988 resultados para Client-side architecture
Resumo:
Tourism is one of the biggest industry branches with billions of tourists traveling every year around the world. Therefore, solutions providing tourist information have to be up to date with both changes in the industry and the world’s technological progress. The aim of this thesis is to present a design and a prototype of a tourist mobile service which is individual-oriented, cost-free for the end user, and secure. On the information providers’ side, the solution is implemented as a Webbased database. The end users access the information through a Bluetooth application on their mobile devices. The Bluetooth-based solution allows to avoid any costs for the end users, that is tourists. The study shows that, even with small data transfers, the tourists could save significantly when compared to possible roaming charges for data transfer. Also, the proposed mobile service is not intrusive, as it is provided through an application installed by tourists voluntarily on their mobile devices. Through design and implementation this work shows that it is possible to build a system which can be used to provide information services to tourists through mobile phones. The work achieved a successful ongoing synchronization between the client and the server databases. Implementation and usage were limited to smart phones only, as they provide better technological support for the solution having features like maps, GPS, Wi-Fi, Bluetooth and Databases. Moreover, the design of this system shows how Bluetooth technology can be used effectively as a means of communication while minimizing its shortcomings and risks, such as security, by bypassing Bluetooth server service discovery protocol (SDP) and connecting directly to the device. Apart from showing the design and implementation of the end-user costfree mobile information service, the results of this work also highlight the possible business opportunities to the provider of the service.
Resumo:
Parameters such as tolerance, scale and agility utilized in data sampling for using in Precision Agriculture required an expressive number of researches and development of techniques and instruments for automation. It is highlighted the employment of methodologies in remote sensing used in coupled to a Geographic Information System (GIS), adapted or developed for agricultural use. Aiming this, the application of Agricultural Mobile Robots is a strong tendency, mainly in the European Union, the USA and Japan. In Brazil, researches are necessary for the development of robotics platforms, serving as a basis for semi-autonomous and autonomous navigation systems. The aim of this work is to describe the project of an experimental platform for data acquisition in field for the study of the spatial variability and development of agricultural robotics technologies to operate in agricultural environments. The proposal is based on a systematization of scientific work to choose the design parameters utilized for the construction of the model. The kinematic study of the mechanical structure was made by the virtual prototyping process, based on modeling and simulating of the tension applied in frame, using the.
Resumo:
Human trafficking is not a new phenomenon. It has existed in various forms for ages around the world. Some researchers have even compared it to slavery, calling it the modern form of slavery in the 21st century. This study is particularly interested in the role of work-related human trafficking in Finnish business. In order for something to be called work-related human trafficking, the concepts of forced labour and human trafficking have to overlap. From the economic point of view, human trafficking is governed by the laws of supply and demand. In many countries the global pressure on cutting costs has created two trends: the increased supply of migrant workers and the deregulation of labour markets. These competitive pressures can have an adverse impact on the conditions of employment and, in the worst cases, can lead to forced labour and trafficking. In fact, trafficking has become one of the most profitable illicit industries worldwide, generating tremendous profits due to its low costs and huge profits. Therefore, it is important to investigate the phenomenon from the business point of view. This study is a qualitative research conducted by using theme interviews as a research approach. Altogether 13 interviews have been conducted and some secondary data has been used in order to find out what the role of human trafficking is in Finnish business. The special sectors investigated are the Finnish construction and service sectors. The theory framework used in this study follows the stakeholder approach. The relevant stakeholder groups for this study are: ‘institutions and authorities’, ‘law enforcement’, ‘management’ and ‘employees – potential victims’ of trafficking. With the help of these stakeholder groups, a holistic picture of the phenomenon is formed. It can be concluded that the role of human trafficking is complicated but it does exist in Finnish business. It appears in low-cost business sectors where the demand for cheap labour is high. Thus, often the victims are foreigners who do not know the culture or the Finnish conditions of employment. Especially smaller Finnish companies are at risk of getting involved in human trafficking or related exploitation cases since monitoring is much more scarce in these firms than in larger companies. The risk of human trafficking and exploitation is also higher at the bottom of the complicated subcontracting chains or when using foreign recruitment agencies. Thus, the study believes that active and intensive collaboration between the company’s different stakeholder groups is needed in order to prevent work-related human trafficking from flourishing in Finland.
Resumo:
Pro gradu -tutkielman tavoitteena on selvittää asiakasomistajien psykologisen omistajuuden tila Etelä-Karjalan Eekoon Osuuskaupassa. Tavoitteena on selvittää miten psykologista sidettä voi vahvistaa ja mitä keinoja on syytä välttää sitoutettaessa asiakasomistajia. Tutkielma on toteutettu laadullisin menetelmin. Tutkielmassa käsitellään psykologista omistajuutta ja identifioitumista sen lähikäsitteiden sitoutumisen ja sisäistämisen avulla. Tutkielman tuloksista ilmenee, että jäsenten psykologinen side Osuuskauppaa kohtaan on melko heikko ja jäsenet eivät tunne olevansa omistajia Osuuskaupassa. Jäsenten psykologinen side vahvistuu Eekoossa parhaiten niin, että jäsenet kokevat voivansa konkreettisesti vaikuttaa Osuuskaupan toimintaan.
Resumo:
OBJECTIVE: To evaluate the natural healing of the rat diaphragm that suffered an extensive right penetrating injury.METHODS: Animals were submitted to an extensive penetrating injury in right diaphragm. The sample consisted of 40 animals. The variables studied were initial weight, weight 21 days after surgery; healing of the diaphragm, non-healing of the diaphragm, and herniated abdominal contents into the chest.RESULTS: Ten animals were used as controls for weight and 30 animals were operated. Two animals died during the experiment, so 28 animals formed the operated group; healing of the diaphragm occurred in 15 animals (54%), 11 other animals showed diaphragmatic hernia (39%) and in two we observed only diaphragmatic injury without hernia (7%). Among the herniated organs, the liver was found in 100% of animals, followed by the omentum in 77%, small bowel in 62%, colon in 46%, stomach in 31% and spleen in 15%. The control group and the diaphragmatic healing subgroup showed increased weight since the beginning of the study and the 21 days after surgery (p <0.001). The unhealed group showed no change in weight (p = 0.228).CONCLUSION: there is a predominance of spontaneous healing in the right diaphragm; animals in which there was no healing of the diaphragm did not gain weight, and the liver was the organ present in 100% the diaphragmatic surface in all rats with healed diaphragm or not.
Resumo:
Julkaisumaa Intia 356 IN IND
Resumo:
Abstract—Concept development and experimentation (CD&E) plays an important role in driving strategic transformation in the military community. Defence architecture frameworks, such as the NATO architecture framework, are considered excellent means to support CD&E. There is not much empirical evidence, however, to indicate how enterprise architectures (EA) are applied in the military community or particularly in military CD&E. Consequently, this paper describes and discusses empirical application of the EA approach in CD&E. The research method in the paper is a case study. Situational method engineering (SiME) is used as a framework to adapt the EA approach to the case project of the paper. The findings of the paper suggest that the EA is applicable to CD&E work, although all aspects of the original concept could not be expressed in the EA model of the case project. The results also show that the SiME method can support in applying the EA framework to the CD&E in the case project.
Resumo:
Superconductor – normal metal point contacts were investigated, using different combinations of Cu, brass, Nb and NbTi. The resulting spectra contained side peaks. The currents at which these side peaks appeared, depended on the radii of the contacts. For contacts with Nb this dependence was quadratic, while for contacts with NbTi it was linear. Based on this, we argue that the side peaks in the case of the Nb contacts are due to the critical current density being exceeded. In contrast, side peaks of the NbTi contacts are caused by the self-magnetic field exceeding the lower critical field of NbTi. The NbTi contacts did not show the expected contribution from the vanishing Maxwell resistance of the superconductor, a question which remained open.
Resumo:
Acid mine drainage (AMD) presents a serious problem for the environment for the massive formation of acidic leachates containing heavy metals. The present work deals with the AMD treatment using neutralizing limestone side-products. The conventional methods for prevention, mitigating and control of AMD formation are described. The experimental testing of Nordkalk Oy calcite-containing side-stones for acid neutralizing and removal of nickel from solutions presents the research objective. The batch experiments in acid neutralizing with subsequent metal content analysis were carried out. The results showed the dependence of pH on the dose of neutralizing material and the exposure time. The nickel removal, unlike iron, within the pH range from 1.2 to 6.0 appeared to be inadequate. The further research on nickel co-precipitation with iron and aluminium may appear to be necessary together with testing of alkalinity strengthening materials.
Resumo:
The aim of this dissertation is to bridge and synthesize the different streams of literature addressing ecosystem architecture through a multiple‐lens perspective. In addition, the structural properties of and processes to design and manage the architecture will be examined. With this approach, the oft‐neglected actor‐structure duality is addressed and both the position and structure, and action and process are under scrutiny. Further, the developed framework and empirical evidence offer valuable insights on how firms collectively create value and individually appropriate value. The dissertation is divided into two parts. The first part comprises a literature review, as well as the conclusions of the whole study, and the second part includes six research publications. The dissertation is based on three different reasoning logics: abduction, induction and deduction; related qualitative and quantitative methodologies are utilized in the empirical examination of the phenomenon in the information and communication technology industry. The results suggest firstly that there are endogenous and exogenous structural properties of the ecosystem architecture. Out of these, the former ones can be more easily influenced by a particular actor whereas the latter ones are taken more or less for granted. Secondly, the exogenous ecosystem design properties influence the value creation potential of the ecosystem whereas the endogenous ecosystem design properties influence the value appropriation potential of a particular actor in the ecosystem. Thirdly, the study suggests that there is a relationship between endogenous and exogenous structural properties in that the endogenous properties can be leveraged to create and reconfigure the exogenous properties whereas the exogenous properties prose opportunities and restrictions on the use of endogenous properties. In addition, the study suggests that there are different emergent and engineered processes to design and manage ecosystem architecture and to influence both the endogenous and exogenous structural properties of ecosystem architecture. This study makes three main contributions. First, on the conceptual level, it brings coherence and direction to the fast growing body of literature on novel inter‐organizational arrangements, such as ecosystems. It does this by bridging and synthetizing three different streams of literature, namely the boundary, design and orchestration conception. Secondly, it sets out a framework that enhances our understanding of the structural properties of ecosystem architecture; of the processes to design and manage ecosystem architecture; and of their influence on the value creation potential of the ecosystem and the value capture potential of a particular firm. Thirdly, it offers empirical evidence of the structural properties and processes.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
The evolution of digital circuit technology, leadind to higher speeds and more reliability allowed the development of machine controllers adapted to new production systems (e.g., Flexible Manufacturing Systems - FMS). Most of the controllers are developed in agreement with the CNC technology of the correspondent machine tool manufacturer. Any alterations or adaptation of their components are not easy to be implemented. The machine designers face up hardware and software restrictions such as lack of interaction among system's elements and impossibility of adding new function. This is due to hardware incompatibility and to software not allowing alterations in the source program. The introduction of open architecture philosophy propitiated the evolution of a new generation of numeric controllers. This brought the conventional CNC technology to the standard IBM - PC microcomputer. As a consequence, the characteristics of the CNC (positioning) and the microcomputer (easy of programming, system configuration, network communication etc) are combined. Some researchers have addressed a flexible structure of software and hardware allowing changes in the hardware basic configuration and all control software levels. In this work, the development of open architecture controllers in the OSACA, OMAC, HOAM-CNC and OSEC architectures is described.
Resumo:
The aim of this master’s thesis was to specify a system requiring minimal configuration and providing maximal connectivity in the vein of Skype but for device management purposes. As peer-to-peer applications are pervasive and especially as Skype is known to provide this functionality, the research was focused on these technologies. The resulting specification was a hybrid of a tiered hierarchical network structure and a Kademlia based DHT. A prototype was produced as a proof-of-concept for the hierarchical topology, demonstrating that the specification was feasible.
Resumo:
ERP system is now attracting the SMEs, as it is now economical and affordable for them. The current research emphasizes on “how to make ERP successful for SMEs”. The researchers have identified various critical success factors in implementation of ERP. The research gap noticed by author is the missing point of view of ERP consultant. This thesis investigates the answer of research question “What are the critical success factors in implementation of ERP system in SMEs in opinion of ERP consultants and acquiring organizations”. The purpose of this study is to identify the highly important and less important factors. The study results will suggest the ERP managers where they have to concentrate more in order to achieve success. Literature is reviewed in order to setup a base for empirical study. Aplenty of work is found related to CSFs, SMEs and ERP. The authors and factors are organized in form of a table that tells which author is agreed upon which factor. Final result of literature review is a list of 14 CSFs. The qualitative research methodology is used to investigate the ERP in Pakistani SMEs. A case study approach is selected because of unified nature of SMEs in Pakistan. A rice mill is selected as a case because it contains maximum SME attributes. The opinion of a Microsoft certified consultant is obtained by a semi-structured interview. Similarly a semi-structured interview is conducted with CIO of SME that acquired ERP. Both the interviewees are asked about all 14 factors, whether they are agree or not and why. The collected evidences then analyzed by tabulation. The factors upon which both the participants found agreed, taken as highly important. Similarly the factors upon which both participants found disagree, taken as less important. Study results present a grid with four quadrants, the CSFs highly important in opinion of both, the CSFs less important in opinion of both, CSFs important in opinion of consultant but not client, CSFs important in opinion of client but not consultant. In discussion part, the significance of each factor is discussed individually. It is discussed that why some factors are high/less important for SMEs in Pakistan. The study output communicates a message that the success of ERP system in SMEs is linked with careful management of five important factors, the project management, top management support, user training and education, consultant participation and ERP teamwork and composition. The ERP consultants and managers can divert their concentration from less important factors such as user involvement, culture readiness and ERP package selection, toward the highly important factors. The limitations of the study are small number of interviews and less people involved, provide an opportunity for future research in this field of information system.