812 resultados para RDS Implementation


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In vitro fermentation techniques (IVFT) have been widely used to evaluate the nutritivevalue of feeds for ruminants and in the last decade to assess the effect of different nutritionalstrategies on methane (CH4) production. However, many technical factors may influencethe results obtained. The present review has been prepared by the ‘Global Network’ FACCE-JPI international research consortium to provide a critical evaluation of the main factorsthat need to be considered when designing, conducting and interpreting IVFT experimentsthat investigate nutritional strategies to mitigate CH4emission from ruminants. Given theincreasing and wide-scale use of IVFT, there is a need to critically review reports in the lit-erature and establish what criteria are essential to the establishment and implementationof in vitro techniques. Key aspects considered include: i) donor animal species and numberof animal used, ii) diet fed to donor animals, iii) collection and processing of rumen fluidas inoculum, iv) choice of substrate and incubation buffer, v) incubation procedures andCH4measurements, vi) headspace gas composition and vii) comparability of in vitro andin vivo measurements. Based on an evaluation of experimental evidence, a set of techni-cal recommendations are presented to harmonize IVFT for feed evaluation, assessment ofrumen function and CH4production.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivation: DNA assembly programs classically perform an all-against-all comparison of reads to identify overlaps, followed by a multiple sequence alignment and generation of a consensus sequence. If the aim is to assemble a particular segment, instead of a whole genome or transcriptome, a target-specific assembly is a more sensible approach. GenSeed is a Perl program that implements a seed-driven recursive assembly consisting of cycles comprising a similarity search, read selection and assembly. The iterative process results in a progressive extension of the original seed sequence. GenSeed was tested and validated on many applications, including the reconstruction of nuclear genes or segments, full-length transcripts, and extrachromosomal genomes. The robustness of the method was confirmed through the use of a variety of DNA and protein seeds, including short sequences derived from SAGE and proteome projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Localization and Mapping are two of the most important capabilities for autonomous mobile robots and have been receiving considerable attention from the scientific computing community over the last 10 years. One of the most efficient methods to address these problems is based on the use of the Extended Kalman Filter (EKF). The EKF simultaneously estimates a model of the environment (map) and the position of the robot based on odometric and exteroceptive sensor information. As this algorithm demands a considerable amount of computation, it is usually executed on high end PCs coupled to the robot. In this work we present an FPGA-based architecture for the EKF algorithm that is capable of processing two-dimensional maps containing up to 1.8 k features at real time (14 Hz), a three-fold improvement over a Pentium M 1.6 GHz, and a 13-fold improvement over an ARM920T 200 MHz. The proposed architecture also consumes only 1.3% of the Pentium and 12.3% of the ARM energy per feature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Birnbaum-Saunders (BS) model is a positively skewed statistical distribution that has received great attention in recent decades. A generalized version of this model was derived based on symmetrical distributions in the real line named the generalized BS (GBS) distribution. The R package named gbs was developed to analyze data from GBS models. This package contains probabilistic and reliability indicators and random number generators from GBS distributions. Parameter estimates for censored and uncensored data can also be obtained by means of likelihood methods from the gbs package. Goodness-of-fit and diagnostic methods were also implemented in this package in order to check the suitability of the GBS models. in this article, the capabilities and features of the gbs package are illustrated by using simulated and real data sets. Shape and reliability analyses for GBS models are presented. A simulation study for evaluating the quality and sensitivity of the estimation method developed in the package is provided and discussed. (C) 2008 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main objective for this degree project is to implement an Application Availability Monitoring (AAM) system named Softek EnView for Fujitsu Services. The aim of implementing the AAM system is to proactively identify end user performance problems, such as application and site performance, before the actual end users experience them. No matter how well applications and sites are designed and nomatter how well they meet business requirements, they are useless to the end users if the performance is slow and/or unreliable. It is important for the customers to find out whether the end user problems are caused by the network or application malfunction. The Softek EnView was comprised of the following EnView components: Robot, Monitor, Reporter, Collector and Repository. The implemented system, however, is designed to use only some of these EnView elements: Robot, Reporter and depository. Robots can be placed at any key user location and are dedicated to customers, which means that when the number of customers increases, at the sametime the amount of Robots will increase. To make the AAM system ideal for the company to use, it was integrated with Fujitsu Services’ centralised monitoring system, BMC PATROL Enterprise Manager (PEM). That was actually the reason for deciding to drop the EnView Monitor element. After the system was fully implemented, the AAM system was ready for production. Transactions were (and are) written and deployed on Robots to simulate typical end user actions. These transactions are configured to run with certain intervals, which are defined collectively with customers. While they are driven against customers’ applicationsautomatically, transactions collect availability data and response time data all the time. In case of a failure in transactions, the robot immediately quits the transactionand writes detailed information to a log file about what went wrong and which element failed while going through an application. Then an alert is generated by a BMC PATROL Agent based on this data and is sent to the BMC PEM. Fujitsu Services’ monitoring room receives the alert, reacts to it according to the incident management process in ITIL and by alerting system specialists on critical incidents to resolve problems. As a result of the data gathered by the Robots, weekly reports, which contain detailed statistics and trend analyses of ongoing quality of IT services, is provided for the Customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this work was to design a set of rules for levodopa infusion dose adjustment in Parkinson’s disease based on a simulation experiments. Using this simulator, optimal infusions dose in different conditions were calculated. There are seven conditions (-3 to +3)appearing in a rating scale for Parkinson’s disease patients. By finding mean of the differences between conditions and optimal dose, two sets of rules were designed. The set of rules was optimized by several testing. Usefulness for optimizing the titration procedure of new infusion patients based on rule-based reasoning was investigated. Results show that both of the number of the steps and the errors for finding optimal dose was shorten by new rules. At last, the dose predicted with new rules well on each single occasion of majority of patients in simulation experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research is based on consumer complaints with respect to recently purchased consumer electronics. This research document will investigate the instances of development and device management as a tool used to aid consumer and manage consumer’s mobile products in order to resolve issues in or before the consumers is aware one exists. The problem at the present time is that mobile devices are becoming very advanced pieces of technology, and not all manufacturers and network providers have kept up the support element of End users. As such, the subject of the research is to investigate how device management could possibly be used as a method to promote research and development of mobile devices, and provide a better experience for the consumer. The wireless world is becoming increasingly complex as revenue opportunities are driven by new and innovative data services. We can no longer expect the customer to have the knowledge or ability to configure their own device. Device Management platforms can address the challenges of device configuration and support through new enabling technologies. Leveraging these technologies will allow a network operator to reduce the cost of subscriber ownership, drive increased ARPU (Average Revenue per User) by removing barriers to adoption, reduce churn by improving the customer experience and increase customer loyalty. DM technologies provide a flexible and powerful management method but are managing the same device features that have historically been configured manually through call centers or by the end user making changes directly on the device. For this reason DM technologies must be treated as part of a wider support solution. The traditional requirement for discovery, fault finding, troubleshooting and diagnosis are still as relevant with DM as they are in the current human support environment yet the current generation of solutions do little to address this problem. In the deployment of an effective Device Management solution the network operator must consider the integration of the DM platform, interfacing with many areas of the business, supported by knowledge of the relationship between devices, applications, solutions and services maintained on an ongoing basis. Complementing the DM solution with published device information, setup guides, training material and web based tools will ensure the quality of the customer experience, ensuring that problems are completely resolved, driving data usage by focusing customer education on the use of the wireless service In this way device management becomes a tool used both internally within the network or device vendor and by the customer themselves, with each user empowered to effectively manage the device without any prior knowledge or experience, confident that changes they apply will be relevant, accurate, stable and compatible. The value offered by an effective DM solution with an expert knowledge service will become a significant differentiator for the network operator in an ever competitive wireless market. This research document is intended to highlight some of the issues the industry faces as device management technologies become more prevalent, and offers some potential solutions to simplify the increasingly complex task of managing devices on the network, where device management can be used as a tool to aid customer relations and manage customer’s mobile products in order to resolve issues before the user is aware one exists. The research is broken down into the following, Customer Relationship Management, Device management, the role of knowledge with the DM, Companies that have successfully implemented device management, and the future of device management and CRM. And it also consists of questionnaires aimed at technical support agents and mobile device users. Interview was carried out with CRM managers within support centre to further the evidence gathered. To conclude, the document is to consider the advantages and disadvantages of device management and attempt to determine the influence it will have over customer support centre, and what methods could be used to implement it.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Video exposure monitoring (VEM) is a group of methods used for occupational hygiene studies. The method is based on a combined use of video recordings with measurements taken with real-time monitoring instruments. A commonly used name for VEM is PIMEX. Since PIMEX initially was invented in the mid 1980’s have the method been implemented and developed in a number of countries. With the aim to give an updated picture of how VEM methods are used and to investigate needs for further development have a number of workshops been organised in Finland, UK, the Netherlands, Germany and Austria. Field studies have also been made with the aim to study to what extent the PIMEX method can improve workers motivation to actively take part in actions aimed at workplace improvements.The results from the workshops illustrates clearly that there is an impressive amount of experiences and ideas for the use of VEM within the network of the groups participating in the workshops. The sharing of these experiences between the groups, as well as dissemination of it to wider groups is, however, limited. The field studies made together with a number of welders indicate that their motivation to take part in workplace improvements is improved after the PIMEX intervention. The results are however not totally conclusive and further studies focusing on motivation are called for.It is recommended that strategies for VEM, for interventions in single workplaces, as well as for exposure categorisation and production of training material are further developed. It is also recommended to conduct a research project with the intention of evaluating the effects of the use of VEM as well as to disseminate knowledge about the potential of VEM to occupational hygiene experts and others who may benefit from its use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In software development organizations there is sometimes a need for change. In order to meet continuously increasing demands from their customers, Sandvik IT Services- SITS, at Sandvik in Sweden, required improving the way they worked with software development. Due to issues like a lot of work in progress and lot of simultaneous tasks for individuals in the teams that caused stress, it was almost impossible to address the question of working with improvements. In order to enable the improvement process Kanban was introduced in the software development teams. Kanban for software development is a change method created by David J. Anderson. The purpose of this thesis is twofold. One part is to assess what effects Kanban has had on the software development teams. The other part is to make a documentation of the Kanban implementation process at SITS. The documentation has been made on the basis of both company internal resources and observations of the Kanban implementation process. The effects of Kanban have been researched with an interview survey to the teams that have gone through the Kick start of the Kanban process. The result of the thesis is also twofold. One part of the result is an extensive documentation of the implementation process of Kanban at SITS. The other part is an assessment of the effects that Kanban has had at SITS. The major effects have been that the teams are experiencing less stress, more focus on quality and better customer collaboration. It is also evident is that it takes time for some effects to evolve when implementing Kanban

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Small-scale enterprises face difficulties in fulfilling the regulations for organising Systematic Work Environment Management. This study compared three groups of small-scale manufacturing enterprises with and without support for implementing the provision. Two implementation methods, supervised and network method, were used. The third group worked according to their own ideas. Twenty-three enterprises participated. The effects of the implementation were evaluated after one year by semi-structured dialogue with the manager and safety representative. Each enterprise was classified on compliance with ten demands concerning the provision. The work environment was estimated by the WEST-method. Impact of the implementation on daily work was also studied. At the follow-up, the enterprises in the supervised method reported slightly more improvements in the fulfilment of the demands in the provision than the enterprises in the network method and the enterprises working on their own did. The effect of the project reached the employees faster in the enterprises with the supervised method. In general, the work environment improved to some extent in all enterprises. Extensive support to small-scale enterprises in terms of advise and networking aimed to fulfil the regulations of Systematic Work Environment Management had limited effect especially considering the cost of applying these methods.