979 resultados para Apical Dominance
Resumo:
Copyright © 2013 Elsevier Ltd. All rights reserved.
Resumo:
Dissertação de Mestrado em Ciências Económicas e Empresariais.
Resumo:
This essay intends to discuss some critical readings of fictional and theoretical texts on gender condition in Southeast Asian countries. Nowadays, many texts about women in Southeast Asia apply concepts of power in unusual areas. Traditional forms of gender hegemony have been replaced by other powerful, if somewhat more covert, forms. We will discuss some universal values concerning conventional female roles as well as the strategies used to recognize women in political fields traditionally characterized by male dominance. Female empowerment will mean different things at different times in history, as a result of culture, local geography and individual circumstances. Empowerment needs to be perceived as an individual attitude, but it also has to be facilitated at the macrolevel by society and the State. Gender is very much at the heart of all these dynamics, strongly related to specificities of historical, cultural, ethnic and class situatedness, requiring an interdisciplinary transnational approach.
Resumo:
Perante a crescente preocupação dos consumidores, cada vez mais exigentes com os produtos e serviços que lhes são fornecidos, têm-se evidenciado esforços no sentido da aplicação prática e coordenada de uma abordagem global e integrada da segurança alimentar com o objectivo de melhorar as normas da qualidade e reforçar os sistemas de controlo em toda a cadeia alimentar, desde a exploração agrícola até ao consumidor final. Os referenciais normativos de segurança alimentar especificam os requisitos de um Sistema de Gestão da Segurança Alimentar, para organizações da cadeia de fornecimento de produtos alimentares, que pretendam demonstrar a sua aptidão para fornecer produtos seguros e o cumprimento de requisitos legais, regulamentares e de qualidade exigidos. Ao longo dos anos, diversos referenciais normativos, baseados na metodologia HACCP, foram desenvolvidos e publicados, por vários países e determinados sectores da cadeia alimentar. Perante a diversidade de referenciais existentes, cada vez mais, as organizações se questionam sobre qual o referencial de segurança alimentar a implementar. Nesta dissertação, dá-se uma contribuição no sentido da sistematização dos requisitos dos referenciais de segurança alimentar com o objectivo de suportar a respectiva comparação nomeadamente o IFS – Food, o BRC – Food, a FSSC 22000 e, de forma indirecta, a ISO 22000. Tal deve-se à necessidade de identificar o(s) referenciais de segurança alimentar a implementar numa dada organização pertencente a um dado sector de actividade. Finalmente, procede-se à realização de um estudo sobre a representatividade, número de empresas certificadas, dos referenciais em análise no mercado Nacional, Europeu e Internacional. Como conclusão genérica, é possível afirmar que, embora ao nível dos requisitos existam diferenças entre os referenciais em análise, também se verificam muitas semelhanças. Prova disso é o reconhecimento por parte da GFSI de vários destes referenciais Quanto à representatividade, verifica-se uma tendência de predomínio de determinados referenciais nos países onde foram desenvolvidos, e nos países com os quais mantêm relações comerciais mais fortes. Refere-se o Reino Unido para a BRC, e a Alemanha e França para a IFS. De salientar a importante contribuição da GFSI que, através do reconhecimento aos diversos referenciais de segurança alimentar, realizado por uma painel de especialistas e representantes de diversos sectores (industria, distribuição e serviços) está a contribuir para a respectiva harmonização e reconhecimento mundial.
Resumo:
The nearly ubiquitous consumption of cereals all over the world renders them an important position in international nutrition, but concurrently allocates exposure to possible contained contaminants. Mycotoxins are natural food contaminants, difficult to predict, evade, and reduce, so it is important to establish the real contribution of each contaminated food product, with the aim to evaluate mycotoxin exposure. This was the key objective of this survey and analysis for ochratoxin A content on 274 samples of commercialized bread in the Portuguese market, during the winter 2007. Different bread products were analyzed through an HPLC-FD method, including traditional types, novel segments, and different grain based bread products. A wide-ranging low level contamination was observed in all regions and types of bread products analyzed, especially in the Porto and Coimbra regions, and in the maize and whole-grain or fiber-enriched bread. Nevertheless, the exposure through contaminated wheat bread continues to be the most significant, given its high consumption and dominance in relation to the other types of bread.
Resumo:
Mestrado em Tecnologia de Diagnóstico e Intervenção Cardiovascular
Resumo:
In recent years several countries have set up policies that allow exchange of kidneys between two or more incompatible patient–donor pairs. These policies lead to what is commonly known as kidney exchange programs. The underlying optimization problems can be formulated as integer programming models. Previously proposed models for kidney exchange programs have exponential numbers of constraints or variables, which makes them fairly difficult to solve when the problem size is large. In this work we propose two compact formulations for the problem, explain how these formulations can be adapted to address some problem variants, and provide results on the dominance of some models over others. Finally we present a systematic comparison between our models and two previously proposed ones via thorough computational analysis. Results show that compact formulations have advantages over non-compact ones when the problem size is large.
Resumo:
Consider the problem of scheduling sporadic messages with deadlines on a wireless channel. We propose a collision-free medium access control (MAC) protocol which implements static-priority scheduling and present a schedulability analysis technique for the protocol. The MAC protocol allows multiple masters and is fully distributed; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel.
Resumo:
Mestrado em Tecnologia de Diagnóstico e Intervenção Cardiovascular - Ramo de especialização: Ultrassonografia Cardiovascular
Resumo:
We focus on large-scale and dense deeply embedded systems where, due to the large amount of information generated by all nodes, even simple aggregate computations such as the minimum value (MIN) of the sensor readings become notoriously expensive to obtain. Recent research has exploited a dominance-based medium access control(MAC) protocol, the CAN bus, for computing aggregated quantities in wired systems. For example, MIN can be computed efficiently and an interpolation function which approximates sensor data in an area can be obtained efficiently as well. Dominance-based MAC protocols have recently been proposed for wireless channels and these protocols can be expected to be used for achieving highly scalable aggregate computations in wireless systems. But no experimental demonstration is currently available in the research literature. In this paper, we demonstrate that highly scalable aggregate computations in wireless networks are possible. We do so by (i) building a new wireless hardware platform with appropriate characteristics for making dominance-based MAC protocols efficient, (ii) implementing dominance-based MAC protocols on this platform, (iii) implementing distributed algorithms for aggregate computations (MIN, MAX, Interpolation) using the new implementation of the dominance-based MAC protocol and (iv) performing experiments to prove that such highly scalable aggregate computations in wireless networks are possible.
Resumo:
WiDom is a wireless prioritized medium access control (MAC) protocol which offers a very large number of priority levels. Hence, it brings the potential for employing non-preemptive static-priority scheduling and schedulability analysis for a wireless channel assuming that the overhead of WiDom is modeled properly. One schedulability analysis for WiDom has already been proposed but recent research has created a new version of WiDom with lower overhead (we call it: WiDom with a master node) and for this version of WiDom no schedulability analysis exists. Also, common to the previously proposed schedulability analyses for WiDom is that they cannot analyze message streams with release jitter. Therefore, in this paper we propose a new schedulability analysis for WiDom (with a master node). We also extend the WiDom analyses (with and without master node) to work also for message streams with release jitter.
Resumo:
We propose a wireless medium access control (MAC) protocol that provides static-priority scheduling of messages in a guaranteed collision-free manner. Our protocol supports multiple broadcast domains, resolves the wireless hidden terminal problem and allows for parallel transmissions across a mesh network. Arbitration of messages is achieved without the notion of a master coordinating node, global clock synchronization or out-of-band signaling. The protocol relies on bit-dominance similar to what is used in the CAN bus except that in order to operate on a wireless physical layer, nodes are not required to receive incoming bits while transmitting. The use of bit-dominance efficiently allows for a much larger number of priorities than would be possible using existing wireless solutions. A MAC protocol with these properties enables schedulability analysis of sporadic message streams in wireless multihop networks.
Resumo:
In this paper, we focus on large-scale and dense Cyber- Physical Systems, and discuss methods that tightly integrate communication and computing with the underlying physical environment. We present Physical Dynamic Priority Dominance ((PD)2) protocol that exemplifies a key mechanism to devise low time-complexity communication protocols for large-scale networked sensor systems. We show that using this mechanism, one can compute aggregate quantities such as the maximum or minimum of sensor readings in a time-complexity that is equivalent to essentially one message exchange. We also illustrate the use of this mechanism in a more complex task of computing the interpolation of smooth as well as non-smooth sensor data in very low timecomplexity.
Resumo:
Consider the problem of sharing a wireless channel between a set of computer nodes. Hidden nodes exist and there is no base station. Each computer node hosts a set of sporadic message streams where a message stream releases messages with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements staticpriority scheduling. The MAC protocol allows multiple masters and is fully distributed. It neither relies on synchronized clocks nor out-of-band signaling; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. Our protocol has the key feature of not only being prioritized and collision-free but also dealing successfully with hidden nodes. This key feature enables schedulability analysis of sporadic message streams in multihop networks.
Resumo:
We propose a collision-free medium access control (MAC) protocol, which implements static-priority scheduling and works in the presence of hidden nodes. The MAC protocol allows multiple masters and is fully distributed; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But unlike that protocol, our protocol does not require a node having the ability to sense the channel while transmitting to the channel. Our protocol is collision-free even in the presence of hidden nodes and it achieves this without synchronized clocks or out-of-band busy tones. In addition, the protocol is designed to ensure that many non-interfering nodes can transmit in parallel and it functions for both broadcast and unicast transmissions.