945 resultados para Internet (Computer network) -- Safety measures
Resumo:
Maritime safety is an issue that has gained a lot of attention in the Baltic Sea area due to the dense maritime traffic and transportation of oil in the area. Lots of effort has been paid to enhance maritime safety in the area. The risk exists that excessive legislation and other requirements mean more costs for limited benefit. In order to utilize both public and private resources efficiently, awareness is required of what kind of costs maritime safety policy instruments cause and whether the costs are in relation to benefits. The aim of this report is to present an overview of the cost-effectiveness of maritime safety policy instruments focusing on the cost aspect: what kind of costs maritime safety policy causes, to whom, what affects the cost-effectiveness and how cost-effectiveness is studied. The study is based on a literature review and on the interviews of Finnish maritime experts. The results of this study imply that cost-effectiveness is a complicated issue to evaluate. There are no uniform practices for which costs and benefits should be included in the evaluation and how they should be valued. One of the challenges is how to measure costs and benefits during the course of a longer time period. Often a lack of data erodes the reliability of evaluation. In the prevention of maritime accidents, costs typically include investments in ship structures or equipment, as well as maintenance and labor costs. Also large investments may be justifiable if they respectively provide significant improvements to maritime safety. Measures are cost-effective only if they are implemented properly. Costeffectiveness is decreased if a measure causes overlapping or repetitious work. Costeffectiveness is also decreased if the technology isn’t user-friendly or if it is soon replaced with a new technology or another new appliance. In future studies on the cost-effectiveness of maritime safety policy, it is important to acknowledge the dependency between different policy instruments and the uncertainty of the factors affecting cost-effectiveness. The costs of a single measure are rarely relatively significant and the effect of each measure on safety tends to be positive. The challenge is to rank the measures and to find the most effective combination of different policy instruments. The greatest potential offered for the analysis of cost-effectiveness of individual measures is their implementation in clearly defined risk situations, in which different measures are truly alternative to each other. Overall, maritime safety measures do not seem to be considered burdening for the shipping industry in Finland at the moment. Generally actors in the Finnish shipping industry seem to find maintaining a high safety level important and act accordingly.
Resumo:
El següent projecte consisteix en analitzar com funciona un sistema SAN, per tal de veure com es pot obtenir un millor rendiment. L’objectiu principal es saber com es comportarà la nostra SAN muntada amb iSCSI a través de la xarxa, volem veure quines són les operacions, les dades i els resultats que comporta crear una RAID a través de discos no locals d’un ordinador i a través d’una xarxa LAN
Resumo:
In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
This paper presents a study of connection availability in GMPLS over optical transport networks (OTN) taking into account different network topologies. Two basic path protection schemes are considered and compared with the no protection case. The selected topologies are heterogeneous in geographic coverage, network diameter, link lengths, and average node degree. Connection availability is also computed considering the reliability data of physical components and a well-known network availability model. Results show several correspondences between suitable path protection algorithms and several network topology characteristics
Resumo:
All-optical label swapping (AOLS) forms a key technology towards the implementation of all-optical packet switching nodes (AOPS) for the future optical Internet. The capital expenditures of the deployment of AOLS increases with the size of the label spaces (i.e. the number of used labels), since a special optical device is needed for each recognized label on every node. Label space sizes are affected by the way in which demands are routed. For instance, while shortest-path routing leads to the usage of fewer labels but high link utilization, minimum interference routing leads to the opposite. This paper studies all-optical label stacking (AOLStack), which is an extension of the AOLS architecture. AOLStack aims at reducing label spaces while easing the compromise with link utilization. In this paper, an integer lineal program is proposed with the objective of analyzing the softening of the aforementioned trade-off due to AOLStack. Furthermore, a heuristic aiming at finding good solutions in polynomial-time is proposed as well. Simulation results show that AOLStack either a) reduces the label spaces with a low increase in the link utilization or, similarly, b) uses better the residual bandwidth to decrease the number of labels even more
Resumo:
In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio
Resumo:
Vintage video (1986) on laser safety, presented by Dr. Gillian Rice. This is a 37 minute video, explaining the hazards which are likely to be encountered and ways to reduce those hazards in teaching and research laboratories in higher education. Presented in 5 parts: Part 1 (1:49) Laser radiation and the body Part 2 (8:49) Classes of laser Part 3 (13:32) Safety measures Part 4 (21:32) Other risks: precautions Part 5 (31:49) Summary
Resumo:
Twitter y otras redes sociales de microblogging ofrecen la posibilidad de comunicarse con todo el planeta, haciendo uso de tan sólo 140 caracteres, esta aparente limitación obliga al usuario a compartir lo esencial, a mostrar los enlaces del mundo con el que interactúa. El eje principal de este trabajo se basa en que las redes sociales de microblogging suponen una ventana al conocimiento informal, al autoaprendizaje y a la creación de redes aplicadas al conocimiento, útiles para la orientación en las aulas. Estas y otras plataformas poseen la característica de motivar a los estudiantes reduciendo las distancias físicas y psicológicas entre alumno y profesor, incrementando la confianza en el alumno e implicándolo en su propio aprendizaje. Para ello implementamos el uso de estas redes sociales, antes, durante y después de cada clase de tipo teórico-práctico. El material de presentación utilizado para las clases posee la posibilidad de transmitir y seguir en directo la actividad realizada durante las clases, tanto del docente como del alumnado. El uso de etiquetas que permitan clasificar, indexar y finalmente recuperar lo expuesto o generado en clase mediante búsquedas, convierten las clases convencionales de tipo unidireccional, en una conversación más interactiva de todos a todos, que permite generar ideas, repasar contenidos y sobretodo recuperar esta información siempre que se desee. El uso de redes sociales y más concretamente redes sociales de microblogging tienen un gran potencial, por ser algo novedoso, que implica la participación y la conversación con el alumnado, rompiendo barreras y generando aprendizaje informal y sobre todo permite ayudar a la autogestión del aprendizaje. Varios millones de personas en todo el mundo utilizan y comparten información en estas plataformas. Al ser herramientas nacidas en entornos TIC permiten ser integradas, agregadas y controladas por parte del docente con mucha flexibilidad y su carácter de ubicuidad espacio-temporal las hacen idóneas para resumir lo expuesto en clase, aportar ejemplos, conversar, compartir, consultar y sobretodo implicar al alumno en la dinámica de aprendizaje y en la creación de su propio material de trabajo. Además resulta relativamente fácil integrar redes sociales de microblogging en el aula, sólo es necesaria una conexión a internet y hacer uso de los servicios generales gratuitos ya existentes. Su facilidad de consulta e integración con servicios como la telefonía móvil o entornos de e-Learning, convirtiendo a estas redes sociales en la conversación que dinamizará las aulas. En este contexto, el presente trabajo parte del modelo de aceptación tecnológica (TAM) de Davis et al. (1989) al que se incorporan algunos de los constructos más utilizados en la literatura científica. Estos constructos son el papel relevante de las normas subjetivas (NS) y de la imagen social (IMAGE) en el uso de tecnologías de la información estructuradas en redes sociales. Para ello un cuestionario fue aplicado a 135 alumnos de diversas titulaciones de Grado y Diplomatura de la Facultad de Ciencias Económicas y Empresariales de la Universidad de Granada. Los datos obtenidos permitieron desarrollar un modelo de Ecuaciones Estructurales con los anteriores constructos. Del análisis resulta un modelo de comportamiento de uso de las redes sociales muy robusto y parsimonioso que demuestra las hipótesis de investigación planteadas, poniendo de manifiesto que la adecuación del uso de modelos TAM ampliados (como el presente) para explicar la aceptación de instrumentos metodológicos basados en tecnologías de la información
Resumo:
A cidade de Piraí, no estado do Rio de Janeiro, Brasil, é palco do programa Piraí Digital, um leque de iniciativas, em cinco áreas de atuação – governo, educação, saúde, negócios e cidadania –, com o objetivo de vencer a exclusão digital no município e contribuir para seu desenvolvimento. O programa foi estudado por meio da associação entre um modelo heurístico para análise da inclusão digital e a Teoria Ator-Rede (ANT). O trabalho apresenta a descrição da evolução do programa segundo os atores que o construíram. Entre 1997 e 2009, Piraí Digital contribuiu para uma série de mudanças positivas em Piraí, notadamente nas áreas de educação, a qual adotou a computação 1:1 em toda a rede municipal no ano de 2009; saúde, que utiliza a estrutura de rede de computadores e internet da cidade para disseminar seus sistemas; e governo, onde a administração pública teve ganhos de produtividade e arrecadação por meio da informatização da máquina administrativa. O estudo de Piraí Digital permite compreender a importância da associação de artefatos – rede de computadores, telecentros, Planos Diretores e outros – e das pessoas nos esforços para vencer a exclusão digital e contribuir para o desenvolvimento local. Explorando o contraste entre a grande notoriedade de Piraí Digital fora do município e o baixo conhecimento do programa pela população local, o autor faz a analogia com uma obra de saneamento, pouco conhecida e visível, mas essencial para a população. Em Piraí, o saneamento digital está pronto, com bits jorrando das torneiras nas escolas e a saúde se beneficiando da TI para escoar seu fluxo de informações para benefício dos cidadãos piraienses.
Resumo:
Com o intuito de utilizar uma rede com protocolo IP para a implementação de malhas fechadas de controle, este trabalho propõe-se a realizar um estudo da operação de um sistema de controle dinâmico distribuído, comparando-o com a operação de um sistema de controle local convencional. Em geral, a decisão de projetar uma arquitetura de controle distribuído é feita baseada na simplicidade, na redução dos custos e confiabilidade; portanto, um diferencial bastante importante é a utilização da rede IP. O objetivo de uma rede de controle não é transmitir dados digitais, mas dados analógicos amostrados. Assim, métricas usuais em redes de computadores, como quantidade de dados e taxa de transferências, tornam-se secundárias em uma rede de controle. São propostas técnicas para tratar os pacotes que sofrem atrasos e recuperar o desempenho do sistema de controle através da rede IP. A chave para este método é realizar a estimação do conteúdo dos pacotes que sofrem atrasos com base no modelo dinâmico do sistema, mantendo o sistema com um nível adequado de desempenho. O sistema considerado é o controle de um manipulador antropomórfico com dois braços e uma cabeça de visão estéreo totalizando 18 juntas. Os resultados obtidos mostram que se pode recuperar boa parte do desempenho do sistema.
Resumo:
No julgamento do recurso especial referente à ação ajuizada pela apresentadora Xuxa Meneghel para compelir o Google Search a desvincular dos seus índices de busca os resultados relativos à pesquisa sobre a expressão “Xuxa pedófila” ou qualquer outra que associasse o nome da autora a esta prática criminosa, a relatora da decisão, a Ministra Nancy Andrighi, definiu de maneira clara a controvérsia de que cuida este trabalho: o cotidiano de milhares de pessoas depende atualmente de informações que estão na web, e que dificilmente seriam encontradas sem a utilização das ferramentas de pesquisas oferecidas pelos sites de busca. Por outro lado, esses mesmos buscadores horizontais podem ser usados para a localização de páginas com informações, URLs prejudiciais resultantes da busca com o nome das pessoas. Diante disso, o que fazer? Existiria realmente um direito de ser esquecido, isto é, de ter uma URL resultante de uma pesquisa sobre o nome de uma pessoa desvinculado do índice de pesquisa do buscador horizontal? Há quem afirme que a medida mais apropriada para lidar com esse problema seria ir atrás do terceiro que publicou essa informação originariamente na web. Há também quem defenda que a proteção de um direito de ser esquecido representaria uma ameaça grande demais para a liberdade de expressão e de informação. Diante deste quadro, esta dissertação visa a estabelecer quais podem ser as características e os limites do direito ao esquecimento na era digital, de acordo com o estado atual da legislação brasileira a respeito, confrontando-se tal direito com outros direitos e interesses públicos e privados (especialmente o direito à liberdade de expressão e à informação) e levando em conta as características de funcionamento da própria rede mundial de computadores, em especial das ferramentas de buscas. Tendo em vista a importância dos buscadores horizontais no exercício do acesso à informação e, além disso, as dificuldades relacionadas à retirada de URLs de todos os sítios em que tenham sido publicadas, nossa pesquisa focará no potencial – e nas dificuldades – de se empregar a regulação de tais ferramentas de busca para a proteção eficaz do direito ao esquecimento na era digital.
Resumo:
This research aims to examine the phenomenon of sexual relations by observing the Social Network Badoo. As a means to achieve this objective, qualitative in-depth interviews were conducted online. The main question is to understand how the amorous expectations in the liquid modernity are configured. Added to that, there is as analysis categories the insight about relationships and the love experiences provided by the use of the Social Network Badoo. There are three initial hypotheses: 1) a time of transition is experienced, in which the liquid love in the proposed terms by Bauman (2004) was gaining ground and, as consequence, the relationships would be presenting themselves shorter, more open and with another interactive proposals for the relations. 2) The consuming practices of the liquid modernity can interpellate the relational practices molding them according to your logic. 3) It is assumed that the reasoning, inherent to the market, of the use followed by the disposal settles itself in the social behavior and this practice is accentuated by technology, through the use of the internet for the establishment of romantic relationships.the empirical analysis shows that both the vision on relationships as the amorous expectations in liquid modernity have as references the model of solid loving relationship, inherent to the traditional modernity. However it also demonstrates that the romantic experiences and practices refer to the liquid relationship model. Therefore, from these statements it is argued that there is in liquid modernity the cohabitation of the liquid and solid models of romantic relationships. In summary, this research aims to understand the contemporary love relationships across the spectrum of relationships that develop on the Internet Social Network: Badoo
Resumo:
In the two last decades of the past century, following the consolidation of the Internet as the world-wide computer network, applications generating more robust data flows started to appear. The increasing use of videoconferencing stimulated the creation of a new form of point-to-multipoint transmission called IP Multicast. All companies working in the area of software and the hardware development for network videoconferencing have adjusted their products as well as developed new solutionsfor the use of multicast. However the configuration of such different solutions is not easy done, moreover when changes in the operational system are also requirede. Besides, the existing free tools have limited functions, and the current comercial solutions are heavily dependent on specific platforms. Along with the maturity of IP Multicast technology and with its inclusion in all the current operational systems, the object-oriented programming languages had developed classes able to handle multicast traflic. So, with the help of Java APIs for network, data bases and hipertext, it became possible to the develop an Integrated Environment able to handle multicast traffic, which is the major objective of this work. This document describes the implementation of the above mentioned environment, which provides many functions to use and manage multicast traffic, functions which existed only in a limited way and just in few tools, normally the comercial ones. This environment is useful to different kinds of users, so that it can be used by common users, who want to join multimedia Internet sessions, as well as more advenced users such engineers and network administrators who may need to monitor and handle multicast traffic
Resumo:
Even living in the XXI century are still some difficulties in access to broadband Internet in several Brazilian cities, due to the purchasing power of people and lack of government investment. But even with these difficulties, we seek to encourage the use of wireless technology, which is based on the IEEE 802.11b protocol - also known as Wi-Fi (Wireless Fidelity) Wireless Fidelity Communications, having wide range of commercial applications in the world market, nationally and internationally. In Brazil, this technology is in full operation in major cities and has proved attractive in relation to the access point to multipoint and point-to-point. This paper is a comparative analysis of prediction field, using models based on the prediction of propagation loss. To validate the techniques used here, the Okumura-Hata models, modified Okumura-Hata, Walfisch-Ikegami model, were applied to a wireless computer network, located in the neighborhood of Cajupiranga in the city of Melbourn, in Rio Grande do Norte . They are used for networking wireless 802.11b, using the Mobile Radio to measure signal levels, beyond the heights of the antennas and distances from the transmitter. The performance data versus distance are added to the graphs generated and compared with results obtained through calculations of propagation models