954 resultados para Vdu Operators


Relevância:

10.00% 10.00%

Publicador:

Resumo:

FTTH-liityntäverkkoja voivat rakennuttaa ja omistaa perinteisten teleoperaattoreiden lisäksi myös muut toimijat, kuten sähköyhtiöt, valtion- ja kuntien omistamat yhtiöt ja yksityiset osuuskunnat. Markkinatoimijoiden ja eri teknologioiden keskinäinen kilpailu johtaa kuitenkin helposti pieniin liityntätiheyksiin ja hajanaisiin pieniin verkkoihin. Tämä tekee verkkojen kannattavasta rakentamisesta vaikeaa ja palvelujen toteuttamisesta tehotonta. Tilannetta voidaan parantaa tasapuolisella pääsyllä, joka selkeyttää arvoketjun osapuolten rooleja. Diplomityön tavoitteena oli kuvata kommunikaatio-operaattorin rooli Suomen telemarkkinaan ja rakentaa sille taloudellisesti kannattava liiketoimintamalli toisen osapuolen toteuttamiin tasapuolisen pääsyn FTTH-verkkoihin. Työ toteutettiin hyödyntäen konstruktiivista tutkimusotetta ja sen lopputuloksena syntyi soveltuva liiketoimintamalli. Kommunikaatio-operaattorin kaksipuolisella alustalla yhdistetään valtakunnallisesti toisiinsa palveluntarjoajat ja alueellisiin liityntäverkkoihin liittyneet loppuasiakkaat. Kommunikaatio-operaattorin liiketoimintamalli mahdollistaa kapasiteetin, palvelunlaadun ja toimintavarmuuden suhteen erilaistetut virtuaaliset tukkutuotteet ja sitä kautta mahdollisuuden uuteen ansaintaan.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Diplomityössä kartoitetaan tiedon laatuun vaikuttavia tekijöitä kirjallisuuden pohjalta sekä tutkitaan empiirisesti sähköisen reseptin tietosisällön laatua toiminnallisuuden näkökulmasta tarkasteltuna. Tutkimuksen tavoitteena on tuottaa esiselvitys Reseptikeskuksen tietosisällön toiminnallisesta laadusta käytettäväksi lähtötietona tiedon laadun arviointiin ja seurantaan. Tutkimuksen empiirinen osuus toteutettiin kvantitatiivisena tutkimuksena analysoimalla Reseptikeskuksen tietosisällöstä poimittua n. 600 potilaan otosta. Tutkitussa tietosisällössä havaittiin joitain poikkeamia tietosisältöä koskeviin määrityksiin verrattuna, mutta merkittäviä eroja terveydenhuollon eri toimijaryhmien apteekeissa, julkisella ja yksityisellä sektorilla kirjaamien reseptien tietosisällön laadussa ei havaittu. Tiedon kontekstisidonnaisuus on keskeinen tekijä tiedon toiminnallisen laadun määrittämisessä, arvioinnissa ja kehittämisessä. Toiminnan kannalta merkityksellinen tieto rakentuu dataan liitettyjen merkitysten, tiedon käyttäjien kokemusten sekä teknisen ja sosiaalisen käyttöympäristön muodostamana kokonaisuutena. Tiedon laadun parantaminen on jatkuva prosessi, jota tulee ylläpitää arvioimalla ja kehittämällä käytettäviä laatumittareita ja analysointimalleja. Reseptikeskuksen tietosisällön laatua voidaan edelleen kehittää ja nyt tehdyn esikartoituksen pohjalta voidaan jatkossa seurata tietosisällön laadun kehittymistä uusien tutkimusten avulla

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The electricity distribution sector will face significant changes in the future. Increasing reliability demands will call for major network investments. At the same time, electricity end-use is undergoing profound changes. The changes include future energy technologies and other advances in the field. New technologies such as microgeneration and electric vehicles will have different kinds of impacts on electricity distribution network loads. In addition, smart metering provides more accurate electricity consumption data and opportunities to develop sophisticated load modelling and forecasting approaches. Thus, there are both demands and opportunities to develop a new type of long-term forecasting methodology for electricity distribution. The work concentrates on the technical and economic perspectives of electricity distribution. The doctoral dissertation proposes a methodology to forecast electricity consumption in the distribution networks. The forecasting process consists of a spatial analysis, clustering, end-use modelling, scenarios and simulation methods, and the load forecasts are based on the application of automatic meter reading (AMR) data. The developed long-term forecasting process produces power-based load forecasts. By applying these results, it is possible to forecast the impacts of changes on electrical energy in the network, and further, on the distribution system operator’s revenue. These results are applicable to distribution network and business planning. This doctoral dissertation includes a case study, which tests the forecasting process in practice. For the case study, the most prominent future energy technologies are chosen, and their impacts on the electrical energy and power on the network are analysed. The most relevant topics related to changes in the operating environment, namely energy efficiency, microgeneration, electric vehicles, energy storages and demand response, are discussed in more detail. The study shows that changes in electricity end-use may have radical impacts both on electrical energy and power in the distribution networks and on the distribution revenue. These changes will probably pose challenges for distribution system operators. The study suggests solutions for the distribution system operators on how they can prepare for the changing conditions. It is concluded that a new type of load forecasting methodology is needed, because the previous methods are no longer able to produce adequate forecasts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Viimeaikaisen talouden yleisen heikon tilanteen johdosta päättäjät ympäri Eurooppaa ovat kääntyneet pienten ja keskisuurten yritysten (pk-yritys) puoleen työllisyyden parantamiseksi. Pk-yritysten edustaessa yli 99% Suomen yrityskannasta, ovat ne erittäin tärkeässä asemassa työllisyystilanteen lisäksi myös maamme talouden kannalta, ja pk-yrityksille onkin asetettu kasvupaineita viimeaikaisten kasvuyritysten menestystarinoiden innoittamana. Tässä tutkimuksessa pääasiallisena tavoitteena on tutkia pk-yritysten kasvuun liittyviä tekijöitä kasvun mahdollistavien sekä kasvua rajoittavien tekijöiden kannalta. Pääasiallisen tavoitteen ohella on tutkittu myös pk-yritysten tekemiä konkreettisia toimia kasvua mahdollistavien tekijöiden vahvistamiseksi, sekä kasvua rajoittavien tekijöiden murtamiseksi. Tutkimus etenee siten, että ensin käydään läpi pk-yritysten kasvuun liittyviä yleisiä asioita, jonka jälkeen siirrytään kasvun mahdollistaviin ja sitä rajoittaviin tekijöihin. Tutkimus on toteutettu laadullisena tutkimuksena eli se on kvalitatiivinen tutkimus. Tutkimuksen empiirinen aineisto koostuu neljän pk-yrityksen teemahaastatteluista, sekä kyselylomakkeesta, joissa kartoitettiin pk-yritysten omistaja-johtajien mielipiteitä yritysten kasvun mahdollistavista ja sitä rajoittavista tekijöistä. Teemahaastattelujen haastattelurunko on rakennettu pk-yritysten kasvua käsittelevien artikkelien ja niissä ilmenneiden kasvuun liittyvien havaintojen pohjalta. Tutkimuksen perusteella pk-yritysten omistaja-johtajat ovat sitä mieltä, että Suomen veropoliittiset, sekä työlainsäädännölliset ratkaisut rajoittavat yritysten kasvua, eivätkä kannusta yrittäjyyteen. Tämän lisäksi kasvua rajoittavat omistaja-johtajien tavoitteet yritystoimintaan liittyen, sekä pätevän työvoiman rekrytointiin liittyvät ongelmat. Kasvun mahdollistavien tekijöiden osalta omistaja-johtajat pitivät tärkeinä yritystoimintaa tukevien järjestelmien merkitystä, yrityksen tunnetuksi tekemistä, yrityksen ja sen sidosryhmien välisten suhteiden kehittämistä ja yhteistyötä sekä yritystoiminnan laadun kehittämistä ja valvontaa. Tutkimuksessa ilmeni myös pk-yritysten pystyvän murtamaan aikaisemmissa tutkimuksissa ilmenneitä kasvua rajoittavia tekijöitä tehokkaasti, saavan aikaan kasvua niiden olemassaolosta huolimatta.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this bachelor’s thesis are examined the benefits of current distortion detection device application in customer premises low voltage networks. The purpose of this study was to find out if there are benefits for measuring current distortion in low-voltage residential networks. Concluding into who can benefit from measuring the power quality. The research focuses on benefits based on the standardization in Europe and United States of America. In this research, were also given examples of appliances in which current distortion detection device could be used. Along with possible illustration of user interface for the device. The research was conducted as an analysis of the benefits of current distortion detection device in residential low voltage networks. The research was based on literature review. The study was divided to three sections. The first explain the reasons for benefitting from usage of the device and the second portrays the low-cost device, which could detect one-phase current distortion, in theory. The last section discuss of the benefits of usage of current distortion detection device while focusing on the beneficiaries. Based on the result of this research, there are benefits from usage to the current distortion detection device. The main benefitting party of the current distortion detection device was found to be manufactures, as they are held responsible of limiting the current distortion on behalf of consumers. Manufactures could adjust equipment to respond better to the distortion by having access to on-going current distortion in network. The other benefitting party are system operators, who would better locate distortion issues in low-voltage residential network to start prevention of long-term problems caused by current distortion early on.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Transmission system operators and distribution system operators are experiencing new challenges in terms of reliability, power quality, and cost efficiency. Although the potential of energy storages to face those challenges is recognized, the economic implications are still obscure, which introduce the risk into the business models. This thesis aims to investigate the technical and economic value indicators of lithium-ion battery energy storage systems (BESS) in grid-scale applications. In order to do that, a comprehensive performance lithium-ion BESS model with degradation effects estimation is developed. The model development process implies literature review on lifetime modelling, use, and modification of previous study progress, building the additional system parts and integrating it into a complete tool. The constructed model is capable of describing the dynamic behavior of the BESS voltage, state of charge, temperature and capacity loss. Five control strategies for BESS unit providing primary frequency regulation are implemented, in addition to the model. The questions related to BESS dimensioning and the end of life (EoL) criterion are addressed. Simulations are performed with one-month real frequency data acquired from Fingrid. The lifetime and cost-benefit analysis of the simulation results allow to compare and determine the preferable control strategy. Finally, the study performs the sensitivity analysis of economic profitability with variable size, EoL and system price. The research reports that BESS can be profitable in certain cases and presents the recommendations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our objective is to develop a diffusion Monte Carlo (DMC) algorithm to estimate the exact expectation values, ($o|^|^o), of multiplicative operators, such as polarizabilities and high-order hyperpolarizabilities, for isolated atoms and molecules. The existing forward-walking pure diffusion Monte Carlo (FW-PDMC) algorithm which attempts this has a serious bias. On the other hand, the DMC algorithm with minimal stochastic reconfiguration provides unbiased estimates of the energies, but the expectation values ($o|^|^) are contaminated by ^, an user specified, approximate wave function, when A does not commute with the Hamiltonian. We modified the latter algorithm to obtain the exact expectation values for these operators, while at the same time eliminating the bias. To compare the efficiency of FW-PDMC and the modified DMC algorithms we calculated simple properties of the H atom, such as various functions of coordinates and polarizabilities. Using three non-exact wave functions, one of moderate quality and the others very crude, in each case the results are within statistical error of the exact values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ontario Editorial Bureau (O.E.B.)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hub location problem is an NP-hard problem that frequently arises in the design of transportation and distribution systems, postal delivery networks, and airline passenger flow. This work focuses on the Single Allocation Hub Location Problem (SAHLP). Genetic Algorithms (GAs) for the capacitated and uncapacitated variants of the SAHLP based on new chromosome representations and crossover operators are explored. The GAs is tested on two well-known sets of real-world problems with up to 200 nodes. The obtained results are very promising. For most of the test problems the GA obtains improved or best-known solutions and the computational time remains low. The proposed GAs can easily be extended to other variants of location problems arising in network design planning in transportation systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Walter D’Arcy Ryan was born in 1870 in Kentville, Nova Scotia. He became the chief of the department of illumination at the General Electric Company of Schenectady, New York. He was a founder in the field of electrical illumination. He built the electric steam scintillator which had numerous nozzles and valves. The operator would release steam through the valves. The nozzles all had names which included: Niagara, fan, snake, plume, column, pinwheel and sunburst. The steam scintillator was combined with projectors, prismatic reflectors, flashers and filters to produce the desired effects. In 1920 a group of businessmen from Niagara Falls, New York formed a group who called themselves the “generators’. They lobbied the American and Canadian governments to improve the illumination of the Falls. They were able to raise $58, 000 for the purchase and installation of 24 arc lights to illuminate the Falls. On February 24th, 1925 the Niagara Falls Illumination Board was formed. Initially, the board had a budget of $28,000 for management, operation and maintenance of the lights. The power was supplied free by the Ontario Power Company. They had 24 lights installed in a row on the Ontario Power Company surge tank which was next to the Refectory in Victoria Park on the Canadian side. The official opening ceremony took place on June 8th, 1925 and included a light parade in Niagara Falls, New York and an international ceremony held in the middle of the Upper Steel Arch Bridge. Walter D’Arcy Ryan was the illuminating engineer and A.D. Dickerson who was his New York field assistant directed the scintillator. with information from American Technological Sublime by David E. Nye and the Niagara Falls info website Location: Brock University Archives Source Information: Subject Headings: Added Entries: 100 Ryan, W. D’A. |q (Walter D’Arcy), |d 1870-1934 610 General Electric Company 650 Lighting, Architectural and decorative 650 Lighting |z New York (State) |z Niagara Falls 700 Dickerson, A.F. 700 Schaffer, J.W. Related material held at other repositories: The Niagara Falls Museum in Niagara Falls, Ontario has a program (pamphlet) dedicating new lighting in 1958 and it has postcards depicting the illumination of the Falls. Some of Ryan’s accomplishments can be seen at The Virtual Museum of the City of San Francisco. Described by: Anne Adams Date: Sept 26,Upper Steel Arch Bridge. Walter D’Arcy Ryan was the illuminating engineer and A.D. Dickerson who was his New York field assistant directed the scintillator. with information from American Technological Sublime by David E. Nye and the Niagara Falls info website

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work investigates mathematical details and computational aspects of Metropolis-Hastings reptation quantum Monte Carlo and its variants, in addition to the Bounce method and its variants. The issues that concern us include the sensitivity of these algorithms' target densities to the position of the trial electron density along the reptile, time-reversal symmetry of the propagators, and the length of the reptile. We calculate the ground-state energy and one-electron properties of LiH at its equilibrium geometry for all these algorithms. The importance sampling is performed with a single-determinant large Slater-type orbitals (STO) basis set. The computer codes were written to exploit the efficiencies engineered into modern, high-performance computing software. Using the Bounce method in the calculation of non-energy-related properties, those represented by operators that do not commute with the Hamiltonian, is a novel work. We found that the unmodified Bounce gives good ground state energy and very good one-electron properties. We attribute this to its favourable time-reversal symmetry in its target density's Green's functions. Breaking this symmetry gives poorer results. Use of a short reptile in the Bounce method does not alter the quality of the results. This suggests that in future applications one can use a shorter reptile to cut down the computational time dramatically.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Formal verification of software can be an enormous task. This fact brought some software engineers to claim that formal verification is not feasible in practice. One possible method of supporting the verification process is a programming language that provides powerful abstraction mechanisms combined with intensive reuse of code. In this thesis we present a strongly typed functional object-oriented programming language. This language features type operators of arbitrary kind corresponding to so-called type protocols. Sub classing and inheritance is based on higher-order matching, i.e., utilizes type protocols as basic tool for reuse of code. We define the operational and axiomatic semantics of this language formally. The latter is the basis of the interactive proof assistant VOOP (Verified Object-Oriented Programs) that allows the user to prove equational properties of programs interactively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Hub Location Problems play vital economic roles in transportation and telecommunication networks where goods or people must be efficiently transferred from an origin to a destination point whilst direct origin-destination links are impractical. This work investigates the single allocation hub location problem, and proposes a genetic algorithm (GA) approach for it. The effectiveness of using a single-objective criterion measure for the problem is first explored. Next, a multi-objective GA employing various fitness evaluation strategies such as Pareto ranking, sum of ranks, and weighted sum strategies is presented. The effectiveness of the multi-objective GA is shown by comparison with an Integer Programming strategy, the only other multi-objective approach found in the literature for this problem. Lastly, two new crossover operators are proposed and an empirical study is done using small to large problem instances of the Civil Aeronautics Board (CAB) and Australian Post (AP) data sets.