896 resultados para Android,Peer to Peer,Wifi,Mesh Network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract : The structural build-up of fresh cement-based materials has a great impact on their structural performance after casting. Accordingly, the mixture design should be tailored to adapt the kinetics of build-up given the application on hand. The rate of structural build-up of cement-based suspensions at rest is a complex phenomenon affected by both physical and chemical structuration processes. The structuration kinetics are strongly dependent on the mixture’s composition, testing parameters, as well as the shear history. Accurate measurements of build-up rely on the efficiency of the applied pre-shear regime to achieve an initial well-dispersed state as well as the applied stress during the liquid-solid transition. Studying the physical and chemical mechanisms of build-up of cement suspensions at rest can enhance the fundamental understanding of this phenomenon. This can, therefore, allow a better control of the rheological and time-dependent properties of cement-based materials. The research focused on the use of dynamic rheology in investigating the kinetics of structural build-up of fresh cement pastes. The research program was conducted in three different phases. The first phase was devoted to evaluating the dispersing efficiency of various disruptive shear techniques. The investigated shearing profiles included rotational, oscillatory, and combination of both. The initial and final states of suspension’s structure, before and after disruption, were determined by applying a small-amplitude oscillatory shear (SAOS). The difference between the viscoelastic values before and after disruption was used to express the degree of dispersion. An efficient technique to disperse concentrated cement suspensions was developed. The second phase aimed to establish a rheometric approach to dissociate and monitor the individual physical and chemical mechanisms of build-up of cement paste. In this regard, the non-destructive dynamic rheometry was used to investigate the evolutions of both storage modulus and phase angle of inert calcium carbonate and cement suspensions. Two independent build-up indices were proposed. The structural build-up of various cement suspensions made with different cement contents, silica fume replacement percentages, and high-range water reducer dosages was evaluated using the proposed indices. These indices were then compared to the well-known thixotropic index (Athix.). Furthermore, the proposed indices were correlated to the decay in lateral pressure determined for various cement pastes cast in a pressure column. The proposed pre-shearing protocol and build-up indices (phases 1 and 2) were then used to investigate the effect of mixture’s parameters on the kinetics of structural build-up in phase 3. The investigated mixture’s parameters included cement content and fineness, alkali sulfate content, and temperature of cement suspension. Zeta potential, calorimetric, spectrometric measurements were performed to explore the corresponding microstructural changes in cement suspensions, such as inter-particle cohesion, rate of Brownian flocculation, and nucleation rate. A model linking the build-up indices and the microstructural characteristics was developed to predict the build-up behaviour of cement-based suspensions The obtained results showed that oscillatory shear may have a greater effect on dispersing concentrated cement suspension than the rotational shear. Furthermore, the increase in induced shear strain was found to enhance the breakdown of suspension’s structure until a critical point, after which thickening effects dominate. An effective dispersing method is then proposed. This consists of applying a rotational shear around the transitional value between the linear and non-linear variations of the apparent viscosity with shear rate, followed by an oscillatory shear at the crossover shear strain and high angular frequency of 100 rad/s. Investigating the evolutions of viscoelastic properties of inert calcite-based and cement suspensions and allowed establishing two independent build-up indices. The first one (the percolation time) can represent the rest time needed to form the elastic network. On the other hand, the second one (rigidification rate) can describe the increase in stress-bearing capacity of formed network due to cement hydration. In addition, results showed that combining the percolation time and the rigidification rate can provide deeper insight into the structuration process of cement suspensions. Furthermore, these indices were found to be well-correlated to the decay in the lateral pressure of cement suspensions. The variations of proposed build-up indices with mixture’s parameters showed that the percolation time is most likely controlled by the frequency of Brownian collisions, distance between dispersed particles, and intensity of cohesion between cement particles. On the other hand, a higher rigidification rate can be secured by increasing the number of contact points per unit volume of paste, nucleation rate of cement hydrates, and intensity of inter-particle cohesion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Le contenu de ce mémoire traite du problème de gestion des stocks dans un réseau constitué de plusieurs sites de stockage de produits. Chaque site i gère son stock de manière autonome pour satisfaire une demande déterministe sur un horizon donné. Un stock maximum Si est tenu à chaque site i. Lorsque le point de commande si est atteint, une commande de taille Qi est placée au centre de distribution qui alimente tous les sites. Qi est telle que Qi = Si - si. La quantité Qi est livrée dans un délai connu Li. Si, à un instant donné, la demande Di au site i excède la quantité en main, le site i fait appel à un ou à plusieurs autres sites du réseau pour le transfert d’une quantité Xji (j = 1, 2, …, n). Ce transfert s’effectue selon un certain nombre de règles de jeu qui tiennent compte des coûts de transfert, de stockage, d’approvisionnement et de pénurie. Ce mémoire examine six principales contributions publiées dans la littérature pour évaluer les contributions d’un modèle collaboratif aux performances, en termes de coûts et de niveau de service, de chaque site du réseau. Cette investigation se limite à une configuration du réseau à deux échelons : un entrepôt central et n (n > 2) sites de stockage. Le cas des pièces de rechange, caractérisé par une demande aléatoire, est examiné dans trois chapitres de ce mémoire. Une autre application de ces stratégies à la collaboration entre n centres hospitaliers (n > 2) est également examinée dans ce travail.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introdução: no Brasil, a violência contra a mulher foi reconhecida somente com a Convenção Belém do Pará, em 1995. A partir daí, inúmeras medidas para prevenção e combate foram instituídas, entre elas a criação das Delegacias Especializadas de Atendimento às Mulheres (DEAM) e a Lei Maria da Penha. No entanto, muitas mulheres ainda são vitimadas, na maioria das vezes dentro do próprio lar. Objetivos: delinear o perfil das mulheres vítimas de violência; identificar as formas de violência registradas na DEAM da cidade do Rio Grande/RS; identificar os motivos que levam à prática da violência e descrever os atos violentos perpetrados, por parceiro íntimo, às mulheres que registraram ocorrência na DEAM. Metodologia: estudo documental, quanti e qualitativo, de natureza exploratória, descritiva e delineamento transversal. Fizeram parte do estudo todas as ocorrências cujas vítimas eram mulheres com 18 anos ou mais. O espaço temporal adotado estendeu-se de agosto de 2009, quando foi implantada a delegacia, a dezembro de 2011. Os dados foram coletados entre outubro de 2011 e março de 2012. Para a coleta, foi elaborado e aprovado, após testagem, um instrumento contendo informações acerca do agressor, da vítima, bem como do tipo de violência praticada. Os dados foram digitados em planilhas do tipo Excel. A análise quantitativa foi efetuada por meio de estatística descritiva e do software estatístico SPSS versão 17.0. Para o estudo qualitativo utilizou-se a análise de conteúdo. Esse projeto foi aprovado pelo Comitê de Ética em Pesquisa na Área da Saúde, da Universidade Federal do Rio Grande sob Parecer no 137/2011. Resultados: estão descritos em dois artigos. Analisaram-se 902 ocorrências policiais evidenciando-se que a maioria das vitimas eram mulheres brancas, jovens, com baixa escolaridade. Ainda foi possível identificar que o Centro da cidade ocupou a segunda posição como local de moradia das vítimas, desmitificando a idéia de que a violência predomina na periferia. A violência física prevaleceu nos registros notificados, seguida do descumprimento de ordem judicial. Além disso, encontrou-se a reincidência de denúncias, o que pode estar atrelado à morosidade judicial. Observou-se também, que existem diversos motivos desencadeadores da violência, no entanto todos eles apresentam como pano de fundo as questões associadas ao gênero. A simultaneidade da violência bem como a extensão aos filhos, família e sociedade retratam a gravidade do fenômeno e a necessidade de se rever a resolutividade das medidas protetivas e das penas atribuídas aos agressores. Conclusões: este estudo expôs, parcialmente, a situação da violência contra a mulher no município, pois se sabe que existem muitos casos velados que não chegam a ser notificados. Entretanto, evidenciou-se o predomínio da violência física cometida por parceiro íntimo repercutindo em graves consequências à vida das vítimas. Assim, julga-se ímpar a implementação de uma rede efetiva de apoio a essas mulheres bem como a atuação de equipe multidisciplinar capacitada, coesa e sensível ao problema, incluindo os profissionais da saúde, que precisam, ainda, estar ciente da obrigatoriedade da notificação compulsória, fundamental para a formulação de novas políticas públicas de combate e prevenção a esse fenômeno.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

SQL injection is a common attack method used to leverage infor-mation out of a database or to compromise a company’s network. This paper investigates four injection attacks that can be conducted against the PL/SQL engine of Oracle databases, comparing two recent releases (10g, 11g) of Oracle. The results of the experiments showed that both releases of Oracle were vulner-able to injection but that the injection technique often differed in the packages that it could be conducted in.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El presente artículo muestra cómo Internet se convierte en una herramienta de comunicación importante para reconfigurar la red social primaria del adulto mayor, fracturada por efecto de la migración. En la investigación que le da origien, se pudo constatar que hoy esta red se encuentra dividida en red primaria natural, conformada por los parientes y amigos con los que comparte el día a día, y red primaria virtual, integrada por los parientes migrantes. El escrito centra su interés en presentar las características de la red primaria virtual en la que el adulto mayor se vio impelido a participar para satisfacer sus necesidades comunicacionales. Esta red cumple la función de mantener, pero no de extender, su red social primaria. Los resultados dan cuenta de 4 aspectos: las competencias digitales desarrolladas por el adulto mayor, la estructura, las funciones y los atributos de vínculo de la red primaria virtual. Para ello se acudió a autores como Cabrera, Castell; Madarriaga, Abello & Sierra; Narváez A.; Soto, Navarro & Sánchez; Tovar & Villarraga. La investigación fue de tipo etnográfico, con enfoque cualitativo. Se aplicaron entrevistas semi-estructuradas. Para el tratamiento de la información se utilizó la teoría Fundamentad, de Strauss & Corbin (2002).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação apresentada à Escola Superior de Educação de Paula Frassinetti para obtenção do grau de Mestre em Intervenção Comunitária, especialização em Contextos de risco.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis develops and tests various transient and steady-state computational models such as direct numerical simulation (DNS), large eddy simulation (LES), filtered unsteady Reynolds-averaged Navier-Stokes (URANS) and steady Reynolds-averaged Navier-Stokes (RANS) with and without magnetic field to investigate turbulent flows in canonical as well as in the nozzle and mold geometries of the continuous casting process. The direct numerical simulations are first performed in channel, square and 2:1 aspect rectangular ducts to investigate the effect of magnetic field on turbulent flows. The rectangular duct is a more practical geometry for continuous casting nozzle and mold and has the option of applying magnetic field either perpendicular to broader side or shorter side. This work forms the part of a graphic processing unit (GPU) based CFD code (CU-FLOW) development for magnetohydrodynamic (MHD) turbulent flows. The DNS results revealed interesting effects of the magnetic field and its orientation on primary, secondary flows (instantaneous and mean), Reynolds stresses, turbulent kinetic energy (TKE) budgets, momentum budgets and frictional losses, besides providing DNS database for two-wall bounded square and rectangular duct MHD turbulent flows. Further, the low- and high-Reynolds number RANS models (k-ε and Reynolds stress models) are developed and tested with DNS databases for channel and square duct flows with and without magnetic field. The MHD sink terms in k- and ε-equations are implemented as proposed by Kenjereš and Hanjalić using a user defined function (UDF) in FLUENT. This work revealed varying accuracies of different RANS models at different levels. This work is useful for industry to understand the accuracies of these models, including continuous casting. After realizing the accuracy and computational cost of RANS models, the steady-state k-ε model is then combined with the particle image velocimetry (PIV) and impeller probe velocity measurements in a 1/3rd scale water model to study the flow quality coming out of the well- and mountain-bottom nozzles and the effect of stopper-rod misalignment on fluid flow. The mountain-bottom nozzle was found more prone to the longtime asymmetries and higher surface velocities. The left misalignment of stopper gave higher surface velocity on the right leading to significantly large number of vortices forming behind the nozzle on the left. Later, the transient and steady-state models such as LES, filtered URANS and steady RANS models are combined with ultrasonic Doppler velocimetry (UDV) measurements in a GaInSn model of typical continuous casting process. LES-CU-LOW is the fastest and the most accurate model owing to much finer mesh and a smaller timestep. This work provided a good understanding on the performance of these models. The behavior of instantaneous flows, Reynolds stresses and proper orthogonal decomposition (POD) analysis quantified the nozzle bottom swirl and its importance on the turbulent flow in the mold. Afterwards, the aforementioned work in GaInSn model is extended with electromagnetic braking (EMBr) to help optimize a ruler-type brake and its location for the continuous casting process. The magnetic field suppressed turbulence and promoted vortical structures with their axis aligned with the magnetic field suggesting tendency towards 2-d turbulence. The stronger magnetic field at the nozzle well and around the jet region created large scale and lower frequency flow behavior by suppressing nozzle bottom swirl and its front-back alternation. Based on this work, it is advised to avoid stronger magnetic field around jet and nozzle bottom to get more stable and less defect prone flow.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En este trabajo se ha desarrollado un nuevo método basado en Inteligencia Artificial para resolver un problema del matriz origen-destino (O-D) aplicado al caso de una red de tráfico vehicular en la ciudad de Ambato. El método implementado, basado en algoritmos genéticos (AG), resuelve el problema de minimización asociado al problema de matriz O-D. Para validar la técnica, se ha utilizado una red vial correspondiente a la zona del Mercado Modelo en la ciudad de Ambato, que es una zona de alta congestión vehicular.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The trees, hedgerows and woods are current configuration of the tree network in several ecological regions of the world. In Trás–os–Montes region, Northeast of Portugal, they are a traditional component of Terra fria landscape and they could be seen in several forms: scatter trees, fencerows, small woodlots, riparian buffer strips, among others. The extensive livestock systems in this region are based on a set of circuits across the landscape. In this practice, flocks interacts with these structures using them for different functions inducing an influence on the itineraries. Our purpose will be focused on the woody features of landscape regarding their configurations, abundance and spacial distribution; in order to examine how the grazing systems depends on the currency of these formations; particularly how species flocks behaviors are related on. Depending on spatial data, The investigation attain to compare the tree network within the agriculture matrix, to the grazed territory crossed by flocks. From the other side, the importance of spatial data on interpreting the issue by suggesting different parameter that may influence the circuits. The recognition of the pressure exerciced by the occurence of the woody structures on the grazed circuits is possible. We believe that the role of these woody structures features in supporting the tradicional silvopastoral systems has been sufficiently strong for change their distribution pattern.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

De nombreux problèmes liés aux domaines du transport, des télécommunications et de la logistique peuvent être modélisés comme des problèmes de conception de réseaux. Le problème classique consiste à transporter un flot (données, personnes, produits, etc.) sur un réseau sous un certain nombre de contraintes dans le but de satisfaire la demande, tout en minimisant les coûts. Dans ce mémoire, on se propose d'étudier le problème de conception de réseaux avec coûts fixes, capacités et un seul produit, qu'on transforme en un problème équivalent à plusieurs produits de façon à améliorer la valeur de la borne inférieure provenant de la relaxation continue du modèle. La méthode que nous présentons pour la résolution de ce problème est une méthode exacte de branch-and-price-and-cut avec une condition d'arrêt, dans laquelle nous exploitons à la fois la méthode de génération de colonnes, la méthode de génération de coupes et l'algorithme de branch-and-bound. Ces méthodes figurent parmi les techniques les plus utilisées en programmation linéaire en nombres entiers. Nous testons notre méthode sur deux groupes d'instances de tailles différentes (gran-des et très grandes), et nous la comparons avec les résultats donnés par CPLEX, un des meilleurs logiciels permettant de résoudre des problèmes d'optimisation mathématique, ainsi qu’avec une méthode de branch-and-cut. Il s'est avéré que notre méthode est prometteuse et peut donner de bons résultats, en particulier pour les instances de très grandes tailles.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this thesis connections between messages on the public wall of the Russian social network Vkontakte are analysed and classified. A total of 1818 messages from three different Vkontakte groups were collected and analysed according to a new framework based on Halliday and Hasan’s (1976) research into cohesion and Simmons’s (1981) adaptation of their classification for Russian. The two categories of textuality, cohesion and coherence, describe the linguistic connections between messages. The main aim was to find out how far the traditional categories of cohesion are applicable to an online social network including written text as well as multimedia-files. In addition to linguistic cohesion the pragmatic and topic coherence between Vkontakte messages was also analysed. The analysis of pragmatic coherence classifies the messages with acts according to their pragmatic function in relation to surrounding messages. Topic coherence analyses the content of the messages, describes where a topic begins, changes or is abandoned. Linguistic cohesion, topic coherence and pragmatic coherence enable three different types of connections between messages and these together form a coherent communication on the message wall. The cohesion devices identified by Halliday and Hasan and Simmons were found to occur in these texts, but additional devices were also identified: these are multimodal, graphical and grammatical cohesion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tämän työn tavoitteena on skenaarioiden avulla luoda pitkän aikavälin alueellinen sähkökuormien kehitysennuste Rovaniemen Verkko Oy:lle. Pitkän aikavälin kuormitusennusteet ovat välttämättömiä verkon kehittämisen pohjalle, jotta verkko voidaan mitoittaa vastaamaan kuormitusta pitkälle tulevaisuuteen tekniset ja taloudelliset vaatimukset huomioiden. Kuormitusennusteen onkin jatkossa tarkoitus toimia apuvälineenä verkon strategisessa kehittämisessä. Pohjana kuormitusennusteissa on tilastokeskuksen ja Rovaniemen kaupungin väestö- ja työpaikkaennusteet. Väestöennusteiden ja erilaisten rakentamistilastoiden avulla arvioidaan uudisrakentamisen määrä tulevaisuudessa. Uudisrakentamisen kuormitusvaikutuksiin päästään työssä määritettyjen paikallisten ja rakennustyyppikohtaisten sähkön ominaiskulutuksien avulla. Kuormituksien alueellinen sijoittautuminen arvioidaan kaavoituksen ja kaupungin maankäytön toteuttamisohjelman avulla. Työssä tutkitaan myös tulevaisuudessa sähkönkäytössä tapahtuvien useiden muutosten vaikutusta alueelliseen kuormitukseen. Näitä muutoksia ovat muun muassa sähköautojen, hajautetun tuotannon, lämpöpumppujen ja kysynnän jouston lisääntyminen. Myös rakennusten jatkuvasti parantuva energiatehokkuus aiheuttaa muutoksia sähkön kulutukseen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este trabalho tem como objetivo desenvolver uma metodologia de seletividade cinética, para os pseudocomponentes do petróleo em escoamento gás-liquido em colunas de bolhas usando a Fluidodinâmica Computacional (CFD). Uma geometria cilíndrica de 2,5m de altura e 0,162m de diâmetro foi usada tanto na validação fluidodinâmica com base em dados experimentais da literatura, como na análise cinética do reator operando em dois modos distintos em relação a fase líquida: batelada e contínuo. Todos os casos de estudo operam em regime heterogêneo de escoamento, com velocidade superficial do gás igual a 8 cm/s e diâmetro médio de bolhas de 6 mm. O modelo fluidodinâmico validado apresentou boa concordância com os dados experimentais, sendo empregado como base para a implementação do modelo cinético de rede de Krishna e Saxena (1989). A análise da hidroconversão foi realizada a 371ºC, e os resultados mostraram o comportamento esperado para o processo reativo estudado, definindo-se os tempos (batelada) e posições axiais (contínuo) de coleta ideal para os pseudocomponentes leves. Em síntese, ressaltase o uso da ferramenta CFD no entendimento, desenvolvimento e otimização de processos.