12 resultados para Security-critical software
em BORIS: Bern Open Repository and Information System - Berna - Suiça
Resumo:
BACKGROUND: Physiologic data display is essential to decision making in critical care. Current displays echo first-generation hemodynamic monitors dating to the 1970s and have not kept pace with new insights into physiology or the needs of clinicians who must make progressively more complex decisions about their patients. The effectiveness of any redesign must be tested before deployment. Tools that compare current displays with novel presentations of processed physiologic data are required. Regenerating conventional physiologic displays from archived physiologic data is an essential first step. OBJECTIVES: The purposes of the study were to (1) describe the SSSI (single sensor single indicator) paradigm that is currently used for physiologic signal displays, (2) identify and discuss possible extensions and enhancements of the SSSI paradigm, and (3) develop a general approach and a software prototype to construct such "extended SSSI displays" from raw data. RESULTS: We present Multi Wave Animator (MWA) framework-a set of open source MATLAB (MathWorks, Inc., Natick, MA, USA) scripts aimed to create dynamic visualizations (eg, video files in AVI format) of patient vital signs recorded from bedside (intensive care unit or operating room) monitors. Multi Wave Animator creates animations in which vital signs are displayed to mimic their appearance on current bedside monitors. The source code of MWA is freely available online together with a detailed tutorial and sample data sets.
Resumo:
OBJECTIVE: To test the feasibility of and interactions among three software-driven critical care protocols. DESIGN: Prospective cohort study. SETTING: Intensive care units in six European and American university hospitals. PATIENTS: 174 cardiac surgery and 41 septic patients. INTERVENTIONS: Application of software-driven protocols for cardiovascular management, sedation, and weaning during the first 7 days of intensive care. MEASUREMENTS AND RESULTS: All protocols were used simultaneously in 85% of the cardiac surgery and 44% of the septic patients, and any one of the protocols was used for 73 and 44% of study duration, respectively. Protocol use was discontinued in 12% of patients by the treating clinician and in 6% for technical/administrative reasons. The number of protocol steps per unit of time was similar in the two diagnostic groups (n.s. for all protocols). Initial hemodynamic stability (a protocol target) was achieved in 26+/-18 min (mean+/-SD) in cardiac surgery and in 24+/-18 min in septic patients. Sedation targets were reached in 2.4+/-0.2h in cardiac surgery and in 3.6 +/-0.2h in septic patients. Weaning protocol was started in 164 (94%; 154 extubated) cardiac surgery and in 25 (60%; 9 extubated) septic patients. The median (interquartile range) time from starting weaning to extubation (a protocol target) was 89 min (range 44-154 min) for the cardiac surgery patients and 96 min (range 56-205 min) for the septic patients. CONCLUSIONS: Multiple software-driven treatment protocols can be simultaneously applied with high acceptance and rapid achievement of primary treatment goals. Time to reach these primary goals may provide a performance indicator.
Resumo:
In recent years, development of information systems (IS) has rapidly changed towards increasing division of labor between firms. Two trends are emerging. First, client companies increasingly outsource software development to external service providers. Second, the formerly oligopolistic enterprise application software industry has started to disintegrate into focal partnership networks – so called platform ecosystems. Despite the increasing prominence of IS outsourcing and platform ecosystems, many of these inter-organizational partnerships fail to achieve expected benefits. Ineffective governance and control frequently plays a pivotal role in producing these failures. While designing effective governance and control mechanisms is always challenging, inter-organizational software development projects are often business-critical and exhibit additional dynamics and uncertainty. As a consequence governance and control have to be adapted over time. The three research projects included in this book provide a better understanding of how and why governance and control can be effectively adapted over time. The implications for successful management of inter-organizational software development projects are highly relevant for theory and practice.
Resumo:
With the availability of lower cost but highly skilled software development labor from offshore regions, entrepreneurs from developed countries who do not have software development experience can utilize this workforce to develop innovative software products. In order to succeed in offshored innovation projects, the often extreme knowledge boundaries between the onsite entrepreneur and the offshore software development team have to be overcome. Prior research has proposed that boundary objects are critical for bridging such boundaries – if they are appropriately used. Our longitudinal, revelatory case study of a software innovation project is one of the first to explore the role of the software prototype as a digital boundary object. Our study empirically unpacks five use practices that transform the software prototype into a boundary object such that knowledge boundaries are bridged. Our findings provide new theoretical insights for literature on software innovation and boundary objects, and have implications for practice.
Resumo:
Knowledge processes are critical to outsourced software projects. According to outsourcing research, outsourced software projects succeed if they manage to integrate the client’s business knowledge and the vendor’s technical knowledge. In this paper, we submit that this view may not be wrong, but incomplete in a significant part of outsourced software work, which is software maintenance. Data from six software-maintenance outsourcing transitions indicate that more important than business or technical knowledge can be application knowledge, which vendor engineers acquire over time during practice. Application knowledge was the dominant knowledge during knowledge transfer activities and its acquisition enabled vendor staff to solve maintenance tasks. We discuss implications for widespread assumptions in outsourcing research.
Resumo:
Title: The perception of critical situations involving football fans – how conflicts escalate or de-escalate Authors: Brechbühl, A.1, Schumacher, A.1 & Seiler, R.1 1Institute of Sport Science, University of Bern, Switzerland Abstract: Introduction: Fan violence in the context of football matches is a prominent issue in today’s western societies and Switzerland presents no exception. A lot of research has been conducted on reasons for fan violence, mostly with fans of national teams. A prominent model is the Elaborated Social Identity Model (ESIM; Drury & Reicher, 2000): ESIM highlights the importance of interactions between the involved groups and their effect on the development of social identities. Another model is the aggravation mitigation model (AM model; Hylander & Guvå, 2010) which illustrates factors that can contribute towards an escalation or non-escalation of group violence, such as the “categorization” of the opponent group. Despite these models, research about the individual perceptions, and in particular, what factors distinguish between an escalation versus a non-escalation of a potentially violent situation in domestic football, is as yet scarce. This explorative study examines perceptions of critical situations in the domestic football fan context in Switzerland. Methods: An explorative qualitative design was employed to gather data about critical situations (CS) around football matches of two clubs of the Raiffeisen Super League. A CS is defined as a setting in or around the football stadium where violence between football fans and another group could occur. Eight CS were identified and analysed. Fifty-nine narrative interviews with individuals involved in a CS, e.g. fans, police officers or security personnel, were conducted. Interviews were analysed using interpretative phenomenological analysis (IPA). Results: The involved opposing groups expressed group-specific perceptions. Furthermore a strong tendency to negatively stereotype the opponent group was observed. Provocative symbols, such as balaclavas or riot-gear uniforms, were considered as highly relevant for the interpretation of the situation. Successful communication and sufficient distance between opponent groups supported the appeasement of a CS. These findings also underline the importance of knowledge about the local fan culture. This culture serves as basis for the perception of legitimacy, which was assessed to be essential for a de-escalation of a CS by fans. Discussion/Conclusion: This study improves the understanding of fan violence in the domestic football context in Switzerland. Based on the results it is suggested to deploy security or police forces without riot gear but with the goal of seeking dialogue with the fans to increase the likelihood of a peaceful ending in a CS. The findings also support the applicability of the ESIM (Drury & Reicher, 2000) and the AM model (Hylander & Guvå, 2010) in the context of domestic fan violence. Due to possible differences in the local fan cultures in Switzerland, research in this area should be continued. References: Drury, J., & Reicher, S. (2000). Collective action and psychological change: The emergence of new social identities. British Journal of Social Psychology, 39, 579-604. Hylander, I., & Guvå, G. (2010). Misunderstanding of out-group behaviour: Different interpretations of the same crowd events among police officers and demonstrators. Nordic Psychology, 62, 25-47.
Resumo:
Cloudification of the Centralized-Radio Access Network (C-RAN) in which signal processing runs on general purpose processors inside virtual machines has lately received significant attention. Due to short deadlines in the LTE Frequency Division Duplex access method, processing time fluctuations introduced by the virtualization process have a deep impact on C-RAN performance. This paper evaluates bottlenecks of the OpenAirInterface (OAI is an open-source software-based implementation of LTE) cloud performance, provides feasibility studies on C-RAN execution, and introduces a cloud architecture that significantly reduces the encountered execution problems. In typical cloud environments, the OAI processing time deadlines cannot be guaranteed. Our proposed cloud architecture shows good characteristics for the OAI cloud execution. As an example, in our setup more than 99.5% processed LTE subframes reach reasonable processing deadlines close to performance of a dedicated machine.
Resumo:
Healthy soils are critical to agriculture, and both are essential to enabling food security. Soil-related challenges include using soils and other natural resources sustainably, combating land and soil degradation, avoiding further reduction of soil-related ecosystem services, and ensuring that all agricultural land is managed sustainably. Agricultural challenges include improving the quantity and quality of agricultural outputs to satisfy rising human needs, also in a 2 degrees world; maintaining diversity in agricultural systems while supporting those farms with the highest potential for closing existing yield gaps; and providing a livelihood for about 2.6 billion mostly poor land users. The greatest needs and potentials lie in small-scale farming, although there as elsewhere, trade-offs must be negotiated within the nexus of water, energy, land and food, including the role of soil therein.
Resumo:
Service providers make use of cost-effective wireless solutions to identify, localize, and possibly track users using their carried MDs to support added services, such as geo-advertisement, security, and management. Indoor and outdoor hotspot areas play a significant role for such services. However, GPS does not work in many of these areas. To solve this problem, service providers leverage available indoor radio technologies, such as WiFi, GSM, and LTE, to identify and localize users. We focus our research on passive services provided by third parties, which are responsible for (i) data acquisition and (ii) processing, and network-based services, where (i) and (ii) are done inside the serving network. For better understanding of parameters that affect indoor localization, we investigate several factors that affect indoor signal propagation for both Bluetooth and WiFi technologies. For GSM-based passive services, we developed first a data acquisition module: a GSM receiver that can overhear GSM uplink messages transmitted by MDs while being invisible. A set of optimizations were made for the receiver components to support wideband capturing of the GSM spectrum while operating in real-time. Processing the wide-spectrum of the GSM is possible using a proposed distributed processing approach over an IP network. Then, to overcome the lack of information about tracked devices’ radio settings, we developed two novel localization algorithms that rely on proximity-based solutions to estimate in real environments devices’ locations. Given the challenging indoor environment on radio signals, such as NLOS reception and multipath propagation, we developed an original algorithm to detect and remove contaminated radio signals before being fed to the localization algorithm. To improve the localization algorithm, we extended our work with a hybrid based approach that uses both WiFi and GSM interfaces to localize users. For network-based services, we used a software implementation of a LTE base station to develop our algorithms, which characterize the indoor environment before applying the localization algorithm. Experiments were conducted without any special hardware, any prior knowledge of the indoor layout or any offline calibration of the system.
Resumo:
Service providers make use of cost-effective wireless solutions to identify, localize, and possibly track users using their carried MDs to support added services, such as geo-advertisement, security, and management. Indoor and outdoor hotspot areas play a significant role for such services. However, GPS does not work in many of these areas. To solve this problem, service providers leverage available indoor radio technologies, such as WiFi, GSM, and LTE, to identify and localize users. We focus our research on passive services provided by third parties, which are responsible for (i) data acquisition and (ii) processing, and network-based services, where (i) and (ii) are done inside the serving network. For better understanding of parameters that affect indoor localization, we investigate several factors that affect indoor signal propagation for both Bluetooth and WiFi technologies. For GSM-based passive services, we developed first a data acquisition module: a GSM receiver that can overhear GSM uplink messages transmitted by MDs while being invisible. A set of optimizations were made for the receiver components to support wideband capturing of the GSM spectrum while operating in real-time. Processing the wide-spectrum of the GSM is possible using a proposed distributed processing approach over an IP network. Then, to overcome the lack of information about tracked devices’ radio settings, we developed two novel localization algorithms that rely on proximity-based solutions to estimate in real environments devices’ locations. Given the challenging indoor environment on radio signals, such as NLOS reception and multipath propagation, we developed an original algorithm to detect and remove contaminated radio signals before being fed to the localization algorithm. To improve the localization algorithm, we extended our work with a hybrid based approach that uses both WiFi and GSM interfaces to localize users. For network-based services, we used a software implementation of a LTE base station to develop our algorithms, which characterize the indoor environment before applying the localization algorithm. Experiments were conducted without any special hardware, any prior knowledge of the indoor layout or any offline calibration of the system.
Resumo:
Fan violence in the context of football matches has drawn the attention of stakeholders and the media. This phenomenon has also attracted the scientific community’s attention, where research mostly focused on reasons for violence escalation. The Elaborated Social Identity Model (ESIM; Drury & Reicher, 2000) for example focuses on group-interactions and social identities, while the Aggravation Mitigation Model (AM model; Hylander & Guvå, 2010) concentrates on factors contributing to an escalation or a non-escalation of group-violence. However individual perceptions of the different persons involved in potential conflicts have not been sufficiently examined. Beside of that research in domestic football or involving ultrafans is scarce. Especially in Switzerland, there is a lack of research concerning the dynamics of the development or non-development of fan violence. This exploratory study included eight critical situations from the season 2012/2013 of the Swiss premier league to gather data about the perceptions of various persons involved (fans, police officers or security) and the dynamics contributing towards escalation or de-escalation. Fifty-nine narrative interviews were conducted and analysed with interpretative phenomenological analysis (Smith, Flowers, & Larkin, 2009). The individuals involved (fans, police and security personnel) showed groupspecific perceptions and a tendency to stereotype the opponent group. Provocative symbols (balaclavas or riot-gear uniforms) were important for the interpretation of the situation. No escalation occurred when successful communication and sufficient distance between the groups was established. Knowledge about the local fan culture is important, because it influences the perception of legitimacy on the side of the fans. This study improves the understanding of fan violence and is congruent with the ESIM and the AM model. It is suggested to deploy police dialogue teams without riot gear. Their task is to establish direct communication with the fans to facilitate a peaceful ending of a critical situation.
Resumo:
Context. Within the core accretion scenario of planetary formation, most simulations performed so far always assume the accreting envelope to have a solar composition. From the study of meteorite showers on Earth and numerical simulations, we know that planetesimals must undergo thermal ablation and disruption when crossing a protoplanetary envelope. Thus, once the protoplanet has acquired an atmosphere, not all planetesimals reach the core intact, i.e. the primordial envelope (mainly H and He) gets enriched in volatiles and silicates from the planetesimals. This change of envelope composition during the formation can have a significant effect on the final atmospheric composition and on the formation timescale of giant planets. Aims. We investigate the physical implications of considering the envelope enrichment of protoplanets due to the disruption of icy planetesimals during their way to the core. Particular focus is placed on the effect on the critical core mass for envelopes where condensation of water can occur. Methods. Internal structure models are numerically solved with the implementation of updated opacities for all ranges of metallicities and the software Chemical Equilibrium with Applications to compute the equation of state. This package computes the chemical equilibrium for an arbitrary mixture of gases and allows the condensation of some species, including water. This means that the latent heat of phase transitions is consistently incorporated in the total energy budget. Results. The critical core mass is found to decrease significantly when an enriched envelope composition is considered in the internal structure equations. A particularly strong reduction of the critical core mass is obtained for planets whose envelope metallicity is larger than Z approximate to 0.45 when the outer boundary conditions are suitable for condensation of water to occur in the top layers of the atmosphere. We show that this effect is qualitatively preserved even when the atmosphere is out of chemical equilibrium. Conclusions. Our results indicate that the effect of water condensation in the envelope of protoplanets can severely affect the critical core mass, and should be considered in future studies.