857 resultados para OSI Security, Mandatory Access Control, Security Education, Operating System Security, Web Services Security
Resumo:
This chapter considers the Multiband Orthogonal Frequency Division Multiplexing (MB- OFDM) modulation and demodulation with the intention to optimize the Ultra-Wideband (UWB) system performance. OFDM is a type of multicarrier modulation and becomes the most important aspect for the MB-OFDM system performance. It is also a low cost digital signal component efficiently using Fast Fourier Transform (FFT) algorithm to implement the multicarrier orthogonality. Within the MB-OFDM approach, the OFDM modulation is employed in each 528 MHz wide band to transmit the data across the different bands while also using the frequency hopping technique across different bands. Each parallel bit stream can be mapped onto one of the OFDM subcarriers. Quadrature Phase Shift Keying (QPSK) and Dual Carrier Modulation (DCM) are currently used as the modulation schemes for MB-OFDM in the ECMA-368 defined UWB radio platform. A dual QPSK soft-demapper is suitable for ECMA-368 that exploits the inherent Time-Domain Spreading (TDS) and guard symbol subcarrier diversity to improve the receiver performance, yet merges decoding operations together to minimize hardware and power requirements. There are several methods to demap the DCM, which are soft bit demapping, Maximum Likelihood (ML) soft bit demapping, and Log Likelihood Ratio (LLR) demapping. The Channel State Information (CSI) aided scheme coupled with the band hopping information is used as a further technique to improve the DCM demapping performance. ECMA-368 offers up to 480 Mb/s instantaneous bit rate to the Medium Access Control (MAC) layer, but depending on radio channel conditions dropped packets unfortunately result in a lower throughput. An alternative high data rate modulation scheme termed Dual Circular 32-QAM that fits within the configuration of the current standard increasing system throughput thus maintaining the high rate throughput even with a moderate level of dropped packets.
Resumo:
The Knowledge Economy favours high skilled and adaptable workers, typically those with a degree. Information and Communication Technologies (ICTs) have the potential to extend educational opportunities through e-Learning. In Sri Lanka efforts have been made to employ ICTs in this way. The case study of Orange Valley University (pseudonymous) is presented, exploring the impact of ICT-based distance education on access to higher education. This ethnographic research employed questionnaires, qualitative interviews and documentary analysis. Online learning was found to appeal to a specific segment of the population. Flexibility and prestige were found to be important influences on programme selection. The majority possessed resources and skills for e-Learning; access and quality issues were considered.
Resumo:
The integral manifold approach captures from a geometric point of view the intrinsic two-time-scale behavior of singularly perturbed systems. An important class of nonlinear singularly perturbed systems considered in this note are fast actuator-type systems. For a class of fast actuator-type systems, which includes many physical systems, an explicit corrected composite control, the sum of a slow control and a fast control, is derived. This corrected control will steer the system exactly to a required design manifold.
Resumo:
The integral manifold approach captures from a geometric point of view the intrinsic two-time-scale behavior of singularly perturbed systems. An important class of nonlinear singularly perturbed systems considered in this note are fast actuator-type systems. For a class of fast actuator-type systems, which includes many physical systems, an explicit corrected composite control, the sum of a slow control and a fast control, is derived. This corrected control will steer the system exactly to a required design manifold.
Resumo:
Wireless local area networks (WLANs) based on the IEEE 802.11 standard are now widespread. Most are used to provide access for mobile devices to a conventional wired infrastructure, and some are used where wires are not possible, forming an ad hoc network of their own. There are several varieties at the physical or radio layer (802.11, 802.11a, 802.11b, 802.11g), with each featuring different data rates, modulation schemes and transmission frequencies. However, all of them share a common medium access control (MAC) layer. As this is largely based on a contention approach, it does not allow prioritising of traffic or stations, so it cannot easily provide the quality of service (QoS) required by time-sensitive applications, such as voice or video transmission. In order to address this shortfall of the technology, the IEEE set up a task group that is aiming to enhance the MAC layer protocol so that it can provide QoS. The latest draft at the time of writing is Draft 11, dated October 2004. The article describes the yet-to-be-ratified 802.11e standard and is based on that draft.
Resumo:
Wireless Body Area Networks (WBANs) consist of a number of miniaturized wearable or implanted sensor nodes that are employed to monitor vital parameters of a patient over long duration of time. These sensors capture physiological data and wirelessly transfer the collected data to a local base station in order to be further processed. Almost all of these body sensors are expected to have low data-rate and to run on a battery. Since recharging or replacing the battery is not a simple task specifically in the case of implanted devices such as pacemakers, extending the lifetime of sensor nodes in WBANs is one of the greatest challenges. To achieve this goal, WBAN systems employ low-power communication transceivers and low duty cycle Medium Access Control (MAC) protocols. Although, currently used MAC protocols are able to reduce the energy consumption of devices for transmission and reception, yet they are still unable to offer an ultimate energy self-sustaining solution for low-power MAC protocols. This paper proposes to utilize energy harvesting technologies in low-power MAC protocols. This novel approach can further reduce energy consumption of devices in WBAN systems.
Resumo:
Although reviews of the association between polyphenol intake and cognition exist, research examining the cognitive effects of fruit, vegetable, and juice consumption across epidemiological and intervention studies has not been previously examined. Critical inclusion criteria were human participants, a measure of fruit, vegetable, or 100% juice consumption, an objective measure of cognitive function, and a clinical diagnosis of neuropsychological disease. Studies were excluded if consumption of fruit, vegetables, or juice was not assessed in isolation from other foods groups, or if there was no statistical control for education or IQ. Seventeen of 19 epidemiological studies and 3 of 6 intervention studies reported significant benefits of fruit, vegetable, or juice consumption for cognitive performance. The data suggest that chronic consumption of fruits, vegetables, and juices is beneficial for cognition in healthy older adults. The limited data from acute interventions indicate that consumption of fruit juices can have immediate benefits for memory function in adults with mild cognitive impairment; however, as of yet, acute benefits have not been observed in healthy adults. Conclusions regarding an optimum dietary intake for fruits, vegetables, and juices are difficult to quantify because of substantial heterogeneity in the categorization of consumption of these foods.
Resumo:
A virtual system that emulates an ARM-based processor machine has been created to replace a traditional hardware-based system for teaching assembly language. The proposed virtual system integrates, in a single environment, all the development tools necessary to deliver introductory or advanced courses on modern assembly language programming. The virtual system runs a Linux operating system in either a graphical or console mode on a Windows or Linux host machine. No software licenses or extra hardware are required to use the virtual system, thus students are free to carry their own ARM emulator with them on a USB memory stick. Institutions adopting this, or a similar virtual system, can also benefit by reducing capital investment in hardware-based development kits and enable distance learning courses.
Resumo:
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient Medium Access Control (MAC) and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, the GinMAC protocol including a mobility module has been chosen, to provide the required performance such as reliability for data delivery and energy saving. Simulation results show that this modification to GinMAC can offer the required performance for the proposed healthcare application.
Resumo:
Abstract: A new methodology was created to measure the energy consumption and related green house gas (GHG) emissions of a computer operating system (OS) across different device platforms. The methodology involved the direct power measurement of devices under different activity states. In order to include all aspects of an OS, the methodology included measurements in various OS modes, whilst uniquely, also incorporating measurements when running an array of defined software activities, so as to include OS application management features. The methodology was demonstrated on a laptop and phone that could each run multiple OSs, results confirmed that OS can significantly impact the energy consumption of devices. In particular, the new versions of the Microsoft Windows OS were tested and highlighted significant differences between the OS versions on the same hardware. The developed methodology could enable a greater awareness of energy consumption, during both the software development and software marketing processes.
Resumo:
In this thesis, one of the current control algorithms for the R744 cycle, which tries tooptimize the performance of the system by two SISO control loops, is compared to acost-effective system with just one actuator. The operation of a key component of thissystem, a two stage orifice expansion valve is examined in a range of typical climateconditions. One alternative control loop for this system, which has been proposed byBehr group, is also scrutinized.The simulation results affirm the preference of using two control-loops instead of oneloop, but refute advantages of the Behr alternate control approach against one-loopcontrol. As far as the economic considerations of the A/C unit are concerned, usinga two-stage orifice expansion valve is desired by the automotive industry, thus basedon the experiment results, an improved logic for control of this system is proposed.In the second part, it is investigated whether the one-actuator control approach isapplicable to a system consisting of two parallel evaporators to allow passengers tocontrol different climate zones. The simulation results show that in the case of usinga two-stage orifice valve for the front evaporator and a fixed expansion valve forthe rear one, a proper distribution of the cooling power between the front and rearcompartment is possible for a broad range of climate conditions.
Resumo:
The aim of this thesis is to explore how different competing discourses in the historical context of the Swedish education development have qualified and disqualified different constructions of national curriculum. How and after what kind of principles is the curriculum constructed? What qualify who are going to be recognized as the author and addressee of the curriculum? These key ques-tions of the study are discussed in the first part of the thesis. My point of depar-ture is that the curriculum can be understood as a relation between freedom and control. In an educational system this relationship reflects the problematic ten-sion between the external demands from an authoritative center and the local need to independently reflect over educational issues. How these concepts are defined by the prevailing social discourses affect specific relations and construc-tions of curricula as a steering tool and a producer of specific teacher identities. In this sense, I claim that curriculum is constructed in different ways depending on which of the didactic questions are emphasized and answered and who is judged as the legitimate author. Based on this, three models of curriculum con-struction are formulated; the content based, the result based and the process based. These models are subsequently used as an analytical tool to examine the historical development of Swedish national curricula. The second part of the thesis investigates the Swedish education system and the production of the national curriculum as a product of rival discourses. The historical investigation begins 1842 when the first state curriculum was issued and the inquiry concludes in 2008. The findings indicate that no one single con-struction has been totally dominant and that there has been an on-going discur-sive struggle between different alternative and opinions about what teachers must do and be.
Resumo:
Rollbaserad åtkomstkontroll är en standardiserad och väl etablerad modell för att hantera åtkomsträttigheter i informationssystem. Den vedertagna ANSI-standarden 359-2004 saknar dock stöd för att geografiskt avgränsa rollbehörigheter. Informationssystem som behandlar geografiska data och de senaste årens ökade spridning av mobila enheter påkallar ett behov av att sådana rumsliga aspekter diskuteras inom kontexten av rollbaserad åtkomstkontroll. Arbetet syftar till att bringa klarhet i hur det befintliga kunskapstillståndet inom ämnesområdet rollbaserad åtkomst kontroll med geografisk avgränsning ser ut, och vilka aspekter hos detta som står i behov av vidare utveckling. Genom de teoretiska referensramar som skapats vid inledande litteraturstudier har en efterföljande systematisk litteraturgenomgång möjliggjorts, där vetenskapligt material selekterats genom fördefinierade urvalskriterier. Sammanställningen och analysen av den systematiska litteraturgenomgångens resultat har i samverkan med de teoretiska referensramarna lett fram till arbetets huvudsakliga kunskapsbidrag: en områdesöversikt där ämnets state-of-the-art presenteras och en strukturerad lista över angelägna forsknings- och utvecklingsbehov inom området.
Resumo:
Este trabalho trata da técnica de validação experimental de protocolos de comunicação confiável, através da injeção de falhas de comunicação. São estudadas inicialmente as técnicas de injeção de falhas, por hardware, software e simulação, e então são aprofundados os conceitos de injeção de falhas de comunicação, modelos de falha e especificação de experimentos de injeção de falhas. Em um segundo momento, são estudadas as formas de implementação de injetores de falhas em software, em suas duas formas mais comuns: no nível da aplicação e no nível do sistema operacional. São comentados os impactos da implementação de injetores no código da aplicação, por processos concorrentes à aplicação, em código utilizado pela aplicação e no meta-nível. Por fim, são estudados também que influências sofre a implementação de um injetor de falhas em um sistema operacional, e mais especificamente a de injetores de falhas de comunicação. O objetivo específico deste trabalho é implementar um injetor de falhas de comunicação bastante abrangente e flexível, situado dentro do núcleo do Sistema Operacional Linux. Para viabilizar esta implementação foi estudada também a arquitetura do Sistema Operacional Linux, sua decomposição em subsistemas e a interação entre estes. Foram estudadas também as várias técnicas de programação e mecanismos que o Sistema Operacional Linux fornece aos seus subsistemas. Estando completas a revisão bibliográfica a respeito de injeção de falhas e o estudo do código do Sistema Operacional Linux, são apresentadas a proposta e a implementação da ferramenta ComFIRM—Communication Fault Injection through Operating System Resource Modification, suas características e sua inserção dentro do núcleo do Sistema Operacional Linux. Finalizando este trabalho, são apresentados uma pequena série de testes de funcionamento e experimentos realizados com a ferramenta ComFIRM, visando demonstrar a correção de seu funcionamento, o cumprimento de seus objetivos e também sua praticidade e flexibilidade de uso. São apresentadas as conclusões deste trabalho, propostas de melhorias à ferramenta apresentada, bem como possibilidades de trabalhos futuros.
Resumo:
Brazil is an extremely unequal country and this inequality has been a permanent characteristic of its economic and social structure. Some scholars generally consider that the economic growth has generated extreme conditions of space and social inequalities, which reveal themselves within Brazil¿s regions, states, rural and urban areas, central and peripheral areas and among its ethnic groups. Such conditions negatively affect the quality of life of the population and will be reflected in the reduction of life expectancy, in the increase of the indexes of infant mortality and illiteracy, amongst other aspects. Education is considered one of the ways to promote the development of a country, however, access to education, specially higher education in Brazil, since it was first implemented, had been limited to a small group of privileged people, the elite of society. Thus, it becomes necessary to extend the access of students to higher education and consequently to generate individuals capable of changing the reality of the place where they live in and as a result, to develop the country. The purpose of this research is to analyze two programs destined to the amplify the access to higher education in Brazil, namely, the University for All Program (ProUni) and the System of Quotas, with the objective to verify at which level their drawings and strategies will allow the democratization of the access to higher education and the reduction of regional inequalities. In order to achieve its objective, the study is initiated with the issue of development and inequalities in Brazil, then it goes through the history of higher education in Brazil and it is finished with the analysis of ProUni and the System of Quotas.