986 resultados para Electronic spreadsheets -- Software


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of RHFID (Radio Frequency ldentification) technology can be employed for not only reducing companies management costs but also to track uniquely each shipping container, pallet, case, and product being manufactured, shipped and sold, to increase visibility and accountability in the supply chain. RFID technology connects the supply chain players (i.e., suppliers, manifacturers, distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, there are challenges and obstacles with the deployment of a RFID-enabled system in the global supply chain. The paper outlines the major RFID issues faced by supply chain management. In this paper, we also present a case study on pharmaceutical supply chain management (SCM) applications by addressing and examining the issues of RFID implementation in a SCM system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic networking ('computer-mediated communication1), considered to be ‘unique domain for educational activity’ (Harasim, 1989:50) and ‘new educational paradigm’ (Mason & Kaye, 1989:23), has been widely used and researched in K-12 schooling, place-based undergraduate subjects and distance education courses. However, only a limited number of reports of usage with experienced teachers (professional development), beginning teachers (induction support) and trainee teachers (initial training) have been published. Hence, little is known about the ways in which this new medium might contribute to the acquisition and maintenance of professional knowledge in the field of teacher education. The purpose of this study was to document an application of electronic networking in an initial 'school-based1 teacher education course. Three factors which were considered to be important in the adoption of electronic networking were specifically addressed: (a) the potential of the medium to attract and maintain a representative and comprehensive audience', (b) the willingness of participants to use the medium for the notation of ideas about teaching; and, (c) the extent to which reflection on practice was evident in network messages. This study also identified and investigated other effects which emerged as participants attempted to negotiate personal relationships with new technology. A case study was selected to investigate audience, notation, reflection, and other effects, in a particular application. Data were collected using participant observation, software-generated statistics, printed documentation, university records, questionnaires, interviews and content analysis of messages. These data were used to describe and analyse network participation by trainee teachers, classroom teachers and university staff. The data revealed that an audience did exist on the electronic network but that this was not comprehensive. Teachers had difficulty accessing the network because of other school commitments, access to equipment and personal competence with microcomputers. These difficulties indicated that developing and maintaining the teacher audience may be a major problem with electronic networking in initial teacher education. This case study revealed that deeply held concerns about notation of ideas by trainee teachers and classroom teachers can be powerful reasons for limited network participation. For trainee teachers, recording ideas publicly presented special difficulties associated with written communication. They were concerned about writing for an audience; about what to write about and how to write it. The loss of visual and verbal cues which form part of face-to-face communication was also a problem leading to concerns about how messages would be received by others. However, the overwhelming concern of almost all trainee teachers about presenting their own ideas was Tear of criticism' from peers (in particular), and other participants on the network. Trainee teachers expressed concerns about the 'dangers' of putting their thoughts in writing, the scrutiny their messages might have received from others, and the public 'criticism' about what they wrote which might have appeared on the network. Knowing that messages were stored on the network, and could be retrieved at some later date, heightened anxiety about the vulnerability of written communication; what was written on one occasion may have to be defended at some later date when the views expressed initially were no longer held. Classroom teachers were also unsure about recording their own ideas in an electronic form. Like trainee teachers, they were concerned about the scrutiny their contributions might receive from other users, and the lack of visual and verbal cues which they had learnt to use in face-to-face communication. Notating ideas in text-based messages which were archived (by the software), and retrievable by others later, was also daunting to many teachers. Another major 'danger' for teachers was the possible repercussions of 'public comment' about curriculum policy and initiatives which they thought might get them into 'trouble' with their employer. Since very few messages were contributed to conferences, there was little evidence of reflection in network communication. In the main, the network was not used to share information and ideas about curriculum and teaching. Public examples of collaboration between participants were not evident, and the 'special knowledge' held by members in each distinct group of users was not elaborated and discussed. Messages were not used to request information or clarification about issues, to outline the processes by which decisions about teaching were reached, or to synthesis ideas from different sources. The potential of the medium to operationalise reflective practice was not realised. Among the effects observed, the use of an anonymous account to access the network, and the impact this had on participation (in one conference) was considered to be a particularly significant finding. While the opportunity to systematically investigate the effects of anonymity on network participation and message contributions was not realised (by the author) while the research was in progress, the effects observed and discussed are considered to be important and worthy of further investigation. In this case study, the anonymous account helped trainee teachers mask concerns about personal writing skills and fear of criticism from others, indicating that anonymity may alter communication patterns, particularly in the early stages of network use. Given the data collected in this case study, and the interpretations placed on it by the author, a pessimistic assessment of the place of electronic networking in initial teacher education courses was presented. For this situation to change - that is, for electronic discussions to become more fully integrated into course activities - four issues which need to be addressed were identified and discussed. These included clarification of the role of collaboration amongst participants in initial teacher education, the ways in which collaboration can be facilitated using electronic networking, the problems of notation - such as the difficulty of expressing ideas about teaching in written form, and the concerns about permanently archived messages - for teachers and trainee teachers, and the lack of skills which many trainee teachers bring to electronic discussions. In the context of initial teacher education, it was suggested that these four aspects require clarification and development before the potential advantages of electronic networking can be realised. Some specific suggestions about how these issues might be resolved were presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article considers the impact of developer policies that hinder or restrict cross platform application development. We suggest that policies that hinder or restrict cross platform development have the potential to erode competition within the market for smartphones. The article also considers the relevance of dominance measures in software markets, arguing that conventional economic approaches may not be applicable. Furthermore, while most monitoring activities tend to focus primarily on protection of consumers, the article points out that modern electronic/information technology markets are multi-sided and there is a need for monitoring of practices designed to attract and retain the favour of developers. While the article is written in the context and application of the applicable Australian legislation, this being s 46 of the Competition and Consumer Act 2010 (Cth), our findings are equally relevant to other jurisdictions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A full length composition that is ambient electronic in style and features analogue and software synths with electronic drums. A gentle sound-bed that would suit contemplative design projects.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic service marketplaces (ESMs) have become major exchange platforms for the online outsourcing of different services – especially software development – to providers. Provider profiles on ESMs encompass extensive information regarding the activities and transactions of providers and they are a main source of information for customers. Such profile information significantly facilitates the relationship development between customers and providers. The existing literature has focused on the impact of the ratings of providers, but so far has not investigated the impact of the other available profile information. Building on the integrated information response model, this study investigates how information presented by providers as well as information provided by the ESM influences the business outcomes of the providers. Based on data collected from one of the major ESMs, we found that profile information indeed has a significant impact on the business outcomes of providers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves. In this study, the decades-old computer security principle that ‘software security depends on hardware security’ is applied to a range of BYOD e-exam tools. Five potential hacks are examined, four of which are confirmed to work against at least one BYOD e-exam tool. The consequences of these hacks are significant, ranging from removal of the exam paper from the venue through to receiving live assistance from an outside expert. Potential mitigation strategies are proposed; however, these are unlikely to completely protect the integrity of BYOD e-exams. Educational institutions are urged to balance the additional affordances of BYOD e-exams for examiners against the potential affordances for cheaters.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Software-Defined Network (SDN) is a promising network paradigm that separates the control plane and data plane in the network. It has shown great advantages in simplifying network management such that new functions can be easily supported without physical access to the network switches. However, Ternary Content Addressable Memory (TCAM), as a critical hardware storing rules for high-speed packet processing in SDN-enabled devices, can be supplied to each device with very limited quantity because it is expensive and energy-consuming. To efficiently use TCAM resources, we propose a rule multiplexing scheme, in which the same set of rules deployed on each node apply to the whole flow of a session going through but towards different paths. Based on this scheme, we study the rule placement problem with the objective of minimizing rule space occupation for multiple unicast sessions under QoS constraints. We formulate the optimization problem jointly considering routing engineering and rule placement under both existing and our rule multiplexing schemes. Via an extensive review of the state-of-the-art work, to the best of our knowledge, we are the first to study the non-routing-rule placement problem. Finally, extensive simulations are conducted to show that our proposals significantly outperform existing solutions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Abstract—
After a decade of extensive research on application-specific wireless sensor networks (WSNs), the recent development of information and communication technologies makes it practical to realize the software-defined sensor networks (SDSNs), which are able to adapt to various application requirements and to fully explore the resources of WSNs. A sensor node in SDSN is able to conduct multiple tasks with different sensing targets simultaneously. A given sensing task usually involves multiple sensors to achieve a certain quality-of-sensing, e.g., coverage ratio. It is significant to design an energy-efficient sensor scheduling and management strategy with guaranteed quality-of-sensing for all tasks. To this end, three issues are investigated in this paper: 1) the subset of sensor nodes that shall be activated, i.e., sensor activation, 2) the task that each sensor node shall be assigned, i.e., task mapping, and 3) the sampling rate on a sensor for a target, i.e., sensing scheduling. They are jointly considered and formulated as a mixed-integer with quadratic constraints programming (MIQP) problem, which is then reformulated into a mixed-integer linear programming (MILP) formulation with low computation complexity via linearization. To deal with dynamic events such as sensor node participation and departure, during SDSN operations, an efficient online algorithm using local optimization is developed. Simulation results show that our proposed online algorithm approaches the globally optimized network energy efficiency with much lower rescheduling time and control overhead.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Performance is a crucial attribute for most software, making performance analysis an important software engineering task. The difficulty is that modern applications are challenging to analyse for performance. Many profiling techniques used in real-world software development struggle to provide useful results when applied to large-scale object-oriented applications. There is a substantial body of research into software performance generally but currently there exists no survey of this research that would help identify approaches useful for object-oriented software. To provide such a review we performed a systematic mapping study of empirical performance analysis approaches that are applicable to object-oriented software. Using keyword searches against leading software engineering research databases and manual searches of relevant venues we identified over 5,000 related articles published since January 2000. From these we systematically selected 253 applicable articles and categorised them according to ten facets that capture the intent, implementation and evaluation of the approaches. Our mapping study results allow us to highlight the main contributions of the existing literature and identify areas where there are interesting opportunities. We also find that, despite the research including approaches specifically aimed at object-oriented software, there are significant challenges in providing actionable feedback on the performance of large-scale object-oriented applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

New technologies appear each moment and its use can result in countless benefits for that they directly use and for all the society as well. In this direction, the State also can use the technologies of the information and communication to improve the level of rendering of services to the citizens, to give more quality of life to the society and to optimize the public expense, centering it in the main necessities. For this, it has many research on politics of Electronic Government (e-Gov) and its main effect for the citizen and the society as a whole. This research studies the concept of Electronic Government and wishes to understand the process of implementation of Free Softwares in the agencies of the Direct Administration in the Rio Grande do Norte. Moreover, it deepens the analysis to identify if its implantation results in reduction of cost for the state treasury and intends to identify the Free Software participation in the Administration and the bases of the politics of Electronic Government in this State. Through qualitative interviews with technologies coordinators and managers in 3 State Secretaries it could be raised the ways that come being trod for the Government in order to endow the State with technological capacity. It was perceived that the Rio Grande do Norte still is an immature State in relation to practical of electronic government (e-Gov) and with Free Softwares, where few agencies have factual and viable initiatives in this area. It still lacks of a strategical definition of the paper of Technology and more investments in infrastructure of staff and equipment. One also observed advances as the creation of the normative agency, the CETIC (State Advice of Technology of the Information and Communication), the Managing Plan of Technology that provide a necessary diagnosis with the situation how much Technology in the State and considered diverse goals for the area, the accomplishment of a course of after-graduation for managers of Technology and the training in BrOffice (OppenOffice) for 1120 public servers

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper describes the first polytomous computerised identification key within the family Phytoseiidae. It applies to the females of the world species of the subgenus Typhlodromus (Anthoseius) de Leon. This group is one of the largest within the family Phytoseiidae and the sub-family Typhlodrominae, with nearly 350 species currently recognised worldwide. No identification tool of these species exists at the world level, which makes their identification very difficult and unsecure. Thirty five characters were used to characterise each of the 343 species. Among these characters, 14 are discrete and 21 are continuous. The polytomous key was constructed using the free software DELTA 1.04 (DEscription Language for TAxonomy) and is freely available at the web site: http://www1.montpellier.inra.fr/CBGP/phytoseiidae/anthoseiuskeypresentation.html. We hope that this work will open new perspectives for the identification of species of other genera (especially the largest ones, e.g. Neoseiulus, Euseius, Amblyseius) which contains more than 150 species and for which no key presently exists. We also expect that the present work will make the identification of the world species of Typhlodromus (Anthoseius) easier and more secure. Finally, we expect a contribution from the whole Phytoseiidae scientist community to improve subsequent versions of the key.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paperwork presents the complete circuitry used to build a microcontroller-based pH-meter. Key control software is also discussed. An industry-standard glass combination electrode has been employed for pH detection. Electrode parameter extraction procedure is presented. Good measurement results, with 1 % error, have been attained. Copyright© (2006) by the International Measurement Federation (IMEKO).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the analysis and evaluation of the Power Electronics course at So Paulo State University-UNESP-Campus of Ilha Solteira(SP)-Brazil, which includes the usage of interactive Java simulations tools and an educational software to aid the teaching of power electronic converters. This platform serves as an oriented course for the lectures and supplementary support for laboratory experiments in the power electronics courses. The simulation tools provide an interactive and dynamic way to visualize the power electronics converters behavior together with the educational software, which contemplates the theory and a list of subjects for circuit simulations. In order to verify the performance and the effectiveness of the proposed interactive educational platform, it is presented a statistical analysis considering the last three years. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a practical experimentation for comparing reactive/non-active energy measures, considering three-phase four-wire non-sinusoidal and unbalanced circuits, involving five different commercial electronic meters. The experimentation set provides separately voltage and current generation, each one with any waveform involving up to fifty-first harmonic components, identically compared with acquisitions obtained from utility. The experimental accuracy is guaranteed by a class A power analyzer, according to IEC61000-4-30 standard. Some current and voltage combination profiles are presented and confronted with two different references of reactive/non-active calculation methodologies; instantaneous power theory and IEEE 1459-2010. The first methodology considers the instantaneous power theory, present into the advanced mathematical internal algorithm from WT3000 power analyzer, and the second methodology, accomplish with IEEE 1459-2010 standard, uses waveform voltage and current acquisition from WT3000 as input data for a virtual meter developed on Mathlab/Simulink software. © 2012 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It is presented a software developed with Delphi programming language to compute the reservoir's annual regulated active storage, based on the sequent-peak algorithm. Mathematical models used for that purpose generally require extended hydrological series. Usually, the analysis of those series is performed with spreadsheets or graphical representations. Based on that, it was developed a software for calculation of reservoir active capacity. An example calculation is shown by 30-years (from 1977 to 2009) monthly mean flow historical data, from Corrente River, located at São Francisco River Basin, Brazil. As an additional tool, an interface was developed to manage water resources, helping to manipulate data and to point out information that it would be of interest to the user. Moreover, with that interface irrigation districts where water consumption is higher can be analyzed as a function of specific seasonal water demands situations. From a practical application, it is possible to conclude that the program provides the calculation originally proposed. It was designed to keep information organized and retrievable at any time, and to show simulation on seasonal water demands throughout the year, contributing with the elements of study concerning reservoir projects. This program, with its functionality, is an important tool for decision making in the water resources management.