846 resultados para Compliance frameworks
Resumo:
BACKGROUND: Radial maze tasks have been used to assess optimal foraging and spatial abilities in rodents. The spatial performance was based on a capacity to rely on a configuration of local and distant cues. We adapted maze procedures assessing the relative weight of local cues and distant landmarks for arm choice in humans. NEW METHOD: The procedure allowed testing memory of places in four experimental setups: a fingertip texture-groove maze, a tactile screen maze, a virtual radial maze and a walking size maze. During training, the four reinforced positions remained fixed relative to local and distal cues. During subsequent conflict trials, these frameworks were made conflictive in the prediction of reward locations. RESULTS: Three experiments showed that the relative weight of local and distal relational cues is affected by different factors such as cues' nature, visual access to the environment, real vs. virtual environment, and gender. A fourth experiment illustrated how a walking maze can be used with people suffering intellectual disability. COMPARISON WITH EXISTING METHODS: In our procedure, long-term (reference) and short-term (working) memory can be assessed. It is the first radial task adapted to human that enables dissociating local and distal cues, to provides an indication as to their relative salience. Our mazes are moveable and easily used in limited spaces. Tasks are performed with realistic and spontaneous though controlled exploratory movements. CONCLUSION: Our tasks enabled highlighting the use of different strategies. In a clinical perspective, considering the use of compensatory strategies should orient towards adapted behavioural rehabilitation.
Resumo:
Reusability has become more popular factor in modern software engineering. This is mainly because object-orientation has brought methods that allow reusing more easily. Today more and more application developer thinks how they can reuse already existing applications in their work. If the developer wants to use existing components outside the current project, he can use design patterns, class libraries or frameworks. These provide solution for specific or general problems that has been already encountered. Application frameworks are collection of classes that provides base for the developer. Application frameworks are mostly implementation phase tools, but can also be used in application design. The main purpose of the frameworks is separate domain specific functionalities from the application specific. Usually the frameworks are divided into two categories: black and white box. Difference between those categories is the way the reuse is done. The application frameworks provide properties that can be examined and compared between different frameworks. These properties are: extensibility, reusability, modularity and scalability. These examine how framework will handle different platforms, changes in framework, increasing demand for resources, etc. Generally application frameworks do have these properties in good level. When comparing general purpose framework and more specific purpose framework, the main difference can be located in reusability of frameworks. It is mainly because the framework designed to specific domain can have constraints from external systems and resources. With general purpose framework these are set by the application developed based on the framework.
Resumo:
A multicompartment compliance aid (MCA) is a blister-type repackaging system that aims to facilitate drug administration and thereby increase patient adherence. One of the characteristics of the MCA that should be taken into account is the moisture permeability, since this atmospheric condition is one of the most important factors that can modify the stability of medicines. In the current paper we report the moisture permeability tests performed on a MCA according to the US Pharmacopeia. This information on the suitability of the device will help pharmacists implement a high-quality professional service.
Resumo:
Current e-business standards have been developed and used by large organizations to reduce clerical costs in business transactions by increased automation and higher level of business-to-business integration. Small and medium enterprises (SME's), however, cannot easily adopt these standards due to the SME's lacking the technical expertise and resources for implementing them. Still, large organizations increasingly require their business partners, most of which are SME's, to be able to interoperate by their chosen e-business standards. The research question for the study was, first, which of the existing e-business technologies are most SME-adoptable, and, second, how could those e-business technologies be made easier for SME's to implement. The study was conducted as a literature study that evaluated the available e-business frameworks and SME-oriented e-business architectures based on the implementation complexity and costs incurred for the SME adopter. The study found that only few e-business solutions are SMEadoptable. The technological approaches used in the solutions need to be improved on a number of areas, the most important of which is implementation complexity. The study revealed that this also applies to the special, SME-oriented e-business architectures, which are also still too difficult for SME's to implement. Based on these findings, a high-level e-business interoperability framework concept was proposed as the basis for future research to overcome the found implementation complexities for SME's.
Resumo:
Master’s thesis focuses on the questions of crane electrics compliance with electrical safety standards. Overview and short comparison of the world’s effective standards in the field is made in order to understand their demands. Basic concepts of a proper electrical circuit design are presented. Characteristics, construction and operation principles of overcurrent protective devices are studied in details. Electrics of the basic crane is designed according to the assumed customer’s demands, compliance with the requirements of the standards is checked. Solutions to achieve better compliance in some issues are proposed. Accent is made on the National Electrical Code (NEC) and standards by Underwriters Laboratories (UL) latests demands. Requirements of the International Electrotechnical Commission (IEC) are also taken into account.
Resumo:
Several recent works in history and philosophy of science have re-evaluated the alleged opposition between the theses put forth by logical empiricists such as Carnap and the so-called "post-positivists", such as Kuhn. Although the latter came to be viewed as having seriously challenged the logical positivist views of science, recent authors (e.g., Friedman, Reisch, Earman, Irzik and Grünberg) maintain that some of the most notable theses of the Kuhnian view of science have striking similarities with some aspects of Carnap's philosophy. Against that reading, Oliveira and Psillos argue that within Carnap's philosophy there is no place for the Kuhnian theses of incommensurability, holism, and theory-ladenness of observations. This paper presents each of those readings and argues that Carnap and Kuhn have non-opposing views on holism, incommensurability, the theory-ladenness of observations, and scientific revolutions. We note at the very end - without dwelling on the point, however - that they come apart on other matters, such as their views on metaphysics and on the context of discovery/justification distinction.
Resumo:
The most outstanding conceptual challenge of modern crisis management is the principle of consent. It is not a problem only at the operational level - it challenges the entire decision-making structures of crisis management operations. In post-cold war times and especially in the 21st century, there has been a transition from peacekeeping with limited size and scope towards large and complex peace operations. This shift has presented peace operations with a dilemma. How to balance between maintaining consent for peace operations, whilst being able to use military force to coerce those attempting to wreck peace processes? To address such a dilemma, this research aims to promote understanding, on what can be achieved by military crisis management operations (peace support operations) in the next decade. The research concentrates on the focal research question: Should military components induce consent or rely on the compliance of conflicting parties in crisis management operations of the next decade (2020 – 2030)? The focus is on military – political strategic level considerations, and especially on the time before political decisions to commit to a crisis management operation. This study does not focus on which actor or organisation should intervene. The framework of this thesis derives from the so called ‘peacebuilding space’, the scope of peace operations and spoiler theory. Feasibility of both peace enforcement and peacekeeping in countering future risk conditions are analysed in this framework. This future-orientated qualitative research uses the Delphi-method with a panel of national and international experts. Citation analysis supports identification of relevant reference material, which consists of contemporary literature, the Delphi-questionnaires and interviews. The research process followed three main stages. In the first stage, plausible future scenarios and risk conditions were identified with the Delphi-panel. In the second stage, operating environments for peace support operations were described and consequent hypotheses formulated. In the third stage, these hypotheses were tested on the Delphi-panel. The Delphi-panel is sufficiently wide and diverse to produce plausible yet different insights. The research design utilised specifically military crisis management and peace operations theories. This produced various and relevant normative considerations. Therefore, one may argue that this research; which is based on accepted contemporary theory, hypotheses derived thereof and utilising an expert panel, contributes to the realm of peace support operations. This research finds that some degree of peace enforcement will be feasible and necessary in at least the following risk conditions: failed governance; potential spillover of ethnic, religious, ideological conflict; vulnerability of strategic chokepoints and infrastructures in ungoverned spaces; as well as in territorial and extra-territorial border disputes. In addition, some form of peace enforcement is probably necessary in risk conditions pertaining to: extremism of marginalised groups; potential disputes over previously uninhabited and resource-rich territories; and interstate rivalry. Furthermore, this research finds that peacekeeping measures will be feasible and necessary in at least risk conditions pertaining to: potential spillover of ethnic, religious, ideological conflict; uncontrolled migration; consequences from environmental catastrophes or changes; territorial and extra-territorial border disputes; and potential disputes over previously uninhabited and resource-rich territories. These findings are all subject to both generic and case specific preconditions that must exist for a peace support operation. Some deductions could be derived from the research findings. Although some risk conditions may appear illogical, understanding the underlying logic of a conflict is fundamental to understanding transition in crisis management. Practitioners of crisis management should possess cognizance of such transition. They must understand how transition should occur from threat to safety, from conflict to stability – and so forth. Understanding transition is imperative for managing the dynamic evolution of preconditions, which begins at the outset of a peace support operation. Furthermore, it is pertinent that spoilers are defined from a peace process point of view. If spoilers are defined otherwise, it changes the nature of an operation towards war, where the logic is breaking the will of an enemy - and surrender. In peace support operations, the logic is different: actions towards spoilers are intended to cause transition towards consent - not defeat. Notwithstanding future developments, history continues to provide strategic education. However, the distinction is that the risk conditions occur in novel futures. Hence, lessons learned from the past should be fitted to the case at hand. This research shows compelling evidence that swaying between intervention optimism and pessimism is not substantiated. Both peace enforcement and peacekeeping are sine qua non for successful military crisis management in the next decade.
Resumo:
The starting point of this study is that the prevailing way to consider the Finnish IT industries and industry information often results in a limited and even skewed picture of the sector. The purpose of the study is to contribute and increase knowledge and understanding of the status, structure and evolution of the Finnish IT industries as well as the Finnish IT vendor field and competition. The focus is on software product and IT services industries which form a crucial part of all ICT industries. This study examines the Finnish IT sector from production (supply) as well as market (demand) perspective. The study is based on empirical information from multiple sources. Three research questions were formulated for the study. The first concerns the status of the Finnish IT industries considered by applying theoretical frameworks. The second research question targets at the basis for the future evolution of the Finnish IT industries and, finally, the third at the ability of the available definitions and indicators to describe the Finnish IT industries and IT markets. Major structural changes like technological changes and related innovations, globalization and new business models are drivers of the evolution of the IT industries. The findings of this study emphasize the significant role of IT services in the Finnish IT sector and in connection to that the ability to combine IT service skills, competences and practices with high level software skills also in the future. According to the study the Finnish IT enterprises and their customers have become increasingly dependent on global ecosystems and platforms, applications and IT services provided by global vendors. As a result, more IT decisions are made outside Finland. In addition, IT companies are facing new competition from other than IT industries bringing into market new substitutes. To respond to the new competition, IT firms seek growth by expanding beyond their traditional markets.. The changing global division of labor accentuates the need for accurate information of the IT sector but, at the same time, also makes it increasingly challenging to acquire the information needed. One of the main contributions of this study is to provide frameworks for describing the Finnish IT sector and its evolution. These frameworks help combine empirical information from various sources and make it easier to concretize the structures, volumes, relationships and interaction of both, the production and market side of the Finnish IT industry. Some frameworks provide tools to analyze the vendor field, competition and the basis for the future evolution of the IT industries. The observations of the study support the argument that static industry definitions and related classifications do not serve the information needs in dynamic industries, such as the IT industries. One of the main messages of this study is to emphasize the importance of understanding the definitions and starting points of different information sources. Simultaneously, in the structure and evolution of Finnish IT industries the number of employees has become a more valid and reliable measure than the revenue based indicators.
Resumo:
Purpose To evaluate the compliance and degree of satisfaction of nulligravida (has not given birth) and parous (had already given birth) women who are using intrauterine devices (IUDs). Methods A cross-sectional cohort study was conducted comparing nulligravida and parous women who had had an IUD inserted between July 2009 and November 2011. A total of 84 nulligravida women and 73 parous women were included. Interviews were conducted with women who agreed to participate through telephone contact. Statistical analysis was performed with Student s t-test and Mann-Whitney test for numeric variables; Pearson s chi-square test to test associations; and, whenever pertinent, Fisher s exact test for categorical variables. A survival curve was constructed to estimate the likelihood of each woman continuing the use of the IUD. A significance level of 5% was established. Results When compared with parous women, nulligravida women had a higher education level (median: 12 vs. 10 years). No statistically significant differences were found between the nulligravida and parous women with respect to information on the use of the IUD, prior use of other contraceptive methods, the reason for having chosen the IUD as the current contraceptive method, reasons for discontinuing the use and adverse effects, compliance, and degree of satisfaction. The two groups did not show any difference in terms of continued use of the IUD (p = 0.4). Conclusion There was no difference in compliance or the degree of satisfaction or continued use of IUDs between nulligravida and parous women, suggesting that IUD use may be recommended for women who have never been pregnant.
Model-View-Controller architectural pattern and its evolution in graphical user interface frameworks
Resumo:
Model-View-Controller (MVC) is an architectural pattern used in software development for graphical user interfaces. It was one of the first proposed solutions in the late 1970s to the Smart UI anti-pattern, which refers to the act of writing all domain logic into a user interface. The original MVC pattern has since evolved in multiple directions, with various names and may confuse many. The goal of this thesis is to present the origin of the MVC pattern and how it has changed over time. Software architecture in general and the MVC’s evolution within web applications are not the primary focus. Fundamen- tal designs are abstracted, and then used to examine the more recent versions. Prob- lems with the subject and its terminology are also presented.
Resumo:
BCM (business continuity Management) is a holistic management process aiming at ensuring business continuity and building organizational resilience. Maturity models offer organizations a tool for evaluating their current maturity in a certain process. In the recent years BCM has been subject to international ISO standardization, while the interest of organizations to bechmark their state of BCM agains standards and the use of maturity models for these asessments has increased. However, although new standards have been introduced, very little attention has been paid to reviewing the existing BCM maturity models in research - especially in the light of the new ISO 22301 standard for BCM. In this thesis the existing BCM maturily models are carefully evaluated to determine whetherthey could be improved. In order to accomplish this, the compliance of the existing models to the ISO 22301 standard is measured and a framework for assessing a maturitymodel´s quality is defined. After carefully evaluating the existing frameworks for maturity model development and evaluation, an approach suggested by Becker et al. (2009) was chosen as the basis for the research. An additionto the procedural model a set of seven research guidelines proposed by the same authors was applied, drawing on the design-science research guidelines as suggested by Hevner et al. (2004). Furthermore, the existing models´ form and function was evaluated to address their usability. Based on the evaluation of the existing BCM maturity models, the existing models were found to have shortcomings in each dimension of the evaluation. Utilizing the best of the existing models, a draft version for an enhanced model was developed. This draft model was then iteratively developed by conducting six semi-structured interviews with BCM professionals in finland with the aim of validating and improving it. As a Result, a final version of the enhanced BCM maturity model was developed, conforming to the seven key clauses in the ISO 22301 standard and the maturity model development guidelines suggested by Becker et al. (2009).
Resumo:
The impact of acute volume imbalances on gastric volume (GV) was studied in anesthetized rats (250-300 g). After cervical and femoral vessel cannulation, a balloon catheter was positioned in the proximal stomach. The opposite end of the catheter was connected to a barostat with an electronic sensor coupled to a plethysmometer. A standard ionic solution was used to fill the balloon (about 3.0 ml) and the communicating vessel system, and to raise the reservoir liquid level 4 cm above the animals' xiphoid appendix. Due to constant barostat pressure, GV values were considered to represent the gastric compliance index. All animals were monitored for 90 min. After a basal interval, they were randomly assigned to normovolemic, hypervolemic, hypovolemic or restored protocols. Data were compared by ANOVA followed by Bonferroni's test. Mean arterial pressure (MAP), central venous pressure (CVP) and GV values did not change in normovolemic animals (N = 5). Hypervolemic animals (N = 12) were transfused at 0.5 ml/min with a suspension of red blood cells in Ringer-lactate solution with albumin (12.5 ml/kg), which reduced GV values by 11.3% (P<0.05). Hypovolemic rats (N = 12) were bled up to 10 ml/kg, a procedure that increased GV values by 15.8% (P<0.05). In the restored group (N = 12), shed blood replacement brought GV values back to basal levels in bled animals (P>0.05). MAP and CVP values increased (P<0.05) after hypervolemia but decreased (P<0.05) with hypovolemia. In conclusion, blood volume level modulates gastric compliance, turning the stomach into an adjustable reservoir, which could be part of the homeostatic process to balance blood volume.