845 resultados para Dual-process Model
Resumo:
The electron pencil-beam redefinition algorithm (PBRA) of Shiu and Hogstrom has been developed for use in radiotherapy treatment planning (RTP). Earlier studies of Boyd and Hogstrom showed that the PBRA lacked an adequate incident beam model, that PBRA might require improved electron physics, and that no data existed which allowed adequate assessment of the PBRA-calculated dose accuracy in a heterogeneous medium such as one presented by patient anatomy. The hypothesis of this research was that by addressing the above issues the PBRA-calculated dose would be accurate to within 4% or 2 mm in regions of high dose gradients. A secondary electron source was added to the PBRA to account for collimation-scattered electrons in the incident beam. Parameters of the dual-source model were determined from a minimal data set to allow ease of beam commissioning. Comparisons with measured data showed 3% or better dose accuracy in water within the field for cases where 4% accuracy was not previously achievable. A measured data set was developed that allowed an evaluation of PBRA in regions distal to localized heterogeneities. Geometries in the data set included irregular surfaces and high- and low-density internal heterogeneities. The data was estimated to have 1% precision and 2% agreement with accurate, benchmarked Monte Carlo (MC) code. PBRA electron transport was enhanced by modeling local pencil beam divergence. This required fundamental changes to the mathematics of electron transport (divPBRA). Evaluation of divPBRA with the measured data set showed marginal improvement in dose accuracy when compared to PBRA; however, 4% or 2mm accuracy was not achieved by either PBRA version for all data points. Finally, PBRA was evaluated clinically by comparing PBRA- and MC-calculated dose distributions using site-specific patient RTP data. Results show PBRA did not agree with MC to within 4% or 2mm in a small fraction (<3%) of the irradiated volume. Although the hypothesis of the research was shown to be false, the minor dose inaccuracies should have little or no impact on RTP decisions or patient outcome. Therefore, given ease of beam commissioning, documentation of accuracy, and calculational speed, the PBRA should be considered a practical tool for clinical use. ^
Resumo:
The knowledge about processes concerning perception and understanding is of paramount importance for designing means of communication like maps and charts. This is especially the case, if one does not want to lose sight of the map-user and if map-design is to be orientated along the map-users needs and preferences in order to improve the cartographic product's usability. A scientific approach to visualization can help to achieve useable results. The insights achieved by such an approach can lead to modes of visualization that are superior to those, which have seemingly proved their value in praxis - so-called "bestpractices" -, concerning their utility and efficiency. This thesis shows this by using the example of visualizing the limits of bodies of waters in the Southern Ocean. After making some introductorily remarks on the chosen mode of problem-solution in chapter one, which simultaneously illustrate the flow of work while working on the problem, in chapter two the relevant information concerning the drawing of limits in the Southern Ocean is outlined. Chapter 3 builds the theoretical framework, which is a multidisciplinary approach to representation. This theoretical framework is based on "How Maps Work" by the American Cartographer MacEachren (1995/2004). His "scientific approach to visualization" is amended and adjusted by the knowledge gained from recent findings of the social sciences where necessary. So, the approach suggested in this thesis represents a synergy of psychology, sociology, semiotics, linguistics, communication theory and cartography. It follows the tradition of interdisciplinary research getting over the boundaries of a single scientific subject. The achieved holistic approach can help to improve the usability of cartographic products. It illustrates on the one hand those processes taking place while perceiving and recognizing cartographic information - so-called bottom-up-processes. On the other hand it illuminates the processes which happen during understanding this information in so-called top-down-processes. Bottom-up- and top-down-processes are interdependent and inseparably interrelated and therefore cannot be understood without each other. Regarding aspects of usability the approach suggested in this thesis strongly focuses on the map-user. This is the reason why the phenomenon of communication gains more weight than in MacEachren's map-centered approach. Because of this, in chapter 4 a holistic approach to communication is developed. This approach makes clear that only the map-user can evaluate the usability of a cartographic product. Only if he can extract the information relevant for him from the cartographical product, it is really useable. The concept of communication is well suited to conceive that. In case of the visualization of limits of bodies of water in the Southern Ocean, which is not complex enough to illustrate all results of the theoretical considerations, it is suggested to visualize the limits with red lines. This suggestion deviates from the commonly used mode of visualization. So, this thesis shows how theory is able to ameliorate praxis. Chapter 5 leads back to the task of fixing limits of the bodies of water in the area of concern. A convention by the International Hydrographic Organization (IHO) states that those limits should be drawn by using meridians, parallels, rhumb lines and bathymetric data. Based on the available bathymetric data both a representation and a process model are calculated, which should support the drawing of the limits. The quality of both models, which depends on the quality of the bathymetric data at hand, leads to the decision that the representation model is better suited to support the drawing of limits.
Resumo:
Los avances en el hardware permiten disponer de grandes volúmenes de datos, surgiendo aplicaciones que deben suministrar información en tiempo cuasi-real, la monitorización de pacientes, ej., el seguimiento sanitario de las conducciones de agua, etc. Las necesidades de estas aplicaciones hacen emerger el modelo de flujo de datos (data streaming) frente al modelo almacenar-para-despuésprocesar (store-then-process). Mientras que en el modelo store-then-process, los datos son almacenados para ser posteriormente consultados; en los sistemas de streaming, los datos son procesados a su llegada al sistema, produciendo respuestas continuas sin llegar a almacenarse. Esta nueva visión impone desafíos para el procesamiento de datos al vuelo: 1) las respuestas deben producirse de manera continua cada vez que nuevos datos llegan al sistema; 2) los datos son accedidos solo una vez y, generalmente, no son almacenados en su totalidad; y 3) el tiempo de procesamiento por dato para producir una respuesta debe ser bajo. Aunque existen dos modelos para el cómputo de respuestas continuas, el modelo evolutivo y el de ventana deslizante; éste segundo se ajusta mejor en ciertas aplicaciones al considerar únicamente los datos recibidos más recientemente, en lugar de todo el histórico de datos. En los últimos años, la minería de datos en streaming se ha centrado en el modelo evolutivo. Mientras que, en el modelo de ventana deslizante, el trabajo presentado es más reducido ya que estos algoritmos no sólo deben de ser incrementales si no que deben borrar la información que caduca por el deslizamiento de la ventana manteniendo los anteriores tres desafíos. Una de las tareas fundamentales en minería de datos es la búsqueda de agrupaciones donde, dado un conjunto de datos, el objetivo es encontrar grupos representativos, de manera que se tenga una descripción sintética del conjunto. Estas agrupaciones son fundamentales en aplicaciones como la detección de intrusos en la red o la segmentación de clientes en el marketing y la publicidad. Debido a las cantidades masivas de datos que deben procesarse en este tipo de aplicaciones (millones de eventos por segundo), las soluciones centralizadas puede ser incapaz de hacer frente a las restricciones de tiempo de procesamiento, por lo que deben recurrir a descartar datos durante los picos de carga. Para evitar esta perdida de datos, se impone el procesamiento distribuido de streams, en concreto, los algoritmos de agrupamiento deben ser adaptados para este tipo de entornos, en los que los datos están distribuidos. En streaming, la investigación no solo se centra en el diseño para tareas generales, como la agrupación, sino también en la búsqueda de nuevos enfoques que se adapten mejor a escenarios particulares. Como ejemplo, un mecanismo de agrupación ad-hoc resulta ser más adecuado para la defensa contra la denegación de servicio distribuida (Distributed Denial of Services, DDoS) que el problema tradicional de k-medias. En esta tesis se pretende contribuir en el problema agrupamiento en streaming tanto en entornos centralizados y distribuidos. Hemos diseñado un algoritmo centralizado de clustering mostrando las capacidades para descubrir agrupaciones de alta calidad en bajo tiempo frente a otras soluciones del estado del arte, en una amplia evaluación. Además, se ha trabajado sobre una estructura que reduce notablemente el espacio de memoria necesario, controlando, en todo momento, el error de los cómputos. Nuestro trabajo también proporciona dos protocolos de distribución del cómputo de agrupaciones. Se han analizado dos características fundamentales: el impacto sobre la calidad del clustering al realizar el cómputo distribuido y las condiciones necesarias para la reducción del tiempo de procesamiento frente a la solución centralizada. Finalmente, hemos desarrollado un entorno para la detección de ataques DDoS basado en agrupaciones. En este último caso, se ha caracterizado el tipo de ataques detectados y se ha desarrollado una evaluación sobre la eficiencia y eficacia de la mitigación del impacto del ataque. ABSTRACT Advances in hardware allow to collect huge volumes of data emerging applications that must provide information in near-real time, e.g., patient monitoring, health monitoring of water pipes, etc. The data streaming model emerges to comply with these applications overcoming the traditional store-then-process model. With the store-then-process model, data is stored before being consulted; while, in streaming, data are processed on the fly producing continuous responses. The challenges of streaming for processing data on the fly are the following: 1) responses must be produced continuously whenever new data arrives in the system; 2) data is accessed only once and is generally not maintained in its entirety, and 3) data processing time to produce a response should be low. Two models exist to compute continuous responses: the evolving model and the sliding window model; the latter fits best with applications must be computed over the most recently data rather than all the previous data. In recent years, research in the context of data stream mining has focused mainly on the evolving model. In the sliding window model, the work presented is smaller since these algorithms must be incremental and they must delete the information which expires when the window slides. Clustering is one of the fundamental techniques of data mining and is used to analyze data sets in order to find representative groups that provide a concise description of the data being processed. Clustering is critical in applications such as network intrusion detection or customer segmentation in marketing and advertising. Due to the huge amount of data that must be processed by such applications (up to millions of events per second), centralized solutions are usually unable to cope with timing restrictions and recur to shedding techniques where data is discarded during load peaks. To avoid discarding of data, processing of streams (such as clustering) must be distributed and adapted to environments where information is distributed. In streaming, research does not only focus on designing for general tasks, such as clustering, but also in finding new approaches that fit bests with particular scenarios. As an example, an ad-hoc grouping mechanism turns out to be more adequate than k-means for defense against Distributed Denial of Service (DDoS). This thesis contributes to the data stream mining clustering technique both for centralized and distributed environments. We present a centralized clustering algorithm showing capabilities to discover clusters of high quality in low time and we provide a comparison with existing state of the art solutions. We have worked on a data structure that significantly reduces memory requirements while controlling the error of the clusters statistics. We also provide two distributed clustering protocols. We focus on the analysis of two key features: the impact on the clustering quality when computation is distributed and the requirements for reducing the processing time compared to the centralized solution. Finally, with respect to ad-hoc grouping techniques, we have developed a DDoS detection framework based on clustering.We have characterized the attacks detected and we have evaluated the efficiency and effectiveness of mitigating the attack impact.
Resumo:
En la actualidad existe una gran expectación ante la introducción de nuevas herramientas y métodos para el desarrollo de productos software, que permitirán en un futuro próximo un planteamiento de ingeniería del proceso de producción software. Las nuevas metodologías que empiezan a esbozarse suponen un enfoque integral del problema abarcando todas las fases del esquema productivo. Sin embargo el grado de automatización conseguido en el proceso de construcción de sistemas es muy bajo y éste está centrado en las últimas fases del ciclo de vida del software, consiguiéndose así una reducción poco significativa de sus costes y, lo que es aún más importante, sin garantizar la calidad de los productos software obtenidos. Esta tesis define una metodología de desarrollo software estructurada que se puede automatizar, es decir una metodología CASE. La metodología que se presenta se ajusta al modelo de ciclo de desarrollo CASE, que consta de las fases de análisis, diseño y pruebas; siendo su ámbito de aplicación los sistemas de información. Se establecen inicialmente los principios básicos sobre los que la metodología CASE se asienta. Posteriormente, y puesto que la metodología se inicia con la fijación de los objetivos de la empresa que demanda un sistema informático, se emplean técnicas que sirvan de recogida y validación de la información, que proporcionan a la vez un lenguaje de comunicación fácil entre usuarios finales e informáticos. Además, estas mismas técnicas detallarán de una manera completa, consistente y sin ambigüedad todos los requisitos del sistema. Asimismo, se presentan un conjunto de técnicas y algoritmos para conseguir que desde la especificación de requisitos del sistema se logre una automatización tanto del diseño lógico del Modelo de Procesos como del Modelo de Datos, validados ambos conforme a la especificación de requisitos previa. Por último se definen unos procedimientos formales que indican el conjunto de actividades a realizar en el proceso de construcción y cómo llevarlas a cabo, consiguiendo de esta manera una integridad en las distintas etapas del proceso de desarrollo.---ABSTRACT---Nowdays there is a great expectation with regard to the introduction of new tools and methods for the software products development that, in the very near future will allow, an engineering approach in the software development process. New methodologies, just emerging, imply an integral approach to the problem, including all the productive scheme stages. However, the automatization degree obtained in the systems construction process is very low and focused on the last phases of the software lifecycle, which means that the costs reduction obtained is irrelevant and, which is more important, the quality of the software products is not guaranteed. This thesis defines an structured software development methodology that can be automated, that is a CASE methodology. Such a methodology is adapted to the CASE development cycle-model, which consists in analysis, design and testing phases, being the information systems its field of application. Firstly, we present the basic principies on which CASE methodology is based. Secondly, since the methodology starts from fixing the objectives of the company demanding the automatization system, we use some techniques that are useful for gathering and validating the information, being at the same time an easy communication language between end-users and developers. Indeed, these same techniques will detail completely, consistently and non ambiguously all the system requirements. Likewise, a set of techniques and algorithms are shown in order to obtain, from the system requirements specification, an automatization of the Process Model logical design, and of the Data Model logical design. Those two models are validated according to the previous requirement specification. Finally, we define several formal procedures that suggest which set of activities to be accomplished in the construction process, and how to carry them out, getting in this way integrity and completness for the different stages of the development process.
Resumo:
New technologies such as, the new Information and Communication Technology ICT, break new paths and redefines the way we understand business, the Cloud Computing is one of them. The on demand resource gathering and the per usage payment scheme are now commonplace, and allows companies to save on their ICT investments. Despite the importance of this issue, we still lack methodologies that help companies, to develop applications oriented for its exploitation in the Cloud. In this study we aim to fill this gap and propose a methodology for the development of ICT applications, which are directed towards a business model, and further outsourcing in the Cloud. In the former the Development of SOA applications, we take, as a baseline scenario, a business model from which to obtain a business process model. To this end, we use software engineering tools; and in the latter The Outsourcing we propose a guide that would facilitate uploading business models into the Cloud; to this end we describe a SOA governance model, which controls the SOA. Additionally we propose a Cloud government that integrates Service Level Agreements SLAs, plus SOA governance, and Cloud architecture. Finally we apply our methodology in an example illustrating our proposal. We believe that our proposal can be used as a guide/pattern for the development of business applications.
Resumo:
El Cementerio Este de Malmo (1916-1973) ha sido analizado en el ámbito internacional sólo en contadas ocasiones, aunque en este lugar el arquitecto sueco Sigurd Lewerentz (1885-1975) realizó un proyecto experimental a gran escala, rechazando los trazados de cementerios pintorescos que se habían popularizado en Europa en aquella época y proponiendo una disposición más ortogonal, vinculada con el lugar de distintas maneras. Después de que Lewerentz ganase el concurso, el proyecto se desarrolló durante casi sesenta años. El Cementerio Este de Malmo ofrece una lente única a través de la cual se puede examinar la forma en la que se establecieron relaciones entre el proyecto de arquitectura y diversos aspectos del paisaje: con el entorno urbano y diversas circunstancias del entorno social mediante la vegetación como límite, con la topografía a través de la escala y los materiales de construcción, con la tradición organizando plantas, secciones y construcción, con el ámbito internacional a través de los paramentos constructivos, con las técnicas constructivas habituales en Suecia por medio de materiales cotidianos y con los alrededores a través del planteamiento de los detalles. La hipótesis de trabajo plantea que el concepto de límite en la obra de Lewerentz y en el Cementerio Este de Malmo en particular tiene un carácter dual, produciendo simultáneamente separaciones y relaciones con distintos aspectos del lugar y del tiempo. Esta investigación documenta y examina la construcción del Cementerio Este de Malmo apoyándose en planos y escritos originales de distintos archivos, datos recogidos en el proyecto así como en otros cementerios de la época y en análisis previos ya publicados. Proporcionando un estudio detallado de la evolución del enfoque de Lewerentz respecto a la relación entre arquitectura y paisaje, se define un marco en el que la obra de este arquitecto puede entenderse de una manera más completa. Lewerentz mantuvo una postura crítica con algunos modelos de su época, al tiempo que planteó vínculos con aspectos de la vida cotidiana de las personas. Este conjunto de referencias redefine, un conjunto de circunstancias vinculadas con el proyecto, que redefinen el lugar de forma abstracta. En esta doble cualidad del límite se da lugar a un espacio de intersección, entendido como un lugar de convergencia de personas. En estas relaciones, el usuario siempre es el centro, ya sea para crear un pórtico para resguardar, una avenida de árboles para crear un espacio más tranquilo o una ventana simplificada. Esta tesis contribuye a la investigación en el ámbito de la integración del proyecto de arquitectura en el lugar, describiendo una metodología de proyectar, en la que los elementos que sirven para separar espacios, también se emplean para vincularlos a un conjunto seleccionado de referencias a distintas escalas, lugares y tiempos. Este doble proceso que implica la construcción de los límites permite favorecer la proximidad a algunos aspectos del entorno y al mismo tiempo rechazar otros, permitiendo una perspectiva crítica y pudiendo proponer situaciones alternativas. ABSTRACT Malmó Eastern Cemetery (1916-1973) has received little international attention, despite the fact that Swedish architect Sigurd Lewerentz (1885-1975) led a large-scale experimental project, rejecting picturesque cemetery plans, popular in Europe at that time, and developing a more orthogonal layout, which was linked to the site in different ways. After Lewerentz won first prize in the competition to develop Malmó Eastern Cemetery, the project unfolded over a period of nearly sixty years. Malmó Eastern Cemetery project offers a unique lens through which to examine how different relationships were established between the architectural project and various features of the landscape: with the urban environment and various social circumstances using greenery as a boundary; with topography using the scale of construction and materials; with tradition by designing plans, sections and construction; with the international architectural arena by building walls; with common construction methods in Sweden using ordinary materials and with the surroundings by using detail. The hypothesis of this thesis explores the dual nature of the notion of limit in Lewerentz's work, and in Malmó Eastern Cemetery in particular, through the simultaneous creation of separations and connections with various aspects of place and time. This research documents and examines the construction of Malmó Eastern Cemetery by examining original drawings and writings from various archives, field exploration into the project and other cemeteries of the time, and the existing literature. By providing a detailed study of Lewerentz's evolving approach to the relationship between architecture and landscape, this thesis defines a framework in which Lewerentz's work may be understood in a more comprehensive way. Lewerentz was critical of some of the models of his time, although he established different connections with aspects of people's everyday lives. This set of connections defines a particular setting or set of circumstances for the project, which are more of an abstract notion. Within this double role of limits, a space of intersection is generated, which can be understood as a place of convergence for people. In this set of connections, the user is always at the centre of the design. For example, Lewerentz designed a portico that would provide shelter, an avenue of trees to produce a tranquil space of commemoration or a simplified window. This thesis contributes to research in the field of integration of an architectural project in a site, by describing a methodology of design, in which the elements used to subdivide spaces are also used to connect a set of selected references for different scales, locations and times. The dual process involved in building limits encourages proximity to some aspects of the environment, while rejecting others, thereby allowing for a critical perspective and the proposal of alternative situations.
Resumo:
En la actualidad no se concibe una empresa, por pequeña que esta sea, sin algún tipo de servicio TI. Se presenta para cada empresa el reto de emprender proyectos para desarrollar o contratar servicios de TI que soporten los diferentes procesos de negocio de la empresa. Por otro lado, a menos que los servicios de TI estén aislados de toda red, lo cual es prácticamente imposible en la actualidad, no existe un servicio o un proyecto que lo desarrolle garantizando el 100% de seguridad. Así la empresa maneja una dualidad entre desarrollar productos/servicios de TI seguros y el mantenimiento constante de sus servicios TI en estado seguro. La gestión de los proyectos para el desarrollo de los servicios de TI se aborda, en la mayoría de las empresas, aplicando distintas prácticas, utilizadas en otros proyectos y recomendadas, a tal efecto, por marcos y estándares con mayor reconocimiento. Por lo general, estos marcos incluyen, entre sus procesos, la gestión de los riesgos orientada al cumplimiento de plazos, de costes y, a veces, de la funcionalidad del producto o servicio. Sin embargo, en estas prácticas se obvian los aspectos de seguridad (confidencialidad, integridad y disponibilidad) del producto/servicio, necesarios durante el desarrollo del proyecto. Además, una vez entregado el servicio, a nivel operativo, cuando surge algún fallo relativo a estos aspectos de seguridad, se aplican soluciones ad-hoc. Esto provoca grandes pérdidas y, en ocasiones, pone en peligro la continuidad de la propia empresa. Este problema, se va acrecentando cada día más, en cualquier tipo de empresa y, son las PYMEs, por su la falta de conocimiento del problema en sí y la escasez de recursos metodológicos y técnicos, las empresas más vulnerables. Por todo lo anterior, esta tesis doctoral tiene un doble objetivo. En primer lugar, demostrar la necesidad de contar con un marco de trabajo que, integrado con otros posibles marcos y estándares, sea sencillo de aplicar en distintos tipos y envergaduras de proyectos, y que guíe a las PYMEs en la gestión de proyectos para el desarrollo seguro y posterior mantenimiento de la seguridad de sus servicios de TI. En segundo lugar, cubrir esta necesidad desarrollando un marco de trabajo que ofrezca un modelo de proceso genérico aplicable sobre distintos patrones de proyecto y una librería de activos de seguridad que sirva a las PYMEs de guía durante el proceso de gestión del proyecto para el desarrollo seguro. El modelo de proceso del marco propuesto describe actividades en los tres niveles organizativos de la empresa (estratégico, táctico y operativo). Está basado en el ciclo de mejora continua (PDCA) y en la filosofía Seguridad por Diseño, propuesta por Siemens. Se detallan las prácticas específicas de cada actividad, las entradas, salidas, acciones, roles, KPIs y técnicas aplicables para cada actividad. Estas prácticas específicas pueden aplicarse o no, a criterio del jefe de proyecto y de acuerdo al estado de la empresa y proyecto que se quiera desarrollar, estableciendo así distintos patrones de proceso. Para la validación del marco se han elegido dos PYMEs. La primera del sector servicios y la segunda del sector TIC. El modelo de proceso ha sido aplicado sobre un mismo patrón de proyecto que responde a necesidades comunes a ambas empresas. El patrón de proceso ha sido valorado en los proyectos elegidos en ambas empresas, antes y después de su aplicación. Los resultados del estudio, después de su aplicación en ambas empresas, han permitido la validación del patrón de proceso, en la mejora de la gestión de proyecto para el desarrollo seguro de TI en las PYMEs. ABSTRACT Today a company without any IT service is not conceived, even if it is small either. It presents the challenge for each company to undertake projects to develop or contract IT services that support the different business processes of the company. On the other hand, unless IT services are isolated from whole network, which is virtually impossible at present, there is no service or project, which develops guaranteeing 100% security. So the company handles a duality, develop products / insurance IT services and constant maintenance of their IT services in a safe state. The project management for the development of IT services is addressed, in most companies, using different practices used in other projects and recommended for this purpose by frameworks and standards with greater recognition. Generally, these frameworks include, among its processes, risk management aimed at meeting deadlines, costs and, sometimes, the functionality of the product or service. However, safety issues such as confidentiality, integrity and availability of the product / service, necessary for the project, they are ignored in these practices. Moreover, once the service delivered at the operational level, when a fault on these safety issues arise, ad-hoc solutions are applied. This causes great losses and sometimes threatens the continuity of the company. This problem is adding more every day, in any kind of business and SMEs are, by their lack of knowledge of the problem itself and the lack of methodological and technical resources, the most vulnerable companies. For all these reasons, this thesis has two objectives. Firstly demonstrate the need for a framework that integrated with other possible frameworks and standards, it is simple to apply in different types and wingspans of projects, and to guide SMEs in the management of development projects safely, and subsequent maintenance of the security of their IT services. Secondly meet this need by developing a framework that provides a generic process model applicable to project different patterns and a library of security assets, which serve to guide SMEs in the process of project management for development safe. The process model describes the proposed activities under the three organizational levels of the company (strategic, tactical and operational). It is based on the continuous improvement cycle (PDCA) and Security Design philosophy proposed by Siemens. The specific practices, inputs, outputs, actions, roles, KPIs and techniques applicable to each activity are detailed. These specific practices can be applied or not, at the discretion of the project manager and according to the state of the company and project that the company wants to develop, establishing different patterns of process. Two SMEs have been chosen to validate the frame work. The first of the services sector and the second in the ICT sector. The process model has been applied on the same pattern project that responds to needs common to both companies. The process pattern has been valued at the selected projects in both companies before and after application. The results of the study, after application in both companies have enabled pattern validation process, improving project management for the safe development of IT in SMEs.
Resumo:
Amphibian metamorphosis is marked by dramatic, thyroid hormone (TH)-induced changes involving gene regulation by TH receptor (TR). It has been postulated that TR-mediated gene regulation involves chromatin remodeling. In the absence of ligand, TR can repress gene expression by recruiting a histone deacetylase complex, whereas liganded TR recruits a histone acetylase complex for gene activation. Earlier studies have led us to propose a dual function model for TR during development. In premetamorphic tadpoles, unliganded TR represses transcription involving histone deacetylation. During metamorphosis, endogenous TH allows TR to activate gene expression through histone acetylation. Here using chromatin immunoprecipitation assay, we directly demonstrate TR binding to TH response genes constitutively in vivo in premetamorphic tadpoles. We further show that TH treatment leads to histone deacetylase release from TH response gene promoters. Interestingly, in whole animals, changes in histone acetylation show little correlation with the expression of TH response genes. On the other hand, in the intestine and tail, where TH response genes are known to be up-regulated more dramatically by TH than in most other organs, we demonstrate that TH treatment induces gene activation and histone H4 acetylation. These data argue for a role of histone acetylation in transcriptional regulation by TRs during amphibian development in some tissues, whereas in others changes in histone acetylation levels may play no or only a minor role, supporting the existence of important alternative mechanisms in gene regulation by TR.
Resumo:
Article
Resumo:
In 1991, Bryant and Eckard estimated the annual probability that a cartel would be detected by the US Federal authorities, conditional on being detected, to be at most between 13 % and 17 %. 15 years later, we estimated the same probability over a European sample and we found an annual probability that falls between 12.9 % and 13.3 %. We also develop a detection model to clarify this probability. Our estimate is based on detection durations, calculated from data reported for all the cartels convicted by the European Commission from 1969 to the present date, and a statistical birth and death process model describing the onset and detection of cartels.
Resumo:
The Tunisian constitution of 27 January 2014 was deemed essentially compatible with international human rights principles and standards. These were adopted at the outcome of a dual process, which was underway both inside the National Constituent Assembly (NCA) and outside it, between the NCA and civil society stakeholders. Three successive drafts fell considerably short of expectations (6 August 2012, 14 December 2012 and 22 April 2013). The fourth draft (1 June 2013) was still fraught with 20 or so fundamental divergences. These were resolved, thanks to the National Dialogue in cooperation with the ad hoc “consensus commission” (lajnet tawafuqat) within the NCA, which is chaired by Mustapha Ben Jaafar (President of the NCA). The final text was overwhelmingly adopted on 26 January 2014 by 200 votes, with 12 against and four abstentions. It was promulgated on 10 February.
Resumo:
Atualmente, as instituições do ensino superior, onde se inclui a Escola Superior de Desporto de Rio Maior do Instituto Politécnico de Santarém, deparam-se com várias questões e desafios relacionados com a sua acreditação e a dos seus ciclos de estudo, e consequentemente, com a melhoria da qualidade do seu desempenho e o acesso a financiamento. Esta realidade exige novas abordagens e o aumento do nível de exigência a todos os intervenientes que contribuem para a qualidade do serviço prestado. No sentido de dar resposta a estes desafios, o Gabinete de Avaliação e Qualidade tem desenvolvido iniciativas e abordagens das quais o presente trabalho é um exemplo. Com este trabalho pretendeu-se, a partir de numa abordagem de Business Process Management, demonstrar a viabilidade e operacionalidade da utilização de uma ferramenta de Business Process Management System neste contexto. Para tal, realizou-se a modelação do processo de avaliação e acreditação desenvolvido pela Agência de Avaliação e Acreditação do Ensino Superior, através da utilização do Business Process Model and Notation. Esta proposta permitiu modelar os processos na instituição, demonstrando a utilização de uma abordagem Business Process Management numa organização desta natureza, com o objetivo de promover a sua melhoria.
Resumo:
A Gestão de Processos de Negócio (BPM – Business Process Management) é uma abordagem que tem como objetivo melhorar a eficiência nas organizações, através da gestão dos processos, em que se realiza a sua modelação, organização e otimização de uma forma iterativa e contínua. O BPM permite suportar os processos de negócio, através da utilização de métodos, técnicas e software para projetar, representar e analisar processos organizacionais que envolvem, pessoas, organizações, aplicações, documentos e outras fontes de informação (Aalst, Hofstede, & Weske, 2003). Neste estudo é utilizado um Business Process Management System (BPMS) para realizar a modelação dos processos do Comité Européen de Rink-Hockey (CERH), para a inscrição de equipas e atletas, nos eventos realizados sob a responsabilidade deste comité. A modelação é realizada através da utilização do Business Process Model and Notation (BPMN). A utilização do BPMS foi realizada considerando as seguintes etapas: (1) desenho do processo; (2) definição do processo; (3) desenvolvimento do processo e (4) administração e utilização de processos. Pretendeu-se, demonstrar a viabilidade e operacionalidade na utilização de uma ferramenta BPMS open-source, numa abordagem BPM, na modelação e implementação de processos, em detrimento de soluções proprietárias de custo elevado. O critério adotado para a seleção da ferramenta baseia-se na análise de relatórios sobre BPMS, que nos permitiu identificar e sustentar a solução adotada (Hill, Cantara, & Kerremans, 2009; Ovum, 2010; Richardson, Moore, Clair, & Vitti, 2010; Sinur & Hill, 2010). O resultado foi o desenvolvimento dos processos na organização, com a sua modelação em BPMN e implementação num BPMS, onde podemos comprovar a abordagem BPM numa organização desportiva.
Resumo:
The phenomenon of portfolio entrepreneurship has attracted considerable scholarly attention and is particularly relevant in the family fi rm context. However, there is a lack of knowledge of the process through which portfolio entrepreneurship develops in family firms. We address this gap by analyzing four in-depth, longitudinal family firm case studies from Europe and Latin America. Using a resource-based perspective, we identify six distinct resource categories that are relevant to the portfolio entrepreneurship process. Furthermore, we reveal that their importance varies across time. Our resulting resource-based process model of portfolio entrepreneurship in family firms makes valuable contributions to both theory and practice.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-06