932 resultados para Interoperability of Applications


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The social networks on the internet have experienced rapid growth and joined millions of users in Brazil and throughout the world. Such networks allow groups of people to communicate and exchange information. Sharing information in files is also a growing activity on the internet and is done in various ways. However, applications are not yet available to enable file sharing on Facebook, the premier social network today. This study aims to investigate how users use Facebook, and their practices for file sharing. Due to the experimental nature of this research, we opted for a data collection survey, applied over the web. From the data analysis, we have found a frequent use of file sharing, but no interest in paid services. As for Facebook, there was an extensive use of applications. The set of results shows a favourable scenario for applications that allow file sharing on Facebook.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a multi-agent architecture that was designed to develop processes supervision and control systems, with the main objective to automate tasks that are repetitive and stressful, and error prone when performed by humans. A set of agents were identified, based on the study of a number of applications found in the literature, that use the approach of multi-agent systems for data integration and process monitoring to faults detection and diagnosis, these agents are used as basis of the proposed multi-agent architecture. A prototype system for the analysis of abnormalities during oil wells drilling was developed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this contribution, we analyze conceptual approaches to nanotechnology and nanoscience in recent issues of secondary education of Brazilian physics textbooks. We analyzed fifteen collections of Physics textbooks of recent editions, however, only two books, belonging to different collections incorporate considerations about nanotechnology and nanoscience in their approaches. We focus our analysis on three aspects, namely: the place dedicated to approaches to nanoscience and nanotechnology, notions about technology and its contributions to critical scientific education. This is a qualitative research; it was used as conceptual approaches the Philosophy of Technology, The Discourse Analysis (DA) and Science, Technology, Society (STS) concepts. We found that in two examined textbooks the approaches to nanoscience and nanotechnology is a complementary description of modern physics, associated with quantum theory. In this context, the concepts of nanoscience and nanotechnology focus superficially in the genesis of the field and some possible areas of applications. It was not identified in all textbooks warnings about the potential risks to human health and the environment from the use of nanotechnology and nanoscience. We understand that textbooks approaches about nanotechnology and nanoscience round a instrumental technological perspective, however keep away from the scientific and technological critical education.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In order to refine the solution given by the classical logistic equation and extend its range of applications in the study of tumor dynamics, we propose and solve a generalization of this equation, using the so-called Fractional Calculus, i.e., we replace the ordinary derivative of order 1, in one version of the usual equation, by a non-integer derivative of order 0 < α < 1, and recover the classical solution as a particular case. Finally, we analyze the applicability of this model to describe the growth of cancer tumors.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Pós-graduação em Matemática em Rede Nacional - IBILCE

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Many key management protocols have been specifically designed for wireless sensor networks. However, most of the key management protocols focus on the establishment of the required keys or the removal of the compromised keys. The design of these key management protocols does not consider the support of higher level security applications. When the applications are integrated later in sensor networks, new mechanisms must be designed. In this paper, we propose a security framework, uKeying, for wireless sensor networks. This framework can be easily extended to support many security applications. It includes three components: a security mechanism to provide secrecy for communications in sensor networks, an efficient session key distribution scheme, and a centralized key revocation scheme. The proposed framework does not depend on a specific key distribution scheme and can be used to support many security applications, such as secure group communications. Our analysis shows that the framework is secure, efficient, and extensible. The simulation and results also reveal for the first time that a centralized key revocation scheme can also attain a high efficiency.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Key management is a core mechanism to ensure the security of applications and network services in wireless sensor networks. It includes two aspects: key distribution and key revocation. Key distribution has been extensively studied in the context of sensor networks. However, key revocation has received relatively little attention. Existing key revocation schemes can be divided into two categories: centralized key revocation scheme and distributed key revocation scheme. In this paper, we first summarize the current key revocation schemes for sensor networks. Then, we propose an efficient centralized key revocation scheme, KeyRev, for wireless sensor networks. Unlike most proposed key revocation schemes focusing on removing the compromised keys, we propose to use key updating techniques to obsolesce the keys owned by the compromised sensor nodes and thus remove the nodes from the network. Our analyses show that the KeyRev scheme is secure inspite of not removing the pre-distributed key materials at compromised sensor nodes. Simulation results also indicate that the KeyRev scheme is scalable and performs very well in wireless sensor networks.