14 resultados para interview protocols

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Artikkelin tekijämerkintönä virheellisesti Johan Lindqvist

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key management has a fundamental role in secure communications. Designing and testing of key management protocols is tricky. These protocols must work flawlessly despite of any abuse. The main objective of this work was to design and implement a tool that helps to specify the protocol and makes it possible to test the protocol while it is still under development. This tool generates compile-ready java code from a key management protocol model. A modelling method for these protocols, which uses Unified Modeling Language (UML) was also developed. The protocol is modelled, exported as an XMI and read by the code generator tool. The code generator generates java code that is immediately executable with a test software after compilation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The networking and digitalization of audio equipment has created a need for control protocols. These protocols offer new services to customers and ensure that the equipment operates correctly. The control protocols used in the computer networks are not directly applicable since embedded systems have resource and cost limitations. In this master's thesis the design and implementation of new loudspeaker control network protocols are presented. The protocol stack was required to be reliable, have short response times, configure the network automatically and support the dynamic addition and removal of loudspeakers. The implemented protocol stack was also required to be as efficient and lightweight as possible because the network nodes are fairly simple and lack processing power. The protocol stack was thoroughly tested, validated and verified. The protocols were formally described using LOTOS (Language of Temporal Ordering Specifications) and verified using reachability analysis. A prototype of the loudspeaker network was built and used for testing the operation and the performance of the control protocols. The implemented control protocol stack met the design specifications and proved to be highly reliable and efficient.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

”METKU –projektissa” (Merenkulun turvallisuuskulttuurin kehittäminen) tutkitaan kansainvälisen turvallisuusjohtamiskoodin (ISM-koodin) vaikutuksia merenkulun turvallisuuteen ja etsitään kehittämiskohteita merenkulun turvallisuusjohtamisen parantamiseksi. Tämä haastatteluraportti on laadittu METKU –projektin yhteistyössä työpakettien 1 ja 2 kesken. Tähän raporttiin haastateltiin yhteensä 94 merenkulun ammattilaista. Suurimman osan haastateltavista muodostivat aktiiviset merenkulkijat: miehistön jäsenet, päällystö ja alusten päälliköt. Haastattelukohteena oli seitsemän suomalaista varustamoa. Haastatteluissa kerättiin merenkulkijoiden kokemuksia ja mielipiteitä ISM-koodin vaikutuksesta heidän käytännön työhönsä. Suomalaiset merenkulkijat uskovat, että tänä päivänä varustamoiden johtajat ovat hyvin sitoutuneita turvallisuuteen. Myös miehistön asenteet turvallisuuteen ovat ISM-koodin käytön myötä parantuneet. Haasteltavien yhteinen huoli kohdistui jatkuvan parantamisen toimivuuteen. Kaikki haastatellut ryhmät olivat samaa mieltä siitä, että poikkeamien raportointi ei ISMkoodin vaatimuksesta huolimatta toimi kunnolla. ISM-koodin käyttöön otosta on ollut merenkululle selkeää hyötyä. Haastateltavat esittivät hyötyinä parantuneen yhteistyön ja tiedonkulun alusten ja varustamon välillä sekä sen, että merenkulun toiminnan laatu on parantunut. Monet haastateltavat korostivat, että ISM-koodin selkeät turvallisuusvastuut yhtiölle on ollut merkittävä hyöty. Itse ISM-koodiin merenkulkijoilla ei ollut juurikaan huomauttamista. Sen sijaan turvallisuusjohtamisen käytännön toteutuksessa nähtiin parantamisen varaa. ISMkoodin aiheuttamina ongelmina mainittiin mm. lisääntynyt byrokratia ja liian monimutkaiset ja yksityiskohtaiset turvallisuuskäsikirjat. Monet haastateltavat toivovat, että ISM-koodin käytännön soveltamiseen laadittaisiin ohjeita.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present thesis had two main objectives: The first was to assess how child sexual abuse (CSA) interviews in Finland are conducted through analysing the interviewing techniques applied and the language used by the interviewers, as well as to suggest ways to improve interviews if they were found to have deficiencies. The second main aim was to contribute to the growing research corpus concerning CSA interviews, in particular, by addressing how interviewers follow up information provided by the child, by analysing whether child health care professionals would use childadapted language, and by studying the kind of modifications in the verbal behaviour of interviewers and children that were associated with a) repeated interviews, b) a support person’s presence at the interview, and c) the use of anatomically detailed dolls. Two complementary samples of CSA interviews were analysed. The first one was composed of child interviews with 3-12-year-old children (N = 27) that had been considered problematic by lawyers or other involved professionals (Studies I and IV). The second sample consisted of unselected interviews (N = 43) with children aged 3 to 8 years conducted in a number of hospitals in different parts of the country (Studies II and III). Study I: The verbal interaction between interviewer and child was analysed in a sample of interviews that had been considered to be problematic by involved professionals. Results showed that interviewers used inappropriate questioning techniques, relying on option-posing, specific suggestive and unspecific suggestive questions to a significant extent, these comprising around 50% of all interviewer utterances. The proportion of invitations, which the research community recommends interviewers to rely on, was strikingly low. Invitations and directive utterances were associated with an increase in informative responses by the child in terms of response type, number of new details reported, as well as length of response. The opposite was true for option-posing and suggestive utterances. Longer questions by the interviewer (in number of words) often rendered no reply from the child, whereas shorter questions were followed by descriptive answers. Even after the child had provided an informative answer, interviewers failed to follow up the information in an adequate way and instead continued to rely on focused and leading questions. Study II: Due to the possible bias of the sample analysed in Study I, the most important analyses were rerun with the unselected sample and reported separately. Results were quite similar between the two studies, indicating that the problems observed in Study I, with interviewers relying on option-posing and suggestive questions to a significant extent, are likely to be general and not specific for those interviews. Even if suggestive questions were slightly less and invitations slightly more common in this sample than in the previous study, almost half of the interviewer questions were still optionposing or suggestive, and also in this sample, interviewers failed to follow up information by the child in a facilitating manner. Differentiating between judicial and contextual details showed that while facilitators, invitations, and directive utterances elicited more contextual than judicial details, the opposite was true for specific suggestive utterances. These results might be explained by the reluctance of children to describe sexual details related to the abuse events. Alternatively, they may also be due to children describing incorrect sexual details as a result of suggestive interviewing techniques. Study III: This study examined features of the language used by the interviewers. Interviewer utterances included multiple questions, long statements, complicated grammar and concepts, as well as unclear references to persons and situations. More than a fifth of the interviewer utterances were coded as belonging to at least one of these categories. The results suggest that even professionals who are experienced in interacting with children may have difficulties in using a child-sensitive language, adding to the pool of studies showing similar problems to occur in legal hearings with children conducted by lawyers. As children rarely comment on, or even recognise, their lack of comprehension, the use of a language that is too complex can have detrimental consequences for the outcomes of investigative interviews. Interviewers used different approaches to introduce the topic of abuse. While 15% of the children spontaneously addressed the topic of abuse, probably indicating that they felt confident with the interviewer and the situation, in almost 50% of the cases, the interviewer introduced the topic of abuse in a way that can be considered leading. Interviews were characterised by a lack of structure, apparent in frequent rapid switches of topic by the interviewer. This manner was associated with a decrease in the number of new details provided by the children. Study IV: This study analysed possible changes in the interview dynamics associated with repeated interviewing, the presence of a support person (related to the child), and the use of anatomically detailed (AD) dolls. Repeated interviewing, in combination with suggestive questions, has previously been found to seriously contaminate children’s accounts. In the present material, interviewers used significantly more suggestive utterances in the repeated condition, thus endangering the reliability of the children’s reports. Few studies have investigated the effects of a support person’s presence at the interview. The results of the present study showed that interviewers talked more and children provided less information when a support person was present. Supporting some earlier findings regarding the use of AD dolls, the present results showed that using AD dolls was associated with longer interviewer utterances and shorter, less responsive, and less detailed child responses. Interviewers used up to five times more unspecific suggestive utterances when dolls were used, for instance through repeatedly asking the child to show “what really happened” with the dolls. Conclusion: The results indicate that CSA interviews in Finland are not conducted in a manner that follows best practice as defined by the research community and as stated in a number of guidelines. When comparing these questioning strategies with the recommendations, which have been predominant in the field for more than ten years now, it can be concluded that the interviews analysed were conducted in a manner that undermines the possibility to elicit an uncontaminated and accurate narrative from the children. A particularly worrying finding was the fact that interviewers did not follow up relevant information by the children in an adequate way. A number of clinical implications can be drawn from the results, particularly concerning the need for improvement in the quality of CSA interviews. There is convincing research regarding how to improve CSA interviews, notably through training forensic child interviewers to use a structured interviewing protocol, and providing them with continuous supervision and feedback. Allocating appropriate resources to improve the quality of forensic child interviews is a matter of protecting the rights of all persons involved in CSA investigations, in particular those of the children.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Mobile Ad-hoc Networks (MANET) the participating nodes have several roles such as sender, receiver and router. Hence there is a lot of energy consumed by the nodes for the normal working of the network since each node has many different roles. Also in MANET the nodes keep moving constantly and this in turn consumes a lot of energy. Since battery capacity of these nodes is limited it fails to fulfil the high demand of energy. The scarcity of energy makes the energy conservation in mobile ad-hoc networks an important concern. There is several research carried out on the energy consumption of mobile ad-hoc networks these days. Some of this research suggests sleep mode, transmission power control, load balancing etc. In this thesis, we are comparing various proposed energy efficient models for some of the ad-hoc protocols. We compare different energy efficient models for Optimised Linked State Algorithm (OLSR) and Ad-hoc On Demand Distance Vector (AODV). The routing protocols are compared for different parameters such as average remaining energy, number of nodes alive, payload data received and performance with different mobility speed. The simulation results helps in benchmarking the various energy efficient routing models for OLSR and AODV protocols. The benchmarking of the routing protocols can be based on many factors but this thesis concentrates on benchmarking the MANET routing protocols mainly based on the energy efficiency and increased network lifetime.