918 resultados para Communication, information technologies
Resumo:
Este relatório de estágio representa o desenvolvimento de uma metodologia, com recurso a Tecnologias de Informação Geográfica, que permite a identificação de zonas que condicionam os processos de planeamento, projecto e manutenção das estruturas que compõem a Rede de Distribuição de Energia Eléctrica. Centra-se assim nas Tecnologias de Informação Geográfica enquanto instrumentos que permitem realizar estudos de carácter territorial com relevância para o sector energético. São trabalhadas a identificação e delimitação de zonas de gelo, zonas de poluição industrial e zonas de salinidade em Portugal Continental. A delimitação destas zonas foi realizada com recurso a ferramentas de análise espacial, utilizando dados fidedignos provenientes de Instituições da Administração Pública. São documentadas também tarefas extraordinárias propostas pela EDP Distribuição - Energia, S.A. Desta forma é possível compreender as vantagens e desvantagens da utilização destas tecnologias por parte da EDP Distribuição, de forma a melhorar a gestão dos recursos disponíveis, para ajudar a manter a qualidade do serviço prestado. Ficou no entanto a recomendação de uma maior aposta nestas tecnologias.
Resumo:
I study how a larger party within a supply chain could use its superior knowledge about its partner, who is considered to be financially constrained, to help its partner gain access to cheap finance. In particular, I consider two scenarios: (i) Retailer intermediation in supplier finance and (ii) The Effectiveness of Supplier Buy Back Finance. In the fist chapter, I study how a large buyer could help small suppliers obtain financing for their operations. Especially in developing economies, traditional financing methods can be very costly or unavailable to such suppliers. In order to reduce channel costs, in recent years large buyers started to implement their own financing methods that intermediate between suppliers and financing institutions. In this paper, I analyze the role and efficiency of buyer intermediation in supplier financing. Building a game-theoretical model, I show that buyer intermediated financing can significantly improve supply chain performance. Using data from a large Chinese online retailer and through structural regression estimation based on the theoretical analysis, I demonstrate that buyer intermediation induces lower interest rates and wholesale prices, increases order quantities, and boosts supplier borrowing. The analysis also shows that the retailer systematically overestimates the consumer demand. Based on counterfactual analysis, I predict that the implementation of buyer intermediated financing for the online retailer in 2013 improved channel profits by 18.3%, yielding more than $68M projected savings. In the second chapter, I study a novel buy-back financing scheme employed by large manufacturers in some emerging markets. A large manufacturer can secure financing for its budget-constrained downstream partners by assuming a part of the risk for their inventory by committing to buy back some unsold units. Buy back commitment could help a small downstream party secure a bank loan and further induce a higher order quantity through better allocation of risk in the supply chain. However, such a commitment may undermine the supply chain performance as it imposes extra costs on the supplier incurred by the return of large or costly-to-handle items. I first theoretically analyze the buy-back financing contract employed by a leading Chinese automative manufacturer and some variants of this contracting scheme. In order to measure the effectiveness of buy-back financing contracts, I utilize contract and sales data from the company and structurally estimate the theoretical model. Through counterfactual analysis, I study the efficiency of various buy-back financing schemes and compare them to traditional financing methods. I find that buy-back contract agreements can improve channel efficiency significantly compared to simple contracts with no buy-back, whether the downstream retailer can secure financing on its own or not.
Resumo:
In this dissertation, we apply mathematical programming techniques (i.e., integer programming and polyhedral combinatorics) to develop exact approaches for influence maximization on social networks. We study four combinatorial optimization problems that deal with maximizing influence at minimum cost over a social network. To our knowl- edge, all previous work to date involving influence maximization problems has focused on heuristics and approximation. We start with the following viral marketing problem that has attracted a significant amount of interest from the computer science literature. Given a social network, find a target set of customers to seed with a product. Then, a cascade will be caused by these initial adopters and other people start to adopt this product due to the influence they re- ceive from earlier adopters. The idea is to find the minimum cost that results in the entire network adopting the product. We first study a problem called the Weighted Target Set Selection (WTSS) Prob- lem. In the WTSS problem, the diffusion can take place over as many time periods as needed and a free product is given out to the individuals in the target set. Restricting the number of time periods that the diffusion takes place over to be one, we obtain a problem called the Positive Influence Dominating Set (PIDS) problem. Next, incorporating partial incentives, we consider a problem called the Least Cost Influence Problem (LCIP). The fourth problem studied is the One Time Period Least Cost Influence Problem (1TPLCIP) which is identical to the LCIP except that we restrict the number of time periods that the diffusion takes place over to be one. We apply a common research paradigm to each of these four problems. First, we work on special graphs: trees and cycles. Based on the insights we obtain from special graphs, we develop efficient methods for general graphs. On trees, first, we propose a polynomial time algorithm. More importantly, we present a tight and compact extended formulation. We also project the extended formulation onto the space of the natural vari- ables that gives the polytope on trees. Next, building upon the result for trees---we derive the polytope on cycles for the WTSS problem; as well as a polynomial time algorithm on cycles. This leads to our contribution on general graphs. For the WTSS problem and the LCIP, using the observation that the influence propagation network must be a directed acyclic graph (DAG), the strong formulation for trees can be embedded into a formulation on general graphs. We use this to design and implement a branch-and-cut approach for the WTSS problem and the LCIP. In our computational study, we are able to obtain high quality solutions for random graph instances with up to 10,000 nodes and 20,000 edges (40,000 arcs) within a reasonable amount of time.
Resumo:
Dissertação de Mestrado, Ciências da Linguagem, Faculdade de Ciências Humanas e Sociais, Universidade do Algarve, 2015
Resumo:
In this work, we propose an inexpensive laboratory practice for an introductory physics course laboratory for any grade of science and engineering study. This practice was very well received by our students, where a smartphone (iOS, Android, or Windows) is used together with mini magnets (similar to those used on refrigerator doors), a 20 cm long school rule, a paper, and a free application (app) that needs to be downloaded and installed that measures magnetic fields using the smartphone's magnetic field sensor or magnetometer. The apps we have used are: Magnetometer (iOS), Magnetometer Metal Detector, and Physics Toolbox Magnetometer (Android). Nothing else is needed. Cost of this practice: free. The main purpose of the practice is that students determine the dependence of the component x of the magnetic field produced by different magnets (including ring magnets and sphere magnets). We obtained that the dependency of the magnetic field with the distance is of the form x-3, in total agreement with the theoretical analysis. The secondary objective is to apply the technique of least squares fit to obtain this exponent and the magnetic moment of the magnets, with the corresponding absolute error.
Resumo:
Two trends are emerging from modern electric power systems: the growth of renewable (e.g., solar and wind) generation, and the integration of information technologies and advanced power electronics. The former introduces large, rapid, and random fluctuations in power supply, demand, frequency, and voltage, which become a major challenge for real-time operation of power systems. The latter creates a tremendous number of controllable intelligent endpoints such as smart buildings and appliances, electric vehicles, energy storage devices, and power electronic devices that can sense, compute, communicate, and actuate. Most of these endpoints are distributed on the load side of power systems, in contrast to traditional control resources such as centralized bulk generators. This thesis focuses on controlling power systems in real time, using these load side resources. Specifically, it studies two problems.
(1) Distributed load-side frequency control: We establish a mathematical framework to design distributed frequency control algorithms for flexible electric loads. In this framework, we formulate a category of optimization problems, called optimal load control (OLC), to incorporate the goals of frequency control, such as balancing power supply and demand, restoring frequency to its nominal value, restoring inter-area power flows, etc., in a way that minimizes total disutility for the loads to participate in frequency control by deviating from their nominal power usage. By exploiting distributed algorithms to solve OLC and analyzing convergence of these algorithms, we design distributed load-side controllers and prove stability of closed-loop power systems governed by these controllers. This general framework is adapted and applied to different types of power systems described by different models, or to achieve different levels of control goals under different operation scenarios. We first consider a dynamically coherent power system which can be equivalently modeled with a single synchronous machine. We then extend our framework to a multi-machine power network, where we consider primary and secondary frequency controls, linear and nonlinear power flow models, and the interactions between generator dynamics and load control.
(2) Two-timescale voltage control: The voltage of a power distribution system must be maintained closely around its nominal value in real time, even in the presence of highly volatile power supply or demand. For this purpose, we jointly control two types of reactive power sources: a capacitor operating at a slow timescale, and a power electronic device, such as a smart inverter or a D-STATCOM, operating at a fast timescale. Their control actions are solved from optimal power flow problems at two timescales. Specifically, the slow-timescale problem is a chance-constrained optimization, which minimizes power loss and regulates the voltage at the current time instant while limiting the probability of future voltage violations due to stochastic changes in power supply or demand. This control framework forms the basis of an optimal sizing problem, which determines the installation capacities of the control devices by minimizing the sum of power loss and capital cost. We develop computationally efficient heuristics to solve the optimal sizing problem and implement real-time control. Numerical experiments show that the proposed sizing and control schemes significantly improve the reliability of voltage control with a moderate increase in cost.
Resumo:
In this article the author argues that a technological utopia underlies present society so that it is necessary to change the way communication has been understood until now. To think of technology as something unavoidable and constitutive of subjectivity in contemporary world means to understand new ways of thinking, doing and transcending; that is, new life forms as metaphors for theory building on communication, the juvenilization of contemporary culture, and (post)modern mysticism.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
Objetivo: Identificar las barreras para la unificación de una Historia Clínica Electrónica –HCE- en Colombia. Materiales y Métodos: Se realizó un estudio cualitativo. Se realizaron entrevistas semiestructuradas a profesionales y expertos de 22 instituciones del sector salud, de Bogotá y de los departamentos de Cundinamarca, Santander, Antioquia, Caldas, Huila, Valle del Cauca. Resultados: Colombia se encuentra en una estructuración para la implementación de la Historia Clínica Electrónica Unificada -HCEU-. Actualmente, se encuentra en unificación en 42 IPSs públicas en el departamento de Cundinamarca, el desarrollo de la HCEU en el país es privado y de desarrollo propio debido a las necesidades particulares de cada IPS. Conclusiones: Se identificaron barreras humanas, financieras, legales, organizacionales, técnicas y profesionales en los departamentos entrevistados. Se identificó que la unificación de la HCE depende del acuerdo de voluntades entre las IPSs del sector público, privado, EPSs, y el Gobierno Nacional.
Resumo:
Las representaciones sociales son una construcción de significados que las personas otorgan a un objeto en este caso el tratamiento oncológico. En el mundo, el cáncer es una enfermedad de alta prevalencia y sus tratamientos suelen generar numerosos efectos secundarios, pero a la vez es el recurso médico disponible para controlar la enfermedad. Este estudio cualitativo tuvo como objetivo analizar las representaciones sociales del tratamiento oncológico en población colombiana. Participaron voluntariamente 20 personas seleccionadas por conveniencia. Se realizaron entrevistas abiertas y se analizaron los resultados a través del análisis temático y se interpretaron con base en la teoría de las representaciones sociales. Los resultados indicaron que las personas representan el tratamiento oncológico convencional, predominantemente como quimioterapia, generadores de sufrimiento, miedo, alto costo físico, emocional y económico; así como una apuesta en la que la ganancia puede ser la prolongación de la vida o la remisión. Se discuten los resultados y sus implicaciones.
Resumo:
Lo Nuestro SAS es una empresa constituida por tres emprendedores que buscan volver más eficiente el sistema domiciliario de las tiendas de barrio, utilizando las tecnologías de la información, con la finalidad de fortalecer tanto a los consumidores como a los vendedores (tenderos). El potencial del concepto permite que a futuro nos posicionemos como una empresa líder e innovadora en el sector, brindado facilidades optimizadoras de servicio que beneficiara al productor, al intermediario y al consumidor final. Finalidad que se logra al ser el servicio más efectivo y de primera mano que entiende los tenderos y al consumidor final. Por consiguiente, y apalancándonos en las tecnologías de la información, a través de una red de ciclistas constituida por gente joven interesada en obtener ingresos extra. Estos se organizan de acuerdo al pacto entre el consumidor, el tendero, la empresa y ciclista, que bien se facilita a través de las características de la plataforma virtual. De acuerdo a lo ya planteado, el proyecto se expone no solo como un atractivo tanto para el tendero común y sus usuarios, sino además para todas las personas que estén interesadas en recibir una remuneración extra por sus servicios de domicilio.
Resumo:
Na sociedade moderna, o uso de novas tecnologias e das correspondentes aplicações informáticas, levanta diversas questões, sendo, sem dúvida a mais importante, a segurança dos utilizadores e dos sistemas. A implementação de novos processos fazendo uso dos meios informáticos disponíveis permite o aumento da produtividade e a sua simplificação sem perder a fiabilidade, através da desmaterialização, desburocratização, acessibilidade, rapidez de execução, comodidade e segurança. A introdução do cartão de cidadão com todas a sua potencialidade contribui para a implementação dos processos acima referidos, os quais acompanharam a evolução do quadro legislativo nacional e europeu. Contudo verificam-se algumas lacunas, devido à sua imaturidade, sendo o seu desenvolvimento um processo ainda em curso. Com o presente trabalho pretende-se criar uma solução aberta a várias aplicações, que permite a optimização de processos através da sua simplificação, com recurso à assinatura digital, autenticação e uso de dados pessoais, tendo em atenção a legislação vigente, o actual cartão de cidadão e os requisitos de segurança. ABSTRACT: ln modern society, the increasing application of information technologies have arisen several questions, being the private and sensitive data security the most important. Today new informatics processes have come to increase productivity using faster and simplified mechanisms, keeping reliability and security. The introduction in Portugal, of the new citizen card is a great example of the above mentioned, in accordance with the National and European legislation. Nevertheless, being recently adopted, it stills vulnerable and therefore is in constant update and revision. The purpose of this thesis is the creation of an open solution to other new applications, aiming a simplification and optimization of citizen card. Seeking the maximum security, it is utilized digital signature, authentication and personal details, always according to the legislation in effect.
Resumo:
In the last few years, mobile wireless technology has gone through a revolutionary change. Web-enabled devices have evolved into essential tools for communication, information, and entertainment. The fifth generation (5G) of mobile communication networks is envisioned to be a key enabler of the next upcoming wireless revolution. Millimeter wave (mmWave) spectrum and the evolution of Cloud Radio Access Networks (C-RANs) are two of the main technological innovations of 5G wireless systems and beyond. Because of the current spectrum-shortage condition, mmWaves have been proposed for the next generation systems, providing larger bandwidths and higher data rates. Consequently, new radio channel models are being developed. Recently, deterministic ray-based models such as Ray-Tracing (RT) are getting more attractive thanks to their frequency-agility and reliable predictions. A modern RT software has been calibrated and used to analyze the mmWave channel. Knowledge of the electromagnetic properties of materials is therefore essential. Hence, an item-level electromagnetic characterization of common construction materials has been successfully achieved to obtain information about their complex relative permittivity. A complete tuning of the RT tool has been performed against indoor and outdoor measurement campaigns at 27 and 38 GHz, setting the basis for the future development of advanced beamforming techniques which rely on deterministic propagation models (as RT). C-RAN is a novel mobile network architecture which can address a number of challenges that network operators are facing in order to meet the continuous customers’ demands. C-RANs have already been adopted in advanced 4G deployments; however, there are still some issues to deal with, especially considering the bandwidth requirements set by the forthcoming 5G systems. Open RAN specifications have been proposed to overcome the new 5G challenges set on C-RAN architectures, including synchronization aspects. In this work it is described an FPGA implementation of the Synchronization Plane for an O-RAN-compliant radio system.
An electronic lifeline: Information and communication technologies in a teacher education internship