793 resultados para Approach through a game
Resumo:
Despite the proliferation of e-commerce adoption by SMEs and the world-wide growth of e-commerce, in general there is a paucity of empirical studies that examine the adoption of e-commerce by SMEs in the Middle East. In this paper, the authors provide insights into the salient e-commerce adoption issues by focusing on Saudi Arabian SMEs. This research was designed using a qualitative approach through in-depth case studies selected from firms in Saudi Arabia. The findings contribute toward a better conceptual and practical understanding of the main factors driving SMEs to adopt e-commerce. The authors find that the level of e-commerce implementation has yet to mature and customer readiness for Internet shopping must improve before e-commerce reaches the levels of maturity seen in other regions of the world. This study highlights directions for future inquiry and implications for information and technology managers and policymakers in developing Arab nations.
Resumo:
This study suggests a novel application of Inverse Data Envelopment Analysis (InvDEA) in strategic decision making about mergers and acquisitions in banking. The conventional DEA assesses the efficiency of banks based on the information gathered about the quantities of inputs used to realize the observed level of outputs produced. The decision maker of a banking unit willing to merge/acquire another banking unit needs to decide about the inputs and/or outputs level if an efficiency target for the new banking unit is set. In this paper, a new InvDEA-based approach is developed to suggest the required level of the inputs and outputs for the merged bank to reach a predetermined efficiency target. This study illustrates the novelty of the proposed approach through the case of a bank considering merging with or acquiring one of its competitors to synergize and realize higher level of efficiency. A real data set of 42 banking units in Gulf Corporation Council countries is used to show the practicality of the proposed approach.
Resumo:
The automotive industry combines a multitude of professionals to develop a modern car successfully. Within the design and development teams the collaboration and interface between Engineers and Designers is critical to ensure design intent is communicated and maintained throughout the development process. This study highlights recent industry practice with the emergence of Concept Engineers in design teams at Jaguar Land Rover Automotive group. The role of the Concept Engineer emphasises the importance of the Engineering and Design/Styling interface with the Concept engineer able to interact and understand the challenges and specific languages of each specialist area, hence improving efficiency and communication within the design team. Automotive education tends to approach design from two distinct directions, that of engineering design through BSc courses or a more styling design approach through BA and BDes routes. The educational challenge for both types of course is to develop engineers and stylist's who have greater understanding and experience of each other's specialist perspective of design and development. The study gives examples of two such courses in the UK who are developing programmes to help students widen their understanding of the engineering and design spectrum. Initial results suggest the practical approach has been well received by students and encouraged by industry as they seek graduates with specialist knowledge but also a wider appreciation of their role within the design process.
Resumo:
Wireless Sensor Network (WSN) systems have become more and more popular in our modern life. They have been widely used in many areas, such as smart homes/buildings, context-aware devices, military applications, etc. Despite the increasing usage, there is a lack of formal description and automated verification for WSN system design. In this paper, we present an approach to support the rigorous verification of WSN modeling using the Semantic Web technology We use Web Ontology Language (OWL) and Semantic Web Rule Language (SWRL) to define a meta-ontology for the modeling of WSN systems. Furthermore, we apply ontology reasoners to perform automated verification on customized WSN models and their instances. We demonstrate and evaluate our approach through a Light Control System (LCS) as the case study.
Resumo:
This dissertation discussed resource allocation mechanisms in several network topologies including infrastructure wireless network, non-infrastructure wireless network and wire-cum-wireless network. Different networks may have different resource constrains. Based on actual technologies and implementation models, utility function, game theory and a modern control algorithm have been introduced to balance power, bandwidth and customers' satisfaction in the system. ^ In infrastructure wireless networks, utility function was used in the Third Generation (3G) cellular network and the network was trying to maximize the total utility. In this dissertation, revenue maximization was set as an objective. Compared with the previous work on utility maximization, it is more practical to implement revenue maximization by the cellular network operators. The pricing strategies were studied and the algorithms were given to find the optimal price combination of power and rate to maximize the profit without degrading the Quality of Service (QoS) performance. ^ In non-infrastructure wireless networks, power capacity is limited by the small size of the nodes. In such a network, nodes need to transmit traffic not only for themselves but also for their neighbors, so power management become the most important issue for the network overall performance. Our innovative routing algorithm based on utility function, sets up a flexible framework for different users with different concerns in the same network. This algorithm allows users to make trade offs between multiple resource parameters. Its flexibility makes it a suitable solution for the large scale non-infrastructure network. This dissertation also covers non-cooperation problems. Through combining game theory and utility function, equilibrium points could be found among rational users which can enhance the cooperation in the network. ^ Finally, a wire-cum-wireless network architecture was introduced. This network architecture can support multiple services over multiple networks with smart resource allocation methods. Although a SONET-to-WiMAX case was used for the analysis, the mathematic procedure and resource allocation scheme could be universal solutions for all infrastructure, non-infrastructure and combined networks. ^
Resumo:
Cette étude vise à analyser les liens entre le climat scolaire et la victimisation par les pairs en contexte de persévérance et de réussite scolaires au secondaire. Après avoir démontré l’existence de liens théoriques entre ces trois variables, elle évalue l’influence du climat scolaire décliné en quatre composantes (sentiment de sécurité, de justice, relations interpersonnelles/soutien et collaboration/participation) sur six formes de victimisation par les pairs (physique, verbale, psychologique, matérielle, électronique, à connotation sexuelle). Les résultats de cette recherche menée auprès de 2 154 élèves de la première à la cinquième secondaire révèlent que la composante du climat scolaire « Sentiment de sécurité » se distingue avec une influence sur les six formes de victimisation étudiées, signifiant que les élèves qui se sentent en sécurité dans leur milieu scolaire sont moins à risque de vivre ces différentes formes de violence. L’influence des autres composantes du climat scolaire sur la victimisation s’est toutefois avérée très faible. Comme le vécu victimaire et la perception d’un climat scolaire négatif peuvent nuire à la réussite et à la persévérance scolaires et entraver la diplomation, et que la décision d’abandonner l’école se prend souvent durant la quatrième et cinquième années du secondaire (Frase, 1989; MELS, 2009), c’est à ce groupe particulier d’élèves que la troisième partie de cette thèse s’est consacrée. Les analyses menées spécifiquement auprès d’élèves de quatrième et cinquième secondaire (n = 715) indiquent que ceux qui subissent au moins une des six formes de victimisation perçoivent plus négativement chacune des composantes du climat scolaire de leur établissement, comparativement à leurs pairs non victimisés. Précisément, les élèves victimes de violence physique et verbale perçoivent plus négativement les quatre composantes du climat scolaire et celles de formes matérielle, psychologique et à connotation sexuelle jugent aussi plus négativement toutes les composantes du climat scolaire, excepté celle du climat de sécurité. L’ensemble de ces résultats indiquent que la perception du climat scolaire influence la victimisation pour l’ensemble des élèves du secondaire et soulignent que cette victimisation, vécue par les élèves de quatrième et cinquième secondaire, affecte plus négativement leur perception du climat scolaire. Des réflexions sont finalement proposées afin d’orienter de futures recherches de même que certaines retombées pratiques pour les milieux scolaires.
Resumo:
Purpose – The purpose of this study is to investigate the effect of non-audit services on auditor independence, and the importance of non-audit services as a source of income for audit firms in the United Kingdom. Design/method/approach – This study will examine 11 companies in the food retail- and wholesale industry during 2007 - 2014. Five indicators have been used; (1) Appointed auditor and provision of non-audit services to audit clients; (2) Auditor tenure; (3) Non-audit services in relation to total services; (4) Tax-services in relation to non-audit services, (5) Big Four’s revenue. Information has been collected using the quantitative approach through annual- and transparency reports. The threshold used to measure possible independence threats (self-review-, self-interest- and familiarity threat) has been set at 18,5 %. Findings – This study concludes that the jointly provision of audit- and nonaudit services possibly causes impairment of auditor independence, and that non-audit services is an important source of income for audit firms. The findings showed that in 99 %, companies purchased non-audit services from their statutory auditor. Non-audit services in relation to total services surpassed the threshold in 78 % of all financial years. Likewise, tax-services in comparison to non-audit services exceeded the threshold in 65 % of all financial years. The Big Four’s revenue from non-audit services to audit clients in relation to total revenue is almost constantly below the threshold. However, in all financial years except from one, total revenue from non-audit services surpassed revenue from audit services by far. Contribution – The study contributes to the ongoing discussion about nonaudit services effect on auditor independence. Originality/value – This study is one of few that provide detailed information about non-audit services in the food retail- and wholesale industry. It highlights social and ethical issues with regard to agency relationships.
Resumo:
The study of forest re activity, in its several aspects, is essencial to understand the phenomenon and to prevent environmental public catastrophes. In this context the analysis of monthly number of res along several years is one aspect to have into account in order to better comprehend this tematic. The goal of this work is to analyze the monthly number of forest res in the neighboring districts of Aveiro and Coimbra, Portugal, through dynamic factor models for bivariate count series. We use a bayesian approach, through MCMC methods, to estimate the model parameters as well as to estimate the common latent factor to both series.
Resumo:
El objetivo del presente artículo es establecer y clarificar el planteamiento de líneas de investigación en diseño a través de ejemplos demostrativos de proyectos de investigación en los tres niveles de investigación: básica, aplicada y de desarrollo tecnológico. La corroboración de estos proyectos tanto por la aplicación práctica a productos reales comercializados sería un primer nivel de verificación de transferencia de conocimiento a empresas, y un segundo nivel de evaluación sería la penetración en el mercado de esos productos resultantes, siendo ésta posiblemente la validación más contundente. Sin embargo, la evaluación positiva de los diferentes tramos de investigación solicitados a la CNEAI basados en estas experiencias prácticas, aporta un valor diferencial a los proyectos desarrollados porque validan una forma de entender la investigación en diseño, nos ha permitido generar un saber-hacer muy particular, y nos dispone a transferirlo al área de conocimiento de dibujo, y mejorar su rendimiento científico, tan reclamado desde las administraciones educativas del país.
Resumo:
This paper presents a differential approach of financial mathematics developed in high school, focusing on financial education. We seek through the insertion of texts, analysis of some financial products and by the interpretation of problems to contribute to the financial training of students. Aiming to make financial mathematics more attractive and accessible to the day-today, there are available for studies some practical tools like the citizen calculator which are available for computers and mobile phones. As well as spreadsheets and software Geogebra, that allow you to compare and analyze the financial costs of consortia, financing and financial applications,in addition to being allied in the preparation and control of personal and family budget. By applying the teaching sequence proposed in a nocturnal class of high school, we realized some difficulties that have limited the financial learning of math concepts.Yet identified progress regarding the financial education of students. These observations were made through qualitative and quantitative analysis from notes in the field diary and also answers given by students in specific form.
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
A Comparative Study on the Homeroom Teachers’ Perception of the School guidance in Korea and Finland
Resumo:
This study has four major purposes. First, it compares school guidance of homeroom teachers in Korea and Finland, in order to understand the reality of education, based on the teachers’ perceptions. Secondly, it also considers the topic within its historical, social, and cultural backgrounds, from a critical standpoint. Thirdly, it investigates the direction of the improvement of school guidance, based on the analysis of similarities and differences between Korea and Finland, with regards to the meaning, practice, and environmental factors of the school guidance. Lastly, the influential factors surrounding the school guidance are noted by analysing empirical data from a microscopic approach, and extending the understanding of it into a social context. As for the methods, it employs thematic analysis approach through 10 homeroom teacher interviews in the lower secondary schools. As a result, firstly, the teachers in both countries assumed similarly, that the role of the teacher was not only to teach the subject, but also to care about every aspects of the students’ development in their school life. In addition, they accepted the fact that school guidance became more significant. However, the school guidance became the top priority for the Korean teachers, while teaching subject is the main task for the Finnish teachers. Secondly, the homeroom teachers in both countries hoped to have a better working environment, to perform school guidance concerning education budget for the resources of school guidance, tight curriculum, and increasing the teachers’ tasks. Thirdly, the school guidance in Korea seemed to be influenced by social expectation and government demand, whereas, the Finnish teachers considered school guidance in more aspects of adjustment and academic motivation, rather than resolving the social problems. Fourthly, the Korean teachers perceived that the trust and respect from the society and home became weakened, also expressing doubts about the educational policies and the attitude of the government with regards to school guidance. On the other hand, the Finnish teachers believed that they were trusted and respected by the society. However, blurred lines in the roles and accountability between the homeroom teachers, home, and the society were also controversial among the teachers in both countries. To sum up, Finland needs to ameliorate the system and conditions for school guidance of the homeroom teachers. The consensus on the role and tasks of Finnish homeroom teachers for school guidance seem to be also necessary. Meanwhile, Korea should improve the social system and social consciousness of the teacher, school guidance, and schooling, preceding the reform of the education system or conditions.
Resumo:
Este relatório de estágio foi realizado na Unidade Curricular da Prática de Ensino Supervisionada (PES), integrada no plano de estudos do curso de Mestrado em Educação Pré-Escolar e Ensino (EPE) e Ensino do 1.º Ciclo do Ensino Básico (1.º CEB) da Escola Superior de Educação do Instituto Politécnico de Bragança. A PES em contexto de Educação Pré-Escolar foi desenvolvida com um grupo de 12 crianças com 3 e 4 anos de idade, numa Instituição Particular de Solidariedade Social (IPSS). Em contexto do 1.º Ciclo do Ensino Básico foi realizada com um grupo de 19 crianças com 8 e 9 anos de idade, numa escola da rede pública. No decorrer da prática tivemos sempre presente os interesses e necessidades das crianças, a interdisciplinaridade entre as áreas do saber, assim como, a importância da formação social e pessoal das crianças, de forma, a torná-las autónomas e participativas e a integrá-las na sociedade. Durante o processo ensino-aprendizagem tivemos o cuidado de desenvolver atividades enriquecedoras e que motivassem as crianças para a aprendizagem. No sentido de melhorar a ação educativa, procurámos ao longo da prática educativa debruçar-nos sobre a utilização do jogo/lúdico como instrumento de aprendizagem, uma vez que, permitem o desenvolvimento pessoal e social das crianças. Desta forma, promovemos atividades lúdicas, através do jogo, pois ele faz parte integrante da vida das crianças. As atividades desenvolvidas foram planificadas de forma a darmos resposta às questões-problema: Os professores reconhecem a importância dos jogos nas aprendizagens das crianças? Qual a importância do jogo/lúdico no processo ensino-aprendizagem? Os jogos/lúdico influenciam o processo de ensino-aprendizagem? Para esta problemática estabelecemos os seguintes objetivos: (i) perceber se os professores aplicam os jogos/lúdico no processo de ensino aprendizagem; (ii) averiguar o envolvimento das crianças em atividades lúdicas; (iii) verificar se os jogos ajudam no processo ensino-aprendizagem; (iv) reconhecer a importância do jogo para as crianças. Para que fosse possível recolhermos dados sobre a presente investigação foi necessário utilizar uma metodologia de investigação, assim como, um conjunto de técnicas e instrumentos. Como tal recorremos a uma metodologia de investigação qualitativa, uma vez que, utilizámos notas de campo e registos fotográficos para a recolha de dados. Os resultados do trabalho foram positivos com as crianças, educadoras e professores a valorizarem o jogo lúdico e permitiu às crianças desenvolverem a cooperação e interação entre elas e estimulou e favoreceu as suas aprendizagens.
Resumo:
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules
Resumo:
La necesidad de mejorar la eficiencia de las organizaciones ha obligado a adoptar nuevas políticas de gestión. Esta necesidad también ha llegado a las empresas e instituciones públicas, incluyendo a las Universidades. Una de las posibilidades de mejora es la aplicación del enfoque de la gestión por procesos a través del Business Process Management (BPM). Las TIC proporcionan la posibilidad de implementar este enfoque a través de los BPMS, lo que aumenta las ventajas de la nueva gestión ya que ofrece la automatización de los procesos, su rediseño y mejora continúa. El caso de estudio es la aplicación de un BPMS en una institución pública educativa de Ecuador para observar como la gestión se mejora, alcanzándose mayores niveles de calidad y una reducción de los tiempos de proceso.