976 resultados para ANPSP control model


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern software systems are often large and complicated. To better understand, develop, and manage large software systems, researchers have studied software architectures that provide the top level overall structural design of software systems for the last decade. One major research focus on software architectures is formal architecture description languages, but most existing research focuses primarily on the descriptive capability and puts less emphasis on software architecture design methods and formal analysis techniques, which are necessary to develop correct software architecture design. ^ Refinement is a general approach of adding details to a software design. A formal refinement method can further ensure certain design properties. This dissertation proposes refinement methods, including a set of formal refinement patterns and complementary verification techniques, for software architecture design using Software Architecture Model (SAM), which was developed at Florida International University. First, a general guideline for software architecture design in SAM is proposed. Second, specification construction through property-preserving refinement patterns is discussed. The refinement patterns are categorized into connector refinement, component refinement and high-level Petri nets refinement. These three levels of refinement patterns are applicable to overall system interaction, architectural components, and underlying formal language, respectively. Third, verification after modeling as a complementary technique to specification refinement is discussed. Two formal verification tools, the Stanford Temporal Prover (STeP) and the Simple Promela Interpreter (SPIN), are adopted into SAM to develop the initial models. Fourth, formalization and refinement of security issues are studied. A method for security enforcement in SAM is proposed. The Role-Based Access Control model is formalized using predicate transition nets and Z notation. The patterns of enforcing access control and auditing are proposed. Finally, modeling and refining a life insurance system is used to demonstrate how to apply the refinement patterns for software architecture design using SAM and how to integrate the access control model. ^ The results of this dissertation demonstrate that a refinement method is an effective way to develop a high assurance system. The method developed in this dissertation extends existing work on modeling software architectures using SAM and makes SAM a more usable and valuable formal tool for software architecture design. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Access control (AC) limits access to the resources of a system only to authorized entities. Given that information systems today are increasingly interconnected, AC is extremely important. The implementation of an AC service is a complicated task. Yet the requirements to an AC service vary a lot. Accordingly, the design of an AC service should be flexible and extensible in order to save development effort and time. Unfortunately, with conventional object-oriented techniques, when an extension has not been anticipated at the design time, the modification incurred by the extension is often invasive. Invasive changes destroy design modularity, further deteriorate design extensibility, and even worse, they reduce product reliability. ^ A concern is crosscutting if it spans multiple object-oriented classes. It was identified that invasive changes were due to the crosscutting nature of most unplanned extensions. To overcome this problem, an aspect-oriented design approach for AC services was proposed, as aspect-oriented techniques could effectively encapsulate crosscutting concerns. The proposed approach was applied to develop an AC framework that supported role-based access control model. In the framework, the core role-based access control mechanism is given in an object-oriented design, while each extension is captured as an aspect. The resulting framework is well-modularized, flexible, and most importantly, supports noninvasive adaptation. ^ In addition, a process to formalize the aspect-oriented design was described. The purpose is to provide high assurance for AC services. Object-Z was used to specify the static structure and Predicate/Transition net was used to model the dynamic behavior. Object-Z was extended to facilitate specification in an aspect-oriented style. The process of formal modeling helps designers to enhance their understanding of the design, hence to detect problems. Furthermore, the specification can be mathematically verified. This provides confidence that the design is correct. It was illustrated through an example that the model was ready for formal analysis. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The main focus of this research is to design and develop a high performance linear actuator based on a four bar mechanism. The present work includes the detailed analysis (kinematics and dynamics), design, implementation and experimental validation of the newly designed actuator. High performance is characterized by the acceleration of the actuator end effector. The principle of the newly designed actuator is to network the four bar rhombus configuration (where some bars are extended to form an X shape) to attain high acceleration. Firstly, a detailed kinematic analysis of the actuator is presented and kinematic performance is evaluated through MATLAB simulations. A dynamic equation of the actuator is achieved by using the Lagrangian dynamic formulation. A SIMULINK control model of the actuator is developed using the dynamic equation. In addition, Bond Graph methodology is presented for the dynamic simulation. The Bond Graph model comprises individual component modeling of the actuator along with control. Required torque was simulated using the Bond Graph model. Results indicate that, high acceleration (around 20g) can be achieved with modest (3 N-m or less) torque input. A practical prototype of the actuator is designed using SOLIDWORKS and then produced to verify the proof of concept. The design goal was to achieve the peak acceleration of more than 10g at the middle point of the travel length, when the end effector travels the stroke length (around 1 m). The actuator is primarily designed to operate in standalone condition and later to use it in the 3RPR parallel robot. A DC motor is used to operate the actuator. A quadrature encoder is attached with the DC motor to control the end effector. The associated control scheme of the actuator is analyzed and integrated with the physical prototype. From standalone experimentation of the actuator, around 17g acceleration was achieved by the end effector (stroke length was 0.2m to 0.78m). Results indicate that the developed dynamic model results are in good agreement. Finally, a Design of Experiment (DOE) based statistical approach is also introduced to identify the parametric combination that yields the greatest performance. Data are collected by using the Bond Graph model. This approach is helpful in designing the actuator without much complexity.

Relevância:

90.00% 90.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

En el estudio que originó este artículo se elaboró una propuesta de mejora del sistema de inventarios para una comercializadora de alimentos en la ciudad de Santa Marta, a fin de lograr una reducción en los costos de inventario y un incremento en el beneficio económico de la organización, mediante la planificación y control de las compras y ventas de los productos. El proceso aplicado consiste en la clasificación de los productos manejados por la empresa con el método ABC, de acuerdo con la importancia de cada producto en el total de ventas de la distribuidora; posteriormente se aplicó el modelo de Cantidad Económica de Pedido –EOQ–, con el fin de sistematizar los conteos periódicos en los productos guardados en bodega, establecer los registros de las ventas realizadas, determinar la cantidad óptima de pedidos y el momento justo en el cual se debe pedir mercancía a los proveedores y las cantidades mínimas de reorden.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

El ejercicio de labores asistenciales en el personal de la salud, las largas horas de trabajo y la responsabilidad en la ejecución de sus tareas, llevan consigo la exposición a riesgos psicosociales; que de no ser debidamente controlados pueden llevar al individuo a generar respuestas inadecuadas a nivel cognitivo, emocional e intelectual, las cuales se manifiestan en algunos casos con la aparición de sintomatología osteomuscular y/o asociada al estrés. OBJETIVO Identificar la relación entre las demandas de la tarea, el control sobre las mismas y la presencia e intensidad de síntomas de estrés y osteo-musculares en médicos, especialistas y personal de enfermería de una institución hospitalaria de IV nivel en Bogotá. Métodos Estudio de corte transversal en una muestra de 100 profesionales de la salud. Se utilizaron tres instrumentos: cuestionario Nórdico para la detección y análisis de síntomas músculo esqueléticos, cuestionario Karasek para identificar la percepción del trabajo y la relación del entorno profesional y el cuestionario de Estrés del Ministerio de la Protección Social validado para la población colombiana. Se obtuvo previa autorización del Comité de Investigaciones y Comité de Ética del Hospital. El análisis estadístico se realizó con el IBM SPSS Statistics versión 2.0 Resultados Se observó que los síntomas osteomusculares con mayor prevalencia estuvieron relacionados con afectaciones en espalda 43% y cuello 36%; no se observan diferencias estadísticamente significativas entre los distintos profesionales. En cuanto a presencia de sintomatología asociada al estrés, la mayor prevalencia se presentó en síntomas osteomusculares en cuello y espalda en el 84% de los casos, dolor de cabeza en el 74%, trastornos del sueño y cansancio en el 64% y percepción de sobrecarga laboral en el 63%. Para el análisis de prevalencia de los factores psicosociales laborales se utilizó la clasificación de la combinación de altas o bajas demandas y alto o bajo control, el resultado de estos teniendo en cuenta el modelo Demanda-control fue la siguiente: trabajo de alta tensión 34%; trabajo activo 40%; trabajo aburrido 13% y trabajo pasivo 13%. Se encontró una asociación entre la sintomatología y las variables toma de decisiones en médicos especialistas (OR 3,12; IC 95%: 2,80 – 3,49) lo que ratifica que este tipo de profesional tiene una mayor libertad para generar decisiones en su actuar médico y control sobre la tarea para especialistas (OR 3,23; IC 95%: 2,82 – 3,70) y enfermeros jefes (OR 3,36; IC 95%: 2,91 – 3,89); lo que permite inferir que cada uno de estos profesionales posee las herramientas para asumir las exigencias y dar respuesta a los distintos aspectos que están ligados a la tarea. Conclusiones: La presencia de síntomas osteo musculares en zonas como cuello y espalda son propios de la actividad del personal de la salud y se asocia a las posturas inadecuadas y el puesto de trabajo, así como al estrés. En cuanto a la sintomatología asociada al estrés se ratifica la presencia de sintomatología osteo muscular (cuello y espalda), como manifestaciones asociadas al cansancio, trastornos del sueño, sobrecarga laboral, dolor de cabeza y en menor porcentaje dificultades para relacionarse con otros. Respecto a los factores de riesgo psicosocial, se observó que el trabajo activo es la condición predominante en el personal de la salud, pero se observa además que un porcentaje importante experimenta episodios de tensión laboral, asociados a condiciones propias de las demandas psicológicas y el control sobre la tarea. Por lo anterior, se deben establecer acciones encaminadas a favorecer espacios saludables, y programas tendientes a la mejora de las condiciones de tal manera que disminuya la presencia de sintomatología osteomuscular y/o sintomatología derivada del estrés.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis project studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. For the agent identity privacy problem in the LQG control, privacy models and privacy measures have to be established first. It depends on a trajectory of correlated data rather than a single observation. I propose here privacy models and the corresponding privacy measures by taking into account the two characteristics. The agent identity is a binary hypothesis: Agent A or Agent B. An eavesdropper is assumed to make a hypothesis testing on the agent identity based on the intercepted environment state sequence. The privacy risk is measured by the Kullback-Leibler divergence between the probability distributions of state sequences under two hypotheses. By taking into account both the accumulative control reward and privacy risk, an optimization problem of the policy of Agent B is formulated. The optimal deterministic privacy-preserving LQG policy of Agent B is a linear mapping. A sufficient condition is given to guarantee that the optimal deterministic privacy-preserving policy is time-invariant in the asymptotic regime. An independent Gaussian random variable cannot improve the performance of Agent B. The numerical experiments justify the theoretic results and illustrate the reward-privacy trade-off. Based on the privacy model and the LQG control model, I have formulated the mathematical problems for the agent identity privacy problem in LQG. The formulated problems address the two design objectives: to maximize the control reward and to minimize the privacy risk. I have conducted theoretic analysis on the LQG control policy in the agent identity privacy problem and the trade-off between the control reward and the privacy risk.Finally, the theoretic results are justified by numerical experiments. From the numerical results, I expected to have some interesting observations and insights, which are explained in the last chapter.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper deals with the problem of tracking target sets using a model predictive control (MPC) law. Some MPC applications require a control strategy in which some system outputs are controlled within specified ranges or zones (zone control), while some other variables - possibly including input variables - are steered to fixed target or set-point. In real applications, this problem is often overcome by including and excluding an appropriate penalization for the output errors in the control cost function. In this way, throughout the continuous operation of the process, the control system keeps switching from one controller to another, and even if a stabilizing control law is developed for each of the control configurations, switching among stable controllers not necessarily produces a stable closed loop system. From a theoretical point of view, the control objective of this kind of problem can be seen as a target set (in the output space) instead of a target point, since inside the zones there are no preferences between one point or another. In this work, a stable MPC formulation for constrained linear systems, with several practical properties is developed for this scenario. The concept of distance from a point to a set is exploited to propose an additional cost term, which ensures both, recursive feasibility and local optimality. The performance of the proposed strategy is illustrated by simulation of an ill-conditioned distillation column. (C) 2010 Elsevier Ltd. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Different interceptive tasks and modes of interception (hitting or capturing) do not necessarily involve similar control processes. Control based on preprogramming of movement parameters is possible for actions with brief movement times but is now widely rejected; continuous perceptuomotor control models are preferred for all types of interception. The rejection of preprogrammed control and acceptance of continuous control is evaluated for the timing of rapidly executed, manual hitting actions. It is shown that a preprogrammed control model is capable of providing a convincing account of observed behavior patterns that avoids many of the arguments that have been raised against it. Prominent continuous perceptual control models are analyzed within a common framework and are shown to be interpretable as feedback control strategies. Although these models can explain observations of on-line adjustments to movement, they offer only post hoc explanations for observed behavior patterns in hitting tasks and are not directly supported by data. It is proposed that rapid manual hitting tasks make up a class of interceptions for which a preprogrammed strategy is adopted-a strategy that minimizes the role of visual feedback. Such a strategy is effective when the task demands a high degree of temporal accuracy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Grande parte dos triples-stores são open source e desenvolvidos em Java, disponibilizando interfaces standards e privadas de acesso. A grande maioria destes sistemas não dispõe de mecanismos de controlo de acessos nativos, o que dificulta ou impossibilita a sua adopção em ambientes em que a segurança dos factos é importante (e.g. ambiente empresarial). Complementarmente observa-se que o modelo de controlo de acesso a triplos e em particular a triplos descritos por ontologias não está standardizado nem sequer estabilizado, havendo diversos modelos de descrição e algoritmos de avaliação de permissões de acesso. O trabalho desenvolvido nesta tese/dissertação propõe um modelo e interface de controlo de acesso que permite e facilite a sua adopção por diferentes triple-stores já existentes e a integração dos triples-stores com outros sistemas já existentes na organização. Complementarmente, a plataforma de controlo de acesso não impõe qualquer modelo ou algoritmo de avaliação de permissões, mas pelo contrário permite a adopção de modelos e algoritmos distintos em função das necessidades ou desejos. Finalmente demonstra-se a aplicabilidade e validade do modelo e interface propostos, através da sua implementação e adopção ao triple-store SwiftOWLIM já existente, que não dispõe de mecanismo de controlo de acessos nativo.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

OBJECTIVE: To assess the association between exposure to adverse psychosocial working conditions and poor self-rated health among bank employees. METHODS: A cross-sectional study including a sample of 2,054 employees of a government bank was conducted in 2008. Self-rated health was assessed by a single question: "In general, would you say your health is (...)." Exposure to adverse psychosocial working conditions was evaluated by the effort-reward imbalance model and the demand-control model. Information on other independent variables was obtained through a self-administered semi-structured questionnaire. A multiple logistic regression analysis was performed and odds ratio calculated to assess independent associations between adverse psychosocial working conditions and poor self-rated health. RESULTS: The overall prevalence of poor self-rated health was 9%, with no significant gender difference. Exposure to high demand and low control environment at work was associated with poor self-rated health. Employees with high effort-reward imbalance and overcommitment also reported poor self-rated health, with a dose-response relationship. Social support at work was inversely related to poor self-rated health, with a dose-response relationship. CONCLUSIONS: Exposure to adverse psychosocial work factors assessed based on the effort-reward imbalance model and the demand-control model is independently associated with poor self-rated health among the workers studied.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação apresentada para obtenção do Grau de Mestre em Contabilidade e Finanças, sob orientação de: Amélia Ferreira da Silva José António Fernandes Lopes Oliveira Vale

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Generally, smart campus applications do not consider the role of the user with his/her position in a university environment, consequently irrelevant information is delivered to the users. This dissertation proposes a location-based access control model, named Smart-RBAC, extending the functionality of Role-based Access Control Model (RBAC) by including user’s location as the contextual attribute, to solve the aforementioned problem. Smart-RBAC model is designed with a focus on content delivery to the user in order to offer a feasible level of flexibility, which was missing in the existing location-based access control models. An instance of the model, derived from Liferay’s RBAC, is implemented by creating a portal application to test and validate the Smart-RBAC model. Additionally, portlet-based applications are developed to assess the suitability of the model in a smart campus environment. The evaluation of the model, based on a popular theoretical framework, demonstrates the model’s capability to achieve some security goals like “Dynamic Separation of Duty” and “Accountability”. We believe that the Smart-RBAC model will improve the existing smart campus applications since it utilizes both, role and location of the user, to deliver content.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present a new unifying framework for investigating throughput-WIP(Work-in-Process) optimal control problems in queueing systems,based on reformulating them as linear programming (LP) problems withspecial structure: We show that if a throughput-WIP performance pairin a stochastic system satisfies the Threshold Property we introducein this paper, then we can reformulate the problem of optimizing alinear objective of throughput-WIP performance as a (semi-infinite)LP problem over a polygon with special structure (a thresholdpolygon). The strong structural properties of such polygones explainthe optimality of threshold policies for optimizing linearperformance objectives: their vertices correspond to the performancepairs of threshold policies. We analyze in this framework theversatile input-output queueing intensity control model introduced byChen and Yao (1990), obtaining a variety of new results, including (a)an exact reformulation of the control problem as an LP problem over athreshold polygon; (b) an analytical characterization of the Min WIPfunction (giving the minimum WIP level required to attain a targetthroughput level); (c) an LP Value Decomposition Theorem that relatesthe objective value under an arbitrary policy with that of a giventhreshold policy (thus revealing the LP interpretation of Chen andYao's optimality conditions); (d) diminishing returns and invarianceproperties of throughput-WIP performance, which underlie thresholdoptimality; (e) a unified treatment of the time-discounted andtime-average cases.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tutkimuksen tavoitteena oli selvittää, miten järjestetään yritysmarkkinoinnin seurantamalli sekä seurannan tietojärjestelmätuki. Erityistä huomiota kiinnitettiin markkinoinnin seurannan ja liiketoimintastrategian kytkökseen. Tutkimusmenetelmänä käytettiin case-tutkimusta. Käsittely oli lineaaris-analyyttinen. Markkinoinnin seurannan tietojärjestelmätuen kehittämisen osalta tutkimus omaa myös jonkin verran systeemianalyyttisiä piirteitä. Case-tutkimuksen tiedonhankinnassa käytettiin yrityksen markkinointihenkilöille jaettua kyselytutkimusta. Markkinoinnin seuranta jaoteltiin strategisen tason ja operatiivisen tason seurantaan. Tutkimuksessa todettiin, että liiketoiminnan kilpailuympäristö, valittu kilpailustrategia ja yrityksen elinkaariasema vaikuttavat liiketoimintastrategiaan ja sitä kautta markkinoinnin seurannan järjestämiseen ja että markkinoinnin strategisen tason seurannan tavoitteena on varmistaa, että markkinointitoiminta toteuttaa valittua liiketoimintastrategiaa. Markkinoinnin operatiivisen tason seurannan tehtäväksi todettiin yrityksen markkinointitoiminnan myynnillisten sekä taloudellisten tulosten, sekä kannattavuuden ja tehokkuuden seuranta ja raportointi. Yritysmarkkinoinnin strategisen tason seurantaan soveltuu parhaiten eteenpäinkytkentäinen, tavoiteltavia tuloksia edeltävien muutosten seurantaan keskittyvä malli. Markkinoinnin operatiiivisen tason seurantaan soveltuu laajan markkinoinnin seurannan perusmittariston sisältävä malli, jolla voidaan palvella nykyisiä seurannan tarpeita ja laatia tarvittaessa uusia seurantakokonaisuuksia. Yritysmarkkinoinnin seurannan tietojärjestelmätuen järjestämiseen soveltuu parhaiten asiakastietokantapohjainen tietojärjestelmämalli. Näin voidaan hallita asiakkaaseen kohdistetut markkinointitoimenpiteet sekä niiden seuranta. Case-tutkimus vahvisti tarpeen kehittää kokonaisvaltainen suunnitelma markkinoinnin strategisen ja operatiivisen tason seurannasta sekä sitä tukevista tietojärjestelmistä. Ilman kokonaissunnitelmaa seuranta muodostuu organisaatioyksiköittäin ja seuranta-alueittain epätasaiseksi, eikä yrityksen asemasta markkinoilla ole muodostettavissa kokonaiskuvaa.