837 resultados para Errors and blunders, Literary.
Resumo:
Thesis (Master's)--University of Washington, 2016-08
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
This paper reports the use of proof planning to diagnose errors in program code. In particular it looks at the errors that arise in the base cases of recursive programs produced by undergraduates. It describes two classes of error that arise in this situation. The use of test cases would catch these errors but would fail to distinguish between them. The system adapts proof critics, commonly used to patch faulty proofs, to diagnose such errors and distinguish between the two classes. It has been implemented in Lambda-clam, a proof planning system, and applied successfully to a small set of examples.
Resumo:
Abstract : Many individuals that had a stroke have motor impairments such as timing deficits that hinder their ability to complete daily activities like getting dressed. Robotic rehabilitation is an increasingly popular therapeutic avenue in order to improve motor recovery among this population. Yet, most studies have focused on improving the spatial aspect of movement (e.g. reaching), and not the temporal one (e.g. timing). Hence, the main aim of this study was to compare two types of robotic rehabilitation on the immediate improvement of timing accuracy: haptic guidance (HG), which consists of guiding the person to make the correct movement, and thus decreasing his or her movement errors, and error amplification (EA), which consists of increasing the person’s movement errors. The secondary objective consisted of exploring whether the side of the stroke lesion had an effect on timing accuracy following HG and EA training. Thirty-four persons that had a stroke (average age 67 ± 7 years) participated in a single training session of a timing-based task (simulated pinball-like task), where they had to activate a robot at the correct moment to successfully hit targets that were presented a random on a computer screen. Participants were randomly divided into two groups, receiving either HG or EA. During the same session, a baseline phase and a retention phase were given before and after each training, and these phases were compared in order to evaluate and compare the immediate impact of HG and EA on movement timing accuracy. The results showed that HG helped improve the immediate timing accuracy (p=0.03), but not EA (p=0.45). After comparing both trainings, HG was revealed to be superior to EA at improving timing (p=0.04). Furthermore, a significant correlation was found between the side of stroke lesion and the change in timing accuracy following EA (r[subscript pb]=0.7, p=0.001), but not HG (r[subscript pb]=0.18, p=0.24). In other words, a deterioration in timing accuracy was found for participants with a lesion in the left hemisphere that had trained with EA. On the other hand, for the participants having a right-sided stroke lesion, an improvement in timing accuracy was noted following EA. In sum, it seems that HG helps improve the immediate timing accuracy for individuals that had a stroke. Still, the side of the stroke lesion seems to play a part in the participants’ response to training. This remains to be further explored, in addition to the impact of providing more training sessions in order to assess any long-term benefits of HG or EA.
Resumo:
This thesis examines three key moments in the intersecting histories of Scotland, Ireland and England, and their impact on literature. Chapter one Robert Bruce and the Last King of Ireland: Writing the Irish Invasion, 1315- 1826‘, is split into two parts. Part one, Barbour‘s (other) Bruce‘ focuses on John Barbour‘s The Bruce (1375) and its depiction of the Bruce‘s Irish campaign (1315-1318). It first examines the invasion material from the perspective of the existing Irish and Scottish relationship and their opposition to English authority. It highlights possible political and ideological motivations behind Barbour‘s negative portrait of Edward Bruce - whom Barbour presents as the catalyst for the invasion and the source of its carnage and ultimate failure - and his partisan comparison between Edward and his brother Robert I. It also probes the socio-polticial and ideological background to the Bruce and its depiction of the Irish campaign, in addition to Edward and Robert. It peers behind some of the Bruce‘s most lauded themes such as chivalry, heroism, loyalty, and patriotism, and exposes its militaristic feudal ideology, its propaganda rich rhetoric, and its illusions of freedom‘. Part one concludes with an examination of two of the Irish section‘s most marginalised figures, the Irish and a laundry woman. Part two, Cultural Memories of the Bruce Invasion of Ireland, 1375-1826‘, examines the cultural memory of the Bruce invasion in three literary works from the Medieval, Early Modern and Romantic periods. The first, and by far the most significant memorialisation of the invasion is Barbour‘s Bruce, which is positioned for the first time within the tradition of ars memoriae (art of memory) and present-day cultural memory theories. The Bruce is evaluated as a site of memory and Barbour‘s methods are compared with Icelandic literature of the same period. The recall of the invasion in late sixteenth century Anglo-Irish literature is then considered, specifically Edmund Spenser‘s A View of the State of Ireland, which is viewed in the context of contemporary Ulster politics. The final text to be considered is William Hamilton Drummond‘s Bruce’s Invasion of Ireland (1826). It is argued that Drummond‘s poem offers an alternative Irish version of the invasion; a counter-memory that responds to nineteenth-century British politics, in addition to the controversy surrounding the publication of the Ossian fragments. Chapter two, The Scots in Ulster: Policies, Proposals and Projects, 1551-1575‘, examines the struggle between Irish and Scottish Gaels and the English for dominance in north Ulster, and its impact on England‘s wider colonial ideology, strategy, literature and life writing. Part one entitled Noisy neighbours, 1551-1567‘ covers the deputyships of Sir James Croft, Sir Thomas Radcliffe, and Sir Henry Sidney, and examines English colonial writing during a crucial period when the Scots provoked an increase in militarisation in the region. Part two Devices, Advices, and Descriptions, 1567-1575‘, deals with the relationship between the Scots and Turlough O‘Neill, the influence of the 5th Earl of Argyll, and the rise of Sorley Boy MacDonnell. It proposes that a renewed Gaelic alliance hindered England‘s conquest of Ireland and generated numerous plantation proposals and projects for Ulster. Many of which exhibit a blurring‘ between the documentary and the literary; while all attest to the considerable impact of the Gaelic Scots in both motivating and frustrating various projects for that province, the most prominent of which were undertaken by Sir Thomas Smith in 1571 and Walter Devereux, 1st Earl of Essex in 1573.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicinechart. This process can be very strenuous and error-prone, given the number of sub-tasksinvolved in the entire workflow and the dynamic nature of the work environment.Therefore, efforts are being made to digitalise the medication dispensation process byintroducing a mobile application called Smart Dosing application. The introduction ofthe Smart Dosing application into hospital workflow raises security concerns and callsfor security requirement analysis. This thesis is written as a part of the smart medication management project at EmbeddedSystems Laboratory, A˚bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive state-of-the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
The view that Gothic literature emerged as a reaction against the prominence of the Greek classics, and that, as a result, it bears no trace of their influence, is a commonplace in Gothic studies. This thesis re-examines this view, arguing that the Gothic and the Classical were not in opposition to one another, and that Greek tragic poetry and myth should be counted among the literary sources that inspired early Gothic writers. The discussion is organised in three parts. Part I focuses on evidence which suggests that the Gothic and the Hellenic were closely associated in the minds of several British literati both on a political and aesthetic level. As is shown, the coincidence of the Hellenic with the Gothic revival in the second half of the eighteenth century inspired them not only to trace common ground between the Greek and Gothic traditions, but also to look at Greek tragic poetry and myth through Gothic eyes, bringing to light an unruly, ‘Dionysian’ world that suited their taste. The particulars of this coincidence, which has not thus far been discussed in Gothic studies, as well as evidence which suggests that several early Gothic writers were influenced by Greek tragedy and myth, open up new avenues for research on the thematic and aesthetic heterogeneity of early Gothic literature. Parts II and III set out to explore this new ground and to support the main argument of this thesis by examining the influence of Greek tragic poetry and myth on the works of two early Gothic novelists and, in many ways, shapers of the genre, William Beckford and Matthew Gregory Lewis. Part II focuses on William Beckford’s Vathek and its indebtedness to Euripides’s Bacchae, and Part III on Matthew Gregory Lewis’s The Monk and its indebtedness to Sophocles’s Oedipus Tyrannus. As is discussed, Beckford and Lewis participated actively in both the Gothic and Hellenic revivals, producing highly imaginative works that blended material from the British and Greek literary traditions.
Resumo:
Since the beginning of the Haitian theatrical tradition there has been an ineluctable dedication to the representation of Haitian history on stage. Given the rich theatrical archive about Haiti throughout the world, this study considers operas and plays written solely by Haitian playwrights. By delving into the works of Juste Chanlatte, Massillon Coicou, and Vendenesse Ducasse this study proposes a re-reading of Haitian theater that considers the stage as an innovative site for contesting negative and clichéd representations of the Haitian Revolution and its revolutionary leadership. A genre long mired in accusations of mimicking European literary forms, this study proposes a reevaluation of Haitian theater and its literary origins.
Resumo:
A comparison of the Rietveld quantitative phase analyses (RQPA) obtained using Cu-Kα1, Mo-Kα1, and synchrotron strictly monochromatic radiations is presented. The main aim is to test a simple hypothesis: high energy Mo-radiation, combined with high resolution laboratory X-ray powder diffraction optics, could yield more accurate RQPA, for challenging samples, than well-established Cu-radiation procedure(s). In order to do so, three set of mixtures with increasing amounts of a given phase (spiking-method) were prepared and the corresponding RQPA results have been evaluated. Firstly, a series of crystalline inorganic phase mixtures with increasing amounts of an analyte was studied in order to determine if Mo-Kα1 methodology is as robust as the well-established Cu-Kα1 one. Secondly, a series of crystalline organic phase mixtures with increasing amounts of an organic compound was analyzed. This type of mixture can result in transparency problems in reflection and inhomogeneous loading in narrow capillaries for transmission studies. Finally, a third series with variable amorphous content was studied. Limit of detection in Cu-patterns, ~0.2 wt%, are slightly lower than those derived from Mo-patterns, ~0.3 wt%, for similar recording times and limit of quantification for a well crystallized inorganic phase using laboratory powder diffraction was established ~0.10 wt%. However, the accuracy was comprised as relative errors were ~100%. Contents higher than 1.0 wt% yielded analyses with relative errors lower than 20%. From the obtained results it is inferred that RQPA from Mo-Kα1 radiation have slightly better accuracies than those obtained from Cu-Kα1. This behavior has been established with the calibration graphics obtained through the spiking method and also from Kullback-Leibler distance statistic studies. We explain this outcome, in spite of the lower diffraction power for Mo-radiation (compared to Cu-radiation), due to the larger volume tested with Mo, also because higher energy minimize pattern systematic errors and the microabsorption effect.
MINING AND VERIFICATION OF TEMPORAL EVENTS WITH APPLICATIONS IN COMPUTER MICRO-ARCHITECTURE RESEARCH
Resumo:
Computer simulation programs are essential tools for scientists and engineers to understand a particular system of interest. As expected, the complexity of the software increases with the depth of the model used. In addition to the exigent demands of software engineering, verification of simulation programs is especially challenging because the models represented are complex and ridden with unknowns that will be discovered by developers in an iterative process. To manage such complexity, advanced verification techniques for continually matching the intended model to the implemented model are necessary. Therefore, the main goal of this research work is to design a useful verification and validation framework that is able to identify model representation errors and is applicable to generic simulators. The framework that was developed and implemented consists of two parts. The first part is First-Order Logic Constraint Specification Language (FOLCSL) that enables users to specify the invariants of a model under consideration. From the first-order logic specification, the FOLCSL translator automatically synthesizes a verification program that reads the event trace generated by a simulator and signals whether all invariants are respected. The second part consists of mining the temporal flow of events using a newly developed representation called State Flow Temporal Analysis Graph (SFTAG). While the first part seeks an assurance of implementation correctness by checking that the model invariants hold, the second part derives an extended model of the implementation and hence enables a deeper understanding of what was implemented. The main application studied in this work is the validation of the timing behavior of micro-architecture simulators. The study includes SFTAGs generated for a wide set of benchmark programs and their analysis using several artificial intelligence algorithms. This work improves the computer architecture research and verification processes as shown by the case studies and experiments that have been conducted.
Resumo:
In this text I examine recent changes in how literature is being produced and circulated in Brazil. These shifts can be related, among other factors, to the growing use of the internet as a way of divulging literary works and to the expansion of national literary life and narrative space. My examination sets out from Silviano Santiago’s analysis of the ‘deliteraturization’ movement in his historical account of the written press. Taking an opposite tack to this writer and critic, though, I look to explore the diverse forms of ‘serialization’ and ‘literaturization’ found among contemporary media such as the internet and television. As I aim to show, the migration of newspaper serials and literary works to web sites, blogs and social networks poses diverse questions and challenges to the critic, including the emergence of new figures of author and reader, accompanied by different forms of mediating and legitimizing literary works. These changes are also essential to understanding the profile of the new generation of literary supplements circulating in Brazil today.
Resumo:
Timely feedback is a vital component in the learning process. It is especially important for beginner students in Information Technology since many have not yet formed an effective internal model of a computer that they can use to construct viable knowledge. Research has shown that learning efficiency is increased if immediate feedback is provided for students. Automatic analysis of student programs has the potential to provide immediate feedback for students and to assist teaching staff in the marking process. This paper describes a “fill in the gap” programming analysis framework which tests students’ solutions and gives feedback on their correctness, detects logic errors and provides hints on how to fix these errors. Currently, the framework is being used with the Environment for Learning to Programming (ELP) system at Queensland University of Technology (QUT); however, the framework can be integrated into any existing online learning environment or programming Integrated Development Environment (IDE)
Resumo:
The construction industry is categorised as being an information-intensive industry and described as one of the most important industries in any developed country, facing a period of rapid and unparalleled change (Industry Science Resources 1999) (Love P.E.D., Tucker S.N. et al. 1996). Project communications are becoming increasingly complex, with a growing need and fundamental drive to collaborate electronically at project level and beyond (Olesen K. and Myers M.D. 1999; Thorpe T. and Mead S. 2001; CITE 2003). Yet, the industry is also identified as having a considerable lack of knowledge and awareness about innovative information and communication technology (ICT) and web-based communication processes, systems and solutions which may prove beneficial in the procurement, delivery and life cycle of projects (NSW Government 1998; Kajewski S. and Weippert A. 2000). The Internet has debatably revolutionised the way in which information is stored, exchanged and viewed, opening new avenues for business, which only a decade ago were deemed almost inconceivable (DCITA 1998; IIB 2002). In an attempt to put these ‘new avenues of business’ into perspective, this report provides an overall ‘snapshot’ of current public and private construction industry sector opportunities and practices in the implementation and application of web-based ICT tools, systems and processes (e-Uptake). Research found that even with a reserved uptake, the construction industry and its participating organisations are making concerted efforts (fortunately with positive results) in taking up innovative forms of doing business via the internet, including e-Tendering (making it possible to manage the entire tender letting process electronically and online) (Anumba C.J. and Ruikar K. 2002; ITCBP 2003). Furthermore, Government (often a key client within the construction industry),and with its increased tendency to transact its business electronically, undoubtedly has an effect on how various private industry consultants, contractors, suppliers, etc. do business (Murray M. 2003) – by offering a wide range of (current and anticipated) e-facilities / services, including e-Tendering (Ecommerce 2002). Overall, doing business electronically is found to have a profound impact on the way today’s construction businesses operate - streamlining existing processes, with the growth in innovative tools, such as e-Tender, offering the construction industry new responsibilities and opportunities for all parties involved (ITCBP 2003). It is therefore important that these opportunities should be accessible to as many construction industry businesses as possible (The Construction Confederation 2001). Historically, there is a considerable exchange of information between various parties during a tendering process, where accuracy and efficiency of documentation is critical. Traditionally this process is either paper-based (involving large volumes of supporting tender documentation), or via a number of stand-alone, non-compatible computer systems, usually costly to both the client and contractor. As such, having a standard electronic exchange format that allows all parties involved in an electronic tender process to access one system only via the Internet, saves both time and money, eliminates transcription errors and increases speed of bid analysis (The Construction Confederation 2001). Supporting this research project’s aims and objectives, researchers set to determine today’s construction industry ‘current state-of-play’ in relation to e-Tendering opportunities. The report also provides brief introductions to several Australian and International e-Tender systems identified during this investigation. e-Tendering, in its simplest form, is described as the electronic publishing, communicating, accessing, receiving and submitting of all tender related information and documentation via the internet, thereby replacing the traditional paper-based tender processes, and achieving a more efficient and effective business process for all parties involved (NT Governement 2000; NT Government 2000; NSW Department of Commerce 2003; NSW Government 2003). Although most of the e-Tender websites investigated at the time, maintain their tendering processes and capabilities are ‘electronic’, research shows these ‘eTendering’ systems vary from being reasonably advanced to more ‘basic’ electronic tender notification and archiving services for various industry sectors. Research also indicates an e-Tender system should have a number of basic features and capabilities, including: • All tender documentation to be distributed via a secure web-based tender system – thereby avoiding the need for collating paperwork and couriers. • The client/purchaser should be able to upload a notice and/or invitation to tender onto the system. • Notification is sent out electronically (usually via email) for suppliers to download the information and return their responses electronically (online). • During the tender period, updates and queries are exchanged through the same e-Tender system. • The client/purchaser should only be able to access the tenders after the deadline has passed. • All tender related information is held in a central database, which should be easily searchable and fully audited, with all activities recorded. • It is essential that tender documents are not read or submitted by unauthorised parties. • Users of the e-Tender system are to be properly identified and registered via controlled access. In simple terms, security has to be as good as if not better than a manual tender process. Data is to be encrypted and users authenticated by means such as digital signatures, electronic certificates or smartcards. • All parties must be assured that no 'undetected' alterations can be made to any tender. • The tenderer should be able to amend the bid right up to the deadline – whilst the client/purchaser cannot obtain access until the submission deadline has passed. • The e-Tender system may also include features such as a database of service providers with spreadsheet-based pricing schedules, which can make it easier for a potential tenderer to electronically prepare and analyse a tender. Research indicates the efficiency of an e-Tender process is well supported internationally, with a significant number, yet similar, e-Tender benefits identified during this investigation. Both construction industry and Government participants generally agree that the implementation of an automated e-Tendering process or system enhances the overall quality, timeliness and cost-effectiveness of a tender process, and provides a more streamlined method of receiving, managing, and submitting tender documents than the traditional paper-based process. On the other hand, whilst there are undoubtedly many more barriers challenging the successful implementation and adoption of an e-Tendering system or process, researchers have also identified a range of challenges and perceptions that seem to hinder the uptake of this innovative approach to tendering electronically. A central concern seems to be that of security - when industry organisations have to use the Internet for electronic information transfer. As a result, when it comes to e-Tendering, industry participants insist these innovative tendering systems are developed to ensure the utmost security and integrity. Finally, if Australian organisations continue to explore the competitive ‘dynamics’ of the construction industry, without realising the current and future, trends and benefits of adopting innovative processes, such as e-Tendering, it will limit their globalising opportunities to expand into overseas markets and allow the continuation of international firms successfully entering local markets. As such, researchers believe increased knowledge, awareness and successful implementation of innovative systems and processes raises great expectations regarding their contribution towards ‘stimulating’ the globalisation of electronic procurement activities, and improving overall business and project performances throughout the construction industry sectors and overall marketplace (NSW Government 2002; Harty C. 2003; Murray M. 2003; Pietroforte R. 2003). Achieving the successful integration of an innovative e-Tender solution with an existing / traditional process can be a complex, and if not done correctly, could lead to failure (Bourn J. 2002).
Resumo:
INTRODUCTION In their target article, Yuri Hanin and Muza Hanina outlined a novel multidisciplinary approach to performance optimisation for sport psychologists called the Identification-Control-Correction (ICC) programme. According to the authors, this empirically-verified, psycho-pedagogical strategy is designed to improve the quality of coaching and consistency of performance in highly skilled athletes and involves a number of steps including: (i) identifying and increasing self-awareness of ‘optimal’ and ‘non-optimal’ movement patterns for individual athletes; (ii) learning to deliberately control the process of task execution; and iii), correcting habitual and random errors and managing radical changes of movement patterns. Although no specific examples were provided, the ICC programme has apparently been successful in enhancing the performance of Olympic-level athletes. In this commentary, we address what we consider to be some important issues arising from the target article. We specifically focus attention on the contentious topic of optimization in neurobiological movement systems, the role of constraints in shaping emergent movement patterns and the functional role of movement variability in producing stable performance outcomes. In our view, the target article and, indeed, the proposed ICC programme, would benefit from a dynamical systems theoretical backdrop rather than the cognitive scientific approach that appears to be advocated. Although Hanin and Hanina made reference to, and attempted to integrate, constructs typically associated with dynamical systems theoretical accounts of motor control and learning (e.g., Bernstein’s problem, movement variability, etc.), these ideas required more detailed elaboration, which we provide in this commentary.
Resumo:
Major global changes are placing new demands on the Australian education system. Recent statements by the Prime Minister, together with current education policy and national curriculum documents available in the public domain, look to education’s role in promoting economic prosperity and social cohesion. Collectively, they emphasise the need to equip young Australians with the knowledge, understandings and skills required to compete in the global economy and participate as engaged citizens in a culturally diverse world. However, the decision to prioritise discipline-based learning in the forthcoming Australian history curriculum without specifically encompassing culture as a referent, raises the following question. How will students acquire the cultural knowledge, understandings and skills necessary for this process? This paper addresses this question by situating the current push for a national history curriculum, with specific reference to the study of Indigenous history and the study of Asia in Australia.