30 resultados para Computer systems and technologies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

How do institutional settings and their embedded policy principles affect gender-typed enrolment in educational programmes? Based on gender-sensitive theories on career choice, we hypothesised that gender segregation in education is higher with a wider range of offers of vocational programmes. By analysing youth survey and panel data, we tested this assumption for Germany, Norway and Canada, three countries whose educational systems represent a different mix of academic, vocational and universalistic education principles. We found that vocational programmes are considerably more gender-segregated than are academic (e.g. university) programmes. Men, more so than women, can avoid gender-typed programmes by passing on to a university education. This in turn means that as long as their secondary school achievement does not allow for a higher education career, they have a higher likelihood of being allocated to male-typed programmes in the vocational education and training (VET) system. In addition, social background and the age at which students have to choose educational offers impact on the transition to gendered educational programmes. Overall, gender segregation in education is highest in Germany and the lowest in Canada. We interpret the differences between these countries with respect to the constellations of educational principles and policies in the respective countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Application of pressure-driven laminar flow has an impact on zone and boundary dispersion in open tubular CE. The GENTRANS dynamic simulator for electrophoresis was extended with Taylor-Aris diffusivity which accounts for dispersion due to the parabolic flow profile associated with pressure-driven flow. Effective diffusivity of analyte and system zones as functions of the capillary diameter and the amount of flow in comparison to molecular diffusion alone were studied for configurations with concomitant action of imposed hydrodynamic flow and electroosmosis. For selected examples under realistic experimental conditions, simulation data are compared with those monitored experimentally using modular CE setups featuring both capacitively coupled contactless conductivity and UV absorbance detection along a 50 μm id fused-silica capillary of 90 cm total length. The data presented indicate that inclusion of flow profile based Taylor-Aris diffusivity provides realistic simulation data for analyte and system peaks, particularly those monitored in CE with conductivity detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study of online reputation systems and their importance for promoting trust and cooperation and, therefore, the smooth functioning of online markets has received considerable attention over the last few years. In the first part of our talk we will try to give a brief overview of the existing theoretical and empirical work in this field, summarize the main findings from this research and identify open questions where results are either controversial or do not yet exist. The second part of our talk will focus on one of these issues that deserve further research, namely the relation between online reputation systems and processes of "cumulative advantage." Cumulative advantage is the mechanism where a favorable relative position of having a good reputation becomes a resource for further relative gains. The process leads to increased status inequality and a heavily skewed distribution of number of feedbacks, i.e. the ties in the reputation network. We present empirical evidence for direct and indirect reputation effects on the micro level of an auction reputation system and discuss the distributional consequences for the market level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVE Type A aortic dissection is a life-threatening disease requiring immediate surgical treatment. With emerging catheter-based technologies, endovascular stent-graft implantation to treat aneurysms and dissections has become a standardized procedure. However, endovascular treatment of the ascending aorta remains challenging. Thus we designed an ascending aortic dissection model to allow simulation of endovascular treatment. METHODS Five formalin-fixed human aortas were prepared. The ascending aorta was opened semicircularly in the middle portion and the medial layer was separated from the intima. The intimal tube was readapted using running monofilament sutures. The preparations were assessed by 128-slice computed tomography. A bare-metal stent was implanted for thoracic endovascular aortic repair in 4 of the aortic dissection models. RESULTS Separation of the intimal and medial layer of the aorta was considered to be sufficient because computed tomography showed a clear image of the dissection membrane in each aorta. The dissection was located 3.9 ± 1.4 cm proximally from the aortic annulus, with a length of 4.6 ± 0.9 cm. Before stent implantation, the mean distance from the intimal flap to the aortic wall was measured as 0.63 ± 0.163 cm in the ascending aorta. After stent implantation, this distance decreased to 0.26 ± 0.12 cm. CONCLUSION This model of aortic dissection of the ascending human aorta was reproducible with a comparable pathological and morphological appearance. The technique and model can be used to evaluate new stent-graft technologies to treat type A dissection and facilitate training for surgeons.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Business and Information Technologies (BIT) project strives to reveal new insights into how modern IT impacts organizational structures and business practices using empirical methods. Due to its international scope, it allows for inter-country comparison of empirical results. Germany — represented by the European School of Management and Technologies (ESMT) and the Institute of Information Systems at Humboldt-Universität zu Berlin — joined the BIT project in 2006. This report presents the result of the first survey conducted in Germany during November–December 2006. The key results are as follows: • The most widely adopted technologies and systems in Germany are websites, wireless hardware and software, groupware/productivity tools, and enterprise resource planning (ERP) systems. The biggest potential for growth exists for collaboration and portal tools, content management systems, business process modelling, and business intelligence applications. A number of technological solutions have not yet been adopted by many organizations but also bear some potential, in particular identity management solutions, Radio Frequency Identification (RFID), biometrics, and third-party authentication and verification. • IT security remains on the top of the agenda for most enterprises: budget spending was increasing in the last 3 years. • The workplace and work requirements are changing. IT is used to monitor employees' performance in Germany, but less heavily compared to the United States (Karmarkar and Mangal, 2007).1 The demand for IT skills is increasing at all corporate levels. Executives are asking for more and better structured information and this, in turn, triggers the appearance of new decision-making tools and online technologies on the market. • The internal organization of companies in Germany is underway: organizations are becoming flatter, even though the trend is not as pronounced as in the United States (Karmarkar and Mangal, 2007), and the geographical scope of their operations is increasing. Modern IT plays an important role in enabling this development, e.g. telecommuting, teleconferencing, and other web-based collaboration formats are becoming increasingly popular in the corporate context. • The degree to which outsourcing is being pursued is quite limited with little change expected. IT services, payroll, and market research are the most widely outsourced business functions. This corresponds to the results from other countries. • Up to now, the adoption of e-business technologies has had a rather limited effect on marketing functions. Companies tend to extract synergies from traditional printed media and on-line advertising. • The adoption of e-business has not had a major impact on marketing capabilities and strategy yet. Traditional methods of customer segmentation are still dominating. The corporate identity of most organizations does not change significantly when going online. • Online sales channel are mainly viewed as a complement to the traditional distribution means. • Technology adoption has caused production and organizational costs to decrease. However, the costs of technology acquisition and maintenance as well as consultancy and internal communication costs have increased.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internet of Things based systems are anticipated to gain widespread use in industrial applications. Standardization efforts, like 6L0WPAN and the Constrained Application Protocol (CoAP) have made the integration of wireless sensor nodes possible using Internet technology and web-like access to data (RESTful service access). While there are still some open issues, the interoperability problem in the lower layers can now be considered solved from an enterprise software vendors' point of view. One possible next step towards integration of real-world objects into enterprise systems and solving the corresponding interoperability problems at higher levels is to use semantic web technologies. We introduce an abstraction of real-world objects, called Semantic Physical Business Entities (SPBE), using Linked Data principles. We show that this abstraction nicely fits into enterprise systems, as SPBEs allow a business object centric view on real-world objects, instead of a pure device centric view. The interdependencies between how currently services in an enterprise system are used and how this can be done in a semantic real-world aware enterprise system are outlined, arguing for the need of semantic services and semantic knowledge repositories. We introduce a lightweight query language, which we use to perform a quantitative analysis of our approach to demonstrate its feasibility.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Linking the physical world to the Internet, also known as the Internet of Things, has increased available information and services in everyday life and in the Enterprise world. In Enterprise IT an increasing number of communication is done between IT backend systems and small IoT devices, for example sensor networks or RFID readers. This introduces some challenges in terms of complexity and integration. We are working on the integration of IoT devices into Enterprise IT by leveraging SOA techniques and Semantic Web technologies. We present a SOA based integration platform for connecting WSNs and large enterprise business processes. For ensuring interoperability our platform is based on Linked Services. These are thoroughly described, machine-readable, machine-reasonable service descriptions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The process of developing a successful stroke rehabilitation methodology requires four key components: a good understanding of the pathophysiological mechanisms underlying this brain disease, clear neuroscientific hypotheses to guide therapy, adequate clinical assessments of its efficacy on multiple timescales, and a systematic approach to the application of modern technologies to assist in the everyday work of therapists. Achieving this goal requires collaboration between neuroscientists, technologists and clinicians to develop well-founded systems and clinical protocols that are able to provide quantitatively validated improvements in patient rehabilitation outcomes. In this article we present three new applications of complementary technologies developed in an interdisciplinary matrix for acute-phase upper limb stroke rehabilitation – functional electrical stimulation, arm robot-assisted therapy and virtual reality-based cognitive therapy. We also outline the neuroscientific basis of our approach, present our detailed clinical assessment protocol and provide preliminary results from patient testing of each of the three systems showing their viability for patient use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of electrophoretic computer models and their use for simulation of electrophoretic processes has increased significantly during the last few years. Recently, GENTRANS and SIMUL5 were extended with algorithms that describe chemical equilibria between solutes and a buffer additive in a fast 1:1 interaction process, an approach that enables simulation of the electrophoretic separation of enantiomers. For acidic cationic systems with sodium and H3 0(+) as leading and terminating components, respectively, acetic acid as counter component, charged weak bases as samples, and a neutral CD as chiral selector, the new codes were used to investigate the dynamics of isotachophoretic adjustment of enantiomers, enantiomer separation, boundaries between enantiomers and between an enantiomer and a buffer constituent of like charge, and zone stability. The impact of leader pH, selector concentration, free mobility of the weak base, mobilities of the formed complexes and complexation constants could thereby be elucidated. For selected examples with methadone enantiomers as analytes and (2-hydroxypropyl)-β-CD as selector, simulated zone patterns were found to compare well with those monitored experimentally in capillary setups with two conductivity detectors or an absorbance and a conductivity detector. Simulation represents an elegant way to provide insight into the formation of isotachophoretic boundaries and zone stability in presence of complexation equilibria in a hitherto inaccessible way.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

N. Bostrom’s simulation argument and two additional assumptions imply that we are likely to live in a computer simulation. The argument is based upon the following assumption about the workings of realistic brain simulations: The hardware of a computer on which a brain simulation is run bears a close analogy to the brain itself. To inquire whether this is so, I analyze how computer simulations trace processes in their targets. I describe simulations as fictional, mathematical, pictorial, and material models. Even though the computer hardware does provide a material model of the target, this does not suffice to underwrite the simulation argument because the ways in which parts of the computer hardware interact during simulations do not resemble the ways in which neurons interact in the brain. Further, there are computer simulations of all kinds of systems, and it would be unreasonable to infer that some computers display consciousness just because they simulate brains rather than, say, galaxies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.