874 resultados para Distributed data access
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
O estudo tem por objetivo documentar o uso de animais na medicina caseira entre ribeirinhos do rio Negro, Amazonas, Brasil. Os dados foram coletados por meio de 92 entrevistas e de observações sobre o conhecimento e as práticas cotidianas de uso de animais medicinais. Cerca de 60 espécies animais são conhecidas com propósitos medicinais. O conhecimento é bem distribuído entre os sexos (homens e mulheres) e entre localidades (urbano e rural). O uso de animais medicinais está imerso em conceitos etiológicos e envolve uma complexa visão cosmológica do processo de cura. O êxodo rural e o acesso facilitado à medicina ocidental podem promover a perda dos conhecimentos tradicionais, o que pode ser mitigado através da valorização e da transmissão desses saberes às futuras gerações.
Resumo:
The metal-insulator or metal-amorphous semiconductor blocking contact is still not well understood. Here, we discuss the steady state characteristics of a non-intimate metal-insulator Schottky barrier. We consider an exponential distribution (in energy) of impurity states in addition to impurity states at a single energy level within the depletion region. We present analytical expressions for the electrical potential, field, thickness of depletion region, capacitance, and charge accumulated in the depletion region. We also discuss ln I versus V(ap) data. Finally, we compare the characteristics in three cases: (i) impurity states at only a single energy level; (ii) uniform energy distribution of impurity states; and (iii) exponential energy distribution of impurity states.In general, the electrical characteristics of Schottky barriers and metal-insulator-metal structures with Schottky barriers depend strongly on the energy distribution of impurity states.
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
The computational program called GIS_EM (Geographic Information System for Environmental Monitoring), a software devised to manage geographic information for monitoring soil, surface, and ground water, developed for use in the Health, Safety, and Environment Division of Paulinia Refinery is presented. This program enables registering and management of alphanumeric information pertaining to specific themes such as drilling performed for sample collection and for installation of monitoring wells, geophysical and other tests, results of chemical analyses of soil, surface, and groundwater, as well as reference values providing orientation for soil and water quality, such as EPA, Dutch List, etc. Management of such themes is performed by means of alphanumeric search tools, with specific filters and, in the case of spatial search, through the selection of spatial elements (themes) in map view. Documents existing in digital form, such as reports, photos, maps, may be registered and managed in the network environment. As the system centralizes information generated upon environmental investigations, it expedites access to and search of documents produced and stored in the network environment, minimizing search time and the need to file printed documents. This is an abstract of a paper presented at the AIChE Annual Meeting and Fall Showcase (Cincinnati, OH 10/30/2005-11/4/2005).
Resumo:
Open access philosophy applied by regulatory agencies may lead to a scenario where captive consumers will solely face the responsibility on distribution network's losses even with Independent Energy Producers (also known as Distributed Generation) and Independent Energy Consumers connected to the system. This work proposes the utilization of a loss allocation method in distribution systems where open access is allowed, in which cross-subsidies, that appear due to the influence the generators have over the system losses, are minimized. Thus, guaranteeing to some extent the efficiency and transparency of the economic signals of the market. Results obtained through the Zbus loss allocation method adapted for distribution networks are processed in such a way that the corresponding allocation to the generation buses is divided among the consumer buses, while still considering consumers spatial characteristics. © 2007 IEEE.
Resumo:
In large distributed systems, where shared resources are owned by distinct entities, there is a need to reflect resource ownership in resource allocation. An appropriate resource management system should guarantee that resource's owners have access to a share of resources proportional to the share they provide. In order to achieve that some policies can be used for revoking access to resources currently used by other users. In this paper, a scheduling policy based in the concept of distributed ownership is introduced called Owner Share Enforcement Policy (OSEP). OSEP goal is to guarantee that owner do not have their jobs postponed for longer periods of time. We evaluate the results achieved with the application of this policy using metrics that describe policy violation, loss of capacity, policy cost and user satisfaction in environments with and without job checkpointing. We also evaluate and compare the OSEP policy with the Fair-Share policy, and from these results it is possible to capture the trade-offs from different ways to achieve fairness based on the user satisfaction. © 2009 IEEE.
Resumo:
Includes bibliography
Resumo:
Includes bibliography
Resumo:
A significant set of information stored in different databases around the world, can be shared through peer-topeer databases. With that, is obtained a large base of knowledge, without the need for large investments because they are used existing databases, as well as the infrastructure in place. However, the structural characteristics of peer-topeer, makes complex the process of finding such information. On the other side, these databases are often heterogeneous in their schemas, but semantically similar in their content. A good peer-to-peer databases systems should allow the user access information from databases scattered across the network and receive only the information really relate to your topic of interest. This paper proposes to use ontologies in peer-to-peer database queries to represent the semantics inherent to the data. The main contribution of this work is enable integration between heterogeneous databases, improve the performance of such queries and use the algorithm of optimization Ant Colony to solve the problem of locating information on peer-to-peer networks, which presents an improve of 18% in results. © 2011 IEEE.
Resumo:
Non-conventional database management systems are used to achieve a better performance when dealing with complex data. One fundamental concept of these systems is object identity (OID), because each object in the database has a unique identifier that is used to access and reference it in relationships to other objects. Two approaches can be used for the implementation of OIDs: physical or logical OIDs. In order to manage complex data, was proposed the Multimedia Data Manager Kernel (NuGeM) that uses a logical technique, named Indirect Mapping. This paper proposes an improvement to the technique used by NuGeM, whose original contribution is management of OIDs with a fewer number of disc accesses and less processing, thus reducing management time from the pages and eliminating the problem with exhaustion of OIDs. Also, the technique presented here can be applied to others OODBMSs. © 2011 IEEE.
Resumo:
Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.
Resumo:
This paper proposes a simple and powerful architecture for publication and universal access to smart transducers, through existing and established open standards. Smart transducers are put to work on standards and styles already included in the Web, exploring resources in Cloud Computing and simplifying access to data. © 2012 IEEE.
Resumo:
This paper presents an Advanced Traveler Information System (ATIS) developed on Android platform, which is open source and free. The developed application has as its main objective the free use of a Vehicle-to- Infrastructure (V2I) communication through the wireless network access points available in urban centers. In addition to providing the necessary information for an Intelligent Transportation System (ITS) to a central server, the application also receives the traffic data close to the vehicle. Once obtained this traffic information, the application displays them to the driver in a clear and efficient way, allowing the user to make decisions about his route in real time. The application was tested in a real environment and the results are presented in the article. In conclusion we present the benefits of this application. © 2012 IEEE.
Resumo:
In this paper, remote laboratory experiment access is considered through the use of radio frequency identification (RFID) technology. Contactless smart cards are used widely in many applications from travel cards through to building access control and inventory tracking. However, their use is considered here for access to electronic engineering experimentation in a remote laboratory setting by providing the ability to interface experiments through this contactless (wireless) connection means. A case study design is implemented to demonstrate such a means by incorporating experiment data onto a contactless smart card and accessing this via a card reader and web server arrangement. © 2012 IEEE.