...Universidade de Coimbra Faculdade de Ciências e Tecnologia DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Protocolos de Comunicação 2 Introdução ao nesC Aula Prática nº1 Ano Lectivo de 2013/2014 CrossBow® This first application that you are going to study is called MyApp. As the name suggests it uses one of the timers on the ATmega128L Mote. The timer will be set to fire continuously every second and the Mote red LED will toggle on and off to show this visually. So why go through the trouble of this program? To help the developer unfamiliar with TinyOS, nesC & Motes gain more confidence in embedded programming concepts before tackling more complex applications. The steps that you’ll take to build the application will be as follows: Enter in all necessary code and auxiliary files Build (compile) and download the application Take a closer look at the code and auxiliary files 1. Hardware Requirements This task requires the following hardware: - One Mote: standard editions of MICAz (MPR2400) - One gateway / programming board: MIB520 and the associated hardware (cables, power supply) for each - A Windows PC with MoteWorks installed 2. A simple nesC program: MyApp To get started the first thing to do is to create the application folder (directory) where all your application code and other files will be stored. 1. Change into the directory /MoteWorks/apps/tutorials/ and create a new subfolder (subdirectory) that should have the name as your application is to be called. In this...
Words: 1121 - Pages: 5
...Steps for Installation of TinyOS 2.1.1 over Ubuntu Installing Ubuntu 1. 2. 3. 4. Go to Ubuntu.com Select Get Ubuntu Now Select Run it with Windows Click Start Download. The file you will download is called wubi.exe (also uploaded on course schedule) 5. Install Ubunutu by running the wubi.exe file Installing TinyOS 2.1.1 1. Open Dash home on the top left corner of the desktop screen 2. Search for Terminal and Open a Terminal (i.e., console) 3. Type the following line: $ sudo gedit /etc/apt/sources.list 4. In the file sources.list that would be opened add the following lines at the end of the file and save and close the file afterwards : #tinyos deb http://hinrg.cs.jhu.edu/tinyos oneiric main 5. Back in the terminal (i.e., console) type the following lines: $ sudo apt-get update $ sudo apt-get install tinyos-2.1.1 6. After installation is complete, in the terminal (i.e., console) type the following line: $ gedit ~/.bashrc 7. In the file .bashrc that would be opened add the following lines at the end of the file and save and close the file afterwards : export TOSROOT=/opt/tinyos-2.1.1 export TOSDIR=$TOSROOT/tos export CLASSPATH=$TOSROOT/support/sdk/java/tinyos.jar:.:$CLASSPATH export MAKERULES=$TOSROOT/support/make/Makerules export PATH=/opt/msp430/bin:$PATH #Sourcing the tinyos environment variable setup script source /opt/tinyos-2.1.1/tinyos.sh 8. Type exit in the terminal (i.e., console) to close it 9. Open a new terminal, if everything went well you should see a message on top...
Words: 519 - Pages: 3
...2010 Fourth International Conference on Network and System Security Security-oriented Workflows for the Social Sciences Prof. Richard O. Sinnott, University of Melbourne, Melbourne, Victoria, 3010, Australia, rsinnott@unimelb.edu.au Sardar Hussain National e-Science Centre University of Glasgow, Glasgow G122 8QQ, Scotland s.hussain@nesc.gla.ac.uk Abstract — The service-oriented computing paradigm and its application to support e-Infrastructures offers, at least in principle, the opportunity to realise platforms for multi- and inter-disciplinary research. Augmenting the service-oriented model for e-Research are mechanisms for services to be coupled and enacted in a coordinated manner through workflow environments. Typically workflows capture a research process that can be shared and repeated by others. However, existing models of workflow definition and enactment assume that services are directly available and can be accessed and invoked by arbitrary users or enactment engines. In more security-oriented domains, such assumptions rarely hold true. Rather in many domains, service providers demand to be autonomous and define and enforce their own service / resource access control using locally defined policy enforcement points (PEP) and policy decision points (PDP) which allow access and usage of resources to be strictly monitored and enforced. In this paper, we outline how it is possible to support security-oriented workflow definition and enactment through chaining...
Words: 6322 - Pages: 26
...Mark Dissen 4/15/2013 Nuclear Arms Race Term Paper The Nuclear Threat During the Berlin Crisis Introduction On November 10, 1958, Soviet Premier Nikita Khrushchev gave a speech at a Soviet-Polish meeting in Moscow that would ultimately culminate into one of the most profound crises of the Cold War. The Soviet leader accused the Western Powers of violating the 1945 Potsdam Agreement and sabotaging the German Democratic Republic (GDR) and recommended that the Federal Republic abandon, “the hope that we shall cease to support the German Democratic Republic.” (Address by Premier, 1958). Soon after, Khrushchev delivered a speech giving an ultimatum to the allies and gave them six months to demilitarize West Berlin. The Allies' subsequent refusal and the resulting tension put both the U.S.S.R. and the United States in a particularly dangerous situation. Although it is unlikely that full-out thermonuclear war would have resulted from the Berlin Crisis, there was a very real threat of a limited nuclear strike or conventional warfare to both of the superpowers until the tension over Berlin was assuaged. Although November 1958 marked the official beginning of the crisis, Berlin had been a source of contention between the US and the Soviets from the initial division of Germany after WWII (Tine, 2005). The three territorial zones in Western Germany, controlled by France, Britain, and the US, contrasted greatly with the Soviet-controlled East, which upheld socialism. Berlin itself...
Words: 3913 - Pages: 16
... NALANDA NEERAJ PHIL-315 13609044 FINAL 1) Explain Friedman’s arguments about social responsibility? In 1970 Milton Friedman wrote that "there is one and only one social responsibility of business--to use its resources and engage in activities designed to increase its profits so long as it stays within the rules of the game, which is to say, engages in open and free competition without deception or fraud." That's the orthodox view among free market economists: that the only social responsibility a law-abiding business has is to maximize profits for the shareholders. Friedman’s article also contains a much less discussed point that deserves more attention. In particular, I believe it should be taken more seriously by people ideologically opposed to the values associated with Friedman. The simple point is how Friedman argues that acceptance of CSR(Corporate Social Responsibility) “involves the acceptance of the socialist view”. For Friedman, the logical step from CSR to socialism means that companies should not engage in CSR. For me, it means that now that the companies are making CSR claims all over the place, socialists might want to point out the ideological dilemmas of this practice. As the power of big corporations has become increasingly evident, their legitimacy may erode if they stop making claims about their social responsibility. The dilemma is that if and when they continue making these claims, they implicitly accept that capitalist...
Words: 1413 - Pages: 6
...removed and added to the program. With the results of the study conducted, it is recommended that the Administrator of this program must give more attention on the curriculum in order for the students to be able to acquire the necessary learning for the course, as well as to lessen the subjects that are important. Furthermore, it is recommended for the future researchers to use this study in assessing the employment rate of students who graduated from the BS HRM program and to verify if the objectives stated from the program have been attained 1. Introduction Changing of curriculum for the past years is very usual and common in the academe. From the first curriculum of education which is NELC (New Elementary Curriculum) and NESC (New Secondary Education Curriculum) up to this time the K-12 Basic Education Curriculum. There are several major reasons for assessing the curriculum. These are: to identify aspects of a curriculum that are working and those that need to be changed; to assess the effectiveness of changes that have already been made; to...
Words: 2376 - Pages: 10
...RESOURCES COMMUNITY DEVELOPMENT AND PUBLIC POLICY guidance on the application of community development approaches to different aspects of anti-poverty and social inclusion work €10 Siobhán Lynam Bridgewater Centre, Conyngham Road, Islandbridge, Dublin 8 Tel: 01 670 6746 Fax: 01 670 6760 Email: info@combatpoverty.ie Website: www.combatpoverty.ie COMMUNITY DEVELOPMENT AND PUBLIC POLICY Siobhán Lynam Community Development and Public Policy 1 © 2006 ISBN: 1-905485-11-5 While every effort has been made to ensure that the information contained in this book is accurate, no legal responsibility is accepted by the author or Combat Poverty for any errors or omissions. The views expressed in this publication are the author’s own and not necessarily those of Combat Poverty Agency. 2 Community Development and Public Policy CONTENTS Acknowledgements Preface 4 5 Introduction Background to the publication Structure of the publication 6 6 Section 1: Defining public policy 1.1 What is public policy? 1.2 How is policy made? 1.3 The public policy cycle 1.4 Example of a community organisation’s impact on policy 7 7 8 13 16 Section 2: A community-development approach to policy making 2.1 Giving voice to excluded groups 2.2 Characteristics of a community-development approach 2.3 Value of adopting a community-development approach 18 18 19 21 Section 3: Influencing public policy making 3.1 Develop a policy...
Words: 13791 - Pages: 56
...6.0 Se Factor 6 - Safety Program XXXXX Safety Program is described in this section as required by the RFP. Copies of any documents not included with this proposal as an Attachment, Appendix or Exhibit will be provided immediately upon request. 6.1 Required Safety Forms and Data and Experience Modification Rate (EMR): XXXXX’ and its significant subcontractors’ Safety Forms and Data are included in this section as required by the RFP. 6.1.1 XXXXX Experience Modification Rate (EMR) (Insert Form Here) 6.1.2 OSHA Form 300A Summary of Work-Related Injuries and Illnesses Reports (Insert Form Here) 6.1.3 OSHA Total Recordable Cases Incidence Rate (TCIR) (Insert Form Here) 6.1.4 Days Away from Work, Job Transfer, or Restriction (DART) Rate (Insert Form Here) 6.1.5 Data and Trends Narrative (Need whatever explanation SME’s are going to use to explain away our “High Risk” to “Extremely High Risk” rating in these categories) 6.2 Significant Subcontractors’ Experience Modification Rate (EMR) (Insert Form Here) 6.2.1 Significant Subcontractors’ OSHA Form 300A (Insert Form Here) 6.2.3 Significant Subcontractors’ OSHA (TCIR) Rate (Insert Form Here) 6.2.4 Significant Subcontractors’ (DART) Rate (Insert Form Here) 6.2.5 Significant Subcontractors’ Data and Trends Narrative (Insert Form Here) 6.3 Safety Program and Procedures XXXXX approach to Safety on all worksites includes adherence to contract-specific safety requirements...
Words: 3195 - Pages: 13
...Kenya Vision 2030 REPUBLIC OF KENYA July - August, 2007 This publication is a summary of Kenya’s new long-term national planning strategy, officially known as Kenya Vision 2030. The publication briefly states the main goals of the Economic, Social and Political pillars that underpin the Vision 2030. It also provides a run-down of major, (or flagship) projects to be embarked upon in the Medium Term period of the Vision, i.e from 2008-2012. The final version of Vision 2030 will be completed after this and other consultations. Kenya Vision 2030 THE CONTEXT OF KENYA VISION 2030 Kenya Vision 2030 is the new country’s development blueprint covering the period 2008 to 2030. It aims at making Kenya a newly industrializing, “middle income country providing high quality life for all its citizens by the year 2030”. The Vision has been developed through an all-inclusive stakeholder consultative process, involving Kenyans from all parts of the country. The vision is based on three “pillars” namely; the economic pillar, the social pillar and the political pillar. This vision’s programme plan comes after the successful implementation of the Economic Recovery Strategy for Wealth and Employment Creation (ERS) which has seen the country’s economy back on the path to rapid growth since 2002, when GDP grew at 0.6% rising to 6.1% in 2006. The relationships between the pillars can be seen in Exhibit One below. The economic pillar aims at providing prosperity...
Words: 7145 - Pages: 29
...Kenya Vision 2030 A Globally Competitive and Prosperous Kenya October 2007 THE NATIONAL ANTHEM Swahili Ee Mungu nguvu yetu Ilete baraka kwetu Haki iwe ngao na mlinzi Natukae na undugu Amani na uhuru Raha tupate na ustawi Amkeni ndugu zetu Tufanye sote bidii Nasi tujitoe kwa nguvu Nchi yetu ya Kenya Tunayoipenda Tuwe tayari kuilinda Natujenge taifa letu Ee, ndio wajibu wetu Kenya istahili heshima Tuungane mikono Pamoja kazini Kila siku tuwe na shukrani English O God of all creation Bless this our land and nation Justice be our shield and defender May we dwell in unity Peace and liberty Plenty be found within our borders Let one and all arise With hearts both strong and true Service be our earnest endeavour And our homeland of Kenya Heritage of splendour Firm may we stand to defend Let all with one accord In common bond united Build this our nation together And the glory of Kenya The fruit of our labour Fill every heart with thanksgiving FOREWORD The unveiling of Kenya Vision 2030 marks an important milestone in our country’s development as it comes soon after the successful implementation of the “Economic Recovery Strategy for Wealth and Employment Creation” (ERS) over the period 2003 to-date. The Kenya economy has now recovered from the slow growth rate of 0.6 percent in 2002 to a projected growth of over 7 percent in 2007. Indeed, the last five years represent the best phase of sustained economic growth in our country in all sectors of our economy notably; agriculture...
Words: 24420 - Pages: 98
...Regional intergration List of acronyms AERC African Economic Research Consortium ASEAN Association of Southeast Asian Nations AU African Union AUC African Union Commission CBI Cross Border Initiative CEPGL Economic Community of the Great Lakes (Communauté Economique des Pays des Grand Lacs) CET Common External Tariff CHE Commission for Higher Education (Kenya) CIEREA Conference of Economics Research and Training Institutions in Francophone Africa CIRES Ivorian Centre for Social and Economic Research CM Common Market COMESA Common Market for Eastern and Southern Africa COBET Complementary Basic Education in Tanzania CODESRIA Council for the Development of Social Science Research in Africa COMESA Common Market for Eastern and Southern Africa CPI Consumer Price Index CRE Christian Religious Education CSAE Centre for the Study of African Economies, University of Oxford CSO Civil Society Organization CU Customs Union EA East Africa EACSCO East African Common Services Organization EABC East African Business Council EAC East African Community EADB East African Development Bank EAHC East African High Commission EARISC East Africa Regional Integration and Scientific Cooperation ECCAS Economic Community of Central African States ECDE Early Childhood Development Education ECOWAS Economic Community of West African States EPA Economic Partnership Agreement EAPF East African Political Federation EPZ ...
Words: 12144 - Pages: 49
...REPUBLIC ACT No. 9593 Tourism Act of 2009 and otherwise known as Its Implementing Rules and Regulations DOT Manual Guides.indd_edited.indd 1 1/26/2010 1:33:03 PM DOT Manual Guides.indd_edited.indd 2 1/26/2010 1:34:00 PM REPUBLIC ACT No. 9593 AN ACT DECLARING A NATIONAL POLICY FOR TOURISM AS AN ENGINE OF INVESTMENT, EMPLOYMENT, GROWTH AND NATIONAL DEVELOPMENT, AND STRENGTHENING THE DEPARTMENT OF TOURISM AND ITS ATTACHED AGENCIES TO EFFECTIVELY AND EFFICIENTLY IMPLEMENT THAT POLICY, AND APPROPRIATING FUNDS THEREFOR Be it enacted by the Senate and the House of Representatives of the Philippines in Congress assembled: CHAPTER I GENERAL PROVISIONS SECTION 1. Short Title. – This Act shall be known as “The Tourism Act of 2009.” SECTION 2. Declaration of Policy. – The State declares tourism as an indispensable element of the national economy and an industry of national interest and importance, which must be harnessed as an engine of socio-economic growth and cultural affirmation to generate investment, foreign exchange and employment, and to continue to mold an enhanced sense of national pride for all Filipinos. Towards this end, the State shall seek to: (a) Ensure the development of Philippine tourism that is for and by the Filipino people, conserve and promote their heritage, national identity and sense of unity; (b) Recognize sustainable tourism development as integral to the national socio- economic development efforts to improve the quality of life of the...
Words: 45022 - Pages: 181
...WIRELESS SENSOR NETWORK COVERAGE: DEMONSTARTING POWER SAVINGS AND LIMITATIONS WITH MINIMIZED COVERAGE BY SIDNEY I. RUBEY A thesis submitted to the Graduate faculty of the University of Colorado at Colorado Springs in partial fulfillment of the requirements for the degree of Master of Science Department of Computer Science 2011 This thesis for Master of Science degree by Sidney I. Rubey has been approved for the Department of Computer Science by ------------------------------------------------------------------------ Dr. C. Edward Chow, Chair ------------------------------------------------------------------------ Dr. Terrance E. Boult ------------------------------------------------------------------------ Dr. Xiaobo Zhou ----------------------------------------- Date Abstract This paper explores the competing issues of coverage efficiency and power available in wireless sensor networks. Specifically, a shortest distance routing protocol is implemented, and total network system lifetimes are determined using a variety of small percentages of the available system nodes. Using a network simulator developed in Java, wireless sensor nodes are simulated, and power consumption algorithms are included in each node that take into consideration all aspects of power consumption in the operation of the node. Simulating different coverage schemes on the same network system, same initial power sources, and routing protocol, an increase of overall system lifetime of 900% is demonstrated...
Words: 15836 - Pages: 64
...ªtefan Stanciu Mihaela Ionescu Managementul resurselor umane CUPRINS CAPITOLUL 1 – Introducere în managementul resurselor umane / 11 1.6. Managementul resurselor umane / 41 1.6.1. Concepte / 41 1.6.2. Obiective privind resursele umane / 43 1.6.3. Departamentul de resurse umane / 44 CAPITOLUL 2 – Manageri [i leadership / 57 2.1. Managerii / 57 2.1.1. Caracterizare general` / 57 2.1.2. Profiluri manageriale / 60 2.1.3. Caracteristicile managerilor / 64 2.2. Managerii de resurse umane / 73 2.3. Delegarea / 77 2.4. Decizia – func]ie esen]ial` a conducerii / 79 2.4.1. Concepte / 79 2.4.2. Tipuri de decizie / 81 2.4.3. Decizia de grup / 83 2.4.4. Etapele procesului decizional / 85 2.5. Leadership / 91 2.6. Dezvoltarea competen]elor managerilor / 100 2.7. Aplica]ii [i studii de caz / 102 CAPITOLUL 3 – Strategii, politici [i planuri privind resursele umane / 111 3.1. Strategii / 111 3.1.1. Schimbarea organiza]ional` / 111 3.1.2. Planificarea strategic` / 115 3.1.3. Cerin]e [i linii strategice / 116 3.1.4. În ce const` strategia de personal? / 117 3.1.5. Op]iuni strategice / 119 3.2. Politici de personal / 121 3.2.1. Caracteristicile politicilor tradi]ionale / 121 3.2.2. Caracteristicile politicilor moderne / 122 3.2.3. Politici cu spectru larg / 126 3.2.4. Politici privind plec`rile voluntare / 130 3.2.5. Previziunea [i planificarea personalului / 131 3.3. Prognoza resurselor umane / 136 3.4. Tendin]e în domeniul resurselor umane / 137 3.5. Practici privind personalul...
Words: 88681 - Pages: 355