949 resultados para HADES – Hades Active Delay Evaluation System
Resumo:
The current context of a strong competition and the ongoing search for competitive advantages requires more than processes modernization, technological and financial resources. It requires a competent workforce, strongly committed and engaged with Organization’s challenges. Under this scenario, it seems crucial to synchronize their performance with Organization’s strategy, aimed at pursuing its effective achievement. If well used, the Performance Evaluation as a strategy for Human Resource Management presents itself as an instrument to foster high levels of performance. A more recent approach of this policy refers to Performance Management representing a dynamic and participative evaluation system, which combines the development of consensual goals, support and follow-up for further execution of respective assessment. This research was based on the ENAPOR, S.A (Porto da Praia) case, with the intention of checking the alignment of its Performance Evaluation System with the Company's strategic goals and what the process features.
Resumo:
Evaluating other individuals with respect to personality characteristics plays a crucial role in human relations and it is the focus of attention for research in diverse fields such as psychology and interactive computer systems. In psychology, face perception has been recognized as a key component of this evaluation system. Multiple studies suggest that observers use face information to infer personality characteristics. Interactive computer systems are trying to take advantage of these findings and apply them to increase the natural aspect of interaction and to improve the performance of interactive computer systems. Here, we experimentally test whether the automatic prediction of facial trait judgments (e.g. dominance) can be made by using the full appearance information of the face and whether a reduced representation of its structure is sufficient. We evaluate two separate approaches: a holistic representation model using the facial appearance information and a structural model constructed from the relations among facial salient points. State of the art machine learning methods are applied to a) derive a facial trait judgment model from training data and b) predict a facial trait value for any face. Furthermore, we address the issue of whether there are specific structural relations among facial points that predict perception of facial traits. Experimental results over a set of labeled data (9 different trait evaluations) and classification rules (4 rules) suggest that a) prediction of perception of facial traits is learnable by both holistic and structural approaches; b) the most reliable prediction of facial trait judgments is obtained by certain type of holistic descriptions of the face appearance; and c) for some traits such as attractiveness and extroversion, there are relationships between specific structural features and social perceptions.
Resumo:
Este artículo, presenta una propuesta de ecoetiqueta que evalúa la calidad de los espacios de interés natural. Debido a la inexistencia de una ecoetiqueta de servicios de estas características, se han estudiado antecedentes de certificados ecológicos de servicios y sistemas de evaluación de espacios naturales y urbanos. A partir de este estudio, se han evaluado 110 indicadores preexistentes, de los cuales se han adaptado 59 indicadores, 29 de cumplimiento obligatorio y 30 recomendables, divididos en tres flujos: Flujo Humano, Flujo Natural y Flujo de Gestión, y 17 vectores; con los cuales se ha elaborado un sistema de evaluación adaptado a esta ecoetiqueta. Con la determinación del reglamento y las condiciones generales para la concesión de la propuesta de ecoetiqueta, se ha realizado una Prueba Piloto en la Vall d’Alinyà (Provincia de Lérida) centrada en el Flujo Humano, verificando de forma positiva la aplicación de la certificación en este espacio. Los resultados indican una adecuación de más del 90% de los indicadores seleccionados, mientras que se ha observado, principalmente, deficiencias en los sistemas hídricos y energéticos de la Vall d’Alinyà. Por ello, se han elaborado una serie de propuestas de mejora.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Line converters have become an attractive AC/DC power conversion solution in industrial applications. Line converters are based on controllable semiconductor switches, typically insulated gate bipolar transistors. Compared to the traditional diode bridge-based power converters line converters have many advantageous characteristics, including bidirectional power flow, controllable de-link voltage and power factor and sinusoidal line current. This thesis considers the control of the lineconverter and its application to power quality improving. The line converter control system studied is based on the virtual flux linkage orientation and the direct torque control (DTC) principle. A new DTC-based current control scheme is introduced and analyzed. The overmodulation characteristics of the DTC converter are considered and an analytical equation for the maximum modulation index is derived. The integration of the active filtering features to the line converter isconsidered. Three different active filtering methods are implemented. A frequency-domain method, which is based on selective harmonic sequence elimination, anda time-domain method, which is effective in a wider frequency band, are used inharmonic current compensation. Also, a voltage feedback active filtering method, which mitigates harmonic sequences of the grid voltage, is implemented. The frequency-domain and the voltage feedback active filtering control systems are analyzed and controllers are designed. The designs are verified with practical measurements. The performance and the characteristics of the implemented active filtering methods are compared and the effect of the L- and the LCL-type line filteris discussed. The importance of the correct grid impedance estimate in the voltage feedback active filter control system is discussed and a new measurement-based method to obtain it is proposed. Also, a power conditioning system (PCS) application of the line converter is considered. A new method for correcting the voltage unbalance of the PCS-fed island network is proposed and experimentally validated.
Resumo:
In Chile, the cherry tree has been one of the fastest growing and most profitable crops in the last ten years. However, increasing production costs, the scarcity of hired labor, and unfavorable exchange rates have reduced the productivity and competitiveness of the Chilean fruit sector. The aim of this article is to evaluate the harvest labor quality in cherry growing in Chile through the use of productivity indicators. A harvest labor evaluation system (HLES) was designed and four indicators were measured: Average Weight of Harvested Box, Average Daily Production per Worker, Percent of Export Fruit, and Percent of Fruit Discarded. Significant differences werefound between the 2010/11 season (with the HLES implementation) and the previous seasons without HLES. The average worker yield, average weight of a filled box, and fruit quality improved, while the amount of discarded fruit decreased. Hired labor management in agriculture is crucial for improving the productivity of the fresh fruit export producers. The use of HLES and the adoption of new technologies could help to solve the competitiveness problem in the Chilean fruit sector.
Resumo:
Tutkielman aihealueena on tavarantoimittaja-arvioinnin systematisointi, koskien nykyisiä toimittajia. Tutkielma on tehty case-yrityksen toimeksiannosta. Työssä kehitellään arviointimenetelmä toimittaja-arviointiin, joka testataan esimerkin omaisesti case-yrityksen kolmen nykyisen toimittajan osalta. Arviointikriteerit valittiin yrityksessä tehtyjen haastattelujen ja teorian pohjalta. Arvioinnin oletuksena on, että tunnusluvut ovat saatavissa Business Warehouse- järjestelmästä. Arviointikriteerit on tarkoitus pisteyttää myöhemmin, jotta voidaan laskea toimittajan kokonaissuoriutuminen. Toimittajia voidaan tällöin myös vertailla keskenään tuoteryhmien sisällä ja niiden välillä. Tutkielmassa kehitetty menetelmä mahdollistaa systemaattisen toimittaja-arvioinnin käynnistämisen. Case-yrityksen on kuitenkin jatkuvasti paranneltava ja kehitettävä arviointia entisestään. Business Warehouse –järjestelmän toimivuus käytännössä on edellytys arvioinnin aloitukselle. Toimittajien arvioimisen tulokset tulevat näkymään yrityksessä ajan kanssa. Tarkoituksena on kehittää toimittajasuhteita tärkeimpien toimittajien kanssa. Arvioinnin jatkuessa pystytään toimittajien suoriutumista seuraamaan pitkällä tähtäimellä ja muutokset suorituskyvyssä havaitaan nopeasti. Arviointimenetelmän varsinainen käyttöönotto jää case-yrityksen tehtäväksi. Työn kontribuutiona kehitetään case-yrityksen tarpeita vastaava yksilöllinen menetelmä toimittajien systemaattiseen arviointiin.
Resumo:
Pro gradu –tutkielman aiheena on hankintatoimen toimittaja-arviointijärjestelmän kehittäminen auditoinnin avulla. Työn päätavoitteena on toimittaja-arviointijärjestelmän kehittäminen case-yrityksen nykyisille toimittajille yrityksen tärkeinä pitämät näkökohdat huomioiden. Tutkimus on tyypiltään laadullinen tutkimus. Aineisto on kerätty kirjallisuuteen perehtymällä, haastatteluilla ja havainnoiden. Arviointikriteerit sisältöineen on valittu teorian ja yrityksessä tehtyjen haastattelujen pohjalta. Tutkimuksen lopputuloksena syntynyt arviointilomake mahdollistaa toimittajien keskinäisen vertailun. Arviointitekniikkana on käytetty auditointia. Arviointilomaketta on testattu muutamilla tavarantoimittajilla. Arvioinnin avulla on tunnistettu parhaimpia toimittajia ja löydetty kehittämistä vaativia osa-alueita samoin kuin heikompia toimittajia. Arviointilomakkeeseen mukaan otettu pisteytys on mahdollistanut toimittajien laittamisen keskinäiseen paremmuusjärjestykseen toisiinsa nähden varsinaisia jatkotoimenpiteitä varten. Tarkoituksena on syventää yhteistyötä tärkeimpien toimittajien kanssa.
Resumo:
Training of highly qualified personnel is the most transversal axis among those identified in the document "Mobilizing Axes in Chemistry", published by SBQ, in 2002, which demands to deep the discussions, initiated in the symposium "The Chemist's Education", whose main objective was to discuss the repercussions of that training in the teaching and in the industrial section. After the publication of an initial paper, a couple of meetings and workshops held in Rio de Janeiro, in December 2003, involving the national chemist community, discussed the "The role of the graduate degrees in the Chemist's Education" and "The Chemist's Education", and confirmed the need to invest in the formation of qualified human resources in profusion and in all levels. Actions to be taken were delineated. Presently, the graduate programs in Chemistry are showing expressive results. However, although these professionals are mostly absorbed by the academy (the absorption of the industry is less significant), only a few programs give special attention to the didactical and pedagogical training. The regional decentralization is actually a tendency in most programs, but the interaction academy-economic activities is still a challenge. It is necessary to establish with the industrial section, the highly qualified professional's profile in Chemistry that the industry can absorb. The undergraduation is growing in number and quality, however still excessively concentrated in the Southeast area. The national "Curricula Guidelines" for Chemistry Courses, through its flexible approach, propitiate the integral, interdisciplinary (non compartmentalized) and critical-reflexive training of the professionals as citizens and as entrepreneurs. However, deficiencies are still recognized. The evaluation system of undergraduate courses has been able to identify the most fragile modalities of courses and other indicators. It was also verified that Brazilian chemistry industry absorbs minimally the highly qualified professionals, which is attributed to the fact that the Federal Council of Chemistry is vertically organized and does not recognize the graduate degrees as professional qualification. In the conclusion, it stands out, among other aspects, the importance of the effective implantation of the national curricula guidelines, bringing out courses whose didactical and pedagogical projects may offer a solid formation in Chemistry, but comprehensive and general enough to enable the Chemistry professionals to develop varied skills.
Resumo:
For any international companies who wish to enter the Chinese market, quality is base on the fundamental. The companies are coming to realize the importance of quality gradually, thus companies have been put the quality problems on the agenda. The competitiveness of companies comes from quality. Quality is the key to success, and it can decide that the companies can be accepted or eliminated by the market. Due to the obvious benefits, the demand of the method of how to achieve high quality of product keeps growing. During achieving the high quality process, the main troubles come from the impact between Eastern and Western culture. Chinese culture which is different with Western one have lasted as long as five thousand years. Such a culture deeply rooted in the hearts of Chinese people, and effected generation after generation of Chinese people's working style and ways of thinking. This thesis determines how to find a good fit point between Eastern and Western culture. Doing right thing by the right way. The nature of improving quality is improving management level in fact. "How to manage, who should be managed", the thesis explains the basic and best option to achieve those. It describes three-dimension-style management to monitoring the working process. This kind of management style can inspect production process from horizontal and vertical direction. In this management way, it defines effective evaluation system to every subcontractor, and makes the companies to achieve the ultimate goal - satisfy quality. Because of the importance of human factor, the thesis determines the range of training of the inspector and welder due to the current situation of China. The results show that in order to reach reliable training effective evaluation, not only the quality of the human but also the ultimate goal of product quality.
Resumo:
It is known already from 1970´s that laser beam is suitable for processing paper materials. In this thesis, term paper materials mean all wood-fibre based materials, like dried pulp, copy paper, newspaper, cardboard, corrugated board, tissue paper etc. Accordingly, laser processing in this thesis means all laser treatments resulting material removal, like cutting, partial cutting, marking, creasing, perforation etc. that can be used to process paper materials. Laser technology provides many advantages for processing of paper materials: non-contact method, freedom of processing geometry, reliable technology for non-stop production etc. Especially packaging industry is very promising area for laser processing applications. However, there are only few industrial laser processing applications worldwide even in beginning of 2010´s. One reason for small-scale use of lasers in paper material manufacturing is that there is a shortage of published research and scientific articles. Another problem, restraining the use of laser for processing of paper materials, is colouration of paper material i.e. the yellowish and/or greyish colour of cut edge appearing during cutting or after cutting. These are the main reasons for selecting the topic of this thesis to concern characterization of interaction of laser beam and paper materials. This study was carried out in Laboratory of Laser Processing at Lappeenranta University of Technology (Finland). Laser equipment used in this study was TRUMPF TLF 2700 carbon dioxide laser that produces a beam with wavelength of 10.6 μm with power range of 190-2500 W (laser power on work piece). Study of laser beam and paper material interaction was carried out by treating dried kraft pulp (grammage of 67 g m-2) with different laser power levels, focal plane postion settings and interaction times. Interaction between laser beam and dried kraft pulp was detected with different monitoring devices, i.e. spectrometer, pyrometer and active illumination imaging system. This way it was possible to create an input and output parameter diagram and to study the effects of input and output parameters in this thesis. When interaction phenomena are understood also process development can be carried out and even new innovations developed. Fulfilling the lack of information on interaction phenomena can assist in the way of lasers for wider use of technology in paper making and converting industry. It was concluded in this thesis that interaction of laser beam and paper material has two mechanisms that are dependent on focal plane position range. Assumed interaction mechanism B appears in range of average focal plane position of 3.4 mm and 2.4 mm and assumed interaction mechanism A in range of average focal plane position of 0.4 mm and -0.6 mm both in used experimental set up. Focal plane position 1.4 mm represents midzone of these two mechanisms. Holes during laser beam and paper material interaction are formed gradually: first small hole is formed to interaction area in the centre of laser beam cross-section and after that, as function of interaction time, hole expands, until interaction between laser beam and dried kraft pulp is ended. By the image analysis it can be seen that in beginning of laser beam and dried kraft pulp material interaction small holes off very good quality are formed. It is obvious that black colour and heat affected zone appear as function of interaction time. This reveals that there still are different interaction phases within interaction mechanisms A and B. These interaction phases appear as function of time and also as function of peak intensity of laser beam. Limit peak intensity is the value that divides interaction mechanism A and B from one-phase interaction into dual-phase interaction. So all peak intensity values under limit peak intensity belong to MAOM (interaction mechanism A one-phase mode) or to MBOM (interaction mechanism B onephase mode) and values over that belong to MADM (interaction mechanism A dual-phase mode) or to MBDM (interaction mechanism B dual-phase mode). Decomposition process of cellulose is evolution of hydrocarbons when temperature is between 380- 500°C. This means that long cellulose molecule is split into smaller volatile hydrocarbons in this temperature range. As temperature increases, decomposition process of cellulose molecule changes. In range of 700-900°C, cellulose molecule is mainly decomposed into H2 gas; this is why this range is called evolution of hydrogen. Interaction in this range starts (as in range of MAOM and MBOM), when a small good quality hole is formed. This is due to “direct evaporation” of pulp via decomposition process of evolution of hydrogen. And this can be seen can be seen in spectrometer as high intensity peak of yellow light (in range of 588-589 nm) which refers to temperature of ~1750ºC. Pyrometer does not detect this high intensity peak since it is not able to detect physical phase change from solid kraft pulp to gaseous compounds. As interaction time between laser beam and dried kraft pulp continues, hypothesis is that three auto ignition processes occurs. Auto ignition of substance is the lowest temperature in which it will spontaneously ignite in a normal atmosphere without an external source of ignition, such as a flame or spark. Three auto ignition processes appears in range of MADM and MBDM, namely: 1. temperature of auto ignition of hydrogen atom (H2) is 500ºC, 2. temperature of auto ignition of carbon monoxide molecule (CO) is 609ºC and 3. temperature of auto ignition of carbon atom (C) is 700ºC. These three auto ignition processes leads to formation of plasma plume which has strong emission of radiation in range of visible light. Formation of this plasma plume can be seen as increase of intensity in wavelength range of ~475-652 nm. Pyrometer shows maximum temperature just after this ignition. This plasma plume is assumed to scatter laser beam so that it interacts with larger area of dried kraft pulp than what is actual area of beam cross-section. This assumed scattering reduces also peak intensity. So result shows that assumably scattered light with low peak intensity is interacting with large area of hole edges and due to low peak intensity this interaction happens in low temperature. So interaction between laser beam and dried kraft pulp turns from evolution of hydrogen to evolution of hydrocarbons. This leads to black colour of hole edges.
Resumo:
The aim of the present study was to examine the feasibility of DNA microarray technology in an attempt to construct an evaluation system for determining gas toxicity using high-pressure conditions, as it is well known that pressure increases the concentration of a gas. As a first step, we used yeast (Saccharomyces cerevisiae) as the indicator organism and analyzed the mRNA expression profiles after exposure of yeast cells to nitrogen gas. Nitrogen gas was selected as a negative control since this gas has low toxicity. Yeast DNA microarray analysis revealed induction of genes whose products were localized to the membranes, and of genes that are involved in or contribute to energy production. Furthermore, we found that nitrogen gas significantly affected the transport system in the cells. Interestingly, nitrogen gas also resulted in induction of cold-shock responsive genes. These results suggest the possibility of applying yeast DNA microarray to gas bioassays up to 40 MPa. We therefore think that "bioassays" are ideal for use in environmental control and protection studies.
Resumo:
The main goal of this thesis is to study the dynamics of Josephson junction system in the presence of an external rf-biasing.A system of two chaotically synchronized Josephson junction is studied.The change in the dynamics of the system in the presence of at phase difference between the applied fields is considered. Control of chaos is very important from an application point of view. The role Of phase difference in controlling chaos is discussed.An array of three Josephson junctions iS studied for the effect of phase difference on chaos and synchronization and the argument is extended for a system of N Josephson junctions. In the presence of a phase difference between the external fields, the system exhibits periodic behavior with a definite phase relationship between all the three junctions.Itdeals with an array of three Josephson junctions with a time delay in the coupling term. It is observed that only the outer systems synchronize while the middle system remain uncorrelated with t-he other two. The effect of phase difference between the applied fields and time-delay on system dynamics and synchronization is also studied. We study the influence of an applied ac biasing on a serniannular Josephson junction. It is found the magnetic field along with the biasing induces creation and annihilation of fluxons in the junction. The I-V characteristics of the junction is studied by considering the surface loss term also in the model equation. The system is found to exhibit chaotic behavior in the presence of ac biasing.
Resumo:
El propósito del presente trabajo es analizar el proceso de construcción de los Programas de Estímulos al Desempeño del Personal Académico (PEDPA), con el fin de ilustrar algunos problemas metodológicos básicos del sistema de evaluación asociado y sus repercusiones en las puntuaciones y estímulos económicos del personal evaluado. Se toma el caso de una universidad pública mexicana, describiendo el contexto institucional, las distintas etapas para elaborar el sistema evaluativo y los resultados obtenidos. Se concluye que los PEDPA adolecen de problemas metodológicos debido a la poca congruencia del modelo evaluativo con los propósitos declarados, la ausencia de los grupos colegiados en la construcción del modelo y la falta de participación de especialistas en evaluación.
Resumo:
Basándose en la necesidad manifiesta de la empresa Thomas Greg & Sons de Colombia por controlar los costos en los que incurre por adoptar un Sistema de Gestión de Calidad, se realizó una investigación de los procesos que realiza la empresa a nivel productivo y el esquema de costos que utiliza a nivel organizacional, con el fin de proponer y concebir un modelo de administración de costos de la calidad y de la no calidad que sea conforme a lo esperado por la alta gerencia y que contribuya significativamente al control de costos.