857 resultados para Laptop computers
Resumo:
RESUM Actualment la majoria de nosaltres sabem de l’existència de molts programes lliures, però hem tenir clar que lliure no vol dir sempre programa gratuït. Tot i que a vegades sí que pot ser-ho, es té en compte molt més que això: és una manera de pensar i entendre el programari i al llarg dels anys ha generat tot un moviment social. Considerem que un programa lliure és aquell que garanteix als usuaris la llibertat per executar, copiar, distribuir, estudiar, canviar i millorar el codi programat, com molt bé defineixen les seves llibertats bàsiques. El programari lliure el podem trobar funcionant en ordinadors personals, escoles, empreses diverses, administracions, etc. ja que la majoria de programes que utilitzen actualment, com hem vist, tenen el seu equivalent en lliure. El fet de si és viable que una empresa es passi a programari lliure, depèn ben bé del seu entorn, ja que en funció d’aquest li serà més o menys fàcil la migració. La finalitat d’aquest projecte és, primer de tot, fer un ampli estudi del món del programari lliure i del seu moviment social. S’ha fet una recerca de diferents aspectes dins del programari lliure per conèixer-lo a fons i després s’ha proposat una possible implantació d’aquest en un usuari domèstic i en una administració pública, tenint en compte tots els aspectes vistos en l’estudi, valorant si totes les idees que defensa i els beneficis que aporta són aplicables i viables en qualsevol persona i àmbit i el perquè. Com a conclusió principal en destacaria que tot i que el programa lliure disposa d’una ideologia que agrada i té uns programes tècnicament perfectes (sense que això sigui el seu objectiu principal), penso que encara hi ha molt camí per recórrer quant a una migració en grans entorns, ja que per exemple en un ajuntament una migració total és encara difícil (tot i que no impossible perquè n’hi ha que s’hi han migrat). A l’apartat d’annexos s’hi inclou un glossari amb un seguit de terminologies amb paraules que no tothom pot saber i s’ha cregut oportú incloure-les en aquest apartat. La primera vegada que apareix alguna d’aquestes paraules la podem trobar senyalitzada amb un *.
Resumo:
En la societat d’avui dia, les empreses depenen en gran part dels seus recursos informàtics. La seva capacitat de supervivència i innovació en el mercat actual, on la competitivitat és cada dia més forta, passa per una infraestructura informàtica que els permeti, no només desplegar i implantar ordinadors i servidors de manera ràpida i eficient sinó que també les protegeixi contra parades del sistema informàtic, problemes amb servidors, caigudes o desastres físics de hardware.Per evitar aquests problemes informàtics susceptibles de poder parar el funcionament d’una empresa es va començar a treballar en el camp de la virtualització informàtica amb l’objectiu de poder trobar solucions a aquests problemes a la vegada que s’aprofitaven els recursos de hardware existents d’una manera més òptim a i eficient, reduint així també el cost de la infraestructura informàtica.L’objectiu principal d’aquest treball és veure en primer pla la conversió d’una empresa real amb una infraestructura informàtica del tipus un servidor físic -una funció cap a una infraestructura virtual del tipus un servidor físic -varis servidors virtual -vàries funcions. Analitzarem l’estat actual de l’empresa, servidors i funcions, adquirirem el hardware necessari i farem la conversió de tots els seus servidors cap a una nova infraestructura virtual.Faig especial atenció a les explicacions de perquè utilitzo una opció i no un altre i també procuro sempre donar vàries opcions. Igualment remarco en quadres verds observacions a tenir en compte complementàries al que estic explicant en aquell moment, i en quadres vermells temes en els que s’ha de posar especial atenció en el moment en que es fan. Finalment, un cop feta la conversió, veurem els molts avantatges que ens ha reportat aquesta tecnologia a nivell de fiabilitat, estabilitat, capacitat de tolerància a errades, capacitat de ràpid desplegament de noves màquines, capacitat de recuperació del sistema i aprofitament de recursos físics.
Resumo:
En aquest projecte s'avaluen els mètodes utilitzats per els mecanismes de detecció de matrícules, i es proposarà un algorisme de detecció de matrícules dissenyat específicament per a sistemes de baix cost com ara els ordinadors actuals. Utilitzarem eines al nostre abast, com càmeres fotogràfiques domèstiques o de mòbil per analitzar el rendiment de l'algorisme
Resumo:
We apply majorization theory to study the quantum algorithms known so far and find that there is a majorization principle underlying the way they operate. Grover's algorithm is a neat instance of this principle where majorization works step by step until the optimal target state is found. Extensions of this situation are also found in algorithms based in quantum adiabatic evolution and the family of quantum phase-estimation algorithms, including Shor's algorithm. We state that in quantum algorithms the time arrow is a majorization arrow.
Resumo:
Purpose: To compare the performance Glaucoma Quality of Life-15 (GQL-15) Questionnaire, intraocular pressure measurement (IOP Goldmann tonometry) and a measure of visual field loss using Moorfields Motion Displacement Test (MDT) in detecting glaucomatous eyes from a self referred population. Methods: The GQL-15 has been suggested to correlate with visual disability and psychophysical measures of visual function in glaucoma patients. The Moorfields MDT is a multi location perimetry test with 32 white line stimuli presented on a grey background on a standard laptop computer. Each stimulus is displaced between computer frames to give the illusion of "apparent motion". Participants (N=312, 90% older than 45 years; 20.5% family history of glaucoma) self referred to an advertised World Glaucoma Day (March 2009) Jules Gonin Eye Hospital, Lausanne Switzerland. Participants underwent a clinical exam (IOP, slit lamp, angle and disc examination by a general ophthalmologist), 90% completed a GQL-15 questionnaire and over 50% completed a MDT test in both eyes. Those who were classified as abnormal on one or more of the following (IOP >21 mmHg/ GQL-15 score >20/ MDT score >2/ clinical exam) underwent a follow up clinical examination by a glaucoma specialist including imaging and threshold perimetry. After the second examination subjects were classified as "healthy"(H), "glaucoma suspect" (GS) (ocular hypertension and/or suspicious disc, angle closure with SD) or "glaucomatous" (G). Results: One hundred and ten subjects completed all 4 initial examinations; of these 69 were referred to complete the 2nd examination and were classified as; 8 G, 24 GS, and 37 H. MDT detected 7/8 G, and 7/24 GS, with false referral rate of 3.8%. IOP detected 2/8 G and 8/24 GS, with false referral rate of 8.9%. GQL-15 detected 4/8 G, 16/24 GS with a false referral rate of 42%. Conclusions: In this sample of participants attending a self referral glaucoma detection event, the MDT performed significantly better than the GQL-15 and IOP in discriminating glaucomatous patients from healthy subjects. Further studies are required to assess the potential of the MDT as a glaucoma screening tool.
Resumo:
A large percentage of bridges in the state of Iowa are classified as structurally or fiinctionally deficient. These bridges annually compete for a share of Iowa's limited transportation budget. To avoid an increase in the number of deficient bridges, the state of Iowa decided to implement a comprehensive Bridge Management System (BMS) and selected the Pontis BMS software as a bridge management tool. This program will be used to provide a selection of maintenance, repair, and replacement strategies for the bridge networks to achieve an efficient and possibly optimal allocation of resources. The Pontis BMS software uses a new rating system to evaluate extensive and detailed inspection data gathered for all bridge elements. To manually collect these data would be a highly time-consuming job. The objective of this work was to develop an automated-computerized methodology for an integrated data base that includes the rating conditions as defined in the Pontis program. Several of the available techniques that can be used to capture inspection data were reviewed, and the most suitable method was selected. To accomplish the objectives of this work, two userfriendly programs were developed. One program is used in the field to collect inspection data following a step-by-step procedure without the need to refer to the Pontis user's manuals. The other program is used in the office to read the inspection data and prepare input files for the Pontis BMS software. These two programs require users to have very limited knowledge of computers. On-line help screens as well as options for preparing, viewing, and printing inspection reports are also available. The developed data collection software will improve and expedite the process of conducting bridge inspections and preparing the required input files for the Pontis program. In addition, it will eliminate the need for large storage areas and will simplify retrieval of inspection data. Furthermore, the approach developed herein will facilitate transferring these captured data electronically between offices within the Iowa DOT and across the state.
Resumo:
This report describes the results of the research project investigating the use of advanced field data acquisition technologies for lowa transponation agencies. The objectives of the research project were to (1) research and evaluate current data acquisition technologies for field data collection, manipulation, and reporting; (2) identify the current field data collection approach and the interest level in applying current technologies within Iowa transportation agencies; and (3) summarize findings, prioritize technology needs, and provide recommendations regarding suitable applications for future development. A steering committee consisting oretate, city, and county transportation officials provided guidance during this project. Technologies considered in this study included (1) data storage (bar coding, radio frequency identification, touch buttons, magnetic stripes, and video logging); (2) data recognition (voice recognition and optical character recognition); (3) field referencing systems (global positioning systems [GPS] and geographic information systems [GIs]); (4) data transmission (radio frequency data communications and electronic data interchange); and (5) portable computers (pen-based computers). The literature review revealed that many of these technologies could have useful applications in the transponation industry. A survey was developed to explain current data collection methods and identify the interest in using advanced field data collection technologies. Surveys were sent out to county and city engineers and state representatives responsible for certain programs (e.g., maintenance management and construction management). Results showed that almost all field data are collected using manual approaches and are hand-carried to the office where they are either entered into a computer or manually stored. A lack of standardization was apparent for the type of software applications used by each agency--even the types of forms used to manually collect data differed by agency. Furthermore, interest in using advanced field data collection technologies depended upon the technology, program (e.g.. pavement or sign management), and agency type (e.g., state, city, or county). The state and larger cities and counties seemed to be interested in using several of the technologies, whereas smaller agencies appeared to have very little interest in using advanced techniques to capture data. A more thorough analysis of the survey results is provided in the report. Recommendations are made to enhance the use of advanced field data acquisition technologies in Iowa transportation agencies: (1) Appoint a statewide task group to coordinate the effort to automate field data collection and reporting within the Iowa transportation agencies. Subgroups representing the cities, counties, and state should be formed with oversight provided by the statewide task group. (2) Educate employees so that they become familiar with the various field data acquisition technologies.
Resumo:
The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.
Resumo:
We show that a chemically engineered structural asymmetry in [Tb2] molecular clusters renders the two weakly coupled Tb3+ spin qubits magnetically inequivalent. The magnetic energy level spectrum of these molecules meets then all conditions needed to realize a universal CNOT quantum gate. A proposal to realize a SWAP gate within the same molecule is also discussed. Electronic paramagnetic resonance experiments confirm that CNOT and SWAP transitions are not forbidden.
Resumo:
It has been shown that repolarization alternans, a beat-to-beat alternation in action potential duration, enhances dispersion of repolarization above a critical heart rate and promotes susceptibility to ventricular arrhythmias. It is unknown whether repolarization alternans is measurable in the atria using standard pacemakers and whether it plays a role in promoting atrial fibrillation. In this work, atrial repolarization alternans amplitude and periodicity are studied in a sheep model of pacing-induced atrial fibrillation. Two pacemakers, each with one right atrial and ventricular lead, were implanted in 4 male sheep after ablation of the atrioventricular junction. The first one was used to deliver rapid pacing for measurements of right atrial repolarization alternans and the second one to record a unipolar electrogram. Atrial repolarization alternans appeared rate-dependent and its amplitude increased as a function of pacing rate. Repolarization alternans was intermittent but no periodicity was detected. An increase of repolarization alternans preceding episodes of non-sustained atrial fibrillation suggests that repolarization alternans is a promising parameter for assessment of atrial fibrillation susceptibility.
Resumo:
Recent years have witnessed the increasing interest in studies focused on information literacy, which is reflected mainly in the number of publications on the subject and goes beyond the fields of Librarianship and Information Science. The purpose of this paper is, therefore, to offer an outlook, historical and conceptual, of international researches on information literacy, trying to show some of the different ramifications which the discussion on the subject has exhibited in past few years in countries where its process of legitimation is already well established, in order to illuminate possible areas of research and action for the librarian professional. This research indicates that if the initial studies on this topic tended to be devoted to conceptualize it, discussing its relevance and determine the skills and knowledge related to information literacy, in the last decade can be noticed a proliferation of researches aimed at describing initiatives or proposing models in areas beyond the usual field such as Medical Sciences, Law, Politics or Computers, among others. The first results of this research refer to a philosophical and educational perspective of information literacy, which suggests the need for deeper understanding and characterization of information literacy in four dimensions: technical, aesthetic, ethical and political, serving both to competence as to information.
Resumo:
The primary objectives of the Electronic Bulletin Board System (BBS) project were to: (1) Provide an electronic communication tool which would link city and county engineering offices to each other and to other governmental agencies for messaging and data sharing; (2) Provide a dial-up site for reference information or files accessible on-demand; and (3) Provide a "stepping stone" to the world of electronic data transfer, recognizing that most local government employees face a huge complex of technology with limited knowledge of computers and communications tools. The system was designed to be as simple as possible, and to require minimal equipment and software cost to the users. The original system was an Apex 386/25 computer with MS-DOS 5.0 software and the final configuration was an HP Vectra XM Pentium 90 with MS-NT 3.51 and Mustang - Wildcat 5.0 software. The users of the BBS were county engineers and their staff, offices in the central office of the Iowa Department of Transportation (DOT) and Resident Construction Engineers at the Iowa DOT. Much of the activity was between the county engineers, and their staffs, and the Iowa DOT offices with which they have ongoing business activities. The BBS contained files for mapping, Internet e-mail service, Accident Location Analysis System (ALAS) data, Iowa DOT bid lettings, and Autocad and Intergraph maps and standards. The 800 line calls were recorded and gave the best indication of the usage and the trends that were being followed. The usage tended to be higher in the winter months when design activities are occurring and lower in the summer months when the construction is in progress. The project was judged a success. The BBS did provide a "stepping stone" to the world of electronic data transfer.
Resumo:
Kansas State University, with funding from the Kansas Department of Transportation (KDOT), has developed a computerized reduction system for profilograms produced by mechanical profilographs. The commercial version of the system (ProScan (trademark)) is marketed by Devore Systems, Inc. The system consists of an IBM Compatible PC 486SX33 computer or better, Epson LQ-570 printer, a Logitech Scanman 32 hand scanner system, a paper transport unit, and the ProScan software. The Scanner is not adaptable to IBM computers with the micro channel architecture. The Iowa DOT Transportation Centers could realize the following advantages by using ProScan: (1) Save about 5 to 8 staff hours of reduction and reporting time per Transportation Center per week for a Materials Technician 3 or 4 (the time savings would come during the busiest part of the season); (2) Reduce errors in reduction, transfer, and typing of profile values; (3) Increase the accuracy of the monitor results; and (4) Allow rapid evaluation of contractor traces when tolerance limits between monitor and certified results are exceeded.