921 resultados para Pulaski (Steam-packet)
Resumo:
Part C:Steam sterilization
Resumo:
Part E:Alternatives to steam for the sterilization of reusable medical devices
Resumo:
Aquest treball se centra en les tècniques de captura i filtratge de paquets a xarxes Ethernet. Com objectiu principal ens hem fixat l¿estudi de les estructures implementades pel sistema operatiu i la interfície oferta als programadors per tal de poder utilitzar-la. Com a objectiu secundari pretenem, posar a la practica els coneixements obtinguts i desenvolupar un producte sòlid i robust en la seva funcionalitat bàsica, filtrar i capturar paquets, però que sigui extensible a altres aplicacions orientades a xarxa. Anàlisis de rendiment de la xarxa, per exemple.
Resumo:
Aedes aegypti L. is the major vector of dengue fever, an endemic disease in Brazil. In an effort to find effective and affordable ways to control this mosquito, the larvicidal activities of essential oils from nine plants widely found in the Northeast of Brazil were analyzed by measurement of their LC50. The essential oils were extracted by steam distillation and their chemical composition determined by GL-chromatography coupled to mass spectroscopy. The essential oils from Cymbopogon citratus and Lippia sidoides, reported in the literature to have larvicidal properties against A. aegypti, were used for activity comparison. The results show that Ocimum americanum and Ocimum gratissimum have LC50 of 67 ppm and 60 ppm respectively, compared to 63 ppm for L. sidoides and 69 ppm for C. citratus. These results suggest a potential utilization of the essential oil of these two Ocimum species for the control of A. aegypti.
Resumo:
In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection
Resumo:
IP based networks still do not have the required degree of reliability required by new multimedia services, achieving such reliability will be crucial in the success or failure of the new Internet generation. Most of existing schemes for QoS routing do not take into consideration parameters concerning the quality of the protection, such as packet loss or restoration time. In this paper, we define a new paradigm to develop new protection strategies for building reliable MPLS networks, based on what we have called the network protection degree (NPD). This NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability and an a posteriori evaluation, the failure impact degree (FID), to determine the impact on the network in case of failure. Having mathematical formulated these components, we point out the most relevant components. Experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms to offer a certain degree of protection
Resumo:
One of the most effective techniques offering QoS routing is minimum interference routing. However, it is complex in terms of computation time and is not oriented toward improving the network protection level. In order to include better levels of protection, new minimum interference routing algorithms are necessary. Minimizing the failure recovery time is also a complex process involving different failure recovery phases. Some of these phases depend completely on correct routing selection, such as minimizing the failure notification time. The level of protection also involves other aspects, such as the amount of resources used. In this case shared backup techniques should be considered. Therefore, minimum interference techniques should also be modified in order to include sharing resources for protection in their objectives. These aspects are reviewed and analyzed in this article, and a new proposal combining minimum interference with fast protection using shared segment backups is introduced. Results show that our proposed method improves both minimization of the request rejection ratio and the percentage of bandwidth allocated to backup paths in networks with low and medium protection requirements
Resumo:
A survey of MPLS protection methods and their utilization in combination with online routing methods is presented in this article. Usually, fault management methods pre-establish backup paths to recover traffic after a failure. In addition, MPLS allows the creation of different backup types, and hence MPLS is a suitable method to support traffic-engineered networks. In this article, an introduction of several label switch path backup types and their pros and cons are pointed out. The creation of an LSP involves a routing phase, which should include QoS aspects. In a similar way, to achieve a reliable network the LSP backups must also be routed by a QoS routing method. When LSP creation requests arrive one by one (a dynamic network scenario), online routing methods are applied. The relationship between MPLS fault management and QoS online routing methods is unavoidable, in particular during the creation of LSP backups. Both aspects are discussed in this article. Several ideas on how these actual technologies could be applied together are presented and compared
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
In networks with small buffers, such as optical packet switching based networks, the convolution approach is presented as one of the most accurate method used for the connection admission control. Admission control and resource management have been addressed in other works oriented to bursty traffic and ATM. This paper focuses on heterogeneous traffic in OPS based networks. Using heterogeneous traffic and bufferless networks the enhanced convolution approach is a good solution. However, both methods (CA and ECA) present a high computational cost for high number of connections. Two new mechanisms (UMCA and ISCA) based on Monte Carlo method are proposed to overcome this drawback. Simulation results show that our proposals achieve lower computational cost compared to enhanced convolution approach with an small stochastic error in the probability estimation
Resumo:
Aquest projecte final de carrera pretén investigar i experimentar una nova línia de desenvolupament d’algorismes dinàmics. A partir de l’algorisme AntNet-QoS [2] s’ incorporen noves mesures a l’algorisme (mesura de l’amplada de banda disponible i jitter), les quals combinant amb la mesura de retard ja feta servir, permet adaptar-se millor a les condicions actuals del trànsit en la xarxa i als requeriments específics de qualitat (QoS) per part del trànsit
Resumo:
L’empresa RUSCALLEDA, S.L., ubicada a la localitat de Vic, es dedica a l’elaboració deproductes alimentaris. La instal·lació actual de generació de calor utilitza una caldera antiga de combustible líquid i té una capacitat de producció de vapor de 1.500 kg/h. A causa de la demanda creixent de productes semielaborats, l'empresa vol instal·lar tres unitats noves de la línia final de productes semielaborats. Aquestes noves unitats tindrien un considerable consum d’energia calorífica en forma de vapor i requeririen actualitzar la instal·lació actual de producció i distribució de calor. L’objecte del projecte és la instal·lació d’un segon generador de vapor que sigui capaç d’alimentar la instal·lació actual més l’ampliació, quedant el generador actual en paral·lel per ser utilitzat en cas d’emergència
Resumo:
Este proyecto se ha realizado mediante un convenio de prácticas con la empresa UNIT4 (Barberà del Vallès). Se basa en el desarrollo de un nuevo módulo enfocado hacia compañías distribuidoras de productos, que será incorporado en el software de gestión que vende la empresa. Este módulo consistirá en facturar algunos servicios ofrecidos en los envíos de paquetes, que se incluirán en el albarán de entrega de los mismos.
Resumo:
Creació d'un sniffer amb entorn GNU.
Resumo:
Supported by IEEE 802.15.4 standardization activities, embedded networks have been gaining popularity in recent years. The focus of this paper is to quantify the behavior of key networking metrics of IEEE 802.15.4 beacon-enabled nodes under typical operating conditions, with the inclusion of packet retransmissions. We corrected and extended previous analyses by scrutinizing the assumptions on which the prevalent Markovian modeling is generally based. By means of a comparative study, we singled out which of the assumptions impact each of the performance metrics (throughput, delay, power consumption, collision probability, and packet-discard probability). In particular, we showed that - unlike what is usually assumed - the probability that a node senses the channel busy is not constant for all the stages of the backoff procedure and that these differences have a noticeable impact on backoff delay, packet-discard probability, and power consumption. Similarly, we showed that - again contrary to common assumption - the probability of obtaining transmission access to the channel depends on the number of nodes that is simultaneously sensing it. We evidenced that ignoring this dependence has a significant impact on the calculated values of throughput and collision probability. Circumventing these and other assumptions, we rigorously characterize, through a semianalytical approach, the key metrics in a beacon-enabled IEEE 802.15.4 system with retransmissions.