878 resultados para WIFM (Computer program)
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
This article places the 6 June 2012 transit of Venus in the context of James Cook’s voyage from England to the South Pacific to observe the 1769 transit of Venus. A description is given on how to use a computer program called Stellarium to ‘observe’ the 1769 transit of Venus exactly as Cook saw it from the island of Tahiti in the South Pacific.
Resumo:
At the core of our uniquely human cognitive abilities is the capacity to see things from different perspectives, or to place them in a new context. We propose that this was made possible by two cognitive transitions. First, the large brain of Homo erectus facilitated the onset of recursive recall: the ability to string thoughts together into a stream of potentially abstract or imaginative thought. This hypothesis is sup-ported by a set of computational models where an artificial society of agents evolved to generate more diverse and valuable cultural outputs under conditions of recursive recall. We propose that the capacity to see things in context arose much later, following the appearance of anatomically modern humans. This second transition was brought on by the onset of contextual focus: the capacity to shift between a minimally contextual analytic mode of thought, and a highly contextual associative mode of thought, conducive to combining concepts in new ways and ‘breaking out of a rut’. When contextual focus is implemented in an art-generating computer program, the resulting artworks are seen as more creative and appealing. We summarize how both transitions can be modeled using a theory of concepts which high-lights the manner in which different contexts can lead to modern humans attributing very different meanings to the interpretation of one concept.
Resumo:
Intellectual Property - group of rights used to protect literary, artistic and industrial property. Generally separated into the categories of: • Copyright • Trade marks • Designs • Patents But also extends to specific subject matter of plant variety rights and circuit layouts and general information that is confidential such as trade secrets and protection of goodwill and reputation through the action of passing off. New information, be it a new computer program or novel device, developed by an organisation is valuable to it. So too is the organisation name and reputation. While some protection is automatic, like copyright, other protection and rights must be obtained under various legislation. When dealing with employees and third parties, ownership of existing and new rights needs to be clearly established so that rights are not lost. Obligations in relation to the use of certain property and any confidential information must also be clearly established...
Resumo:
The act of computer programming is generally considered to be temporally removed from a computer program's execution. In this paper we discuss the idea of programming as an activity that takes place within the temporal bounds of a real-time computational process and its interactions with the physical world. We ground these ideas within the con- text of livecoding -- a live audiovisual performance practice. We then describe how the development of the programming environment "Impromptu" has addressed our ideas of programming with time and the notion of the programmer as an agent in a cyber-physical system.
Resumo:
Motivation: Unravelling the genetic architecture of complex traits requires large amounts of data, sophisticated models and large computational resources. The lack of user-friendly software incorporating all these requisites is delaying progress in the analysis of complex traits. Methods: Linkage disequilibrium and linkage analysis (LDLA) is a high-resolution gene mapping approach based on sophisticated mixed linear models, applicable to any population structure. LDLA can use population history information in addition to pedigree and molecular markers to decompose traits into genetic components. Analyses are distributed in parallel over a large public grid of computers in the UK. Results: We have proven the performance of LDLA with analyses of simulated data. There are real gains in statistical power to detect quantitative trait loci when using historical information compared with traditional linkage analysis. Moreover, the use of a grid of computers significantly increases computational speed, hence allowing analyses that would have been prohibitive on a single computer. © The Author 2009. Published by Oxford University Press. All rights reserved.
Resumo:
The invention relates to a method for monitoring user activity on a mobile device, comprising an input and an output unit, comprising the following steps preferably in the following order: detecting and / or logging user activity on said input unit, identifying a foreground running application, hashing of a user-interface-element management list of the foreground running application, and creating a screenshot comprising items displayed on said input unit. The invention also relates to a method for analyzing user activity at a server, comprising the following step: obtaining at least one of an information about detected and / or logged user activity, an information about a foreground running application, a hashed user-interface-element management list and a screenshot from a mobile device. Further, a computer program product is provided, comprising one or more computer readable media having computer executable instructions for performing the steps of at least one of the aforementioned methods.
Resumo:
Charcot-Marie-Tooth neuropathy type 1 (CMT1) is an autosomal dominant disorder originally localized to chromosome 1 by linkage to the Duffy blood group. Studies have since shown that the disorder may be heterogeneous, as not all families show this linkage. We tested genetic heterogeneity by the HOMOG computer program in 15 CMT1 pedigrees informative for Duffy. We detected no evidence for heterogeneity in this sample, but when we combined results with previously published lod scores, heterogeneity was statistically significant. Twelve of the 15 families studied did not show linkage to Duffy. We found six of these families to be informative for a chromosome 19 marker, apolipoprotein CII(ApoC2). Despite a previous report showing probable linkage of a non-Duffy-linked CMT1 pedigree to two chromosome 19 markers, we did not detect significant linkage of ApoC2 to CMT1 in these families.
Resumo:
Motivation: Gene silencing, also called RNA interference, requires reliable assessment of silencer impacts. A critical task is to find matches between silencer oligomers and sites in the genome, in accordance with one-to-many matching rules (G-U matching, with provision for mismatches). Fast search algorithms are required to support silencer impact assessments in procedures for designing effective silencer sequences.Results: The article presents a matching algorithm and data structures specialized for matching searches, including a kernel procedure that addresses a Boolean version of the database task called the skyline search. Besides exact matches, the algorithm is extended to allow for the location-specific mismatches applicable in plants. Computational tests show that the algorithm is significantly faster than suffix-tree alternatives. © The Author 2010. Published by Oxford University Press. All rights reserved.
Resumo:
Lean strategies have been developed to eliminate or reduce waste and thus improve operational efficiency in a manufacturing environment. However, in practice, manufacturers encounter difficulties to select appropriate lean strategies within their resource constraints and to quantitatively evaluate the perceived value of manufacturing waste reduction. This paper presents a methodology developed to quantitatively evaluate the contribution of lean strategies selected to reduce manufacturing wastes within the manufacturers’ resource (time) constraints. A mathematical model has been developed for evaluating the perceived value of lean strategies to manufacturing waste reduction and a step-by-step methodology is provided for selecting appropriate lean strategies to improve the manufacturing performance within their resource constraints. A computer program is developed in MATLAB for finding the optimum solution. With the help of a case study, the proposed methodology and developed model has been validated. A ‘lean strategy-wastes’ correlation matrix has been proposed to establish the relationship between the manufacturing wastes and lean strategies. Using the correlation matrix and applying the proposed methodology and developed mathematical model, authors came out with optimised perceived value of reduction of a manufacturer's wastes by implementing appropriate lean strategies within a manufacturer's resources constraints. Results also demonstrate that the perceived value of reduction of manufacturing wastes can significantly be changed based on policies and product strategy taken by a manufacturer. The proposed methodology can also be used in dynamic situations by changing the input in the programme developed in MATLAB. By identifying appropriate lean strategies for specific manufacturing wastes, a manufacturer can better prioritise implementation efforts and resources to maximise the success of implementing lean strategies in their organisation.
Resumo:
Background There is increasing interest in using complementary and alternative treatments to manage behavioural and psychological symptoms of dementia such as agitation, aggression and depressed mood. Objective To compare the effect of foot massage (intervention) and quiet presence (control) on agitation and mood in people with dementia. Design A randomised controlled trial using a within-subjects, crossover design. Settings Five long-term care facilities in Brisbane, Australia. The primary outcome was the Cohen-Mansfield Agitation Inventory (CMAI) and the secondary outcome was the Observed Emotion Rating Scale (OERS). The screening and data collection research assistants, families, and care staff were blinded to participant allocation. Participants Participants of the study were 55 long-term care residents aged 74–103 years (mean age 86.5), with moderate to severe dementia and a history of agitated behaviour according to the Pittsburgh Agitation Scale. A computer-program randomised participants to 10-min foot massage (intervention) or quiet presence (control), every weekday for 3 weeks. Results A carry-over effect was identified in the data, and so the data was treated as a parallel groups RCT. The mean total CMAI increased in both groups (reflecting an increase in agitation) with this increase greater in the quiet presence group than the foot massage group (p=0.03). There was a trend towards a difference on OERS General Alertness, with a positive change in alertness for participants in the foot massage group (indicating reduced alertness) and a negative change for participants in the quiet presence group (indicating increased alertness) (F(1,51)=3.88, p=0.05, partial ή2=0.07). Conclusions The findings highlight the need for further research on the specific conditions under which massage might promote relaxation and improve mood for people with dementia. The unfamiliar research assistants and variations in usual activity may have contributed to the increase in agitation and this needs further research.
Resumo:
Background There is increasing interest in using complementary and alternative treatments to manage behavioural and psychological symptoms of dementia such as agitation, aggression and depressed mood. Objective To compare the effect of foot massage (intervention) and quiet presence (control) on agitation and mood in people with dementia. Design A randomised controlled trial using a within-subjects, crossover design. Settings Five long-term care facilities in Brisbane, Australia. The primary outcome was the Cohen-Mansfield Agitation Inventory (CMAI) and the secondary outcome was the Observed Emotion Rating Scale (OERS). The screening and data collection research assistants, families, and care staff were blinded to participant allocation. Participants Participants of the study were 55 long-term care residents aged 74–103 years (mean age 86.5), with moderate to severe dementia and a history of agitated behaviour according to the Pittsburgh Agitation Scale. A computer-program randomised participants to 10-min foot massage (intervention) or quiet presence (control), every weekday for 3 weeks. Results A carry-over effect was identified in the data, and so the data was treated as a parallel groups RCT. The mean total CMAI increased in both groups (reflecting an increase in agitation) with this increase greater in the quiet presence group than the foot massage group (p=0.03). There was a trend towards a difference on OERS General Alertness, with a positive change in alertness for participants in the foot massage group (indicating reduced alertness) and a negative change for participants in the quiet presence group (indicating increased alertness) (F(1,51)=3.88, p=0.05, partial ή2=0.07). Conclusions The findings highlight the need for further research on the specific conditions under which massage might promote relaxation and improve mood for people with dementia. The unfamiliar research assistants and variations in usual activity may have contributed to the increase in agitation and this needs further research.
Resumo:
Collections of biological specimens are fundamental to scientific understanding and characterization of natural diversity - past, present and future. This paper presents a system for liberating useful information from physical collections by bringing specimens into the digital domain so they can be more readily shared, analyzed, annotated and compared. It focuses on insects and is strongly motivated by the desire to accelerate and augment current practices in insect taxonomy which predominantly use text, 2D diagrams and images to describe and characterize species. While these traditional kinds of descriptions are informative and useful, they cannot cover insect specimens "from all angles" and precious specimens are still exchanged between researchers and collections for this reason. Furthermore, insects can be complex in structure and pose many challenges to computer vision systems. We present a new prototype for a practical, cost-effective system of off-the-shelf components to acquire natural-colour 3D models of insects from around 3 mm to 30 mm in length. ("Natural-colour" is used to contrast with "false-colour", i.e., colour generated from, or applied to, gray-scale data post-acquisition.) Colour images are captured from different angles and focal depths using a digital single lens reflex (DSLR) camera rig and two-axis turntable. These 2D images are processed into 3D reconstructions using software based on a visual hull algorithm. The resulting models are compact (around 10 megabytes), afford excellent optical resolution, and can be readily embedded into documents and web pages, as well as viewed on mobile devices. The system is portable, safe, relatively affordable, and complements the sort of volumetric data that can be acquired by computed tomography. This system provides a new way to augment the description and documentation of insect species holotypes, reducing the need to handle or ship specimens. It opens up new opportunities to collect data for research, education, art, entertainment, biodiversity assessment and biosecurity control. © 2014 Nguyen et al.