950 resultados para CASE-CROSSOVER ANALYSIS
Resumo:
Modern telecommunication equipment requires components that operate in many different frequency bands and support multiple communication standards, to cope with the growing demand for higher data rate. Also, a growing number of standards are adopting the use of spectrum efficient digital modulations, such as quadrature amplitude modulation (QAM) and orthogonal frequency division multiplexing (OFDM). These modulation schemes require accurate quadrature oscillators, which makes the quadrature oscillator a key block in modern radio frequency (RF) transceivers. The wide tuning range characteristics of inductorless quadrature oscillators make them natural candidates, despite their higher phase noise, in comparison with LC-oscillators. This thesis presents a detailed study of inductorless sinusoidal quadrature oscillators. Three quadrature oscillators are investigated: the active coupling RC-oscillator, the novel capacitive coupling RCoscillator, and the two-integrator oscillator. The thesis includes a detailed analysis of the Van der Pol oscillator (VDPO). This is used as a base model oscillator for the analysis of the coupled oscillators. Hence, the three oscillators are approximated by the VDPO. From the nonlinear Van der Pol equations, the oscillators’ key parameters are obtained. It is analysed first the case without component mismatches and then the case with mismatches. The research is focused on determining the impact of the components’ mismatches on the oscillator key parameters: frequency, amplitude-, and quadrature-errors. Furthermore, the minimization of the errors by adjusting the circuit parameters is addressed. A novel quadrature RC-oscillator using capacitive coupling is proposed. The advantages of using the capacitive coupling are that it is noiseless, requires a small area, and has low power dissipation. The equations of the oscillation amplitude, frequency, quadrature-error, and amplitude mismatch are derived. The theoretical results are confirmed by simulation and by measurement of two prototypes fabricated in 130 nm standard complementary metal-oxide-semiconductor (CMOS) technology. The measurements reveal that the power increase due to the coupling is marginal, leading to a figure-of-merit of -154.8 dBc/Hz. These results are consistent with the noiseless feature of this coupling and are comparable to those of the best state-of-the-art RC-oscillators, in the GHz range, but with the lowest power consumption (about 9 mW). The results for the three oscillators show that the amplitude- and the quadrature-errors are proportional to the component mismatches and inversely proportional to the coupling strength. Thus, increasing the coupling strength decreases both the amplitude- and quadrature-errors. With proper coupling strength, a quadrature error below 1° and amplitude imbalance below 1% are obtained. Furthermore, the simulations show that increasing the coupling strength reduces the phase noise. Hence, there is no trade-off between phase noise and quadrature error. In the twointegrator oscillator study, it was found that the quadrature error can be eliminated by adjusting the transconductances to compensate the capacitance mismatch. However, to obtain outputs in perfect quadrature one must allow some amplitude error.
Resumo:
Based on the report for the unit “Foresight Analysis Methods” of the PhD program on Technology Assessment in 2013. This unit was supervised by Prof. António Moniz. The paper had meanwhile contributions from the supervisor and Dr. Douglas Robinson.
Resumo:
Childhood non-Hodgkin's lymphomas, including Burkitt and Burkitt-like, are rarely diagnosed in infants. A case of B-cell lymphoma in a 13-month-old girl with extensive abdominal disease, ascites, pleural effusion, and tumor lysis syndrome is reported. Phenotypic analysis showed a germinal center B-cell phenotype, and a B-cell clonality was confirmed by polymerase chain reaction. There was no evidence of Epstein-Barr and HIV infection. The case herein reported emphasizes the need for considering the diagnosis of lymphoma even in very young children.
Resumo:
Umbilical nodes are rare. The metastatic involvement of the region was first described in 1846. Sister Mary Joseph was the first observer to establish the correlation between carcinomas and umbilical nodes. The umbilical node may be the sole presenting sign of cancer and is usually associated with advanced disease and poor prognosis. A 64-year-old woman, previously healthy, presented vague abdominal discomfort and a hard umbilical nodule for 1 week, which was first diagnosed as an incarcerated umbilical hernia. She underwent a new clinical assessment and biopsy. After immunohistochemical analysis and computerized tomography, she was diagnosed with pancreatic cancer. The clinical staging showed advanced disease with distant metastasis. She received palliative chemotherapy. After 8 months, she was alive in poor clinical condition. Clinical suspicion should lead to a careful additional evaluation whenever an umbilical nodule presents with malignant signs.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
This thesis applied real options analysis to the valuation of an offshore oil exploration project, taking into consideration the several options typically faced by the management team of these projects. The real options process is developed under technical and price uncertainties, where it is considered that the mean reversion stochastic process is more adequate to describe the movement of oil price throught time. The valuation is realized to two case scenarios, being the first a simplified approach to develop the intuition of the used concepts, and the later a more complete cases that is resolved using both the binomial and trinomial processes to describe oil price movement. Real options methodology demonstrated to be capable of assessing and valuing the projects options, and of overcoming common capital budgeting methodologies flexibility limitation. The added value of the application of real options is evident, but so is the method's increased complexity, which adversely influence its widespread implementation.
Resumo:
Timber connections represent the crucial part of a timber structure and a great variability exists in terms of types of connections and mechanisms. Taking as case study the widespread traditional timber frame structures, in particular the Portuguese Pombalino buildings, one of the most common timber connection is the half-lap joint. Connections play a major role in the overall behaviour of a structure, particularly when assessing their seismic response, since damage is concentrated at the connections. For this reason, an experimental campaign was designed and distinct types of tests were carried out on traditional half-lap joints to assess their in-plane response. In particular, pull-out and in-plane cyclic tests were carried out on real scale unreinforced connections. Subsequently, the connections were retrofitted, using strengthening techniques such as self-tapping screws, steel plates and GFRP sheets. The tests chosen were meant to capture the hysteretic behaviour and dissipative capacity of the connections and characterise their response and, therefore, their influence on the seismic response of timber frame walls, particularly concerning their uplifting and rotation capacity, that could lead to rocking in the walls. In this paper, the results of the experimental campaign are presented in terms of hysteretic curves, dissipated energy and equivalent viscous damping ratio. Moreover, recommendations are provided on the most appropriate retrofitting solutions.
Resumo:
Following detailed studies of Portuguese vernacular building typologies, this paper deals with buildings located in historical urban centres. An analysis of the history of the urban centre and, in particular, of some vernacular buildings is enhanced. Additionally, a discussion on the influence of changes of the geometry, and on added built volumes to original buildings in the seismic vulnerability of the buildings is also provided.
Resumo:
Due to the increasing acceptance of BPM, nowadays BPM tools are extensively used in organizations. Core to BPM are the process modeling languages, of which BPMN is the one that has been receiving most attention these days. Once a business process is described using BPMN, one can use a process simulation approach in order to find its optimized form. In this context, the simulation of business processes, such as those defined in BPMN, appears as an obvious way of improving processes. This paper analyzes the business process modeling and simulation areas, identifying the elements that must be present in the BPMN language in order to allow processes described in BPMN to be simulated. During this analysis a set of existing BPM tools, which support BPMN, are compared regarding their limitations in terms of simulation support.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
Sustainability-related skills are becoming more and more relevant for a proficient and professional engineering practice. Industrial engineers in particular, given their broad field of intervention and being at the heart of industrial activity, hold a great deal of potential and responsibility in providing and delivering best industrial practices, that support enhanced industrial systems and products. Therefore making a real contribution in generating wealth and income for all the companies’ stakeholders, including local communities, as well as adding up to more sustainable ecosystems. Previous work by the authors focused on studying the inclusion of this subject on the education of industrial engineers, especially through active-learning methodologies, as well as presenting results on the use of one such approach. The study conducted tried to identify the impacts on sustainability learning using a given specific activity, i.e. a workshop on industrial ecology, held in the 2014/2015 academic year on the Integrated MSc degree on Industrial Engineering and Management at the University of Minho, Portugal. The study uses content analysis of student teams’ reports for two consecutive academic years. The former did not include one such workshop, while the latter did. The Fink taxonomy was used in the discussion of results and reflection. The study outcomes aimed at supporting decision making on worthiness of investment on similar education instruments for sustainability competency development. Some results of the study highlight that: (1) the workshop seem to globally have a positive contribution on the sustainability learning; (2) a number of dimensions of the Life cycle design strategy wheel was developed, but the approach was not broadly used, (3) There was a mismatch on the workshop schedule; (4) students enjoy the workshop; (5) a clearer endorsement on relevance of this aspect is required. Suggestions for future work are also issued.
Resumo:
This study aimed to develop appropriate changes in a pair of shoes in order to improve the gait of an individual selected for this case study. This analysis took into account ergonomic aspects, namely those relating to the individual’s anthropometrics. Gait analysis was done with the adapted footwear both before and after intervention.A conventional X-ray was performed, which revealed a 29-mm left lower limb shortening and possible foot adduction. The anthropometric assessment confirmed a 27-mm asymmetry between the left knee and foot.Corrective changes were implemented in the left boot, with a 20-mm increase in the plantar aspect and approximately 30-mm in the calcaneus area.The pressure-mapping system WalkinSense was used for the kinetic gait analysis. Results showed some improvement in plantar pressure distribution after corrective changes in footwear. Peak pressure in the left foot decreased from 2.8kg/cm2 to 1.6kg/cm2. The second peak also showed a marked decrease. The right foot presented with a reduction in peak plantar pressure from 2.7kg/cm2 to 2.3kg/cm2.After identifying asymmetries, the associated pathologies and modifyingthe footwear, a kinetic analysis of gait before and after altering the footwear was undertaken, which showed improvements in the gait. According to the obtained results, it was possible to demonstrate that the initially proposed objectives were achieved, i.e., the changes in footwear resulted in an improvement of the analyzed individual.
Resumo:
Nowadays, organizations are increasingly looking to invest in business intelligence solutions, mainly private companies in order to get advantage over its competitors, however they do not know what is necessary. Business intelligence allows an analysis of consolidated information in order to obtain more specific outlets and certain indications in order to support the decision making process. You can take the right decision based on the data collected from different information systems present in the organization and outside of them. The textile sector is a sector where concept of Business Intelligence it is not many explored yet. Actually there are few textile companies that have a BI platform. Thus, the article objective is present an architecture and show all the steps by which companies need to spend to implement a successful free homemade Business Intelligence system. As result the proposed approach it was validated using real data aiming assess the steps defined.
Resumo:
On assistive technology targeted for people with activity limitations and participation, usability issues becomes an essential tool to ensure that the product has the appropriate ergonomics characteristics, in other words, ensure that it fits the specific user´s needs. The aim of this study was to analyze the usability of an adaptive seating device for children with neuromotor impairments, by using kinematic indicators of the reaching movement. The study sample consisted of 13 children with associated neurologic conditions. The tests were developed by using a wooden bench height adjustable, integrated with the adaptive seating device under study, and a system to capture three-dimensional image, called Qualisys Track Manager. The following reaching kinematics variables were measured: maximum reaching velocity, movement duration, index of curvature, and unit movements. It was found that the use of the adaptive seating device had a positive impact on upper limb function in children with neuromotor impairments. It was also noticed an improvement in the reaching movement kinematics, which was statistical significant for the index of curvature and unit movements. As main conclusions, it is possible to point out some positive effects that the product under study seems to have on users' movements, such as the improved movement quality of the upper limb, which could mean a better postural adjustments and higher trunk postural control. By identifying new measures of usability in terms of effectiveness and efficiency for the analyzeddevice, the results obtained may serve also as performance indicators, providing new data that may help to improve the product and eventually modifying it, in order to turn it more compatible with the needs of the considered target population.
Resumo:
The monitoring data collected during tunnel excavation can be used in inverse analysis procedures in order to identify more realistic geomechanical parameters that can increase the knowledge about the interested formations. These more realistic parameters can be used in real time to adapt the project to the real structure in situ behaviour. However, monitoring plans are normally designed for safety assessment and not especially for the purpose of inverse analysis. In fact, there is a lack of knowledge about what types and quantity of measurements are needed to succeed in identifying the parameters of interest. Also, the optimisation algorithm chosen for the identification procedure may be important for this matter. In this work, this problem is addressed using a theoretical case with which a thorough parametric study was carried out using two optimisation algorithms based on different calculation paradigms, namely a conventional gradient-based algorithm and an evolution strategy algorithm. Calculations were carried for different sets of parameters to identify several combinations of types and amount of monitoring data. The results clearly show the high importance of the available monitoring data and the chosen algorithm for the success rate of the inverse analysis process.