935 resultados para Integrated services digital networks
Resumo:
The potential of digital interactive television (iDTV) to promote original services, formats and contents that can be relevant to support personal health care and wellness of individuals, namely elderly people, has not been yet fully explored in the past. Therefore, in a context of rapid change of the technological resources, in which the distribution and presentation of content comes associated with new platforms (such as digital terrestrial TV and IPTV), it is important to perceive the configurations that are being developed for interactive digital TV (iDTV) that may result in relevant outcomes within the field of healthcare and wellness, with the aim of offering complementarity to the existing services and contents made available today via the traditional means and media. This article describes and discusses the preliminary results of the first part of the research project iDTV-HEALTH: Inclusive services to promote health and wellness via digital interactive television. These first results suggest that iDTV solutions may represent a real contribution to delivery healthcare and wellness to the target population, namely as a supplement to health services provision.
Resumo:
This RTD project, 2007-2009, is partly funded by the European Commission, in Framework Programme 6. It aims to assist elderly people for living well, independently and at case. ENABLE will provide a number of services for elderly people based on the new technology provided by mobile phones. The project is developing a Wrist unit with both integrated and external sensors, and with a radio frequency link to a mobile phone. Dedicated ENABLE software running on the wrist unit and mobile phone makes these services fully accessible for the elderly users. This paper outlines the fundamental motivation and the approach which currently is undertaken in order to collect the more detailed user needs and requirements. The general architecture and the design of the ENABLE system are outlined.
Resumo:
This article reports the results of an experiment that examined how demand aggregators can discipline vertically-integrated firms - generator and distributor-retailer holdings-, which have a high share in wholesale electricity market with uniform price double auction (UPDA). We initially develop a treatment where holding members redistribute the profit based on the imposition of supra-competitive prices, in equal proportions (50%-50%). Subsequently, we introduce a vertical disintegration (unbundling) treatment with holding-s information sharing, where profits are distributed according to market outcomes. Finally, a third treatment is performed to introduce two active demand aggregators, with flexible interruptible loads in real time. We found that the introduction of responsive demand aggregators neutralizes the power market and increases market efficiency, even beyond what is achieved through vertical disintegration.
Resumo:
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.
Resumo:
BACKGROUND: Social networks are common in digital health. A new stream of research is beginning to investigate the mechanisms of digital health social networks (DHSNs), how they are structured, how they function, and how their growth can be nurtured and managed. DHSNs increase in value when additional content is added, and the structure of networks may resemble the characteristics of power laws. Power laws are contrary to traditional Gaussian averages in that they demonstrate correlated phenomena. OBJECTIVES: The objective of this study is to investigate whether the distribution frequency in four DHSNs can be characterized as following a power law. A second objective is to describe the method used to determine the comparison. METHODS: Data from four DHSNs—Alcohol Help Center (AHC), Depression Center (DC), Panic Center (PC), and Stop Smoking Center (SSC)—were compared to power law distributions. To assist future researchers and managers, the 5-step methodology used to analyze and compare datasets is described. RESULTS: All four DHSNs were found to have right-skewed distributions, indicating the data were not normally distributed. When power trend lines were added to each frequency distribution, R(2) values indicated that, to a very high degree, the variance in post frequencies can be explained by actor rank (AHC .962, DC .975, PC .969, SSC .95). Spearman correlations provided further indication of the strength and statistical significance of the relationship (AHC .987. DC .967, PC .983, SSC .993, P<.001). CONCLUSIONS: This is the first study to investigate power distributions across multiple DHSNs, each addressing a unique condition. Results indicate that despite vast differences in theme, content, and length of existence, DHSNs follow properties of power laws. The structure of DHSNs is important as it gives insight to researchers and managers into the nature and mechanisms of network functionality. The 5-step process undertaken to compare actor contribution patterns can be replicated in networks that are managed by other organizations, and we conjecture that patterns observed in this study could be found in other DHSNs. Future research should analyze network growth over time and examine the characteristics and survival rates of superusers.
Resumo:
Complex products such as manufacturing equipment have always needed maintenance and repair services. Increasingly, leading manufacturers are integrating products and services to generate increased revenues and achieve customer satisfaction. Designing integrated products and services requires a different approach to new product development and a clear understanding of how customers perceive the value they obtain from actual usage of products and services—so-called value-in-use. However, there is a lack of research on integrated products and services and how they impact customer satisfaction. An exploratory study was undertaken to understand customers’ views on integrated products and services and the value-in-use derived from such offerings. As value-in-use and its impacts are complicated concepts, a technique from psychology—Repertory Grid Technique—was used to gather data in 33 interviews. The interviews allowed a deep understanding of customer views on integrated products and services to be obtained, and a systematic analysis identified the key attributes of value-in-use. In order to probe further, the data were then analyzed using Honey’s procedure, which identified the impact of the attributes of value-in-use on customer satisfaction. Two key attributes—relational dynamic and access—were found to have the most influence on customer satisfaction. This paper contributes to the innovation field by identifying customer needs for integrated products and services and how these impact customer satisfaction. These are key points and need to be fully considered by managers during new product and service development. Similarly, the paper identifies a number of important areas for further research.
Resumo:
Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Academic libraries are faced with a daunting series of challenges brought on by the digital revolution. In an era when millions of books, articles, images, and videos available instantaneously via the web, libraries across all institutional types are experiencing declining demand for their traditional services, built around the storage and dissemination of physical resources. At the same time, new demand for digital information services and collaborative learning spaces promise new areas of opportunity and engagement with patrons. A rapid and orderly transition to “the library of the future” requires difficult trade-offs, however, as no institution can afford to continue expanding both its commitment to comprehensive, local print collections as well as new investments in staff, technology, and renovations. This report illustrates how progressive academic libraries are evolving in response to these challenges, providing case studies and best practices in managing library space, staff, and resources.
Resumo:
O objetivo da presente dissertação é analisar como a temática da inclusão digital entrou na agenda governamental do Estado de São Paulo e como foi concebido o programa de inclusão digital Acessa São Paulo. Ao estudar essa política pública, buscou-se identificar quem foram às pessoas que discutiram esse tema, por que fizeram, como foi feito, quem participou, enfim, entrar nos bastidores dessas discussões que antecederam a concepção dessa política pública. Para se chegar aos atores relevantes que participaram da concepção da política pública de inclusão digital no Estado de São Paulo, foi realizado um levantamento bibliográfico sobre o tema e vários contatos foram feitos via email e/ou redes sociais buscando nomes que participaram dessas discussões que antecederam a implantação do programa de inclusão digital no Estado de São Paulo. A partir da confirmação do envolvimento desses atores foi feito um convite para que esses participassem do trabalho através de uma entrevista. A entrada da temática da inclusão digital foi um processo lento e gradual que se iniciou desde a posse do governador Mario Covas para seu primeiro mandato (1995-1998). O uso da informatização pelo governo estava previsto em seu plano de governo em 1994 como forma de modernizar a maquina administrativa e aproximar o Estado dos cidadãos. A necessidade de se criar um programa de inclusão digital para que os cidadãos de baixa renda pudessem ter acesso à internet deve, sobretudo, as iniciativas de governo eletrônico promovidas pelo governo do Estado que tinha por objetivo disponibilizar serviços públicos via internet aos cidadãos. No inicio da década de 2000 acesso a internet era privilégio para poucos. Daí a necessidade de se pensar em uma política que promovesse a inclusão digital dessas pessoas. Essa foi a razão principal para que o governo assumisse que a questão da inclusão digital era um problema a ser resolvido. E entrasse definitivamente na agenda do governo e posteriormente dando origem ao Acessa São Paulo.
Resumo:
Trabalho apresentado na conferência Os Desafios das Bibliotecas Digitais realizado na Fundação Getulio Vargas em agosto 2014