1000 resultados para Engenharia Informática
Resumo:
Wireless Sensor Networks(WSN) are networks of devices used to sense and act that applies wireless radios to communicate. To achieve a successful implementation of a wireless device it is necessary to take in consideration the existence of a wide variety of radios available, a large number of communication parameters (payload, duty cycle, etc.) and environmental conditions that may affect the device’s behaviour. However, to evaluate a specific radio towards a unique application it might be necessary to conduct trial experiments, with such a vast amount of devices, communication parameters and environmental conditions to take into consideration the number of trial cases generated can be surprisingly high. Thus, making trial experiments to achieve manual validation of wireless communication technologies becomes unsuitable due to the existence of a high number of trial cases on the field. To overcome this technological issue an automated test methodology was introduced, presenting the possibility to acquire data regarding the device’s behaviour when testing several technologies and parameters that care for a specific analysis. Therefore, this method advances the validation and analysis process of the wireless radios and allows the validation to be done without the need of specific and in depth knowledge about wireless devices.
Resumo:
Com o passar dos anos, os custos das tecnologias fotovoltaica são cada vez menores, ainda que, para muitas pessoas, seja algo dispendioso, tendo em conta a crise económica vivida nos últimos anos. Contudo, em Portugal, o sector fotovoltaico tem sofrido uma estagnação. O Decreto-Lei n.º 34/2011, não obteve a adesão esperada, uma vez que os apoios foram drasticamente reduzidos. Este aspecto tornou menos rentável o sector fotovoltaico, ainda que o país se encontre numa posição geográfica privilegiada para a produção de energia solar. Para tentar reverter a situação, o governo português aprovou uma nova legislação para o sector fotovoltaico, apresenta alterações significativas face a anterior. A mais significativa prende-se com a capacidade do sistema fotovoltaico poder injectar o excesso de energia da sua produção na rede, quando esta ultrapassa o consumo, obtendo-se, desta forma, uma remuneração de acordo com a quantidade de energia injectada. O objectivo deste trabalho é implementar uma ferramenta informática que permite avaliar a rentabilidade dos projectos fotovoltaicos, face a um determinado consumidor, de acordo com a legislação portuguesa em vigor. Neste sentido, a referida ferramenta vai analisar os dados do consumo de uma habitação familiar. Após o uso da referida ferramenta informática, concluiu-se ser financeiramente rentável a instalação de um sistema voltaico na habitação. Este resultado irá ser comparado com uma aplicação financeira e com outro software de análise de projectos, existentes no mercado.
Resumo:
É impensável viver nos dias de hoje sem energia eléctrica. Com o aumento das alterações climáticas, é fulcral substituir ou diminuir a dependência dos combustíveis fósseis, apostando em tecnologias de produção de energia mais limpas e amigas do ambiente. Neste seguimento, as energias renováveis surgem como uma boa alternativa a este problema. A tecnologia fotovoltaica aproveita a energia solar para a produção de electricidade, apresentando a vantagem de não produzir emissões durante a sua operação e ter um tipo de instalação distribuída, mas põe-se em causa o seu ciclo de vida. O principal objectivo desta dissertação é analisar o ciclo de vida da tecnologia fotovoltaica em Portugal, consistindo o objectivo secundário em comparar esta tecnologia com outras fontes de electroprodução, também em Portugal. Do ponto de vista ambiental, de maneira a ser possível identificar as fases críticas do ciclo de vida e comparar as tecnologias, foi utilizado o método Ecoblok, que fornece indicadores de desempenho. Após a análise, constatou-se que os principais impactes no ciclo de vida estão ligados à fase de produção da célula, montagem do painel e componentes do sistema (BOS). Os indicadores mais críticos são a extracção de recursos, emissão de gases de efeito de estufa e a poluição da água e do solo. Em relação à extracção de matérias-primas, o silício é abundante, mas requer elevadas quantidades de energia na sua transformação. Dentro dos tipos de tecnologia fotovoltaica, o silício monocristalino gera mais impactes ambientais comparado com o silício policristalino. Esta diferença está relacionada com o processo produtivo do silício monocristalino, um processo mais lento e com maior consumo de energia. Na comparação da tecnologia fotovoltaica com outras fontes de energia, verificou-se que a tecnologia de gás natural apresenta mais impactes gerados nos indicadores extracção de água, extracção de recursos e emissão de gases de efeito de estufa; já a tecnologia hídrica gera mais impactes no indicador uso do solo. Nos indicadores poluição da água e solo e poluição do ar, a tecnologia fotovoltaica apresenta o valor mais elevado de todas as tecnologias. A fonte de energia fotovoltaica apresenta a vantagem de ter uma produção mais estável e previsível durante o ano e de o seu horário de produção coincidir com as horas de maior consumo energético.
Resumo:
Investigações recentes apontam a grande. variação na produção de diversas micromoléculas protetoras ou sinalizadoras de plantas, de acordo com suas relações ecológicas locais e imediatas, mudando-se continuamente com o tempo, o espaço e a natureza das interrelações. Esta flexibilidade quimiossintética das plantas, tanto genética como fisiológica, podendo aumentar a canalização de energia para caminhos de fabricação da fármacos úteis, pode ser aproveitada através de estudos dessa variação, e de seleção tanto de genes como de regimes ambientais ótimos para produtividade e pureza das substâncias desejadas (Engenharia Ecológica de plantas medicinais).
Resumo:
Current computer systems have evolved from featuring only a single processing unit and limited RAM, in the order of kilobytes or few megabytes, to include several multicore processors, o↵ering in the order of several tens of concurrent execution contexts, and have main memory in the order of several tens to hundreds of gigabytes. This allows to keep all data of many applications in the main memory, leading to the development of inmemory databases. Compared to disk-backed databases, in-memory databases (IMDBs) are expected to provide better performance by incurring in less I/O overhead. In this dissertation, we present a scalability study of two general purpose IMDBs on multicore systems. The results show that current general purpose IMDBs do not scale on multicores, due to contention among threads running concurrent transactions. In this work, we explore di↵erent direction to overcome the scalability issues of IMDBs in multicores, while enforcing strong isolation semantics. First, we present a solution that requires no modification to either database systems or to the applications, called MacroDB. MacroDB replicates the database among several engines, using a master-slave replication scheme, where update transactions execute on the master, while read-only transactions execute on slaves. This reduces contention, allowing MacroDB to o↵er scalable performance under read-only workloads, while updateintensive workloads su↵er from performance loss, when compared to the standalone engine. Second, we delve into the database engine and identify the concurrency control mechanism used by the storage sub-component as a scalability bottleneck. We then propose a new locking scheme that allows the removal of such mechanisms from the storage sub-component. This modification o↵ers performance improvement under all workloads, when compared to the standalone engine, while scalability is limited to read-only workloads. Next we addressed the scalability limitations for update-intensive workloads, and propose the reduction of locking granularity from the table level to the attribute level. This further improved performance for intensive and moderate update workloads, at a slight cost for read-only workloads. Scalability is limited to intensive-read and read-only workloads. Finally, we investigate the impact applications have on the performance of database systems, by studying how operation order inside transactions influences the database performance. We then propose a Read before Write (RbW) interaction pattern, under which transaction perform all read operations before executing write operations. The RbW pattern allowed TPC-C to achieve scalable performance on our modified engine for all workloads. Additionally, the RbW pattern allowed our modified engine to achieve scalable performance on multicores, almost up to the total number of cores, while enforcing strong isolation.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
Search is now going beyond looking for factual information, and people wish to search for the opinions of others to help them in their own decision-making. Sentiment expressions or opinion expressions are used by users to express their opinion and embody important pieces of information, particularly in online commerce. The main problem that the present dissertation addresses is how to model text to find meaningful words that express a sentiment. In this context, I investigate the viability of automatically generating a sentiment lexicon for opinion retrieval and sentiment classification applications. For this research objective we propose to capture sentiment words that are derived from online users’ reviews. In this approach, we tackle a major challenge in sentiment analysis which is the detection of words that express subjective preference and domain-specific sentiment words such as jargon. To this aim we present a fully generative method that automatically learns a domain-specific lexicon and is fully independent of external sources. Sentiment lexicons can be applied in a broad set of applications, however popular recommendation algorithms have somehow been disconnected from sentiment analysis. Therefore, we present a study that explores the viability of applying sentiment analysis techniques to infer ratings in a recommendation algorithm. Furthermore, entities’ reputation is intrinsically associated with sentiment words that have a positive or negative relation with those entities. Hence, is provided a study that observes the viability of using a domain-specific lexicon to compute entities reputation. Finally, a recommendation system algorithm is improved with the use of sentiment-based ratings and entities reputation.
Resumo:
This work is devoted to the broadband wireless transmission techniques, which are serious candidates to be implemented in future broadband wireless and cellular systems, aiming at providing high and reliable data transmission and concomitantly high mobility. In order to cope with doubly-selective channels, receiver structures based on OFDM and SC-FDE block transmission techniques, are proposed, which allow cost-effective implementations, using FFT-based signal processing. The first subject to be addressed is the impact of the number of multipath components, and the diversity order, on the asymptotic performance of OFDM and SC-FDE, in uncoded and for different channel coding schemes. The obtained results show that the number of relevant separable multipath components is a key element that influences the performance of OFDM and SC-FDE schemes. Then, the improved estimation and detection performance of OFDM-based broadcasting systems, is introduced employing SFN (Single Frequency Network) operation. An initial coarse channel is obtained with resort to low-power training sequences estimation, and an iterative receiver with joint detection and channel estimation is presented. The achieved results have shown very good performance, close to that with perfect channel estimation. The next topic is related to SFN systems, devoting special attention to time-distortion effects inherent to these networks. Typically, the SFN broadcast wireless systems employ OFDM schemes to cope with severely time-dispersive channels. However, frequency errors, due to CFO, compromises the orthogonality between subcarriers. As an alternative approach, the possibility of using SC-FDE schemes (characterized by reduced envelope fluctuations and higher robustness to carrier frequency errors) is evaluated, and a technique, employing joint CFO estimation and compensation over the severe time-distortion effects, is proposed. Finally, broadband mobile wireless systems, in which the relative motion between the transmitter and receiver induces Doppler shift which is different or each propagation path, is considered, depending on the angle of incidence of that path in relation to the direction of travel. This represents a severe impairment in wireless digital communications systems, since that multipath propagation combined with the Doppler effects, lead to drastic and unpredictable fluctuations of the envelope of the received signal, severely affecting the detection performance. The channel variations due this effect are very difficult to estimate and compensate. In this work we propose a set of SC-FDE iterative receivers implementing efficient estimation and tracking techniques. The performance results show that the proposed receivers have very good performance, even in the presence of significant Doppler spread between the different groups of multipath components.
Resumo:
In the current global and competitive business context, it is essential that enterprises adapt their knowledge resources in order to smoothly interact and collaborate with others. However, due to the existent multiculturalism of people and enterprises, there are different representation views of business processes or products, even inside a same domain. Consequently, one of the main problems found in the interoperability between enterprise systems and applications is related to semantics. The integration and sharing of enterprises knowledge to build a common lexicon, plays an important role to the semantic adaptability of the information systems. The author proposes a framework to support the development of systems to manage dynamic semantic adaptability resolution. It allows different organisations to participate in a common knowledge base building, letting at the same time maintain their own views of the domain, without compromising the integration between them. Thus, systems are able to be aware of new knowledge, and have the capacity to learn from it and to manage its semantic interoperability in a dynamic and adaptable way. The author endorses the vision that in the near future, the semantic adaptability skills of the enterprise systems will be the booster to enterprises collaboration and the appearance of new business opportunities.