6 resultados para Internet Environment
Resumo:
Objective
To examine the psychometric properties of an internet version of a children and young person's quality of life measure originally designed as a paper questionnaire.
Methods
Participants were 3,440 10 and 11 year old children in Northern Ireland who completed the KIDSCREEN-27 online as part of a general attitudinal survey. The questionnaire was animated using cartoon characters that are familiar to most children and the questions appeared on screen and were read aloud by actors.
Results
Exploratory principal component analysis of the online version of the questionnaire supported the existence of five components in line with the paper version. The items loaded on the components that would be expected based on previous findings with five domains - physical well-being,psychological well-being, autonomy and parents, social support and peers and school environment.Internal consistency reliability of the five domains was measured using Cronbach's alpha and the results suggested that the scale scores were reliable. The domain scores were similar to those reported in the literature for the paper version.
Conclusions
These results suggest that the factor structure and internal consistency reliability scores of the KIDSCREEN-27 embedded within an online survey are comparable to those reported in the literature for the paper version.
Resumo:
A research project in Web-enabled collaborative design and manufacture has been conducted. The major tasks of the project include the development of a Web-enabled environment for collaboration, online collaborative CAD/CAM, remote execution of large size programs (RELSP), and distributed product design. The tasks and Web/Internet techniques involved are presented first, followed by detail description of two approaches developed for implementation of the research: (1) a client-server approach for RELSP, where the following Internet techniques are utilized: CORBA, Microsoft’s Internet information server, Tomcat server, JDBC and ODBC; (2) Web-Services supported collaborative CAD which enables geographically dispersed designers jointly conduct a design task in the way of speaking and seeing each other and instantaneously modifying the CAD drawing online.
Resumo:
We present a novel Service Level Agreement (SLA)-driven service provisioning architecture, which enables dynamic and flexible bandwidth reservation schemes on a per-user or per-application basis. Various session level SLA negotiation schemes involving bandwidth allocation, service start time and service duration parameters are introduced and analyzed. The results show that these negotiation schemes can be utilized for the benefit of both end users and network providers in achieving the highest individual SLA optimization in terms of key Quality of Service (QoS) metrics and price. The inherent characteristics of software agents such as autonomy, adaptability and social abilities offer many advantages in this dynamic, complex, and distributed network environment especially when performing Service Level Agreements (SLA) definition negotiations and brokering tasks. This article also presents a service broker prototype based on Fujitsu's Phoenix Open Agent Mediator (OAM) agent technology, which was used to demonstrate a range of SLA brokering scenarios.
Resumo:
Software is patentable in Europe so long as there is sufficient ‘technical contribution’ under the decades-long interpretation of the European Patent Convention made by the Boards of Appeal of the European Patent Office. Despite the failure of the proposed Directive on Computer Implemented Inventions, opponents of software patents have failed to have any affect upon this technical contrivance. Yet, while national courts find the Boards of Appeal decisions persuasive, ‘technical contribution’ remains a difficult test for these various courts to apply. In this article I outline that the test is difficult to utilise in national litigation (it is an engineering approach, rather than a legal one) and suggest that as the Boards of Appeal become less important (and thus less persuasive) should the proposed Unified Patent Court come to fruition, the ‘technical contribution’ test is unlikely to last. This may again make the whole issue of what/whether/how software should be patentable open to debate, hopefully in a less aggressive environment than has existed to date.
Resumo:
Cloud computing is a technological advancementthat provide resources through internet on pay-as-you-go basis.Cloud computing uses virtualisation technology to enhance theefficiency and effectiveness of its advantages. Virtualisation isthe key to consolidate the computing resources to run multiple instances on each hardware, increasing the utilization rate of every resource, thus reduces the number of resources needed to buy, rack, power, cool, and manage. Cloud computing has very appealing features, however, lots of enterprises and users are still reluctant to move into cloud due to serious security concerns related to virtualisation layer. Thus, it is foremost important to secure the virtual environment.In this paper, we present an elastic framework to secure virtualised environment for trusted cloud computing called Server Virtualisation Security System (SVSS). SVSS provide security solutions located on hyper visor for Virtual Machines by deploying malicious activity detection techniques, network traffic analysis techniques, and system resource utilization analysis techniques.SVSS consists of four modules: Anti-Virus Control Module,Traffic Behavior Monitoring Module, Malicious Activity Detection Module and Virtualisation Security Management Module.A SVSS prototype has been deployed to validate its feasibility,efficiency and accuracy on Xen virtualised environment.