37 resultados para ARCHITECTURE - INVESTIGATIONS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multimedia-sanomanvälityspalvelu (MMS) on matkapuhelinten väliseen viestintään kehitetty palvelu, joka mahdollistaa yhteyden Internet maailmaan. Multimedia-sanomanvälityspalvelua voidaan käyttää luomaan yhteys matkapuhelimen käyttäjän ja ulkoisen sovelluspalvelimen välille. MMS voidaan nähdä sovelluksena, joka yhdistää multimediaviestin luonnin, käsittelyn sekä toimituksen monelle eri sisältö tyypille. Multimedia-viestikeskus (MMSC) on uusi verkkoelementti, joka on vastuussa multimediaviestien varastoinnista ja toimituksesta. Multimedia-viestikeskuksella on kolme loogista elementtiä, jotka ovat välityspalvelin, sovellusrajapinnat ja matkapuhelinverkkorajapinta. Operaattorit sekä kolmannen osapuolen sovelluskehittäjät voivat kehittää lisäarvopalveluita multimedia-sanomanvälityspalvelulle hyödyntämällä sovellusrajapintoja. Sovellusrajapinnat perustuvat olemassa oleviin Internet protokolliin. Tämä diplomityö tutkii Multimedia-sanomanvälityspalvelun verkkoelementtien rajapintoja. Tulevaisuudessa on tarkoitus lisätä Multimedia-sanomanvälityspalvelun verkkoelementtejä sähköisen kaupankäynnin kehysarkkitehtuuriin, joka perustuu komponentteihin.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobiiliviestintään käytetystä lyhytsanomapalvelusta (Short Messaging Service, SMS) on tullut ilmiömäinen menestys. SMS-palvelulle on tulossa seuraaja, jota kutsutaan monimediaviestipalveluksi (Multimedia Messaging Service, MMS). MMS-viestit voivat sisältää useita erilaisia kuva-, ääni- ja videoformaatteja. Vaikka yhteensopimattomia SMS-keskuksia yhdistämään tarvitaan Intellitel Messaging Gatewayn kaltaisia sanomanvälitystuotteita, ei tällainen SMS-keskeinen lähestyminen sanomanvälitykseen ole MMS-kykyisen sanomanvälittimen kannalta järkevä ratkaisu. MMS-kykyisen sanomanvälittimen täytyy lisätä arvoa itse sanomanvälitysprosessiin, jotta tuotteesta tulisi menestyksekäs. Tässä työssä käsitellään MMS-sanomanvälityksen ongelmallisuuksia. Erityisesti painotetaan MMS-kykyisen sanomanvälittimen kehittämistä olemassaolevasta SMS-sanomanvälitintuotteesta, sekä selvitetään syitä arvonlisäyksen välttämättömyydelle. Työssä esitetään myös erilaisia arvonlisäystapoja MMS-sanomanvälitykseen. Eräitä esitetyistä arvonlisäystavoista käytetään käytännön osassa toteutetussa Nokian MMS-keskuksen MM7/VAS-rajapintaan kytkeytymään kykenevässä sanomanvälityskomponentissa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mitä on läsnäolo? Tämä työ määrittelee läsnäolon tietyn henkilön, laitteen tai palvelun halukkuudeksi kommunikoida. Nykyään on olemassa lukuisia läsnäolotietoa levittäviä sovelluksia, joista jokainen käyttää erilaista protokollaa tehtävän suorittamiseen. Vasta viime aikoina sovellusten kehittäjät ovat huomanneet tarpeen yhdelle sovellukselle, joka kykenee tukemaan lukuisia läsnäoloprotokollia. Session Initiation Protocol (SIP) voi levittää läsnäolotietoa muiden ominaisuuksiensa lisäksi. Kun muita protokollia käytetään vain reaaliaikaiseen viestintään ja läsnäolotiedon lähetykseen, SIP pystyy moniin muihinkin asioihin. Se on alunperin suunniteltu aloittamaan, muuttamaan ja lopettamaan osapuolien välisiä multimediaistuntoja. Arkkitehtuurin toteutus käyttää kahta Symbian –käyttöjärjestelmän perusominaisuutta: asiakas-palvelin rakennetta ja kontaktitietokantaa. Asiakaspalvelin rakenne erottaa asiakkaan protokollasta tarjoten perustan laajennettavalle usean protokollan arkkitehtuurille ja kontaktitietokanta toimii läsnäolotietojen varastona. Työn tuloksena on Symbianin käyttöjärjestelmässä toimiva läsnäoloasiakas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A modem software development requires quick results and excellent quality, which leads to high demand for reusability in design and implementation of software components. The purpose of this thesis was to design and implement a reusable framework for portal front ends, including common portal features, such as authentication and authorization. The aim was also to evaluate frameworks as components of reuse and compare them to other reuse techniques. As the result of this thesis, a goo'd picture of framework's life cycle, problem domain and the actual implementation process of the framework, was obtained. It was also found out that frameworks fit well to solve recurrent and similar problems in a restricted problem domain. The outcome of this thesis was a prototype of a generic framework and an example application built on it. The implemented framework offered an abstract base for the portal front ends, using object-oriented methods and wellknown design patterns. The example application demonstrated the speed and ease of the application development based on the application frameworks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis studies the problems and their reasons a software architect faces in his work. The purpose of the study is to search and identify potential factors causing problens in system integration and software engineering. Under a special interest are non-technical factors causing different kinds of problems. Thesis was executed by interviewing professionals that took part in e-commerce project in some corporation. Interviewed professionals consisted of architects from technical implementation projects, corporation's architect team leader, different kind of project managers and CRM manager. A specific theme list was used as an guidance of the interviews. Recorded interviews were transcribed and then classified using ATLAS.ti software. Basics of e-commerce, software engineering and system integration is described too. Differences between e-commerce and e-business as well as traditional business are represented as are basic types of e-commerce. Software's life span, general problems of software engineering and software design are covered concerning software engineering. In addition, general problems of the system integration and the special requirements set by e-commerce are described in the thesis. In the ending there is a part where the problems founded in study are described and some areas of software engineering where some development could be done so that same kind of problems could be avoided in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis I examine Service Oriented Architecture (SOA) considering both its positive and negative qualities for business organizations and IT. In SOA, services are loosely coupled and invoked through standard interfaces to enable business process independence from the underlying technology. As an architecture, SOA brings the key benefit of service reuse that may mean anything from simple application reuse to taking advantage of entire business processes across enterprises. SOA also promises interoperability especially by the Web services standards that enable platform independency. Cost efficiency is mainly a result of the savings in IT maintenance and reduced development costs. The most severe limitations of SOA are performance implications and security issues, but the applicability of SOA is also limited. Additional disadvantages of a service oriented approach include problems in data management and complexity questions, and the lack of agreement about SOA and its twofold nature as a business as well as technology approach leads to problematic interpretation of the available information. In this thesis I find the benefits and limitations of SOA for the purpose described above and propose that companies need to consider the decision to implement SOA carefully to determine whether the benefits will outdo the costs in the individual case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the present thesis was to explore different aspects of decision making and expertise in investigations of child sexual abuse (CSA) and subsequently shed some light on the reasons for shortcomings in the investigation processes. Clinicians’ subjective attitudes as well as scientifically based knowledge concerning CSA, CSA investigation and interviewing were explored. Furthermore the clinicians’ own view on their expertise and what enhances this expertise was investigated. Also, the effects of scientific knowledge, experience and attitudes on the decision making in a case of CSA were explored. Finally, the effects of different kinds of feedback as well as experience on the ability to evaluate CSA in the light of children’s behavior and base rates were investigated. Both explorative and experimental methods were used. The purpose of Study I was to investigate whether clinicians investigating child sexual abuse (CSA) rely more on scientific knowledge or on clinical experience when evaluating their own expertise. Another goal was to check what kind of beliefs the clinicians held. The connections between these different factors were investigated. A questionnaire covering items concerning demographic data, experience, knowledge about CSA, selfevaluated expertise and beliefs about CSA was given to social workers, child psychiatrists and psychologists working with children. The results showed that the clinicians relied more on their clinical experience than on scientific knowledge when evaluating their expertise as investigators of CSA. Furthermore, social workers possessed stronger attitudes in favor of children than the other groups, while child psychiatrists had more negative attitudes towards the criminal justice system. Male participants held less strong beliefs than female participants. The findings indicate that the education of CSA investigators should focus more on theoretical knowledge and decision making processes as well as the role of beliefs In Study II school and family counseling psychologists completed a Child Sexual Abuse Attitude and Belief Scale. Four CSA related attitude and belief subscales were identified: 1. The Disclosure subscale reflecting favoring a disclosure at any cost, 2. The Pro-Child subscale reflecting unconditional belief in children's reports, 3. The Intuition subscale reflecting favoring an intuitive approach to CSA investigations, and 4. The Anti Criminal Justice System subscale reflecting negative attitudes towards the legal system. Beliefs that were erroneous according to empirical research were analyzed separately. The results suggest that some psychologists hold extreme attitudes and many erroneous beliefs related to CSA. Some misconceptions are common. Female participants tended to hold stronger attitudes than male participants. The more training in interviewing children the participants have, the more erroneous beliefs and stronger attitudes they hold. Experience did not affect attitudes and beliefs. In Study III mental health professionals’ sensitivity to suggestive interviewing in CSA cases was explored. Furthermore, the effects of attitudes and beliefs related to CSA and experience with CSA investigations on the sensitivity to suggestive influences in the interview were investigated. Also, the effect of base rate estimates of CSA on decisions was examined. A questionnaire covering items concerning demographic data, different aspects of clinical experience, self-evaluated expertise, beliefs and knowledge about CSA and a set of ambiguous material based on real trial documents concerning an alleged CSA case was given to child mental health professionals. The experiment was based on a 2 x 2 x 2 x 2 (leading questions: yes vs no) x (stereotype induction: yes vs no) x (emotional tone: pressure to respond vs no pressure to respond) x (threats and rewards: yes vs no) between-subjects factorial design, in which the suggestiveness of the methods with which the responses of the child were obtained were varied. There was an additional condition in which the material did not contain any interview transcripts. The results showed that clinicians are sensitive only to the presence of leading questions but not to the presence of other suggestive techniques. Furthermore, the clinicians were not sensitive to the possibility that suggestive techniques could have been used when no interview transcripts had been included in the trial material. Experience had an effect on the sensitivity of the clinicians only regarding leading questions. Strong beliefs related to CSA lessened the sensitivity to leading questions. Those showing strong beliefs on the belief scales used in this study were even more prone to prosecute than other participants when other suggestive influences than leading questions were present. Controversy exists regarding effects of experience and feedback on clinical decision making. In Study IV the impact of the number of handled cases and of feedback on the decisions in cases of alleged CSA was investigated. One-hundred vignettes describing cases of suspected CSA were given to students with no experience with investigating CSA. The vignettes were based on statistical data about symptoms and prevalence of CSA. According to the theoretical likelihood of CSA the children described were categorized as abused or not abused. The participants were asked to decide whether abuse had occurred. They were divided into 4 groups: one received feedback on whether their decision was right or wrong, one received information about cognitive processes involved in decision making, one received both, and one did not receive feedback at all. The results showed that participants who received feedback on their performance made more correct positive decisions and participants who got information about decision making processes made more correct negative decisions. Feedback and information combined decreased the number of correct positive decisions but increased the number of correct negative decisions. The number of read cases had in itself a positive effect on correct positive decision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this thesis was to investigate creating and improving category purchasing visibility for corporate procurement by utilizing financial information. This thesis was a part of the global category driven spend analysis project of Konecranes Plc. While creating general understanding for building category driven corporate spend visibility, the IT architecture and needed purchasing parameters for spend analysis were described. In the case part of the study three manufacturing plants of Konecranes Standard Lifting, Heavy Lifting and Services business areas were examined. This included investigating the operative IT system architecture and needed processes for building corporate spend visibility. The key findings of this study were the identification of the needed processes for gathering purchasing data elements while creating corporate spend visibility in fragmented source system environment. As an outcome of the study, roadmap presenting further development areas was introduced for Konecranes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This artcle describes work done with enterprise architecture of the National Digital Library. The National Digital Library is an initiative of the Finnish Ministry of Education and Culture. Its purpose is to promote the availability of the digital information resources of archives, libraries and museums, and to develope the long-term preservation of digital cultural heritage materials. Enterprise architectures are a tool for strategic management and planning. An enterprise architecture also functions as an aid at a more practical level. It shows, for example, what kind of changes and improvements may be made in one system without overlap or conflict with other systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract—Concept development and experimentation (CD&E) plays an important role in driving strategic transformation in the military community. Defence architecture frameworks, such as the NATO architecture framework, are considered excellent means to support CD&E. There is not much empirical evidence, however, to indicate how enterprise architectures (EA) are applied in the military community or particularly in military CD&E. Consequently, this paper describes and discusses empirical application of the EA approach in CD&E. The research method in the paper is a case study. Situational method engineering (SiME) is used as a framework to adapt the EA approach to the case project of the paper. The findings of the paper suggest that the EA is applicable to CD&E work, although all aspects of the original concept could not be expressed in the EA model of the case project. The results also show that the SiME method can support in applying the EA framework to the CD&E in the case project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present thesis had two main objectives: The first was to assess how child sexual abuse (CSA) interviews in Finland are conducted through analysing the interviewing techniques applied and the language used by the interviewers, as well as to suggest ways to improve interviews if they were found to have deficiencies. The second main aim was to contribute to the growing research corpus concerning CSA interviews, in particular, by addressing how interviewers follow up information provided by the child, by analysing whether child health care professionals would use childadapted language, and by studying the kind of modifications in the verbal behaviour of interviewers and children that were associated with a) repeated interviews, b) a support person’s presence at the interview, and c) the use of anatomically detailed dolls. Two complementary samples of CSA interviews were analysed. The first one was composed of child interviews with 3-12-year-old children (N = 27) that had been considered problematic by lawyers or other involved professionals (Studies I and IV). The second sample consisted of unselected interviews (N = 43) with children aged 3 to 8 years conducted in a number of hospitals in different parts of the country (Studies II and III). Study I: The verbal interaction between interviewer and child was analysed in a sample of interviews that had been considered to be problematic by involved professionals. Results showed that interviewers used inappropriate questioning techniques, relying on option-posing, specific suggestive and unspecific suggestive questions to a significant extent, these comprising around 50% of all interviewer utterances. The proportion of invitations, which the research community recommends interviewers to rely on, was strikingly low. Invitations and directive utterances were associated with an increase in informative responses by the child in terms of response type, number of new details reported, as well as length of response. The opposite was true for option-posing and suggestive utterances. Longer questions by the interviewer (in number of words) often rendered no reply from the child, whereas shorter questions were followed by descriptive answers. Even after the child had provided an informative answer, interviewers failed to follow up the information in an adequate way and instead continued to rely on focused and leading questions. Study II: Due to the possible bias of the sample analysed in Study I, the most important analyses were rerun with the unselected sample and reported separately. Results were quite similar between the two studies, indicating that the problems observed in Study I, with interviewers relying on option-posing and suggestive questions to a significant extent, are likely to be general and not specific for those interviews. Even if suggestive questions were slightly less and invitations slightly more common in this sample than in the previous study, almost half of the interviewer questions were still optionposing or suggestive, and also in this sample, interviewers failed to follow up information by the child in a facilitating manner. Differentiating between judicial and contextual details showed that while facilitators, invitations, and directive utterances elicited more contextual than judicial details, the opposite was true for specific suggestive utterances. These results might be explained by the reluctance of children to describe sexual details related to the abuse events. Alternatively, they may also be due to children describing incorrect sexual details as a result of suggestive interviewing techniques. Study III: This study examined features of the language used by the interviewers. Interviewer utterances included multiple questions, long statements, complicated grammar and concepts, as well as unclear references to persons and situations. More than a fifth of the interviewer utterances were coded as belonging to at least one of these categories. The results suggest that even professionals who are experienced in interacting with children may have difficulties in using a child-sensitive language, adding to the pool of studies showing similar problems to occur in legal hearings with children conducted by lawyers. As children rarely comment on, or even recognise, their lack of comprehension, the use of a language that is too complex can have detrimental consequences for the outcomes of investigative interviews. Interviewers used different approaches to introduce the topic of abuse. While 15% of the children spontaneously addressed the topic of abuse, probably indicating that they felt confident with the interviewer and the situation, in almost 50% of the cases, the interviewer introduced the topic of abuse in a way that can be considered leading. Interviews were characterised by a lack of structure, apparent in frequent rapid switches of topic by the interviewer. This manner was associated with a decrease in the number of new details provided by the children. Study IV: This study analysed possible changes in the interview dynamics associated with repeated interviewing, the presence of a support person (related to the child), and the use of anatomically detailed (AD) dolls. Repeated interviewing, in combination with suggestive questions, has previously been found to seriously contaminate children’s accounts. In the present material, interviewers used significantly more suggestive utterances in the repeated condition, thus endangering the reliability of the children’s reports. Few studies have investigated the effects of a support person’s presence at the interview. The results of the present study showed that interviewers talked more and children provided less information when a support person was present. Supporting some earlier findings regarding the use of AD dolls, the present results showed that using AD dolls was associated with longer interviewer utterances and shorter, less responsive, and less detailed child responses. Interviewers used up to five times more unspecific suggestive utterances when dolls were used, for instance through repeatedly asking the child to show “what really happened” with the dolls. Conclusion: The results indicate that CSA interviews in Finland are not conducted in a manner that follows best practice as defined by the research community and as stated in a number of guidelines. When comparing these questioning strategies with the recommendations, which have been predominant in the field for more than ten years now, it can be concluded that the interviews analysed were conducted in a manner that undermines the possibility to elicit an uncontaminated and accurate narrative from the children. A particularly worrying finding was the fact that interviewers did not follow up relevant information by the children in an adequate way. A number of clinical implications can be drawn from the results, particularly concerning the need for improvement in the quality of CSA interviews. There is convincing research regarding how to improve CSA interviews, notably through training forensic child interviewers to use a structured interviewing protocol, and providing them with continuous supervision and feedback. Allocating appropriate resources to improve the quality of forensic child interviews is a matter of protecting the rights of all persons involved in CSA investigations, in particular those of the children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this dissertation is to bridge and synthesize the different streams of literature addressing ecosystem architecture through a multiple‐lens perspective. In addition, the structural properties of and processes to design and manage the architecture will be examined. With this approach, the oft‐neglected actor‐structure duality is addressed and both the position and structure, and action and process are under scrutiny. Further, the developed framework and empirical evidence offer valuable insights on how firms collectively create value and individually appropriate value. The dissertation is divided into two parts. The first part comprises a literature review, as well as the conclusions of the whole study, and the second part includes six research publications. The dissertation is based on three different reasoning logics: abduction, induction and deduction; related qualitative and quantitative methodologies are utilized in the empirical examination of the phenomenon in the information and communication technology industry. The results suggest firstly that there are endogenous and exogenous structural properties of the ecosystem architecture. Out of these, the former ones can be more easily influenced by a particular actor whereas the latter ones are taken more or less for granted. Secondly, the exogenous ecosystem design properties influence the value creation potential of the ecosystem whereas the endogenous ecosystem design properties influence the value appropriation potential of a particular actor in the ecosystem. Thirdly, the study suggests that there is a relationship between endogenous and exogenous structural properties in that the endogenous properties can be leveraged to create and reconfigure the exogenous properties whereas the exogenous properties prose opportunities and restrictions on the use of endogenous properties. In addition, the study suggests that there are different emergent and engineered processes to design and manage ecosystem architecture and to influence both the endogenous and exogenous structural properties of ecosystem architecture. This study makes three main contributions. First, on the conceptual level, it brings coherence and direction to the fast growing body of literature on novel inter‐organizational arrangements, such as ecosystems. It does this by bridging and synthetizing three different streams of literature, namely the boundary, design and orchestration conception. Secondly, it sets out a framework that enhances our understanding of the structural properties of ecosystem architecture; of the processes to design and manage ecosystem architecture; and of their influence on the value creation potential of the ecosystem and the value capture potential of a particular firm. Thirdly, it offers empirical evidence of the structural properties and processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Med prediktion avses att man skattar det framtida värdet på en observerbar storhet. Kännetecknande för det bayesianska paradigmet är att osäkerhet gällande okända storheter uttrycks i form av sannolikheter. En bayesiansk prediktiv modell är således en sannolikhetsfördelning över de möjliga värden som en observerbar, men ännu inte observerad storhet kan anta. I de artiklar som ingår i avhandlingen utvecklas metoder, vilka bl.a. tillämpas i analys av kromatografiska data i brottsutredningar. Med undantag för den första artikeln, bygger samtliga metoder på bayesiansk prediktiv modellering. I artiklarna betraktas i huvudsak tre olika typer av problem relaterade till kromatografiska data: kvantifiering, parvis matchning och klustring. I den första artikeln utvecklas en icke-parametrisk modell för mätfel av kromatografiska analyser av alkoholhalt i blodet. I den andra artikeln utvecklas en prediktiv inferensmetod för jämförelse av två stickprov. Metoden tillämpas i den tredje artik eln för jämförelse av oljeprover i syfte att kunna identifiera den förorenande källan i samband med oljeutsläpp. I den fjärde artikeln härleds en prediktiv modell för klustring av data av blandad diskret och kontinuerlig typ, vilken bl.a. tillämpas i klassificering av amfetaminprover med avseende på produktionsomgångar.