920 resultados para Computer System Management


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this paper is to demonstrate the potential of the EXODUS evacuation model in building environments. The latest PC/workstation version of EXODUS is described and is also applied to a large hypothetical supermarket/restaurant complex measuring 50 m x 40 m. A range of scenarios is presented where population characteristics (such as size, individual travel speeds, and individual response times), and enclosure configuration characteristics (such as number of exits, size of exits, and opening times of exits) are varied. The results demonstrate a wide range of occupant behavior including overtaking, queuing, redirection, and conflict avoidance. Evacuation performance is measured by a number of model predicted parameters including individual exit flow rates, overall evacuation flow rates, total evacuation time, average evacuation time per occupant, average travel distance, and average wait time. The simulations highlight the profound impact that variations in individual travel speeds and occupant response times have in determining the overall evacuation performance. 1. Jin, T., and Yamada T., "Experimental Study of Human Behavior in Smoke Filled Corridors," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 511-519. 2. Galea, E.R., and Galparsoro, J.M.P., "EXODUS: An Evacuation Model for Mass Transport Vehicles," UK CAA Paper 93006 ISBN 086039 543X, CAA London, 1993. 3. Galea, E.R., and Galparsoro, J.M.P., "A Computer Based Simulation Model for the Prediction of Evacuation from Mass Transport Vehicles," Fire Safety Journal, Vol. 22, 1994, pp. 341-366. 4. Galea, E.R., Owen, M., and Lawrence, P., "Computer Modeling of Human Be havior in Aircraft Fire Accidents," to appear in the Proceedings of Combus tion Toxicology Symposium, CAMI, Oklahoma City, OK, 1995. 5. Kisko, T.M. and Francis, R.L., "EVACNET+: A Computer Program to Determine Optimal Building Evacuation Plans," Fire Safety Journal, Vol. 9, 1985, pp. 211-220. 6. Levin, B., "EXITT, A Simulation Model of Occupant Decisions and Actions in Residential Fires," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 561-570. 7. Fahy, R.F., "EXIT89: An Evacuation Model for High-Rise Buildings," Pro ceedings of The Third International Sym posium on Fire Safety Science, 1991, pp. 815-823. 8. Thompson, P.A., and Marchant, E.W., "A Computer Model for the Evacuation of Large Building Populations," Fire Safety Journal, Vol. 24, 1995, pp. 131-148. 9. Still, K., "New Computer System Can Predict Human Behavior Response to Building Fires," FIRE 84, 1993, pp. 40-41. 10. Ketchell, N., Cole, S.S., Webber, D.M., et.al., "The Egress Code for Human Move ment and Behavior in Emergency Evacu ations," Engineering for Crowd Safety (Smith, R.A., and Dickie, J.F., Eds.), Elsevier, 1993, pp. 361-370. 11. Takahashi, K., Tanaka, T. and Kose, S., "An Evacuation Model for Use in Fire Safety Design of Buildings," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 551- 560. 12. G2 Reference Manual, Version 3.0, Gensym Corporation, Cambridge, MA. 13. XVT Reference Manual, Version 3.0 XVT Software Inc., Boulder, CO. 14. Galea, E.R., "On the Field Modeling Approach to the Simulation of Enclosure Fires, Journal of Fire Protection Engineering, Vol. 1, No. 1, 1989, pp. 11-22. 15. Purser, D.A., "Toxicity Assessment of Combustion Products," SFPE Handbook of Fire Protection Engineering, National Fire Protection Association, Quincy, MA, pp. 1-200 - 1-245, 1988. 16. Hankin, B.D., and Wright, R.A., "Pas senger Flows in Subways," Operational Research Quarterly, Vol. 9, 1958, pp. 81-88. 17. HMSO, The Building Regulations 1991 - Approved Document B, section B 1 (1992 edition), HMSO publications, London, pp. 9-40. 18. Polus A., Schofer, J.L., and Ushpiz, A., "Pedestrian Flow and Level of Service," Journal of Transportation Engineering, Vol. 109, 1983, pp. 46-47. 19. Muir, H., Marrison, C., and Evans, A., "Aircraft Evacuations: the Effect of Passenger Motivation and Cabin Con figuration Adjacent to the Exit," CAA Paper 89019, ISBN 0 86039 406 9, 1989. 20. Muir, H., Private communication to appear as a CAA report, 1996.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The scalability of a computer system is its response to growth. It is also depended on its hardware, its operating system and the applications it is running. Most distributed systems technology today still depends on bus-based shared memory which do not scale well, and systems based on the grid or hypercube scheme requires significantly less connections than a full inter-connection that would exhibit a quadratic growth rate. The rapid convergence of mobile communication, digital broadcasting and network infrastructures calls for rich multimedia content that is adaptive and responsive to the needs of individuals, businesses and the public organisations. This paper will discuss the emergence of mobile Multimedia systems and provides an overview of the issues regarding design and delivery of multimedia content to mobile devices.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2015

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Smart Grids (SGs) appeared as the new paradigm for power system management and operation, being designed to integrate large amounts of distributed energy resources. This new paradigm requires a more efficient Energy Resource Management (ERM) and, simultaneously, makes this a more complex problem, due to the intensive use of distributed energy resources (DER), such as distributed generation, active consumers with demand response contracts, and storage units. This paper presents a methodology to address the energy resource scheduling, considering an intensive use of distributed generation and demand response contracts. A case study of a 30 kV real distribution network, including a substation with 6 feeders and 937 buses, is used to demonstrate the effectiveness of the proposed methodology. This network is managed by six virtual power players (VPP) with capability to manage the DER and the distribution network.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Projecto Final para obtenção do grau de Mestre em Engenharia Informática e de Computadores

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Consider a distributed computer system comprising many computer nodes, each interconnected with a controller area network (CAN) bus. We prove that if priorities to message streams are assigned using rate-monotonic (RM) and if the requested capacity of the CAN bus does not exceed 25% then all deadlines are met.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The integration of growing amounts of distributed generation in power systems, namely at distribution networks level, has been fostered by energy policies in several countries around the world, including in Europe. This intensive integration of distributed, non-dispatchable, and natural sources based generation (including wind power) has caused several changes in the operation and planning of power systems and of electricity markets. Sometimes the available non-dispatchable generation is higher than the demand. This generation must be used; otherwise it is wasted if not stored or used to supply additional demand. New policies and market rules, as well as new players, are needed in order to competitively integrate all the resources. The methodology proposed in this paper aims at the maximization of the social welfare in a distribution network operated by a virtual power player that aggregates and manages the available energy resources. When facing a situation of excessive non-dispatchable generation, including wind power, real time pricing is applied in order to induce the increase of consumption so that wind curtailment is minimized. This method is especially useful when actual and day-ahead resources forecast differ significantly. The distribution network characteristics and concerns are addressed by including the network constraints in the optimization model. The proposed methodology has been implemented in GAMS optimization tool and its application is illustrated in this paper using a real 937-bus distribution network with 20.310 consumers and 548 distributed generators, some of them non-dispatchable and with must take contracts. The implemented scenario corresponds to a real day in Portuguese power system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Load forecasting has gradually becoming a major field of research in electricity industry. Therefore, Load forecasting is extremely important for the electric sector under deregulated environment as it provides a useful support to the power system management. Accurate power load forecasting models are required to the operation and planning of a utility company, and they have received increasing attention from researches of this field study. Many mathematical methods have been developed for load forecasting. This work aims to develop and implement a load forecasting method for short-term load forecasting (STLF), based on Holt-Winters exponential smoothing and an artificial neural network (ANN). One of the main contributions of this paper is the application of Holt-Winters exponential smoothing approach to the forecasting problem and, as an evaluation of the past forecasting work, data mining techniques are also applied to short-term Load forecasting. Both ANN and Holt-Winters exponential smoothing approaches are compared and evaluated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A cidade do Porto é uma das regiões do país onde é importante uma gestão sustentável e integrada dos recursos hídricos. A (re) utilização de água surge neste contexto como uma possível resposta na sua utilização como um recurso hídrico passível de ser usado beneficamente, permitindo a poupança de fontes de água convencionais e aumentando a disponibilidade dos recursos hídricos existentes para finalidades que requerem padrões de qualidade mais exigentes. O potencial desta prática no nosso país é enorme, considerando que o volume de água tratada descarregada no ano 2000 era suficiente para suprir 10% das necessidades em água para rega num ano seco, sem necessidade de armazenamento sazonal. Por outro lado, um sistema de rega, quando devidamente projetado e funcionando adequadamente, permite que a água seja aplicada com um caudal, duração e frequência que maximizam o consumo da água e nutrientes pela planta. Este projeto consiste no desenvolvimento de um Sistema de Gestão Técnica para o controlo do sistema de rega dos jardins do ISEP – Instituto Politécnico de Engenharia do Porto com recurso a um autómato programável (PLC). Pretende-se otimizar os consumos energéticos do sistema de rega tendo em conta os parâmetros de humidade, temperatura e velocidade do vento característicos do local a regar. Outros dos objetivos é controlar o processo de enchimento e de rega. Esta operação consiste no controlo das bombas e respetivos débitos e conhecimento dos caudais necessários. Pretende-se, igualmente, definir e colocar em marcha todo o equipamento necessário para a realização do projeto. Os dados coletados devem ser tratados de tal modo que possam ser realizadas análises diárias, mensais e/ou anuais. Neste trabalho foram efetuados os cálculos de dimensionamentos relativamente às necessidades hídricas da planta e necessidades de rega, entre outros.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

RESUMO - Introdução: A literatura aponta que a gravidez é um período do ciclo reprodutivo associado com o excesso de peso, que se tem tornado um problema de saúde pública em ascensão. Na verdade, evidências sugerem que o excessivo peso pré-gestacional e o ganho ponderal excessivo estão associados a um peso elevado do RN. Objetivos: Relacionar o IMC antes da conceção e o ganho ponderal durante a gestação com o PN do RN. Métodos: Foi realizado um estudo epidemiológico, analítico, observacional e transversal, com uma amostra de cento e três mães e respetivos RNs, de termo, saudáveis e de gravidez única, da Unidade de Obstetrícia do Hospital Beatriz Ângelo. Estas foram recrutadas entre novembro de 2012 e março de 2013 inclusive. Para tal, foram recolhidos dados clínicos e outras informações relativas à gravidez e parto, nomeadamente o PN, através do sistema informático. Resultados: Após a análise dos resultados, constatou-se que mães com IMC superior a 25 antes da gravidez apresentam ganho ponderal durante a gravidez acima dos valores recomendados (47,2%). A prevalência de macrossomia e baixo peso ao nascer também foi maior em mães com excesso de peso (p=0,021), tal como de PIG e GIG (p=0,004). Observando a influência do ganho ponderal verificou-se que 9,5% (n=4) das mães com ganho ponderal excessivo tiveram RN com elevado peso ao nascer, enquanto 14,3% (n=4) das mães com ganho ponderal abaixo do recomendado tiveram RN com baixo peso ao nascer (p=0,018). Verificou-se também que o tempo de gestação é maior em mães com ganho ponderal acima do recomendado (p=0,024), e que este fator está positivamente associado com o PN (r=0,218; p=0,029), comprimento (r=0,221; p=0,027) e PC (r=0,249; p=0,012) do RN. No que se refere às correlações, encontrou-se uma correlação positiva moderada entre os fatores maternos (peso antes de engravidar; IMC pré-gestacional; e ganho ponderal) e o PN. Discussão/Conclusão: Desta forma, podemos concluir que tanto o excesso de peso pré-gestacional como o ganho de peso inadequado durante a gestação têm implicações diretas no peso do recém-nascido, nomeadamente aumentando o risco de macrossomia fetal.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Les nouvelles technologies de l’information et des communications occupent aujourd’hui une place importante dans les entreprises, quelle que soit la taille ou le(s) domaine(s) d’activité de ces dernières. Elles participent de manière positive au développement de la vie économique. Elles sont toutefois à l’origine d’une nouvelle forme de criminalité qui menace la sécurité et l’intégrité des systèmes informatiques dans l’entreprise. Celle-ci est d’une ampleur difficile à évaluer, mais surtout difficile à maîtriser avec les dispositions législatives déjà en place, laissant par là même apparaître qu’une adaptation au niveau juridique est inévitable. Certains pays industrialisés ont ainsi décidé de mettre en place un cadre juridique adéquat pour garantir aux entreprises la sécurité de leurs systèmes informatiques. Notre étude va justement porter sur les dispositifs mis en place par deux systèmes juridiques différents. Forcés de prendre en compte une réalité nouvelle – qui n’existait pas nécessairement il y a plusieurs années –, la France et le Canada ont décidé de modifier respectivement leurs codes pénal et criminel en leur ajoutant des dispositions qui répriment de nouvelles infractions. À travers cet exposé, nous allons analyser les infractions qui portent atteinte à la sécurité du système informatique de l’entreprise à la lumière des outils juridiques mis en place. Nous allons mesurer leur degré d’efficacité face à la réalité informatique. En d’autres termes, il s’agit pour nous de déterminer si le droit va répondre ou non aux besoins de l’informatique.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Traditionally, we've focussed on the question of how to make a system easy to code the first time, or perhaps on how to ease the system's continued evolution. But if we look at life cycle costs, then we must conclude that the important question is how to make a system easy to operate. To do this we need to make it easy for the operators to see what's going on and to then manipulate the system so that it does what it is supposed to. This is a radically different criterion for success. What makes a computer system visible and controllable? This is a difficult question, but it's clear that today's modern operating systems with nearly 50 million source lines of code are neither. Strikingly, the MIT Lisp Machine and its commercial successors provided almost the same functionality as today's mainstream sytsems, but with only 1 Million lines of code. This paper is a retrospective examination of the features of the Lisp Machine hardware and software system. Our key claim is that by building the Object Abstraction into the lowest tiers of the system, great synergy and clarity were obtained. It is our hope that this is a lesson that can impact tomorrow's designs. We also speculate on how the spirit of the Lisp Machine could be extended to include a comprehensive access control model and how new layers of abstraction could further enrich this model.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Aquest projecte final de carrera pretén investigar i experimentar una nova línia de desenvolupament d’algorismes dinàmics. A partir de l’algorisme AntNet-QoS [2] s’ incorporen noves mesures a l’algorisme (mesura de l’amplada de banda disponible i jitter), les quals combinant amb la mesura de retard ja feta servir, permet adaptar-se millor a les condicions actuals del trànsit en la xarxa i als requeriments específics de qualitat (QoS) per part del trànsit

Relevância:

80.00% 80.00%

Publicador:

Resumo:

El Sistema de Desarrollo Administrativo y sus alcances en la actual Ley de Administración Pública. Antes de la Ley 489 de 1998 las entidades de la Administración Pública no trabajaban en forma coordinada y la colaboración interinstitucional era deficiente, lo cual se ha corregido con la entrada en vigencia de la citada norma. Con la aplicación del Sistema de Desarrollo Administrativo creado por la Ley 489 de 1998, las entidades de la Administración Pública del Orden Nacional y Territorial, deben aplicar un conjunto de políticas, estrategias, metodologías, técnicas y mecanismos de carácter administrativo y organizacional para la gestión y manejo de sus recursos humanos, técnicos, materiales, físicos y financieros, tendientes a fortalecer su capacidad administrativa y su desempeño institucional. Las Políticas de Desarrollo Administrativo fueron plasmadas en el artículo 17 de la Ley 489 de 1998 y reagrupadas por el Decreto 3622 de 2005, en cinco ítems para su mejor comprensión y aplicación: 1) Política de Desarrollo del Talento Humano Estatal. 2) Política de Gestión de la Calidad 3) Política de Democratización de la Administración Pública. 4) Política de Moralización y Transparencia de la Administración Pública y 5) Política de Rediseños Organizacionales. Las anteriores políticas junto con el Plan Nacional de Formación y Capacitación constituyen los Fundamentos del Sistema de Desarrollo Administrativo de que trata el artículo 16 de la Ley 489 de 1998, las cuales se aplican actualmente en los 19 Sectores Administrativos de la Rama Ejecutiva del Orden Nacional. En el Orden Territorial la aplicación del Sistema de Desarrollo Administrativo ha sido parcial y los resultados aún no están consolidados. Nuestra investigación pretende que con el conocimiento claro del tema, a través de una adecuada planificación de los recursos de las entidades públicas, orientado a fortalecer la capacidad administrativa y el desempeño institucional de las entidades públicas, se administre mejor el Estado.