23 resultados para Hardware and Architecture

em BORIS: Bern Open Repository and Information System - Berna - Suiça


Relevância:

100.00% 100.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Mapping the relevant principles and norms of international law, the paper discusses scientific evidence and identifies current legal foundations of climate change mitigation adaptation and communication in international environmental law, human rights protection and international trade regulation in WTO law. It briefly discusses the evolution and architecture of relevant multilateral environmental agreements, in particular the UN Framework Convention on Climate Change. It discusses the potential role of human rights in identifying pertinent goals and values of mitigation and adaptation and eventually turns to principles and rules of international trade regulation and investment protection which are likely to be of crucial importance should the advent of a new multilateral agreement fail to materialize. The economic and legal relevance of rules on tariffs, border tax adjustment and subsidies, services and intellectual property and investment law are discussed in relation to the production, supply and use of energy. Moreover, lessons from trade negotiations may be drawn for negotiations of future environmental instruments. The paper offers a survey of the main interacting areas of public international law and discusses the intricate interaction of all these components informing climate change mitigation, adaptation and communication in international law in light of an emerging doctrine of multilayered governance. It seeks to contribute to greater coherence of what today is highly fragmented and rarely discussed in an overall context. The paper argues that trade regulation will be of critical importance in assessing domestic policies and potential trade remedies offer powerful incentives for all nations alike to participate in a multilateral framework defining appropriate goals and principles.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The ever increasing popularity of apps stems from their ability to provide highly customized services to the user. The flip side is that in order to provide such services, apps need access to very sensitive private information about the user. This leads to malicious apps that collect personal user information in the background and exploit it in various ways. Studies have shown that current app vetting processes which are mainly restricted to install time verification mechanisms are incapable of detecting and preventing such attacks. We argue that the missing fundamental aspect here is a comprehensive and usable mobile privacy solution, one that not only protects the user's location information, but also other equally sensitive user data such as the user's contacts and documents. A solution that is usable by the average user who does not understand or care about the low level technical details. To bridge this gap, we propose privacy metrics that quantify low-level app accesses in terms of privacy impact and transforms them to high-level user understandable ratings. We also provide the design and architecture of our Privacy Panel app that represents the computed ratings in a graphical user-friendly format and allows the user to define policies based on them. Finally, experimental results are given to validate the scalability of the proposed solution.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The Business and Information Technologies (BIT) project strives to reveal new insights into how modern IT impacts organizational structures and business practices using empirical methods. Due to its international scope, it allows for inter-country comparison of empirical results. Germany — represented by the European School of Management and Technologies (ESMT) and the Institute of Information Systems at Humboldt-Universität zu Berlin — joined the BIT project in 2006. This report presents the result of the first survey conducted in Germany during November–December 2006. The key results are as follows: • The most widely adopted technologies and systems in Germany are websites, wireless hardware and software, groupware/productivity tools, and enterprise resource planning (ERP) systems. The biggest potential for growth exists for collaboration and portal tools, content management systems, business process modelling, and business intelligence applications. A number of technological solutions have not yet been adopted by many organizations but also bear some potential, in particular identity management solutions, Radio Frequency Identification (RFID), biometrics, and third-party authentication and verification. • IT security remains on the top of the agenda for most enterprises: budget spending was increasing in the last 3 years. • The workplace and work requirements are changing. IT is used to monitor employees' performance in Germany, but less heavily compared to the United States (Karmarkar and Mangal, 2007).1 The demand for IT skills is increasing at all corporate levels. Executives are asking for more and better structured information and this, in turn, triggers the appearance of new decision-making tools and online technologies on the market. • The internal organization of companies in Germany is underway: organizations are becoming flatter, even though the trend is not as pronounced as in the United States (Karmarkar and Mangal, 2007), and the geographical scope of their operations is increasing. Modern IT plays an important role in enabling this development, e.g. telecommuting, teleconferencing, and other web-based collaboration formats are becoming increasingly popular in the corporate context. • The degree to which outsourcing is being pursued is quite limited with little change expected. IT services, payroll, and market research are the most widely outsourced business functions. This corresponds to the results from other countries. • Up to now, the adoption of e-business technologies has had a rather limited effect on marketing functions. Companies tend to extract synergies from traditional printed media and on-line advertising. • The adoption of e-business has not had a major impact on marketing capabilities and strategy yet. Traditional methods of customer segmentation are still dominating. The corporate identity of most organizations does not change significantly when going online. • Online sales channel are mainly viewed as a complement to the traditional distribution means. • Technology adoption has caused production and organizational costs to decrease. However, the costs of technology acquisition and maintenance as well as consultancy and internal communication costs have increased.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The site of Bakr Awa is situated in north-eastern Iraq, in the Plain of Shahrizor. Excavations were undertaken in 1960/61by the Iraqi Department of Antiquities and 2010/11 by the University of Heidelberg/Germany. Occupation layers from the beginning of the Early Bronze Age tothe Ottoman period were uncoveredin the lower city and on the citadel. Archaeological evidence from the secondmillennium B.C. shows the most intensive settlement activities and apparent prosperity at Bakr Awa. Several forms of pottery, small finds and architecture reflect dynamic processes of cultural and political transformation at this site located in an area of transition between northern and southern Mesopotamia and western Iran.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

AIMS To investigate whether drugs others than mycophenolic acid and ipilimumab might cause graft-versus-host-like apoptotic enteropathy, the clinicopathological findings in four patients were examined who had developed watery diarrhoea and apoptotic enteropathy (three cases from colon and one case from ileal pouch) after intake of antimetabolites (methotrexate and capecitabine) and/or tumour necrosis factor-α inhibitors (etanercept and infliximab). METHODS The clinical charts, endoscopy reports and intestinal biopsies from all endoscopies were reviewed for all patients. Biopsies were evaluated semiquantitatively for apoptosis of basal crypts, dilated damaged crypts, defined as cystically dilated crypts with flattened degenerated epithelium containing apoptotic debris and few neutrophils, and mucosal architecture. Further, the presence of intraepithelial lymphocytes, chronic inflammatory cells in the lamina propria and mucosal ulcerations was recorded and immunohistochemical analysis for human cytomegalovirus and herpes simplex virus was performed. RESULTS Endoscopic examination revealed normal mucosa in two patients, whereas the other two showed focal ulcerations. Histological changes included increased apoptosis of basal crypts, the presence of dilated damaged crypts and architecture distortion. In all cases, a temporal association between drug intake and/or dose increase, and onset of diarrhoea, was observed, and no convincing evidence of other potentially underlying causes of colitis/enteritis was found, including infections. CONCLUSIONS Pathologists should be aware of the expanding spectrum of drugs that can cause apoptotic enteropathy, including antimetabolites and tumour necrosis factor-α inhibitors.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

(31)P MRS magnetization transfer ((31)P-MT) experiments allow the estimation of exchange rates of biochemical reactions, such as the creatine kinase equilibrium and adenosine triphosphate (ATP) synthesis. Although various (31)P-MT methods have been successfully used on isolated organs or animals, their application on humans in clinical scanners poses specific challenges. This study compared two major (31)P-MT methods on a clinical MR system using heteronuclear surface coils. Although saturation transfer (ST) is the most commonly used (31)P-MT method, sequences such as inversion transfer (IT) with short pulses might be better suited for the specific hardware and software limitations of a clinical scanner. In addition, small NMR-undetectable metabolite pools can transfer MT to NMR-visible pools during long saturation pulses, which is prevented with short pulses. (31)P-MT sequences were adapted for limited pulse length, for heteronuclear transmit-receive surface coils with inhomogeneous B1 , for the need for volume selection and for the inherently low signal-to-noise ratio (SNR) on a clinical 3-T MR system. The ST and IT sequences were applied to skeletal muscle and liver in 10 healthy volunteers. Monte-Carlo simulations were used to evaluate the behavior of the IT measurements with increasing imperfections. In skeletal muscle of the thigh, ATP synthesis resulted in forward reaction constants (k) of 0.074 ± 0.022 s(-1) (ST) and 0.137 ± 0.042 s(-1) (IT), whereas the creatine kinase reaction yielded 0.459 ± 0.089 s(-1) (IT). In the liver, ATP synthesis resulted in k = 0.267 ± 0.106 s(-1) (ST), whereas the IT experiment yielded no consistent results. ST results were close to literature values; however, the IT results were either much larger than the corresponding ST values and/or were widely scattered. To summarize, ST and IT experiments can both be implemented on a clinical body scanner with heteronuclear transmit-receive surface coils; however, ST results are much more robust against experimental imperfections than the current implementation of IT.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

All-sky Meteor Orbit System (AMOS) is a semi-autonomous video observatory for detection of transient events on the sky, mostly the meteors. Its hardware and software development and permanent placement on several locations in Slovakia allowed the establishment of Slovak Video Meteor Network (SVMN) monitoring meteor activity above the Central Europe. The data reduction, orbital determination and additional results from AMOS cameras–the SVMN database– as well as from observational expeditions on Canary Islands and in Canada provided dynamical and physical data for better understanding of mutual connections between parent bodies of asteroids and comets and their meteoroid streams. We present preliminary results on exceptional and rare meteor streams such as September ε Perseids (SPE) originated from unknown long periodic comet on a retrograde orbit, suspected asteroidal meteor stream of April α Comae Berenicids (ACO) in the orbit of meteorites Příbram and Neuschwanstein and newly observed meteor stream Camelopardalids (CAM) originated from Jupiter family comet 209P/Linear.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In hemodialysis patients, radiographic imaging with iodinated contrast medium (ICM) application plays a central role in the diagnosis and/or follow-up of disease-related conditions. Therefore, safety aspects concerning ICM administration and radiation exposure have a great impact on this group of patients. Current hardware and software improvements including the design and synthesis of modern contrast compounds allow the use of very small amounts of ICM in concert with low radiation exposure. Undesirable ICM side effects are divided into type A (predictable reactions such as heat feeling, headache, and contrast-induced acute kidney injury, for example) and type B (nonpredictable or hypersensitivity) reactions; this chapter deals with the latter. The first onset cannot be prevented. To prevent hypersensitivity upon reexposure of ICM, an allergological workup is recommended. If this is not possible and ICM is necessary, the patient should receive a premedication (H1 antihistamine with or without corticosteroids). Current imaging hardware and software improvements (e.g. such as additional filtration of the X-ray beam) allow the use of very small amount of ICM and small X-ray doses. Proper communication among the team involved in the treatment of a patient may allow to apply imaging protocols and efficient imaging strategies limiting radiation exposure to a minimum. Practical recommendations will guide the reader how to use radiation and ICM efficiently to improve both patient and staff safety.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Major progress has recently been made in the neuro-imaging of stroke as a result of improvements in imaging hardware and software. Imaging may be based on either magnetic resonance imaging (MRI) or computed tomography (CT) techniques. Imaging should provide information on the entire vascular cervical and intracranial network, from the aortic arch to the circle of Willis. Equally, it should also give information on the viability of brain tissue and brain hemodynamics. CT has the advantage in the detection of acute hemorrhage whereas MRI offers more accurate pathophysiological information in the follow-up of patients.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The use of information technology (IT) in dentistry is far ranging. In order to produce a working document for the dental educator, this paper focuses on those methods where IT can assist in the education and competence development of dental students and dentists (e.g. e-learning, distance learning, simulations and computer-based assessment). Web pages and other information-gathering devices have become an essential part of our daily life, as they provide extensive information on all aspects of our society. This is mirrored in dental education where there are many different tools available, as listed in this report. IT offers added value to traditional teaching methods and examples are provided. In spite of the continuing debate on the learning effectiveness of e-learning applications, students request such approaches as an adjunct to the traditional delivery of learning materials. Faculty require support to enable them to effectively use the technology to the benefit of their students. This support should be provided by the institution and it is suggested that, where possible, institutions should appoint an e-learning champion with good interpersonal skills to support and encourage faculty change. From a global prospective, all students and faculty should have access to e-learning tools. This report encourages open access to e-learning material, platforms and programs. The quality of such learning materials must have well defined learning objectives and involve peer review to ensure content validity, accuracy, currency, the use of evidence-based data and the use of best practices. To ensure that the developers' intellectual rights are protected, the original content needs to be secure from unauthorized changes. Strategies and recommendations on how to improve the quality of e-learning are outlined. In the area of assessment, traditional examination schemes can be enriched by IT, whilst the Internet can provide many innovative approaches. Future trends in IT will evolve around improved uptake and access facilitated by the technology (hardware and software). The use of Web 2.0 shows considerable promise and this may have implications on a global level. For example, the one-laptop-per-child project is the best example of what Web 2.0 can do: minimal use of hardware to maximize use of the Internet structure. In essence, simple technology can overcome many of the barriers to learning. IT will always remain exciting, as it is always changing and the users, whether dental students, educators or patients are like chameleons adapting to the ever-changing landscape.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We describe a system for performing SLA-driven management and orchestration of distributed infrastructures composed of services supporting mobile computing use cases. In particular, we focus on a Follow-Me Cloud scenario in which we consider mobile users accessing cloud-enable services. We combine a SLA-driven approach to infrastructure optimization, with forecast-based performance degradation preventive actions and pattern detection for supporting mobile cloud infrastructure management. We present our system's information model and architecture including the algorithmic support and the proposed scenarios for system evaluation.