930 resultados para Large detector systems for particle and astroparticle physics
Resumo:
A comprehensive introduction to the technology, development and management of business information systems. The book assumes no prior knowledge of IS or IT, so that new concepts and terms are defined as clearly as possible, with explanations in the text, and definitions at the margin. In this fast-moving area, the book covers both the crucial underpinnings of the subject as well as the most recent business and technology applications.It is written for students on any IS, BIS or MIS course from undergraduate to postgraduate and MBA level within a Business or Computer Science Department - See more at: http://catalogue.pearsoned.ca/educator/product/Business-Information-Systems-Technology-Development-and-Management-for-the-EBusiness/9780273716624.page#sthash.LgAheK57.dpuf
Resumo:
Tissue Transglutaminase (TG2) and FXIIIa, members of the transglutaminase (TG) family, catalyses a transamidating reaction and form covalent bond between or within proteins. In bone development, both enzymes expressions correlate with the initial of the mineralisation process by osteoblasts and chondrocytes. Exogenous TG2 also promotes maturation of chondrocytes and mineralisation in pre-osteoblasts. To understand the role of endogenous TG2 in osteoblast mineralisation, the TG2 expression was examined during the human osteoblast (HOB) mineralisation. The expression of the endogenous TG2 increased during the mineralisation, yet, its expression was not essential for mineral deposition due to the compensation effect by other members in the TG family. The extracellular transamidating activity of HOBs was found increased during mineralisation and a shift from FXIIIa dominant- to TG2-dominant crosslinking activity was suggested after differentiation. However, the transamidating activity of both TG2 and FXIIIa were not critical for cell mineralisation. On the other hand, Exogenous TG2 was found to enhance wild type HOB and TG2 knockdown HOB mineral deposition. The transamidating activity of TG2 was not required but most likely a close conformation was essential for this enhancement. Results also demonstrated that exogenous TG2 may activate the ß-catenin pathway through LRP5 receptor thus contribute in cell mineralisation. This enhancement could be abolished by addition of ß-catenin inhibitors. Finally, using of TG2 crosslinked collagen gel for bone and cornea repair was evaluated. Crosslinked collagen gel showed promising results in improving HOB mineralisation, human corneal fibroblast (hCF) proliferation and migration. These effects might be resulted from the trapped TG2 within the collagen matrix and the alteration of matrix topography by TG2.
Resumo:
We proposed and tested a multilevel model, underpinned by empowerment theory, that examines the processes linking high-performance work systems (HPWS) and performance outcomes at the individual and organizational levels of analyses. Data were obtained from 37 branches of 2 banking institutions in Ghana. Results of hierarchical regression analysis revealed that branch-level HPWS relates to empowerment climate. Additionally, results of hierarchical linear modeling that examined the hypothesized cross-level relationships revealed 3 salient findings. First, experienced HPWS and empowerment climate partially mediate the influence of branch-level HPWS on psychological empowerment. Second, psychological empowerment partially mediates the influence of empowerment climate and experienced HPWS on service performance. Third, service orientation moderates the psychological empowerment-service performance relationship such that the relationship is stronger for those high rather than low in service orientation. Last, ordinary least squares regression results revealed that branch-level HPWS influences branch-level market performance through cross-level and individual-level influences on service performance that emerges at the branch level as aggregated service performance. © 2011 American Psychological Association.
Resumo:
Radio-frequency identification technology (RFID) is a popular modern technology proven to deliver a range of value-added benefits to achieve system and operational efficiency, as well as cost-effectiveness. The operational characteristics of RFID outperform barcodes in many aspects. One of the main challenges for RFID adoption is proving its ability to improve competitiveness. In this paper, we examine multiple real-world examples where RFID technology has been demonstrated to provide significant benefits to industry competitiveness, and also to enhance human experience in the service sector. This paper will explore and survey existing value-added applications of RFID systems in industry and the service sector, with particular focus on applications in retail, logistics, manufacturing, healthcare, leisure and the public sector. © 2012 AICIT.
Resumo:
This book is very practical in its international usefulness (because current risk practice and understanding is not equal across international boundaries). For example, an accountant in Belgium would want to know what the governance regulations are in that country and what the risk issues are that he/she needs to be aware of. This book covers the international aspect of risk management systems, risk and governance, and risk and accounting. In doing so the book covers topics such as: internal control and corporate governance; risk management systems; integrating risk into performance management systems; risk and audit; governance structures; risk management of pensions; pension scheme risks e.g. hedging derivatives, longevity bonds etc; risk reporting; and the role of the accountant in risk management. There are the case studies through out the book which illustrate by way of concrete practical examples the major themes contained in the book. The book includes highly topical areas such as the Sarbanes Oxley Act and pension risk management.
Resumo:
List of Participants
Resumo:
Battery energy storage systems have traditionally been manufactured using new batteries with a good reliability. The high cost of such a system has led to investigations of using second life transportation batteries to provide an alternative energy storage capability. However, the reliability and performance of these batteries is unclear and multi-modular power electronics with redundancy have been suggested as a means of helping with this issue. This paper reviews work already undertaken on battery failure rate to suggest suitable figures for use in reliability calculations. The paper then uses reliability analysis and a numerical example to investigate six different multi-modular topologies and suggests how the number of series battery strings and power electronic module redundancy should be determined for the lowest hardware cost using a numerical example. The results reveal that the cascaded dc-side modular with single inverter is the lowest cost solution for a range of battery failure rates.
Resumo:
AMS subject classification: 49N55, 93B52, 93C15, 93C10, 26E25.
Resumo:
A wide range of metrology processes are involved in the manufacture of large products. In addition to the traditional tool-setting and product-verification operations, increasingly flexible metrology-enabled automation is also being used. Faced with many possible measurement problems and a very large number of metrology instruments employing diverse technologies, the selection of the appropriate instrument for a given task can be highly complex. Also, as metrology has become a key manufacturing process, it should be considered in the early stages of design, and there is currently very little research to support this. This paper provides an overview of the important selection criteria for typical measurement processes and presents some novel selection strategies. Metrics that can be used to assess measurability are also discussed. A prototype instrument selection and measurability analysis application is also presented, with discussion of how this can be used as the basis for development of a more sophisticated measurement planning tool. © 2010 Authors.
Resumo:
This study identifies and investigates the potential use of in-eye trigger mechanisms to supplement the widely available information on release of ophthalmic drugs from contact lenses under passive release conditions. Ophthalmic dyes and surrogates have been successfully employed to investigate how these factors can be drawn together to make a successful system. The storage of a drug-containing lens in a pH lower than that of the ocular environment can be used to establish an equilibrium that favours retention of the drug in the lens prior to ocular insertion. Although release under passive conditions does not result in complete dye elution, the use of mechanical agitation techniques which mimic the eyelid blink action in conjunction with ocular tear chemistry promotes further release. In this way differentiation between passive and triggered in vitro release characteristics can be established. Investigation of the role of individual tear proteins revealed significant differences in their ability to alter the equilibrium between matrix-held and eluate-held dye or drug. These individual experiments were then investigated in vivo using ophthalmic dyes. Complete elution was found to be achievable in-eye; this demonstrated the importance of that fraction of the drug retained under passive conditions and the triggering effect of in-eye conditions on the release process. Understanding both the structure-property relationship between drug and material and in-eye trigger mechanisms, using ophthalmic dyes as a surrogate, provides the basis of knowledge necessary to design ocular drug delivery vehicles for in-eye release in a controllable manner.
Resumo:
2002 Mathematics Subject Classification: 35L40
Resumo:
A class of priority systems with non-zero switching times, referred as generalized priority systems, is considered. Analytical results regarding the distribution of busy periods, queue lengths and various auxiliary characteristics are presented. These results can be viewed as generalizations of the Kendall functional equation and the Pollaczek-Khintchin transform equation, respectively. Numerical algorithms for systems’ busy periods and traffic coefficients are developed. ACM Computing Classification System (1998): 60K25.
Resumo:
A cikkben a szerzők először áttekintik a cafeteria-rendszer legfontosabb jellemzőit (célját, tipikus „stakeholdereit” és HR-stratégiai kérdéseit). Ezt követően megvizsgálják, milyen átalakuláson ment át a béren kívüli juttatások rendszere 1996-tól – az első ilyen rendszerek magyarországi megjelenésétől – napjainkig. Áttekintik azt is, milyen mozgatórugók idézték elő a főbb változásokat, és ezekhez a piaci szereplők hogyan alkalmazkodtak. Szintén vizsgálják a 2012-re vonatkozó legfőbb változásokat, és ezek lehetséges kihatásait a cégek juttatási politikájára, valamint elmutatnak néhány alternatívát az új feltételek közötti lehetőségekre és kihívásokra. Empirikus felméréseik tükrében kitérnek arra is, hogy főleg a szervezeti méret és kisebb részben a tulajdonforma szignifikánsan befolyásolja a cafeteria-rendszerek alkalmazását. _________ The authors review firstly the most important features of the cafeteria system (goals, typical “stakeholders” and strategic HR issues). Then they examine the evolution of the system of flexible benefits since 1996, the first appearance of such systems in Hungary. Authors also analyze how the main drivers caused the changes, and how the key players of the cafeteria systems adapted to these movements. The reader also can find insights about the major changes for 2012 and about the potential impact of these changes on benefit policies of Hungarian firms. The contribution shows some alternative opportunities and challenges driven by different influencing factors. They also touch upon the light of empirical surveys, that the cafeteria systems are significantly influenced to a lesser extent by the form of ownership and to a bigger extent by the organizational size.
Resumo:
Electrical energy is an essential resource for the modern world. Unfortunately, its price has almost doubled in the last decade. Furthermore, energy production is also currently one of the primary sources of pollution. These concerns are becoming more important in data-centers. As more computational power is required to serve hundreds of millions of users, bigger data-centers are becoming necessary. This results in higher electrical energy consumption. Of all the energy used in data-centers, including power distribution units, lights, and cooling, computer hardware consumes as much as 80%. Consequently, there is opportunity to make data-centers more energy efficient by designing systems with lower energy footprint. Consuming less energy is critical not only in data-centers. It is also important in mobile devices where battery-based energy is a scarce resource. Reducing the energy consumption of these devices will allow them to last longer and re-charge less frequently. Saving energy in computer systems is a challenging problem. Improving a system's energy efficiency usually comes at the cost of compromises in other areas such as performance or reliability. In the case of secondary storage, for example, spinning-down the disks to save energy can incur high latencies if they are accessed while in this state. The challenge is to be able to increase the energy efficiency while keeping the system as reliable and responsive as before. This thesis tackles the problem of improving energy efficiency in existing systems while reducing the impact on performance. First, we propose a new technique to achieve fine grained energy proportionality in multi-disk systems; Second, we design and implement an energy-efficient cache system using flash memory that increases disk idleness to save energy; Finally, we identify and explore solutions for the page fetch-before-update problem in caching systems that can: (a) control better I/O traffic to secondary storage and (b) provide critical performance improvement for energy efficient systems.
Resumo:
Modern IT infrastructures are constructed by large scale computing systems and administered by IT service providers. Manually maintaining such large computing systems is costly and inefficient. Service providers often seek automatic or semi-automatic methodologies of detecting and resolving system issues to improve their service quality and efficiency. This dissertation investigates several data-driven approaches for assisting service providers in achieving this goal. The detailed problems studied by these approaches can be categorized into the three aspects in the service workflow: 1) preprocessing raw textual system logs to structural events; 2) refining monitoring configurations for eliminating false positives and false negatives; 3) improving the efficiency of system diagnosis on detected alerts. Solving these problems usually requires a huge amount of domain knowledge about the particular computing systems. The approaches investigated by this dissertation are developed based on event mining algorithms, which are able to automatically derive part of that knowledge from the historical system logs, events and tickets. ^ In particular, two textual clustering algorithms are developed for converting raw textual logs into system events. For refining the monitoring configuration, a rule based alert prediction algorithm is proposed for eliminating false alerts (false positives) without losing any real alert and a textual classification method is applied to identify the missing alerts (false negatives) from manual incident tickets. For system diagnosis, this dissertation presents an efficient algorithm for discovering the temporal dependencies between system events with corresponding time lags, which can help the administrators to determine the redundancies of deployed monitoring situations and dependencies of system components. To improve the efficiency of incident ticket resolving, several KNN-based algorithms that recommend relevant historical tickets with resolutions for incoming tickets are investigated. Finally, this dissertation offers a novel algorithm for searching similar textual event segments over large system logs that assists administrators to locate similar system behaviors in the logs. Extensive empirical evaluation on system logs, events and tickets from real IT infrastructures demonstrates the effectiveness and efficiency of the proposed approaches.^