965 resultados para Cenários
Resumo:
The commitment assumed by Brazil to ILO in order to pursue actions toward the ILO/OSH-2001 adoption in the country poses the issue of modeling the institutional arrangement the set roles and relationship between government, standards organizations, health and safety organizations, professionals and other institutions to deploy the ILO/OSH-2001. This Thesis develop institutional arrangement models based on the current model and also in the ISO 9000 scheme and others. It is studied the US case with OSHA and VPP, the OHSAS 18001 and ANSI/AIHA Z-10, in addition to actual context of the regulating norms NR s. The scenarios developed are put to evaluation on feasibility, potential changes and effects on current MTE auditors work scheme. The main results are five scenarios developed and that the MTE auditors tend to be reactive to the change toward the ILO/OSH-2001.
Resumo:
The present study aims to analyse, in different levels of demand, what is the best layout strategy to adopt for the small metallic shipbuilding. To achieve this purpose, three simulation models are developed for analyze these production strategies under the positional, cellular and linear layouts. By the use of a simulation tool for compare the scenarios, Chwif and Medina (2010) and Law (2009)´s methodologies were adapted that includes three phases: conception, implementation and analysis. In conception real systems were represented by process mapping according to time, material resources and human resources variables required for each step of the production process. All of this information has been transformed in the cost variable. Data were collected from three different production systems, two located in Natal RN with cellular and positional layouts and one located in Belém-PA with linear layout. In the implementation phase, the conceptual models were converted in computacional models through the tool Rockwell Software Arena ® 13.5 and then validated. In the analysis stage the production of 960 ships in a year vessels were simulated for each layout noting that, for a production of until 80 units positional layout is the most recommended, between 81 and 288 units the cellular layout and more than 289 units the linear layout
Resumo:
This thesis deals with analyzing the actual perception of the brazilian hospital managers about natural gas fired cogeneration. An study of case is developed to obtain information about the viability of the investments in cogeneration technolgies in four hospitals. These studies are made using a questionnaire, to know and to obtain necessaries data of the managers. The main results shows that the investors have a bad feeling about to invest in a different activity. In other hand, the results show that the investors have a good impression about the configuration of the project that uses the project finance like way of financing
Resumo:
The importance of the airport sector in the development of a country refers to the need for studies on management of airports, to aid the process of decision making. In Brazil, growth in passenger demand is why investments in order to balance the capacity of an airport with air demand. Thus, the study aims to develop a model for Dynamic Systems able to assist airport management in Brazilian sizing subsystems an airport (Passenger Terminal, Runway and Patio). The methodology of this work consists in the steps of defining the problem, formulating the hypothesis dynamic building simulation model, and validation experiments. Finally, we examined the status of each subsystem in thirteen Brazilian airports in scenarios current, most likely and optimistic for air passenger demand
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Resumo:
The natural gas perform a essential paper, not only in primary sectors of energy, but also in others sectors of economy. The use natural gas will have expansion in Brazil, motivated by governmental decision to increase the participation of this fuel in the Brazilian energy matrix from 4% to 12% up until 2010. in order to reach the objective related to increase the consumption of natural gas in the energy matrix and to propose solutions to attend the electric requirements of heart and refrigeration, using natural gas as primary power plant. This thesis has a main objective to analysis the perception of businessmen of hotel sector about the feasability of investment with micro-cogeneration system by natural gas in their hotel in turistic sector, in Natal/RN. It s show a case for the hotels selected analyzing the actual knowledge of businessmen about alternative of new technology in generation of owner energy. There was make a interview using a standard form researching information about this topic. In this interview has shown 4 (four) canaries for businessmen with different configurations of investment in micro-cogeneration. Two of this canaries uses the project finance like option to make fasible this projects. The resulteis showed who businessmen has insecurity to make decision to put in office alone, or with a local company, and perhaps with a national company to perform for a alternative energy system, justifying, the alone feasability and without information by local businessmen. Apart from that, they are receptive for a option to put in office in micro-cogeneration configured in the settings using project finance
Resumo:
Internet applications such as media streaming, collaborative computing and massive multiplayer are on the rise,. This leads to the need for multicast communication, but unfortunately group communications support based on IP multicast has not been widely adopted due to a combination of technical and non-technical problems. Therefore, a number of different application-layer multicast schemes have been proposed in recent literature to overcome the drawbacks. In addition, these applications often behave as both providers and clients of services, being called peer-topeer applications, and where participants come and go very dynamically. Thus, servercentric architectures for membership management have well-known problems related to scalability and fault-tolerance, and even peer-to-peer traditional solutions need to have some mechanism that takes into account member's volatility. The idea of location awareness distributes the participants in the overlay network according to their proximity in the underlying network allowing a better performance. Given this context, this thesis proposes an application layer multicast protocol, called LAALM, which takes into account the actual network topology in the assembly process of the overlay network. The membership algorithm uses a new metric, IPXY, to provide location awareness through the processing of local information, and it was implemented using a distributed shared and bi-directional tree. The algorithm also has a sub-optimal heuristic to minimize the cost of membership process. The protocol has been evaluated in two ways. First, through an own simulator developed in this work, where we evaluated the quality of distribution tree by metrics such as outdegree and path length. Second, reallife scenarios were built in the ns-3 network simulator where we evaluated the network protocol performance by metrics such as stress, stretch, time to first packet and reconfiguration group time
Resumo:
This thesis proposes the specification and performance analysis of a real-time communication mechanism for IEEE 802.11/11e standard. This approach is called Group Sequential Communication (GSC). The GSC has a better performance for dealing with small data packets when compared to the HCCA mechanism by adopting a decentralized medium access control using a publish/subscribe communication scheme. The main objective of the thesis is the HCCA overhead reduction of the Polling, ACK and QoS Null frames exchanged between the Hybrid Coordinator and the polled stations. The GSC eliminates the polling scheme used by HCCA scheduling algorithm by using a Virtual Token Passing procedure among members of the real-time group to whom a high-priority and sequential access to communication medium is granted. In order to improve the reliability of the mechanism proposed into a noisy channel, it is presented an error recovery scheme called second chance algorithm. This scheme is based on block acknowledgment strategy where there is a possibility of retransmitting when missing real-time messages. Thus, the GSC mechanism maintains the real-time traffic across many IEEE 802.11/11e devices, optimized bandwidth usage and minimal delay variation for data packets in the wireless network. For validation purpose of the communication scheme, the GSC and HCCA mechanisms have been implemented in network simulation software developed in C/C++ and their performance results were compared. The experiments show the efficiency of the GSC mechanism, especially in industrial communication scenarios.
Resumo:
The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network
Resumo:
Deaf people have serious difficulties to access information. The support for sign languages is rarely addressed in Information and Communication Technologies (ICT). Furthermore, in scientific literature, there is a lack of works related to machine translation for sign languages in real-time and open-domain scenarios, such as TV. To minimize these problems, in this work, we propose a solution for automatic generation of Brazilian Sign Language (LIBRAS) video tracks into captioned digital multimedia contents. These tracks are generated from a real-time machine translation strategy, which performs the translation from a Brazilian Portuguese subtitle stream (e.g., a movie subtitle or a closed caption stream). Furthermore, the proposed solution is open-domain and has a set of mechanisms that exploit human computation to generate and maintain their linguistic constructions. Some implementations of the proposed solution were developed for digital TV, Web and Digital Cinema platforms, and a set of experiments with deaf users was developed to evaluate the main aspects of the solution. The results showed that the proposed solution is efficient and able to generate and embed LIBRAS tracks in real-time scenarios and is a practical and feasible alternative to reduce barriers of deaf to access information, especially when human interpreters are not available
Resumo:
Ensuring the dependability requirements is essential for the industrial applications since faults may cause failures whose consequences result in economic losses, environmental damage or hurting people. Therefore, faced from the relevance of topic, this thesis proposes a methodology for the dependability evaluation of industrial wireless networks (WirelessHART, ISA100.11a, WIA-PA) on early design phase. However, the proposal can be easily adapted to maintenance and expansion stages of network. The proposal uses graph theory and fault tree formalism to create automatically an analytical model from a given wireless industrial network topology, where the dependability can be evaluated. The evaluation metrics supported are the reliability, availability, MTTF (mean time to failure), importance measures of devices, redundancy aspects and common cause failures. It must be emphasized that the proposal is independent of any tool to evaluate quantitatively the target metrics. However, due to validation issues it was used a tool widely accepted on academy for this purpose (SHARPE). In addition, an algorithm to generate the minimal cut sets, originally applied on graph theory, was adapted to fault tree formalism to guarantee the scalability of methodology in wireless industrial network environments (< 100 devices). Finally, the proposed methodology was validate from typical scenarios found in industrial environments, as star, line, cluster and mesh topologies. It was also evaluated scenarios with common cause failures and best practices to guide the design of an industrial wireless network. For guarantee scalability requirements, it was analyzed the performance of methodology in different scenarios where the results shown the applicability of proposal for networks typically found in industrial environments
Resumo:
Desenvolveu-se um estudo de simulação estocástica com o objetivo de verificar as consequências do uso combinado de acasalamento dirigido e sêmen sexado em uma população de bovinos de corte sob seleção. Simularam-se seis gerações de seleção para três cenários de acasalamento e uso de sêmen sexado. O primeiro cenário foi caracterizado por acasalamento aleatório e uso exclusivo de sêmen convencional. O segundo cenário caracterizou-se pelo uso de acasalamento associativo positivo nas 40% melhores vacas e acasalamento associativo negativo nas demais, sem uso de sêmen sexado. O terceiro cenário seguiu o mesmo procedimento de acasalamento do segundo, combinando-o com uso de sêmen sexado nas vacas submetidas a acasalamento associativo positivo. O acasalamento associativo positivo teve maior impacto no progresso genético que o uso de sêmen sexado, apesar de ter aumentado a incidência de endogamia na população. O uso de acasalamento associativo negativo foi ineficiente em reduzir a variabilidade dos animais destinados ao abate. O uso combinado de acasalmento associativo positivo e sêmen sexado aumentou a produção de animais geneticamente superiores.
Resumo:
This paper presents the performanee analysis of traffie retransmission algorithms pro¬posed to the HCCA medium aeeess meehanism of IEEE 802.11 e standard applied to industrial environmen1. Due to the nature of this kind of environment, whieh has eleetro¬magnetic interferenee, and the wireless medium of IEEE 802.11 standard, suseeptible to such interferenee, plus the lack of retransmission meehanisms, refers to an impraetieable situation to ensure quality of service for real-time traffic, to whieh the IEEE 802.11 e stan¬dard is proposed and this environment requires. Thus, to solve this problem, this paper proposes a new approach that involves the ereation and evaluation of retransmission al-gorithms in order to ensure a levei of robustness, reliability and quality of serviee to the wireless communication in such environments. Thus, according to this approaeh, if there is a transmission error, the traffie scheduler is able to manage retransmissions to reeo¬ver data 10s1. The evaluation of the proposed approaeh is performed through simulations, where the retransmission algorithms are applied to different seenarios, whieh are abstrae¬tions of an industrial environment, and the results are obtained by using an own-developed network simulator and compared with eaeh other to assess whieh of the algorithms has better performanee in a pre-defined applieation
Resumo:
Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.
Resumo:
Attacks to devices connected to networks are one of the main problems related to the confidentiality of sensitive data and the correct functioning of computer systems. In spite of the availability of tools and procedures that harden or prevent the occurrence of security incidents, network devices are successfully attacked using strategies applied in previous events. The lack of knowledge about scenarios in which these attacks occurred effectively contributes to the success of new attacks. The development of a tool that makes this kind of information available is, therefore, of great relevance. This work presents a support system to the management of corporate security for the storage, retrieval and help in constructing attack scenarios and related information. If an incident occurs in a corporation, an expert must access the system to store the specific attack scenario. This scenario, made available through controlled access, must be analyzed so that effective decisions or actions can be taken for similar cases. Besides the strategy used by the attacker, attack scenarios also exacerbate vulnerabilities in devices. The access to this kind of information contributes to an increased security level of a corporation's network devices and a decreased response time to occurring incidents