiores ao observado. Houve, entretanto, reutilização de elementos de baixo nível, que forneceram a infra-estrutura necessária para o desenvolvimento do projeto. Os resultados contextualizados diante das expectativas de reutilização (dos desenvolvedores) são positivos, na medida em que houve benefícios metodológicos e tecnológicos decorrentes da parceria realizada. Por outro lado, constatam-se alguns aspectos restritivos para o desenvolvedor de aplicativos, em virtude de escolhas arbitrárias realizadas pelo provedor de elementos reutilizáveis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Com o fim da Guerra Fria e os acontecimentos que marcaram o “onze de setembro”, novas ameaças surgiram, impactando negativamente a percepção de segurança coletiva, e impondo profundas modificações nas estruturas e no modo de atuação do Poder Militar de diversas nações. A marginalidade social, o narcotráfico, o crime organizado, a degradação do meio ambiente e outras tantas ameaças, fizeram com que algumas nações se vissem motivadas a empregar suas Forças Armadas, prioritariamente, no combate a estas mazelas, ou seja, nas operações de não-guerra. Este fenômeno vem causando uma ebulição nas ciências militares, com reflexo no campo social, político e econômico, provocando um processo conhecido como “Transformação da Defesa”, que só é viável com a ruptura de alguns modelos tradicionais de administração e com a introdução de uma nova cultura organizacional que promova um ambi-ente adequado ao processo de inovações no setor de Defesa. Para fazer gestão deste processo, deve haver um sistema de inovação setorial de Defesa, já que o atual modelo, conforme apon-tou a investigação, é fragmentado e desarticulado, que produz, fundamentalmente, inovações incrementais e, raramente as de ruptura. Trata-se de um sistema virtual, que não existe for-malmente como tal, mas que possui toda a infraestrutura necessária para funcionar como um sistema formal e gerenciável. A pesquisa, de caráter epistemológico estruturalista, teve por objetivo desenvolver um modelo conceitual para gestão do sistema de inovação do setor de Defesa (segmento de não-guerra), com base em uma estrutura subjacente desvelada, que, de forma oculta, dá suporte ao sistema atual. O desvelamento desta estrutura permitiu concluir que, no campo estudado, os agentes do sistema de inovação, agindo de acordo com seus inte-resses, mobilizam, de forma consciente ou inconsciente, os fatores valorativos da inovação presentes na cultura organizacional em que estão imersos, os quais, juntamente com a influên-cia dos fatores de suporte (o Capital), são fundamentais para a formação de alianças e, em consequência, para o processo de inovação no segmento de não-guerra do setor de Defesa. Como era esperado, o desvelamento da estrutura subjacente propiciou a realização de um di-agnóstico preciso do sistema estudado, permitindo ao pesquisador o lançamento de um olhar crítico sobre o mesmo, o que contribui para a proposição de uma intervenção segura no modelo vigente. O modelo proposto buscou incentivar, também, a criação, o avanço e a difusão das inovações não-tecnológicas, contrapondo-se ao atual, que privilegia fundamentalmente a abordagem tecnológica. Adicionalmente, foram sugeridas algumas medidas, no sentido de incrementar as interações entre os principais agentes do sistema.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Existe uma dissonância entre a teoria dominante de competição entre telefonias e evidências empíricas. Aquela tem como resultado que as redes de telefonia móvel irão definir a tarifa de interconexão abaixo do custo marginal de término da ligação. Já evidências empíricas diversas mostram que as tarifas de interconexão das telefonias móveis são mais elevadas e que as agências reguladoras encontram resistência destas ao aplicarem políticas de redução das tarifas de interconexão. Este trabalho desenvolve um modelo, baseado em Hoernig (2010), que provê resultados mais aderentes às evidências de existência de incentivos para precificação de tarifas de interconexão acima do custo marginal. O modelo aqui proposto inova em relação a Hoernig (2010) ao assumir que as redes de telefonia móvel concorrem com a telefonia fixa, a qual é sujeita à regulação da tarifa de interconexão. Esta é uma representação bastante plausível frente ao desenvolvimento da telefonia móvel. O modelo também considera o efeito de uma das empresas de telefonia móvel ter o seu controle compartilhado com a de telefonia fixa. Devido ao pressuposto de competição em um mesmo mercado entre telefonia fixa e móvel, é encontrado como resultado geral que as redes de telefonia móvel irão definir a tarifa de interconexão acima do custo marginal de término da ligação.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Brazilian start-up Local Wander plans to enter the tourism sector with a mobile application aiming to enable a new form of travel research. A web-based survey has been sent out to the start-up’s target audience (n: 236) in order to gain further relevant information for the designing of Local Wander’s market entry strategy. By applying the diffusion of innovation theory, this thesis could detect five different adopter categories, originally described by Rogers (1962), among Local Wander’s target audience based on their adoption intention. The Early Market was observed to be significantly bigger than the theory predicted. Research revealed four characteristics to be of significant impact on the adoption intention: Relative Perceived Product Advantage, Perceived Product Complexity, Compatibility with digital travel research sources, and the adopter’s Innovativeness towards mobile applications. Specific characteristics in order to identify Local Wander’s early users, the so called Innovators, were detected giving indications for further necessary company market research. Findings showed that the diffusion of innovation framework is a helpful tool for start-ups’ prospective decision making and market entry strategy planning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Spontaneous volunteers always emerge under emergency scenarios and are vital to a successful community response, yet some uncertainty subsists around their role and its inherent acceptance by official entities under emergency scenarios. In our research we have identified that most of the spontaneous volunteers do have none or little support from official entities, hence they end up facing critical problems as situational awareness, safety instructions and guidance, motivation and group organization. We argue that official entities still play a crucial role and should change some of their behaviors regarding spontaneous volunteerism. We aim with this thesis to design a software architecture and a framework in order to implement a solution to support spontaneous volunteerism under emergency scenarios along with a set of guidelines for the design of open information management systems. Together with the collaboration from both citizens and emergency professionals we have been able to attain several important contributions, as the clear identification of the roles taken by both spontaneous volunteers and professionals, the importance of volunteerism in overall community response and the role which open collaborative information management systems have in the community volunteering efforts. These conclusions have directly supported the design guidelines of our software solution proposal. In what concerns to methodology, we first review literature on technologies support to emergencies and how spontaneous volunteers actually challenge these systems. Following, we have performed a field research where we have observed that the emerging of spontaneous volunteer’s efforts imposes new requirements for the design of such systems, which leaded to the creation of a cluster of design guidelines that supported our software solution proposal to address the volunteers’ requirements. Finally we have architected and developed an online open information management tool which has been evaluated via usability engineering methods, usability user tests and heuristic evaluations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Nowadays, more than half of the computer development projects fail to meet the final users' expectations. One of the main causes is insufficient knowledge about the organization of the enterprise to be supported by the respective information system. The DEMO methodology (Design and Engineering Methodology for Organizations) has been proved as a well-defined method to specify, through models and diagrams, the essence of any organization at a high level of abstraction. However, this methodology is platform implementation independent, lacking the possibility of saving and propagating possible changes from the organization models to the implemented software, in a runtime environment. The Universal Enterprise Adaptive Object Model (UEAOM) is a conceptual schema being used as a basis for a wiki system, to allow the modeling of any organization, independent of its implementation, as well as the previously mentioned change propagation in a runtime environment. Based on DEMO and UEAOM, this project aims to develop efficient and standardized methods, to enable an automatic conversion of DEMO Ontological Models, based on UEAOM specification into BPMN (Business Process Model and Notation) models of processes, using clear semantics, without ambiguities, in order to facilitate the creation of processes, almost ready for being executed on workflow systems that support BPMN.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Selenium is an essential nutrient for many organisms, including fish. It can be released in the water by natural processes of dissolving rocks and minerals, and by the wastewater from industries and agricultural activities, which can increase its concentration in the environment, leading to toxic effects to the aquatic biota. Median Lethal Concentrations (LC(50-96h)) of two forms of selenium were estimated to fingerlings of Nile tilapia Oreochromis niloticus, focusing on estimating indicators for future environmental risk assessments in aquatic ecosystems contaminated with those elements, particularly for evaluate sources of water quality suitable for rearing tilapia. The results were: LC(50-96h) of sodium selenite (Na(2)SeO(3)) = 4.42 mg Se(4+) L(-1), and LC(50-96h) of sodium selenate (Na(2)SeO(4)) = 14,67 mg Se(6+) L(-1). According to those data, it was possible to classify sodium selenite as highly toxic and sodium selenate as moderately toxic to fingerlings of tilapia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The electronic mail service is one of the most Internet services that grow in the corporate environment. This evolution is bringing several problems for the organizations, especially to information that circulates inside of the corporate net. The lack of correct orientation to the people, about the usage and the security importance of these resources, is leaving breaches and causing misusage and overuse of service, for example. In recent literature, it starts to coming out several ideas, which has helped to rganizations how to plain and how to implement the information security system to the electronic mail in computer environment. However, these ideas are still not placed in practice in many companies, public or private. This dissertation tries to demonstrate the results of a research that has like goal, identify the importance that user training has over the information security policy, through a case study inside of private superior education institute in this state. Besides, this work had by basic orientation the ISO/IEC 17799, which talk about People Security. This study was developed over a proposed model to this research, which looked for offer conditions to guide the institution studied, how to plan better a information security policy to the electronic mail. Also, this research has an exploratory and descreptive nature and your type, qualitative. Firstly, it was applied na questionary to the information technology manager, as better way to get some general data and to deepen the contact which still then, it was being kept through e-mail. Thereupon this first contact, eleven interviews were done with the same manager, beside one interview with twenty-four users, among employees e students. After that to collect and transcript the interviews, were review with the manager all informations given, to correct any mistakes and to update that informations, to then, start the data analyze. The research suggests that the institution has a pro attitude about the information security policy and the electronic mail usage. However, it was clear that answers have their perception about information security under a very inexperient way, derived of a planning lack in relation to training program capable to solve the problem

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the two last decades of the past century, following the consolidation of the Internet as the world-wide computer network, applications generating more robust data flows started to appear. The increasing use of videoconferencing stimulated the creation of a new form of point-to-multipoint transmission called IP Multicast. All companies working in the area of software and the hardware development for network videoconferencing have adjusted their products as well as developed new solutionsfor the use of multicast. However the configuration of such different solutions is not easy done, moreover when changes in the operational system are also requirede. Besides, the existing free tools have limited functions, and the current comercial solutions are heavily dependent on specific platforms. Along with the maturity of IP Multicast technology and with its inclusion in all the current operational systems, the object-oriented programming languages had developed classes able to handle multicast traflic. So, with the help of Java APIs for network, data bases and hipertext, it became possible to the develop an Integrated Environment able to handle multicast traffic, which is the major objective of this work. This document describes the implementation of the above mentioned environment, which provides many functions to use and manage multicast traffic, functions which existed only in a limited way and just in few tools, normally the comercial ones. This environment is useful to different kinds of users, so that it can be used by common users, who want to join multimedia Internet sessions, as well as more advenced users such engineers and network administrators who may need to monitor and handle multicast traffic

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Spacecraft move with high speeds and suffer abrupt changes in acceleration. So, an onboard GPS receiver could calculate navigation solutions if the Doppler effect is taken into consideration during the satellite signals acquisition and tracking. Thus, for the receiver subject to such dynamic cope these shifts in the frequency signal, resulting from this effect, it is imperative to adjust its acquisition bandwidth and increase its tracking loop to a higher order. This paper presents the changes in the GPS Orion s software, an open architecture receiver produced by GEC Plessey Semiconductors, nowadays Zarlink, in order to make it able to generate navigation fix for vehicle under high dynamics, especially Low Earth Orbit satellites. GPS Architect development system, sold by the same company, supported the modifications. Furthermore, it presents GPS Monitor Aerospace s characteristics, a computational tool developed for monitoring navigation fix calculated by the GPS receiver, through graphics. Although it was not possible to simulate the software modifications implemented in the receiver in high dynamics, it was observed that the receiver worked in stationary tests, verified also in the new interface. This work also presents the results of GPS Receiver for Aerospace Applications experiment, achieved with the receiver s participation in a suborbital mission, Operation Maracati 2, in December 2010, using a digital second order carrier tracking loop. Despite an incident moments before the launch have hindered the effective navigation of the receiver, it was observed that the experiment worked properly, acquiring new satellites and tracking them during the VSB-30 rocket flight.