61 |
Industry 4.0 – the intended impact of Cyber Physical Systems in a Smart Factory on the daily business processes : A Study on BMW (UK) Manufacturing LimitedLiebert, Andreas January 2016 (has links)
Purpose: The purpose of this paper is to identify the opportunities that Industry 4.0 brings within the framework of applying Cyber Physical Systems in an environment of a Smart Factory. This paper shall identify the changes within daily business processes and the impact of these changes on the daily business life. Design/Methodology/Approach: The research is carried out as a case study research. Due to a qualitative approach for this case study interviews are conducted and the results are analyzed and discussed. Findings: Industry 4.0 will change the way we are working today and influence businesses and business processes in many ways. Data handling, processes and efficiency will change and the way we perceive manufacturing will change in a long term view. Further Research: It would be recommended to expand this research by conducting more research in this particular field as well as impacts on the employee should be studied more in detail.
|
62 |
Managing commitment in small construction professional services firmsMohyin, Nur January 2011 (has links)
Small construction professional services (CPS) firms are recognised as being vitally important to the UK construction industry as much of the professional capacity of the sector resides within these small practices. They rely on the capabilities of small groups of professional employees in delivering their services and so need to ensure their commitment to achieving organisational objectives. Clearly, human resource management (HRM) strategies have a major role to play in managing employee commitment, and yet such strategies have received little attention within the construction management literature. This study investigates the nature of construction professionals commitment within small CPS firms and to develop HRM interventions that foster organisational commitment in small CPS firms. The study adopts qualitative approach to enable gathering of rich data that come directly from the participants involved in the phenomenon. Exploratory interviews with managers of small CPS firms conducted in the early phase of the research helped to identify some of the key strategies and operational challenges related to the management of commitment. Following this, the main data was collected through conducting two in-depth case studies, which included one small quantity surveying practice in the East Midlands, UK, and one small multi-disciplinary practice in the West Midlands, UK. The case studies involve in-depth interviews involving the employer and employees, participation observation and document analysis at the main office of both organisations. Together, these data helped to unravel the nature of the employment relationship within such firms and also to gain a better understanding of how professional employees express their commitment. The findings reveal that professional employees commitment is influenced by a complex range of factors, but that five main HRM levers have a particular influence within such firms. These relate to job design, performance and career management, training and development, reward management and employee involvement. It is clear that a range of factors impinge on the abilities of employers to enact effective HRM strategies. In particular the recent economic crisis and personal problems have both been cited as the main challenges by the employer and employees of both organisations. It highlights the significant importance of managing organisational commitment much more effectively, regardless of the economic climate. Based on the research results a framework for managing professional commitment was developed and validated within a range of small CPS firms. The framework presents a holistic way of accounting for all the issues that influence the development and maintenance of organisational commitment within small CPS firms. Such knowledge is essential to the management of small CPS firms for achieving meaningful improvement in their approach to foster organisational commitment. The key recommendations for the management of small CPS firms is to make sure that every aspect of the job meets the professional employees expectations as well as project requirements and organisational objectives. This includes improving communication by utilising both formal and informal medium of communication, rewarding employees with both monetary and non-monetary rewards and developing employees by providing both on-the-job training and off-the job training. All these HRM practices need to be effectively linked and managed appropriately to collectively foster commitment. In conclusion, the complex nature of organisational commitment raised the importance for the management of small CPS firms to have a structured approach in managing their employees commitment.
|
63 |
Compilation d'architectures à flot de données à partir de programmes fonctionnelsSaint-Mleux, Xavier January 2006 (has links)
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
|
64 |
Latinos' Knowledge and Perceptions Towards Child Protective ServicesGracian, Ana R, Aguilar, Yanni 01 June 2017 (has links)
This study examined the knowledge and perceptions of the Latino population in Southern California towards Children Protective Services (CPS). Modern representation of social workers from the Department of Children and Family Services (DCFS), or Child Protective Services (CPS) often do not complement, support, or value the profession. This is a quantitative study with a sample of 103 Hispanic/Latino individuals ranging from the ages of 18 to over 60. An online Qualtrics survey was disseminated through social media and in person. It included a total of 26 questions measuring knowledge and perceptions. The purpose of this study was to better understand the Latino population as it relates to CPS, and create positive changes in the Latino communities CPS serves, with the hope to bring awareness and better service delivery.
|
65 |
Continuation-Passing C : Transformations de programmes pour compiler la concurrence dans un langage impératifKerneis, Gabriel 09 November 2012 (has links) (PDF)
La plupart des programmes informatiques sont concurrents : ils doivent effectuer plusieurs tâches en même temps. Les threads et les événements sont deux techniques usuelles d'implémentation de la concurrence. Les événements sont généralement plus légers et efficaces que les threads, mais aussi plus difficiles à utiliser. De plus, ils sont souvent trop limités ; il est alors nécessaire d'écrire du code hybride, encore plus complexe, utilisant à la fois des threads ordonnancés préemptivement et des événements ordonnancés coopérativement. Nous montrons dans cette thèse que des programmes concurrents écrits dans un style à threads sont traduisibles automatiquement en programmes à événements équivalents et efficaces par une suite de transformations source-source prouvées. Nous proposons d'abord Continuation-Passing C, une extension du langage C pour l'écriture de systèmes concurrents qui offre des threads très légers et unifiés (coopératifs et préemptifs). Les programmes CPC sont transformés par le traducteur CPC pour produire du code à événements séquentialisé efficace, utilisant des threads natifs pour les parties préemptives. Nous définissons et prouvons ensuite la correction de ces transformations, en particulier le lambda lifting et la conversion CPS, pour un langage impératif. Enfin, nous validons la conception et l'implémentation de CPC en le comparant à d'autres bibliothèques de threads et en exhibant notre seeder BitTorrent Hekate. Nous justifions aussi notre choix du lambda lifting en implémentant eCPC, une variante de CPC utilisant les environnements, et en comparant ses performances à celles de CPC.
|
66 |
Rekommendationer för införande av public key infrastructure / Recommendations for implementing Public Key InfrastructureAndersson, Johan January 2002 (has links)
<p>The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.</p>
|
67 |
Autour du lambda-calcul avec constructeursPetit, Barbara 13 July 2011 (has links) (PDF)
Le lambda calcul avec constructeurs (de Arbiser, Miquel et Rios) est une extension du lambda calcul avec un mécanisme de filtrage. Le filtrage à la ML y est décomposé en deux étapes: une analyse de cas sur des constantes (telle l'instruction "case" de Pascal), et une commutation de l'application avec la construction de filtrage. Cette règle de commutation entre deux constructions de natures différentes induit une géométrie de calcul surprenante, a priori incompatible avec les intuitions habituelles de typage. Cependant il a été montré que ce calcul est confluent, et vérifie la propriété de séparation (à la Böhm). Cette thèse propose un système de types du polymorphique pour ce calcul, et décrit ensuite un modèle de réalisabilité, qui adapte les candidats de réductibilité de Girard au lambda calcul avec constructeurs. La normalisation forte du calcul typé et l'absence d'erreur de filtrage lors de l'évaluation en découlent immédiatement. Nous nous intéressons ensuite à la sémantique du lambda calcul avec constructeurs non typé. Une notion générique de modèle catégorique pour ce calcul est définie, puis un modèle particulier (le modèle syntaxique dans la catégorie des PERs) est construit. Nous en déduisons un résultat de complétude. Enfin, nous proposons une traduction CPS du lambda calcul avec constructeurs dans le lambda calcul simplement typé avec paires. Le lambda calcul avec constructeurs peut ainsi être simulé dans un calcul bien connu, et cette traduction nous permet aussi de transformer tout modèle par continuation en modèle du lambda calcul avec constructeurs. Une équation catégorique caractéristique de ces modèles apparait alors, qui permet de construire des modèles non syntaxiques (dans les domaines) de Scott du lambda calcul avec constructeurs.
|
68 |
Sistema físico cibernético multiagente para monitoramento remoto de pacientes.MARTINS, Aldenor Falcão. 04 May 2018 (has links)
Submitted by Emanuel Varela Cardoso (emanuel.varela@ufcg.edu.br) on 2018-05-04T17:30:47Z
No. of bitstreams: 1
ALDENOR FALCÃO MARTINS – DISSERTAÇÃO (PPGEE) 2015.pdf: 15602466 bytes, checksum: 608173ca67ff68da8ae45b321aa82204 (MD5) / Made available in DSpace on 2018-05-04T17:30:47Z (GMT). No. of bitstreams: 1
ALDENOR FALCÃO MARTINS – DISSERTAÇÃO (PPGEE) 2015.pdf: 15602466 bytes, checksum: 608173ca67ff68da8ae45b321aa82204 (MD5)
Previous issue date: 2015-04-24 / Segundo o IBGE em 2013, o Brasil apresentava 13% de sua população composta
por pessoas acima de 65 anos, somado a isto, o estilo de vida das sociedades ocidentais tem facilitado o aparecimento de doenças crônicas cada vez mais cedo. A
premissa é que tornemos mais eficiente a utilização do nosso sistema de saúde, pois
este é um recurso escasso. Uma forma de melhorar esta eficiência é assegurar que
os tratamentos prescritos serão devidamente seguidos. Quando o paciente se encontra no hospital uma gama de recursos monitora a saúde do paciente oferecendo
acompanhamento seguro na eventualidade de um desvio, alertando e armazenando
as informações do paciente no decorrer de suas atividades. Um recurso que ajuda
no acompanhamento deste paciente é a monitoração remota do paciente, que possibilita que sensores enviem a informação da condição de saúde do paciente e
permitam o acompanhamento do mesmo. Sistemas Físicos Cibernéticos (SFC) são
entidades computacionais ligadas em rede que operam entidades no mundo físico
de maneira cooperativa. Tais sistemas podem ser utilizados em redes de monitoramento remoto de pacientes com o fim de apresentar e ajustar o tratamento de
acordo com as recomendações do médico. Este trabalho propõe um passo na direção da autonomia, que permita uma melhor qualidade de vida ao paciente crônico,
permitindo que situações conhecidas e dentro de um regime de segurança previamente determinado pelo médico sejam ajustadas. Este trabalho apresenta uma
proposta de um Sistema Físico Cibernético (SFC), que permite que adequações
ao tratamento previamente elaboradas sejam colocadas em planos de tratamento
por meio de agentes inteligentes e de planejadores SAT e sejam disponibilizadas
de acordo com a mudança da condição do paciente, através de uma rede monitoramento do paciente, seguindo padrões estabelecidos para dispositivos médicos
utilizados em casa que disponibiliza o tratamento ao paciente. O modelo proposto
é indicado para o acompanhamento em casa de doenças crônicas através de um
coletor central responsável pela coordenação do acompanhamento do paciente. / According to IBGE in 2013 13% of the population had 60 or more years old. As the national population ages, we have to move towards more efficient use of SUS. A way to improve is the closer followup of patient’s evolution by the healthcare professional. At the hospital the patient has access to a set of equipments and expert knowledge capable to correct the treatment path. From this scenario it is easy to imply the need for a change, the current status quo is unbearable financially and cumbersome for patient and doctor routines. A resource that helps is the remote patient monitoring (RPM) , where sensors provide the latest information about patient’s health status and are able to suggest a course correction on the treatment path. A Cyber-Physical System (CPS) is a network
of interacting computational entities with physical inputs and outputs that work
together towards a goal. A CPS can be part of a RPM in order to present and
adjust the treatment according to the healthcare professional recommendations.
This work offers a framework for situations where the medical expert knowledge
is complete allowing changes on the treatment path be adjusted with minimum
risk. Our proposal to deal with the problem is a CPS based remote patient monitoring network where a model for the system is developed based on Multiagent
Agent System (MAS) and automatic planning system based on SAT, allowing safe
and minimal course correction on treatment paths already set for a patient. This
proposal operates through a central hub element responsible to coordinate the
followup of the patient.
|
69 |
Rekommendationer för införande av public key infrastructure / Recommendations for implementing Public Key InfrastructureAndersson, Johan January 2002 (has links)
The use of insecure networks -such as the Internet- to send and receive information has made the need for preventing unauthorised people reading it yet more important. One of the easiest way to do this is through public key cryptography. However, the problem with this solution is how to tie a specific public key to a certain subject. This is solved by letting a trusted third party issue a certificate that holds, as a minimum, the name of the subject and the subject's public key along with the issuer's digital signature on the information. The rules we make for issuing, revoking and verifying of certificates and the entities that are being used to do so are called PKI - Public Key Infrastructure. In this thesis we shall se what PKI really is in a more detailed way and which entities it constitutes of. We will also investigate some of the areas in which we could make use of it, for instance secure e-mail and virtual private networks. Next, we will look into some of the drawbacks with PKI and what you should think of in order to aviod these. Finally, we'll give recommendations for the implementation itself. As for the theory of cryptography, the basics is presented to the interested reader in a separate appendix.
|
70 |
Representation of asynchronous communication protocols in Scala and AkkaEriksson, Joakim January 2013 (has links)
This thesis work investigates how to represent protocols for asynchronous communication in the Scala programming language and the Akka actor framework, to be run on Java Virtual Machine (JVM). Further restrictions from the problem domain - the coexistence of multiple protocol instances sharing the same Java thread - imply that neither an asynchronous call waiting for response nor anything else can block the underlying Java threads. A common way to represent asynchronous communication protocols is to use state machines. This thesis seeks a way to shrink the size of and to reduce the complexity of the protocol implementations by representing sequences of asynchronous communication calls (i.e. sequences of sent and received messages) as a type of procedure. The idea is find a way to make the procedures that contain asynchronous calls look like synchronous communication procedures by hiding the asynchronous details. In other words, the resulting procedure code should show what to do and not so much focus on how to overcome the impediment of the asynchronous calls. With the help of an asynchronous communication protocol toy example, this report shows how such an protocol can be implemented with a combination of a state machine and a procedure representation in Scala and Akka. The procedure representation hides away the asynchronous details by using the Scala capability to use CPS-transformed delimited continuations. As a sub-problem, this thesis also shows how to safely schedule asynchronous communication timeouts with help of Scala and Akka within the restrictions of the thesis problem domain.
|
Page generated in 0.0431 seconds