344 resultados para upgrade
Resumo:
National Highway Traffic Safety Administration, Washington, D.C.
Resumo:
Texas State Department of Highways and Public Transportation, Austin
Resumo:
Published pursuant to Public Act 85-472.
Resumo:
This paper describes an ongoing collaboration between Boeing Australia Limited and the University of Queensland to develop and deliver an introductory course on software engineering. The aims of the course are to provide a common understanding of the nature of software engineering for all Boeing Australia's engineering staff, and to ensure they understand the practices used throughout the company. The course is designed so that it can be presented to people with varying backgrounds, such as recent software engineering graduates, systems engineers, quality assurance personnel, etc. The paper describes the structure and content of the course, and the evaluation techniques used to collect feedback from the participants and the corresponding results. The immediate feedback on the course indicates that it has been well received by the participants, but also indicates a need for more advanced courses in specific areas. The long-term feedback from participants is less positive, and the long-term feedback from the managers of the course participants indicates a need to expand on the coverage of the Boeing-specific processes and methods. (C) 2004 Elsevier Inc. All rights reserved.
Resumo:
This thesis presents experimental investigation of different effects/techniques that can be used to upgrade legacy WDM communication systems. The main issue in upgrading legacy systems is that the fundamental setup, including components settings such as EDFA gains, does not need to be altered thus the improvement must be carried out at the network terminal. A general introduction to optical fibre communications is given at the beginning, including optical communication components and system impairments. Experimental techniques for performing laboratory optical transmission experiments are presented before the experimental work of this thesis. These techniques include optical transmitter and receiver designs as well as the design and operation of the recirculating loop. The main experimental work includes three different studies. The first study involves a development of line monitoring equipment that can be reliably used to monitor the performance of optically amplified long-haul undersea systems. This equipment can provide instant finding of the fault locations along the legacy communication link which in tum enables rapid repair execution to be performed hence upgrading the legacy system. The second study investigates the effect of changing the number of transmitted 1s and Os on the performance of WDM system. This effect can, in reality, be seen in some coding systems, e.g. forward-error correction (FEC) technique, where the proportion of the 1s and Os are changed at the transmitter by adding extra bits to the original bit sequence. The final study presents transmission results after all-optical format conversion from NRZ to CSRZ and from RZ to CSRZ using semiconductor optical amplifier in nonlinear optical loop mirror (SOA-NOLM). This study is mainly based on the fact that the use of all-optical processing, including format conversion, has become attractive for the future data networks that are proposed to be all-optical. The feasibility of the SOA-NOLM device for converting single and WDM signals is described. The optical conversion bandwidth and its limitations for WDM conversion are also investigated. All studies of this thesis employ 10Gbit/s single or WDM signals being transmitted over dispersion managed fibre span in the recirculating loop. The fibre span is composed of single-mode fibres (SMF) whose losses and dispersion are compensated using erbium-doped fibre amplifiers (EDFAs) and dispersion compensating fibres (DCFs), respectively. Different configurations of the fibre span are presented in different parts.
Resumo:
Fibre overlay is a cost-effective technique to alleviate wavelength blocking in some links of a wavelength-routed optical network by increasing the number of wavelengths in those links. In this letter, we investigate the effects of overlaying fibre in an all-optical network (AON) based on GÉANT2 topology. The constraint-based routing and wavelength assignment (CB-RWA) algorithm locates where cost-efficient upgrades should be implemented. Through numerical examples, we demonstrate that the network capacity improves by 25 per cent by overlaying fibre on 10 per cent of the links, and by 12 per cent by providing hop reduction links comprising 2 per cent of the links. For the upgraded network, we also show the impact of dynamic traffic allocation on the blocking probability. Copyright © 2010 John Wiley & Sons, Ltd.
Resumo:
Fibre overlay is a cost-effective technique to alleviate wavelength blocking in some links of a wavelength-routed optical network by increasing the number of wavelengths in those links. In this letter, we investigate the effects of overlaying fibre in an all-optical network (AON) based on GÉANT2 topology. The constraint-based routing and wavelength assignment (CB-RWA) algorithm locates where cost-efficient upgrades should be implemented. Through numerical examples, we demonstrate that the network capacity improves by 25 per cent by overlaying fibre on 10 per cent of the links, and by 12 per cent by providing hop reduction links comprising 2 per cent of the links. For the upgraded network, we also show the impact of dynamic traffic allocation on the blocking probability. Copyright © 2010 John Wiley & Sons, Ltd.
Resumo:
The paper applies the GVC framework to analyse the organisational and geographical reconfiguration of the global R&D function of leading US and European pharmaceutical MNCs. Though pharmaceutical MNCs have been outsourcing clinical trial activities since the mid-1990s, the outsourcing of discovery research tasks is a phenomenon of the 2000s (Ramirez 2013). Moreover, in the context of a crisis of R&D productivity and increasing pressure from shareholders, a number of US and European pharmaceutical MNCs are breaking up their R&D function in an attempt to increase flexibility and reduce risk as well as costs and are thereby restructuring the global architecture of their R&D function. This break-up, or unbundling (Sako 2006), of the R&D function is particularly interesting given the prevalence of market failure in innovation (Howells et al 2008), the non-modular nature of the R&D process in this industry (Pisano 2006) and the strategic important of this activity to the core competence and long-term competitive advantage of firms in this sector. The focus of this paper is on the outsourcing of R&D activities to Chinese and Indian independently-owned contract research organisations (CROs) and the way these firms are becoming integrated as service providers into the global R&D function (or R&D value chain) of pharmaceutical MNCs. Above all the paper is concerned with the development of capabilities of CROs from these two countries and the dynamics of upgrading in GVCs in knowledge-intensive functions. The paper therefore discusses the role of both knowledge flows within global pharmaceutical R&D value chains as well as national innovation systems on the development of capabilities of Chinese and Indian CROs. Our analysis is based on data from semi-structured interviews collected from senior R&D managers from a sample of ten US and European pharmaceutical MNCs and owners and senior R&D managers from five Chinese and five Indian CROs who are providing research services to MNCs in this industry. We discuss the emergence of R&D outsourcing in this industry and the nature and mechanisms of knowledge flows within R&D value chains. The embeddedness of CROS in the national innovation systems of their home countries is also discussed.
Resumo:
Questo progetto è stato sviluppato durante un periodo di ricerca presso il Dipartimento di Ingegneria Civile del Trinity College e continuato presso l’Università di Bologna. Il progetto ha l’obiettivo di analizzare le soluzioni per l’ampliamento, la sostituzione degli impianti e l’ottimizzazione energetica di un tipico edificio residenziale Irlandese, una end of terrace in mattoni costruita negli anni ’20, collocata a Blackrock (Dublino). Diversi studi sostengono che lo stock abitativo irlandese è il peggiore del nord Europa per quanto riguarda la performance energetica. Questa tesi consta di una prima parte di studio del contesto e delle tecniche costruttive tradizionali irlandesi; è presente un capitolo di approfondimento sulle leggi riguardanti le costruzioni e gli incentivi forniti dal governo irlandese per interventi di retrofit energetico. Il terzo capitolo è un’analisi dell'esistente, con disegni del rilievo geometrico, immagini dell’edificio originale, termogrammi e dati riguardanti l’attuale performance energetica. Vengono poi mostrate diverse ipotesi di progetto e, una volta determinata la disposizione degli spazi interni, vengono considerate due soluzioni simili, ma costruite con pacchetti costruttivi diversi. Nel Progetto A l’involucro dell’addizione ha una struttura in muratura, nel Progetto B la struttura è in X-lam. Le performance energetiche delle due proposte vengono confrontate tramite una simulazione attuata grazie all'utilizzo del software dinamico IES-VE. Viene valutata l’applicazione di energie rinnovabili, quali l’energia solare e eolica e l’apporto che queste possono dare al bilancio energetico. Infine viene fatta un’analisi dei costi, valutando possibili suddivisioni dei lavori e ipotizzando un piano di ritorno dell’investimento, anche in combinazione con l’applicazione di energie rinnovabili. Alla fine del progetto si trova una valutazione quantitativa dei miglioramenti dell’edificio e un’analisi critica dei limiti del progetto.
Resumo:
COMPASS is an experiment at CERN’s SPS whose goal is to study hadron structure and spectroscopy. The experiment includes a wide acceptance RICH detector, operating since 2001 and subject to a major upgrade of the central region of its photodetectors in 2006. The remaining 75% of the photodetection area are still using MWPCs from the original design, who suffer from limitations in gain due to aging of the photocathodes from ion bombardment and due to ion-induced instabilities. Besides the mentioned limitations, the increased luminosity conditions expected for the upcoming years of the experiment make an upgrade to the remaining detectors pertinent. This upgrade should be accomplished in 2016, using hybrid detectors composed of ThGEMs and MICROMEGAS. This work presents the study, development and characterization of gaseous photon detectors envisaging the foreseen upgrade, and the progress in production and evaluation techniques necessary to reach increasingly larger area detectors with the performances required. It includes reports on the studies performed under particle beam environment of such detectors. MPGD structures can also be used in a variety of other applications, of which nuclear medical imaging is a notorious example. This work includes, additionally, the initial steps in simulating, assembling and characterizing a prototype of a gaseous detector for application as a Compton Camera.
Resumo:
Networked control over data networks has received increasing attention in recent years. Among many problems in networked control systems (NCSs) is the need to reduce control latency and jitter and to deal with packet dropouts. This paper introduces our recent progress on a queuing communication architecture for real-time NCS applications, and simple strategies for dealing with packet dropouts. Case studies for a middle-scale process or multiple small-scale processes are presented for TCP/IP based real-time NCSs. Variations of network architecture design are modelled, simulated, and analysed for evaluation of control latency and jitter performance. It is shown that a simple bandwidth upgrade or adding hierarchy does not necessarily bring benefits for performance improvement of control latency and jitter. A co-design of network and control is necessary to maximise the real-time control performance of NCSs
Resumo:
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.