992 resultados para Supporting activities


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aldgate, J. and Bradley, M. (1999). Supporting families through short-term fostering. London: The Stationery Office. This essay reviews a British qualitative study of short-term foster care from the perspectives of birth parents, children, foster parents, and social workers. Respondents highlighted the value of short-term foster care as a family support service and also offered many recommendations for improving service delivery. The study provides useful implications for restructuring child welfare services in the United States and for promoting cross-national collaboration in future research activities in the area of child and family services.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Data-related properties of the activities involved in a service composition can be used to facilitate several design-time and run-time adaptation tasks, such as service evolution, distributed enactment, and instance-level adaptation. A number of these properties can be expressed using a notion of sharing. We present an approach for automated inference of data properties based on sharing analysis, which is able to handle service compositions with complex control structures, involving loops and sub-workflows. The properties inferred can include data dependencies, information content, domain-defined attributes, privacy or confidentiality levels, among others. The analysis produces characterizations of the data and the activities in the composition in terms of minimal and maximal sharing, which can then be used to verify compliance of potential adaptation actions, or as supporting information in their generation. This sharing analysis approach can be used both at design time and at run time. In the latter case, the results of analysis can be refined using the composition traces (execution logs) at the point of execution, in order to support run-time adaptation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper introduces a road map for ICTs (Information and communication technologies) supporting planning, operation and management of energy systems in smart cities. The road map summarises different elements that form energy systems in cities and proposes research and technical development (RTD) and innovation activities for the development and innovation of ICTs for holistic design, planning and operation of energy systems. In addition, synergies with other ICT systems for smart cities are considered. There are four main target groups for the road map: 1) citizen; 2) building sector; 3) energy sector; and 4) municipality level. As an example for enabling active participation of citizens, the road map proposes how ICT can enable citizens? involvement among others into building design. The building sector roadmap proposes how ICTs can support the planning of buildings and renovations in the future, as well as how to manage building energy systems. The energy sector road map focuses on city?s energy systems and their planning and management, including e.g. demand side management, management of different district level energy systems, energy performance validation and management, energy data models, and smarter use of open energy data. Moreover, the municipality level road map proposes among others ICTs for better integration of city systems and city planning enabling maximised energy efficiency. In addition, one road map section suggests development needs related to open energy data, including among others the use of energy data and the development and harmonisation of energy data models. The road map has been assembled in the READY4SmartCities project (funded by EU 7th Framework Programme), which focuses on the energy system at the city level, consisting of centralised energy systems and connections to the national level energy grids, as well as interconnections to the neighbourhood and building level energy systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Oncoprotein 18/stathmin (Op18) has been identified recently as a protein that destabilizes microtubules, but the mechanism of destabilization is currently controversial. Based on in vitro microtubule assembly assays, evidence has been presented supporting conflicting destabilization models of either tubulin sequestration or promotion of microtubule catastrophes. We found that Op18 can destabilize microtubules by both of these mechanisms and that these activities can be dissociated by changing pH. At pH 6.8, Op18 slowed microtubule elongation and increased catastrophes at both plus and minus ends, consistent with a tubulin-sequestering activity. In contrast, at pH 7.5, Op18 promoted microtubule catastrophes, particularly at plus ends, with little effect on elongation rates at either microtubule end. Dissociation of tubulin-sequestering and catastrophe-promoting activities of Op18 was further demonstrated by analysis of truncated Op18 derivatives. Lack of a C-terminal region of Op18 (aa 100–147) resulted in a truncated protein that lost sequestering activity at pH 6.8 but retained catastrophe-promoting activity. In contrast, lack of an N-terminal region of Op18 (aa 5–25) resulted in a truncated protein that still sequestered tubulin at pH 6.8 but was unable to promote catastrophes at pH 7.5. At pH 6.8, both the full length and the N-terminal–truncated Op18 bound tubulin, whereas truncation at the C-terminus resulted in a pronounced decrease in tubulin binding. Based on these results, and a previous study documenting a pH-dependent change in binding affinity between Op18 and tubulin, it is likely that tubulin sequestering observed at lower pH resulted from the relatively tight interaction between Op18 and tubulin and that this tight binding requires the C-terminus of Op18; however, under conditions in which Op18 binds weakly to tubulin (pH 7.5), Op18 stimulated catastrophes without altering tubulin subunit association or dissociation rates, and Op18 did not depolymerize microtubules capped with guanylyl (α, β)-methylene diphosphonate–tubulin subunits. We hypothesize that weak binding between Op18 and tubulin results in free Op18, which is available to interact with microtubule ends and thereby promote catastrophes by a mechanism that likely involves GTP hydrolysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The long-term decline in gross public investment in European Union countries mirrors the trend in other advanced economies, but recent developments have been different: public investment has increased elsewhere, but in the EU it has declined and even collapsed in the most vulnerable countries, exaggerating the output fall. The provisions in the EU fiscal framework to support public investment are very weak.The recently inserted ‘investment clause’ is almost no help. In the short term, exclusion of national co-funding of EU-supported investments from the fiscal indicators considered in the Stability and Growth Pact would be sensible. In the medium term, the EU fiscal framework should be extended with an asymmetric ‘golden rule’ to further protect public investment in bad times, while limiting adverse incentives in good times. During a downturn, a European investment programme is needed and the European Semester should encourage greater investment by member states with healthy public finances and low public investment rates. Reform and harmonisation of budgeting, accounting, transparency and project assessment is also needed to improve the quality of public investment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The proliferation of data throughout the strategic, tactical and operational areas within many organisations, has provided a need for the decision maker to be presented with structured information that is appropriate for achieving allocated tasks. However, despite this abundance of data, managers at all levels in the organisation commonly encounter a condition of ‘information overload’, that results in a paucity of the correct information. Specifically, this thesis will focus upon the tactical domain within the organisation and the information needs of management who reside at this level. In doing so, it will argue that the link between decision making at the tactical level in the organisation, and low-level transaction processing data, should be through a common object model that used a framework based upon knowledge leveraged from co-ordination theory. In order to achieve this, the Co-ordinated Business Object Model (CBOM) was created. Detailing a two-tier framework, the first tier models data based upon four interactive object models, namely, processes, activities, resources and actors. The second tier analyses the data captured by the four object models, and returns information that can be used to support tactical decision making. In addition, the Co-ordinated Business Object Support System (CBOSS), is a prototype tool that has been developed in order to both support the CBOM implementation, and to also demonstrate the functionality of the CBOM as a modelling approach for supporting tactical management decision making. Containing a graphical user interface, the system’s functionality allows the user to create and explore alternative implementations of an identified tactical level process. In order to validate the CBOM, three verification tests have been completed. The results provide evidence that the CBOM framework helps bridge the gap between low level transaction data, and the information that is used to support tactical level decision making.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Ongoing advances in mobile technologies have the potential to improve independence and quality of life of older adults by supporting the delivery of personalised and ubiquitous healthcare solutions. The authors are actively engaged in participatory, user-focused research to create a mobile assistive healthcare-related intervention for persons with age-related macular degeneration (AMD): the authors report here on our participatory research in which participatory design (PD) has been positively adopted and adapted for the design of our mobile assistive technology. The authors discuss their work as a case study in order to outline the practicalities and highlight the benefits of participatory research for the design of technology for (and importantly with) older adults. The authors argue it is largely impossible to achieve informed and effective design and development of healthcare-related technologies without employing participatory approaches, and outline recommendations for engaging in participatory design with older adults (with impairments) based on practical experience.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Much has been written in the educational psychology literature about effective feedback and how to deliver it. However, it is equally important to understand how learners actively receive, engage with, and implement feedback. This article reports a systematic review of the research evidence pertaining to this issue. Through an analysis of 195 outputs published between 1985 and early 2014, we identified various factors that have been proposed to influence the likelihood of feedback being used. Furthermore, we identified diverse interventions with the common aim of supporting and promoting learners' agentic engagement with feedback processes. We outline the various components used in these interventions, and the reports of their successes and limitations. Moreover we propose a novel taxonomy of four recipience processes targeted by these interventions. This review and taxonomy provide a theoretical basis for conceptualizing learners' responsibility within feedback dialogues and for guiding the strategic design and evaluation of interventions. Receiving feedback on one's skills and understanding is an invaluable part of the learning process, benefiting learners far more than does simply receiving praise or punishment (Black & Wiliam, 1998 Black, P., & Wiliam, D. (1998). Assessment and classroom learning. Assessment in Education: Principles, Policy & Practice, 5, 7–74. doi:10.1080/0969595980050102[Taylor & Francis Online]; Hattie & Timperley, 2007 Hattie, J., & Timperley, H. (2007). The power of feedback. Review of Educational Research, 77, 81–112. doi:10.3102/003465430298487[CrossRef], [Web of Science ®]). Inevitably, the benefits of receiving feedback are not uniform across all circumstances, and so it is imperative to understand how these gains can be maximized. There is increasing consensus that a critical determinant of feedback effectiveness is the quality of learners' engagement with, and use of, the feedback they receive. However, studies investigating this engagement are underrepresented in academic research (Bounds et al., 2013 Bounds, R., Bush, C., Aghera, A., Rodriguez, N., Stansfield, R. B., & Santeen, S. A. (2013). Emergency medicine residents' self-assessments play a critical role when receiving feedback. Academic Emergency Medicine, 20, 1055–1061. doi:10.1111/acem.12231[CrossRef], [PubMed], [Web of Science ®]), which leaves a “blind spot” in our understanding (Burke, 2009 Burke, D. (2009). Strategies for using feedback students bring to higher education. Assessment & Evaluation in Higher Education, 34, 41–50. doi:10.1080/02602930801895711[Taylor & Francis Online], [Web of Science ®]). With this blind spot in mind, the present work sets out to systematically map the research literature concerning learners' proactive recipience of feedback. We use the term “proactive recipience” here to connote a state or activity of engaging actively with feedback processes, thus emphasizing the fundamental contribution and responsibility of the learner (Winstone, Nash, Rowntree, & Parker, in press Winstone, N. E., Nash, R. A., Rowntree, J., & Parker, M. (in press). ‘It'd be useful, but I wouldn't use it’: Barriers to university students' feedback seeking and recipience. Studies in Higher Education. doi: 10.1080/03075079.2015.1130032[Taylor & Francis Online]). In other words, just as Reeve and Tseng (2011 Reeve, J., & Tseng, M. (2011). Agency as a fourth aspect of student engagement during learning activities. Contemporary Educational Psychology, 36, 257–267. doi:10.1016/j.cedpsych.2011.05.002[CrossRef], [Web of Science ®]) defined “agentic engagement” as a “student's constructive contribution into the flow of the instruction they receive” (p. 258), likewise proactive recipience is a form of agentic engagement that involves the learner sharing responsibility for making feedback processes effective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Model Driven Engineering uses the principle that code can automatically be generated from software models which would potentially save time and cost of development. By this methodology, a systems structure and behaviour can be expressed in more abstract, high level terms without some of the accidental complexity that the use of a general purpose language can bring. Models are the actual implementation of the system unlike in traditional software development where models are often used for documentation purposes only. However once the code is generated from the model, testing and debugging activities tend to happen on the code level and the model is not updated. We believe that monitoring on the model level could potentially facilitate quality assurance activities as the errors are detected in the early phase of development. In this thesis, we create a Monitoring Configuration for an open source model driven engineering tool called PapyrusRT in Eclipse. We support the run-time monitoring of UML-RT elements with a tracing tool called LTTng. We annotate the model with monitoring information to be used by the code generator for adding tracepoint statements for the corresponding elements. We provide the option of a timing specification to discover latency errors on the model. We validate the results by creating and tracing real time models in PapyrusRT.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a vision that allows the combined use of model-driven engineering, run-time monitoring, and animation for the development and analysis of components in real-time embedded systems. Key building block in the tool environment supporting this vision is a highly-customizable code generation process. Customization is performed via a configuration specification which describes the ways in which input is provided to the component, the ways in which run-time execution information can be observed, and how these observations drive animation tools. The environment is envisioned to be suitable for different activities ranging from quality assurance to supporting certification, teaching, and outreach and will be built exclusively with open source tools to increase impact. A preliminary prototype implementation is described.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Les élections post-conflit ou élections de sortie de crise organisées sous l’égide de la communauté internationale en vue de rétablir la paix dans les pays sortant de violents conflits armés ont un bilan mixte caractérisé par le succès ou l’échec selon les cas. Ce bilan mitigé représente le problème principal auquel cette recherche tente de répondre à travers les questions suivantes : l’assistance électorale étrangère est-elle efficace comme outil de rétablissement de la paix dans les sociétés post-conflit? Qu’est ce qui détermine le succès ou l’échec des élections post-conflit à contribuer efficacement au rétablissement de la paix dans les sociétés déchirées par la guerre? Pour résoudre cette problématique, cette thèse développe une théorie de l’assistance électorale en période post-conflit centrée sur les parties prenantes à la fois du conflit armé et du processus électoral. Cette théorie affirme que l’élément clé pour le succès des élections post-conflit dans le rétablissement de la paix est le renforcement de la capacité de négociation des parties prenantes à la fois dans le processus de paix et dans le processus électoral post-conflit. Dans les situations post-conflit, une assistance électorale qui se voudrait complète et efficace devra combiner à la fois le processus électoral et le processus de paix. L’assistance électorale sera inefficace si elle se concentre uniquement sur les aspects techniques du processus électoral visant à garantir des élections libres, transparentes et équitables. Pour être efficace, l’accent devra également être mis sur les facteurs supplémentaires qui peuvent empêcher la récurrence de la guerre, tels que l’habilité des individus et des groupes à négocier et à faire des compromis sur les grandes questions qui peuvent menacer le processus de paix. De fait, même des élections transparentes comme celles de 1997 au Liberia saluées par la communauté internationale n’avaient pas réussi à établir des conditions suffisantes pour éviter la reprise des hostilités. C’est pourquoi, pour être efficace, l’assistance électorale dans les situations de post-conflit doit prendre une approche globale qui priorise l’éducation civique, la sensibilisation sur les droits et responsabilités des citoyens dans une société démocratique, le débat public sur les questions qui divisent, la participation politique, la formation au dialogue politique, et toute autre activité qui pourrait aider les différentes parties à renforcer leur capacité de négociation et de compromis. Une telle assistance électorale fera une contribution à la consolidation de la paix, même dans le contexte des élections imparfaites, comme celles qui se sont détenues en Sierra Leone en 2002 ou au Libéria en 2005. Bien que la littérature sur l’assistance électorale n’ignore guère l’importance des parties prenantes aux processus électoraux post-conflit (K. Kumar, 1998, 2005), elle a fortement mis l’accent sur les mécanismes institutionnels. En effet, la recherche académique et professionnelle est abondante sur la réforme des lois électorales, la reforme constitutionnelle, et le développement des administrations électorales tels que les commissions électorales, ainsi que l’observation électorale et autres mécanismes de prévention de la fraude électorale, etc. (Carothers & Gloppen, 2007). En d’autres termes, les décideurs et les chercheurs ont attribué jusqu’à présent plus d’importance à la conception et au fonctionnement du cadre institutionnel et des procédures électorales. Cette thèse affirme qu’il est désormais temps de prendre en compte les participants eux-mêmes au processus électoral à travers des types d’assistance électorale qui favoriseraient leur capacité à participer à un débat pacifique et à trouver des compromis aux questions litigieuses. Cette approche plus globale de l’assistance électorale qui replace l’élection post-conflit dans le contexte plus englobant du processus de paix a l’avantage de transformer le processus électoral non pas seulement en une expérience d’élection de dirigeants légitimes, mais aussi, et surtout, en un processus au cours duquel les participants apprennent à régler leurs points de vue contradictoires à travers le débat politique dans un cadre institutionnel avec des moyens légaux et légitimes. Car, si le cadre institutionnel électoral est important, il reste que le résultat du processus électoral dépendra essentiellement de la volonté des participants à se conformer au cadre institutionnel et aux règles électorales.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Televisions (TVs) and VR Head-Mounted Displays (VR HMDs) are used in shared and social spaces in the home. This thesis posits that these displays do not sufficiently reflect the collocated, social contexts in which they reside, nor do they sufficiently support shared experiences at-a-distance. This thesis explores how the role of TVs and VR HMDs can go beyond presenting a single entertainment experience, instead supporting social and shared use in both collocated and at-a-distance contexts. For collocated TV, this thesis demonstrates that the TV can be augmented to facilitate multi-user interaction, support shared and independent activities and multi-user use through multi-view display technology, and provide awareness of the multi-screen activity of those in the room, allowing the TV to reflect the social context in which it resides. For at-a-distance TV, existing smart TVs are shown to be capable of supporting synchronous at-a-distance activity, broadening the scope of media consumption beyond the four walls of the home. For VR HMDs, collocated proximate persons can be seamlessly brought into mixed reality VR experiences based on engagement, improving VR HMD usability. Applied to at-a-distance interactions, these shared mixed reality VR experiences can enable more immersive social experiences that approximate viewing together as if in person, compared to at-a-distance TV. Through an examination of TVs and VR HMDs, this thesis demonstrates that consumer display technology can better support users to interact, and share experiences and activities, with those they are close to.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.