924 resultados para Communication between software components
Resumo:
Swain corrects the chi-square overidentification test (i.e., likelihood ratio test of fit) for structural equation models whethr with or without latent variables. The chi-square statistic is asymptotically correct; however, it does not behave as expected in small samples and/or when the model is complex (cf. Herzog, Boomsma, & Reinecke, 2007). Thus, particularly in situations where the ratio of sample size (n) to the number of parameters estimated (p) is relatively small (i.e., the p to n ratio is large), the chi-square test will tend to overreject correctly specified models. To obtain a closer approximation to the distribution of the chi-square statistic, Swain (1975) developed a correction; this scaling factor, which converges to 1 asymptotically, is multiplied with the chi-square statistic. The correction better approximates the chi-square distribution resulting in more appropriate Type 1 reject error rates (see Herzog & Boomsma, 2009; Herzog, et al., 2007).
Resumo:
The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.
Resumo:
Kun kauppaa käydään eri maanosien välillä, törmätään vieraisiin kulttuureihin ja erilaisiin kaupankäyntitapoihin. Tämä tutkimus keskittyy suomalaisten liikemiesten ja - naisten työhön Yhdistyneissä Arabiemiraateissa kulttuurierojen näkökulmasta. Tavoitteena on kuvata kulttuurierojen vaikutuksia kaupankäyntiprosessiin ja löytää niitä ongelmia, joita tämän prosessin aikana kohdataan. Tavoitteena on tuottaa tietoa, jonka avulla kulttuurieroista johtuvia ongelmia voidaan vähentää tulevaisuudessa. Tutkimuksen teoreettinen tausta perustuu Hofsteden kulttuurista vaihtelua kuvaaviin dimensioihin ja Ting Toomeyn kulttuurisen identiteetin neuvotteluprosessin malliin. Näihin malleihin perustuen luotiin tähän tutkimukseen oma kulttuurien välisen kohtaamisen malli. Tutkimusongelmia ovat: 1) Miten suomalaiset liikemiehet kuvailevat arabien kaupantekokulttuuria? Kuinka vastapuoli kuvailee omaa kaupantekokulttuuriaan? 2) Minkälainen on suomalaisten ja arabien välinen kaupankäyntiprosessi? 3) Minkälaisia ongelmia kohdataan tehtäessä kauppaa suomalaisten ja arabien kesken? Tutkimus on etnografinen, laadullinen haastattelututkimus (n=12). Haastattelut tehtiin suurimmaksi osaksi Yhdistyneissä Arabiemiraateissa, osin Suomessa. Erilainen kulttuuritausta näkyy kaupankäynnissä. Kollektivistinen, maskuliininen, islamilaisen uskontoon ja vain vähäisessä määrin suoraan kielelliseen koodistoon perustuva kulttuuri heijastuu kaupankäyntiprosessiin. Ystävyyden ja sukulaisten sekä muiden verkostojen merkitys korostuu. Ruumiin kieleen, ilmeisiin ja eleisiin liittyvä kommunikaatio on erilaista ja voi aiheuttaa väärinkäsityksiä. Myös aikakäsitys ja sopimuskäytäntö poikkeavat suomalaisesta. Kaikki nämä voivat aiheuttaa ongelmia kaupankäyntiprosessissa. Tärkeimmiksi tekijöiksi ongelmien kohtaamisessa nousivat ammattitaidon lisäksi kärsivällisyys ja joustavuus. Ongelmia voidaan vähentää huolellisella valmistautumisella ennen ulkomaille lähtöä. Toinen tapa on jatkuviin työkokemuksiin perustuen oppia paikallista kulttuuria ja sen piirteitä.
Resumo:
The purpose of this study was to analyze the relationship between the anaerobic components of the maximal accumulated oxygen deficit (MAOD) and of the 30-second Wingate anaerobic test (30-WAnT). Nine male physical education students performed: a) a maximal incremental exercise test; b) a supramaximal constant workload test to determine the anaerobic components of the MAOD; and c) a 30-WAnT to measure the peak power (PP) and mean power (MP). The fast component of the excess post-exercise oxygen consumption and blood lactate accumulation were measured after the supramaximal constant workload test in order to determine the contributions made by alactic (ALMET) and lactic (LAMET) metabolism. Significant correlations were found between PP and ALMET (r=0.71; P=0.033) and between MP and LAMET(r=0.72; P=0.030). The study results suggested that the anaerobic components of the MAOD and of the 30-WAnT are similarly applicable in the assessment of ALMET and LAMET during high-intensity exercise.
Resumo:
The goal of the present study was to examine the barriers to access in health services faced by individuals with intellectual disabilities (ID), as well as the nature of communication between people with ID and those who are directly involved in supporting their health and well being. The study included in-depth interviews with five adults who have been identified as having ID and are supported by a community agency, five community agency support staff and four physicians who are specialists in supporting people who have ID. A qualitative content analysis approach facilitated the comparative exploration of key themes that each participant group saw as positive or negative influences on health care access and on effective health care communication. Themes drawn from the findings emphasize the unique roles each of these groups plays within the dialogical framework of the health care encounter. Of particular importance to informants was the issue of people with ID being seen as full participants in their own health care who, like all people, are unique individuals and not simply members of an identified or marginalized group. Participants across groups emphasized the need for the health care recipient to be known as an individual who is an expert in her/his own health and well being and, therefore, entitled to full participation with the support of but not control by others.
Resumo:
Resumen en español
Resumo:
This paper discusses a study to identify major problems in communication during hospitalization perceived by deaf patients and by nurses.
Resumo:
A new generation of advanced surveillance systems is being conceived as a collection of multi-sensor components such as video, audio and mobile robots interacting in a cooperating manner to enhance situation awareness capabilities to assist surveillance personnel. The prominent issues that these systems face are: the improvement of existing intelligent video surveillance systems, the inclusion of wireless networks, the use of low power sensors, the design architecture, the communication between different components, the fusion of data emerging from different type of sensors, the location of personnel (providers and consumers) and the scalability of the system. This paper focuses on the aspects pertaining to real-time distributed architecture and scalability. For example, to meet real-time requirements, these systems need to process data streams in concurrent environments, designed by taking into account scheduling and synchronisation. The paper proposes a framework for the design of visual surveillance systems based on components derived from the principles of Real Time Networks/Data Oriented Requirements Implementation Scheme (RTN/DORIS). It also proposes the implementation of these components using the well-known middleware technology Common Object Request Broker Architecture (CORBA). Results using this architecture for video surveillance are presented through an implemented prototype.
Resumo:
Measuring ultrasonic communication provides us with a way to study parental influence on animals. In this study I measured the ultrasonic communication between mouse pups and two maternal females, one of which who had given birth to the pups and the other had raised them. I found that there was no significant difference between the amount of noise expressed by pups in response to each the biological mother and foster mother test groups. Mouse pups call to maternal females regardless of genetic relatedness. Communication in mice may be a more complicated model because of their communal nature.
Resumo:
Multimedia systems must incorporate middleware concepts in order to abstract hardware and operational systems issues. Applications in those systems may be executed in different kinds of platforms, and their components need to communicate with each other. In this context, it is needed the definition of specific communication mechanisms for the transmission of information flow. This work presents a interconnection component model for distributed multimedia environments, and its implementation details. The model offers specific communication mechanisms for transmission of information flow between software components considering the Cosmos framework requirements in order to support component dynamic reconfiguration
Resumo:
Multimedia systems must incorporate middleware concepts in order to abstract hardware and operational systems issues. Applications in those systems may be executed in different kinds of platforms, and their components need to communicate with each other. In this context, it is needed the definition of specific communication mechanisms for the transmission of information flow. This work presents a interconnection component model for distributed multimedia environments, and its implementation details. The model offers specific communication mechanisms for transmission of information flow between software components considering the Cosmos framework requirements in order to support component dynamic reconfiguration
Resumo:
The objective of this cross-sectional study was to analyze therapeutic communication techniques used by health workers with patients under care for diabetes mellitus. Data were collected in 2010 in a public facility in the interior of Ceara, Brazil using video camera equipment and direct observation. Results showed that the most frequently used techniques within the "expression" group were: asking questions, voicing interest, and using descriptive phrases. The most frequently used technique within the "clarification" group was: asking the patient to specify the agent of action. Finally, in regard to the "validation" group, only the technique "summarizing content of the interaction" was employed. The conclusion is that despite the use of communication techniques on the part of professionals, there is still an alarming gap concerning communication skills. Such skills should be allied with technical expertise to enable the delivery of qualified care to individuals with diabetes mellitus.
Resumo:
Code duplication is common in current programming-practice: programmers search for snippets of code, incorporate them into their projects and then modify them to their needs. In today's practice, no automated scheme is in place to inform both parties of any distant changes of the code. As code snippets continues to evolve both on the side of the user and on the side of the author, both may wish to benefit from remote bug fixes or refinements --- authors may be interested in the actual usage of their code snippets, and researchers could gather information on clone usage. We propose maintaining a link between software clones across repositories and outline how the links can be created and maintained.