996 resultados para Abstract


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As a result of the growing adoption of Business Process Management (BPM) technology different stakeholders need to understand and agree upon the process models that are used to configure BPM systems. However, BPM users have problems dealing with the complexity of such models. Therefore, the challenge is to improve the comprehension of process models. While a substantial amount of literature is devoted to this topic, there is no overview of the various mechanisms that exist to deal with managing complexity in (large) process models. It is thus hard to obtain comparative insight into the degree of support offered for various complexity reducing mechanisms by state-of-the-art languages and tools. This paper focuses on complexity reduction mechanisms that affect the abstract syntax of a process model, i.e. the structure of a process model. These mechanisms are captured as patterns, so that they can be described in their most general form and in a language- and tool-independent manner. The paper concludes with a comparative overview of the degree of support for these patterns offered by state-of-the-art languages and language implementations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Disability following a stroke can impose various restrictions on patients’ attempts at participating in life roles. The measurement of social participation, for instance, is important in estimating recovery and assessing quality of care at the community level. Thus, the identification of factors influencing social participation is essential in developing effective measures for promoting the reintegration of stroke survivors into the community. Data were collected from 188 stroke survivors (mean age 71.7 years) 12 months after discharge from a stroke rehabilitation hospital. Of these survivors, 128 (61 %) had suffered a first ever stroke, and 81 (43 %) had a right hemisphere lesion. Most (n = 156, 83 %) were living in their own home, though 32 (17 %) were living in residential care facilities. Path analysis was used to test a hypothesized model of participation restriction which included the direct and indirect effects between social, psychological and physical outcomes and demographic variables. Participation restriction was the dependent variable. Exogenous independent variables were age, functional ability, living arrangement and gender. Endogenous independent variables were depressive symptoms, state self-esteem and social support satisfaction. The path coefficients showed functional ability having the largest direct effect on participation restriction. The results also showed that more depressive symptoms, low state self-esteem, female gender, older age and living in a residential care facility had a direct effect on participation restriction. The explanatory variables accounted for 71% of the variance in explaining participation restriction. Prediction models have empirical and practical applications such as suggesting important factors to be considered in promoting stroke recovery. The findings suggest that interventions offered over the course of rehabilitation should be aimed at improving functional ability and promoting psychological aspects of recovery. These are likely to enhance stroke survivors resume or maximize their social participation so that they may fulfill productive and positive life roles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

FOS, the Fleck Operating System, is a new operating system that implements cooperative threads—providing a simple and productive environment for applications programmers. This paper discusses sensor network operating systems in general and places this development in context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication security for wireless sensor networks (WSN) is a challenge due to the limited computation and energy resources available at nodes. We describe the design and implementation of a public-key (PK) platform based on a standard Trusted Platform Module (TPM) chip that extends the capability of a standard node. The result facilitates message security services such as confidentiality, authenticity and integrity. We present results including computation time, energy consumption and cost.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the design and deployment results for PosNet - a large-scale, long-duration sensor network that gathers summary position and status information from mobile nodes. The mobile nodes have a fixed-sized memory buffer to which position data is added at a constant rate, and from which data is downloaded at a non-constant rate. We have developed a novel algorithm that performs online summarization of position data within the buffer, where the algorithm naturally accommodates data input and output rate mismatch, and also provides a delay-tolerant approach to data transport. The algorithm has been extensively tested in a large-scale long-duration cattle monitoring and control application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Java programming language has potentially significant advantages for wireless sensor nodes but there is currently no feature-rich, open source virtual machine available. In this paper we present Darjeeling, a system comprising offline tools and a memory efficient run-time. The offline post-compiler tool analyzes, links and consolidates Java class files into loadable modules. The runtime implements a modified Java VM that supports multithreading and is designed specifically to operate in constrained execution environments such as wireless sensor network nodes and supports inheritance, threads, garbage collection, and loadable modules. We have demonstrated Java running on AVR128 and MSP430 microcontrollers at speeds of up to 70,000 JVM instructions per second.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces an energy-efficient Rate Adaptive MAC (RA-MAC) protocol for long-lived Wireless Sensor Networks (WSN). Previous research shows that the dynamic and lossy nature of wireless communication is one of the major challenges to reliable data delivery in a WSN. RA-MAC achieves high link reliability in such situations by dynamically trading off radio bit rate for signal processing gain. This extra gain reduces the packet loss rate which results in lower energy expenditure by reducing the number of retransmissions. RA-MAC selects the optimal data rate based on channel conditions with the aim of minimizing energy consumption. We have implemented RA-MAC in TinyOS on an off-the-shelf sensor platform (TinyNode), and evaluated its performance by comparing RA-MAC with state-ofthe- art WSN MAC protocol (SCP-MAC) by experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper attempts to address some fundamental issues faced by new and emerging researchers in the discipline of Fashion design. A culture of patchwork research methodology appears to have become the norm in an attempt to ‘fit’ fashion design research into an academic paradigm for the examination of readers from more traditional research fields such as Arts, Humanities, Science and Philosophy. Two key questions are discussed here; is it appropriate for fashion researchers to adopt and adapt existing research methodologies to find a scholarly, academic voice? Secondly; do these methodologies enable fashion design research to be effectively disseminated to professionals and fellow researchers within the discipline of fashion design?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the work of Brisbane artist Gemma Smith. It investigates the artist's career and her developmental abstract paintings and sculptures. It argues that the artist is fundamentally intuitive in her approach to the genre and also employs mimicry of certain abstract styles as a means through which to develop her own creative outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While the fashion industry is normally first to recognise trends and embrace creativity, fashion designers are sometimes the last to acknowledge that business acumen and entrepreneurial skills are needed. However, fashion designers and entrepreneurs are now all members of the new ‘creative’ global marketplace with its inherent need to sell globally and be competitive with international brands. For the Australian industry, this tension creates enormous pressures due to Australia’s small population (and market/s), the decreasing textile and manufacturing base, the increase of ‘creative’ micro businesses and with this the increasing number of young Australians wanting to start their own fashion business. This paper highlights the current size of the Australian fashion industry, the trend for small business models, the ‘career portfolio’ entrepreneur and strategies Australian universities are undertaking to address students wishing to enter the business of fashion. It also identifies case studies where enterprise learning pedagogy has been successfully implemented into the business education of an Australian fashion program and concludes with recommendations for an enterprise pedagogy that creates authentic learning, while working with industry and community stakeholders in flexible university formats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.