869 resultados para Error-correcting codes (Information theory)


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Steganography is an information hiding application which aims tohide secret data imperceptibly into a cover object. In this paper, we describe anovel coding method based on Z2Z4-additive codes in which data is embeddedby distorting each cover symbol by one unit at most (+-1-steganography). Thismethod is optimal and solves the problem encountered by the most e cientmethods known today, concerning the treatment of boundary values. Theperformance of this new technique is compared with that of the mentionedmethods and with the well-known rate-distortion upper bound to conclude thata higher payload can be obtained for a given distortion by using the proposedmethod.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this thesis was to analyze the background information of an activity-based costing system, which is being used in a domestic forest industry company. The reports produced by the system have not been reliable, and this has caused the utilization of the system to diminish. The study was initiated by examining the theory of activity-based costing. It was also discovered, that the system produces management accounting information and therefore also that theory was introduced briefly. Next the possible sources of errors were examined. The significance of these errors was evaluated and waste handling was chosen as a subject of further study. The problem regarding waste handling was that there is no waste compensation in current model. When paper or board machine produces waste, it can be used as raw material in the process. However, at the moment the product, which is being produced, at the time does not get any compensation. The use of compensation has not been possible due to not knowing the quantity of process waste. As a result of the study a calculatory model, which enables calculating the quantity of process waste based on the data from the mill system, was introduced. This, for one, enables starting to use waste compensation in the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to analyze nursing ethics education from the perspective of nurses’ codes of ethics in the basic nursing education programmes in polytechnics in Finland with the following research questions: What is known about nurses’ codes in practice and education, what contents of the codes are taught, what teaching and evaluation methods are used, which demographic variables are associated with the teaching, what is nurse educators’ adequacy of knowledge to teach the codes and nursing students’ knowledge of and ability to apply the codes, and what are participants’ opinions of the need and applicability of the codes, and their importance in nursing ethics education. The aim of the study was to identify strengths and possible problem areas in teaching of the codes and nursing ethics in general. The knowledge gained from this study can be used for developing nursing ethics curricula and teaching of ethics in theory and practice. The data collection was targeted to all polytechnics in Finland providing basic nursing education (i.e. Bachelor of Health Care). The target groups were all nurse educators teaching ethics and all graduating nursing students in the academic year of 2006. A total of 183 educators and 214 students from 24 polytechnics participated. The data was collected using a structured questionnaire with four open-ended questions, designed for this study. The data was analysed by SPSS (14.0) and the open-ended questions by inductive content analysis. Descriptive statistics were used to summarize the data. Inferential statistics were used to estimate the differences between the participant groups. The reliability of the questionnaire was estimated with Cronbach’s coefficient alpha. The literature review revealed that empirical research on the codes was scarce, and minimal in the area of education. Teaching of nurses’ codes themselves and the embedded ethical concepts was extensive, teaching of the functions of the codes and related laws and agreements was moderate, but teaching of the codes of other health care professions was modest. Issues related to the nurse-patient relationship were emphasised. Wider social dimensions of the codes were less emphasized. Educators’ and students’ descriptions of teaching emphasized mainly the same teaching contents, but there were statistically significant differences between the groups in that educators assessed their teaching to be more extensive than what students had perceived it had been. T he use of teaching and evaluation methods was rather narrow and conventional. However, educators’ and students’ descriptions of the used methods differed statistically significantly. Students’ knowledge of the codes and their ability to apply them in practice was assessed as mediocre by educators and by students themselves. Most educators assessed their own knowledge of the codes as adequate to teach the codes, as did most of the students. Educators who regarded their knowledge as adequate taught the codes more extensively than those who assessed their knowledge as less adequate. Also students who assessed their educators’ knowledge as adequate perceived the teaching of the codes to be more extensive. Otherwise educators’ and students’ demographic variables had little association with their descriptions of the teaching. According to the participants, nurses need their own codes, and they are also regarded as applicable in practice. The codes are an important element in nursing ethics education, but their teaching needs development. Further research should focus on the organization of ethics teaching in the curricula, the teaching process, and on the evaluation of the effectiveness of ethics education and on educators’ competence. Also the meaning and functions of the codes at all levels of nursing deserve attention. More versatile use of research methods would be beneficial in gaining new knowledge.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tutkimuksen tarkoituksena on laadullisin menetelmin syventää tietoa työikäisten (28–60-vuotiaiden) suomalaisten kvantitatiivisesti mitatun koherenssin tunteen takana olevista tekijöistä. Tutkimuksella halutaan tuottaa aineistolähtöisesti tietoa siitä, mitkä käsitteet kuvaavat tutkittavien kerrottujen elämänkokemusten kautta selvitettyä koherenssin tunnetta ja samalla lisäämään ymmärrystä Antonovskyn salutogeenisesta teoreettisesta mallista. Tutkimukseen osallistuneet olivat Health and Social Support tutkimukseen vuosina 1998 ja 2003 osallistuneita. Koko kyseinen tutkimusotos edusti vuonna 1998 20–24, 30–34, 40–44 ja 50–54 -vuotiasta Suomen väestöä. Tutkimuksen metodina käytettiin glaserilaista grounded theory -metodologiaa. Tutkimuksen aineistonkeruu toteutettiin kolmessa eri vaiheessa. Ensimmäisessä vaiheessa haastateltiin 27 tutkittavaa. Toisessa vaiheessa haastateltavilta kerättiin lisäaineistoa kirjallisesti. Kahdeksan vastasi tähän pyyntöön. Kolmannessa vaiheessa haastateltiin seitsemää. Haastattelujen yhteydessä haastateltavat täyttivät koherenssin tunteen mittarin (13-osainen). Aineisto analysoitiin koherenssipisteiden mukaisesti kolmena eri aineistona. Tulokseksi saatiin substantiivinen teoria. Tutkimuksen tuloksena kuvattiin sosiaalinen perusprosessi, joka nimitettiin Elämän kokonaisuudeksi tässä hetkessä. Sosiaalisen perusprosessin sisällä on typologia. Jokaisesta koherenssipisteryhmästä muodostettiin oma typologia. Kukin typologia sisälsi neljä tyyppiä. Sosiaalisen perusprosessin vaiheet olivat: ehdot tämän hetken taustalla, eläminen ehtojen varassa ja uusia luoden (tietynlainen ihminen, eläminen tässä hetkessä, kokonaisnäkemys elämästä) sekä jatkaminen ehtojen varassa ja uusia luoden. Typologiat ovat nimeltään eheät, pärjäävät ja sinnittelijät. Haastateltavien kokemuksia ei analyysivaiheessa pyritty liittämään tiettyyn kontekstiin, vaan ne liittyivät toimintaan ja käyttäytymiseen. Tulosten tarkasteluvaiheessa tehtiin kuitenkin lyhyt kuvaus elämänkulkututkimuksesta sekä sosiaalisesta ja kulttuurisesta ympäristöstä. Tutkimustulokset ovat kuvailevia ja niiden perusteella saadaan viitteitä siitä, millaiset asiat ovat yhteydessä koherenssin tunteeseen ja millä tavalla yhteys rakentuu. Saatu substantiivinen teoria on pätevä tässä aineistossa. Tulokset noudattelevat Antonovskyn salutogeenista teoreettista mallia siltä osin, että mitä korkeammat koherenssipisteet olivat, sitä enemmän typologiassa oli eheyttä lisääviä tekijöitä. Eheys tuo elämään henkistä liikkumavaraa, jota typologian tyypit (rakentava, ilmavasti elävä, elämänmyönteinen, juureva realisti) ilmentävät. Typologioiden kuvauksista voidaan lukea, että kaikissa tyypeissä kuvataan vaikeita elämänkokemuksia. Olennaista on se, miten näihin vaikeuksiin suhtaudutaan. Eheillä on parhaat edellytykset käsitellä elämän haasteita. Voidaan kuitenkin todeta, että kaikki tähän tutkimukseen osallistuneet olivat selviytyjiä.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Designing user interfaces for novel software systems can be challenging since the usability preferences of the users are not well known. This thesis presents a usability study conducted for the development of a user interface for game developers to enter game specific information. By conducting usability testing, the usability preferences of game developers were explored and the design was shaped according to their needs. An assessment of the overall usability of the final design is provided together with the main findings that include the usability preferences and design recommendations. The results showed that the most valuable usability preferences are quickness, error tolerance and the ability to constantly inspect the entered information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Speed, uncertainty and complexity are increasing in the business world all the time. When knowledge and skills become quickly irrelevant, new challenges are set for information technology (IT) education. Meta-learning skills – learning how to learn rapidly - and innovation skills have become more essential than single technologies or other specific issues. The drastic changes in the information and communications technology (ICT) sector have caused a need to reconsider how IT Bachelor education in Universities of Applied Sciences should be organized and employed to cope with the change. The objective of the study was to evaluate how a new approach to IT Bachelor education, the ICT entrepreneurship study path (ICT-ESP) fits IT Bachelor education in a Finnish University of Applied Sciences. This kind of educational arrangement has not been employed elsewhere in the context of IT Bachelor education. The study presents the results of a four-year period during which IT Bachelor education was renewed in a Finnish University of Applied Sciences. The learning environment was organized into an ICT-ESP based on Nonaka’s knowledge theory and Kolb’s experiental learning. The IT students who studied in the ICT-ESP established a cooperative and learned ICT by running their cooperative at the University of Applied Sciences. The students (called team entrepreneurs) studied by reading theory in books and other sources of explicit information, doing projects for their customers, and reflecting in training sessions on what was learnt by doing and by studying the literature. Action research was used as the research strategy in this study. Empirical data was collected via theme-based interviews, direct observation, and participative observation. Grounded theory method was utilized in the data analysis and the theoretical sampling was used to guide the data collection. The context of the University of Applied Sciences provided a good basis for fostering team entrepreneurship. However, the results showed that the employment of the ICT-ESP did not fit into the IT Bachelor education well enough. The ICT-ESP was cognitively too tough for the team entrepreneurs because they had two different set of rules to follow in their studies. The conventional courses engaged lot of energy which should have been spent for professional development in the ICT-ESP. The amount of competencies needed in the ICT-ESP for professional development was greater than those needed for any other ways of studying. The team entrepreneurs needed to develop skills in ICT, leadership and self-leadership, team development and entrepreneurship skills. The entrepreneurship skills included skills on marketing and sales, brand development, productization, and business administration. Considering the three-year time the team entrepreneurs spent in the ICT-ESP, the challenges were remarkable. Changes to the organization of IT Bachelor education are also suggested in the study. At first, it should be admitted that the ICT-ESP produces IT Bachelors with a different set of competencies compared to the conventional way of educating IT Bachelors. Secondly, the number of courses on general topics in mathematics, physics, and languages for team entrepreneurs studying in the ICTESP should be reconsidered and the conventional course-based teaching of the topics should be reorganized to support the team coaching process of the team entrepreneurs with their practiceoriented projects. Third, the upcoming team entrepreneurs should be equipped with relevant information about the ICT-ESP and what it would require in practice to study as a team entrepreneur. Finally, the upcoming team entrepreneurs should be carefully selected before they start in the ICT-ESP to have a possibility to eliminate solo players and those who have a too romantic view of being a team entrepreneur. The results gained in the study provided answers to the original research questions and the objectives of the study were met. Even though the IT degree programme was terminated during the research process, the amount of qualitative data gathered made it possible to justify the interpretations done.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed storage systems are studied. The interest in such system has become relatively wide due to the increasing amount of information needed to be stored in data centers or different kinds of cloud systems. There are many kinds of solutions for storing the information into distributed devices regarding the needs of the system designer. This thesis studies the questions of designing such storage systems and also fundamental limits of such systems. Namely, the subjects of interest of this thesis include heterogeneous distributed storage systems, distributed storage systems with the exact repair property, and locally repairable codes. For distributed storage systems with either functional or exact repair, capacity results are proved. In the case of locally repairable codes, the minimum distance is studied. Constructions for exact-repairing codes between minimum bandwidth regeneration (MBR) and minimum storage regeneration (MSR) points are given. These codes exceed the time-sharing line of the extremal points in many cases. Other properties of exact-regenerating codes are also studied. For the heterogeneous setup, the main result is that the capacity of such systems is always smaller than or equal to the capacity of a homogeneous system with symmetric repair with average node size and average repair bandwidth. A randomized construction for a locally repairable code with good minimum distance is given. It is shown that a random linear code of certain natural type has a good minimum distance with high probability. Other properties of locally repairable codes are also studied.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The present study compares the performance of stochastic and fuzzy models for the analysis of the relationship between clinical signs and diagnosis. Data obtained for 153 children concerning diagnosis (pneumonia, other non-pneumonia diseases, absence of disease) and seven clinical signs were divided into two samples, one for analysis and other for validation. The former was used to derive relations by multi-discriminant analysis (MDA) and by fuzzy max-min compositions (fuzzy), and the latter was used to assess the predictions drawn from each type of relation. MDA and fuzzy were closely similar in terms of prediction, with correct allocation of 75.7 to 78.3% of patients in the validation sample, and displaying only a single instance of disagreement: a patient with low level of toxemia was mistaken as not diseased by MDA and correctly taken as somehow ill by fuzzy. Concerning relations, each method provided different information, each revealing different aspects of the relations between clinical signs and diagnoses. Both methods agreed on pointing X-ray, dyspnea, and auscultation as better related with pneumonia, but only fuzzy was able to detect relations of heart rate, body temperature, toxemia and respiratory rate with pneumonia. Moreover, only fuzzy was able to detect a relationship between heart rate and absence of disease, which allowed the detection of six malnourished children whose diagnoses as healthy are, indeed, disputable. The conclusion is that even though fuzzy sets theory might not improve prediction, it certainly does enhance clinical knowledge since it detects relationships not visible to stochastic models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Coronary artery disease (CAD) is a worldwide leading cause of death. The standard method for evaluating critical partial occlusions is coronary arteriography, a catheterization technique which is invasive, time consuming, and costly. There are noninvasive approaches for the early detection of CAD. The basis for the noninvasive diagnosis of CAD has been laid in a sequential analysis of the risk factors, and the results of the treadmill test and myocardial perfusion scintigraphy (MPS). Many investigators have demonstrated that the diagnostic applications of MPS are appropriate for patients who have an intermediate likelihood of disease. Although this information is useful, it is only partially utilized in clinical practice due to the difficulty to properly classify the patients. Since the seminal work of Lotfi Zadeh, fuzzy logic has been applied in numerous areas. In the present study, we proposed and tested a model to select patients for MPS based on fuzzy sets theory. A group of 1053 patients was used to develop the model and another group of 1045 patients was used to test it. Receiver operating characteristic curves were used to compare the performance of the fuzzy model against expert physician opinions, and showed that the performance of the fuzzy model was equal or superior to that of the physicians. Therefore, we conclude that the fuzzy model could be a useful tool to assist the general practitioner in the selection of patients for MPS.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Premenstrual syndrome and premenstrual dysphoric disorder (PMDD) seem to form a severity continuum with no clear-cut boundary. However, since the American Psychiatric Association proposed the research criteria for PMDD in 1994, there has been no agreement about the symptomatic constellation that constitutes this syndrome. The objective of the present study was to establish the core latent structure of PMDD symptoms in a non-clinical sample. Data concerning PMDD symptoms were obtained from 632 regularly menstruating college students (mean age 24.4 years, SD 5.9, range 17 to 49). For the first random half (N = 316), we performed principal component analysis (PCA) and for the remaining half (N = 316), we tested three theory-derived competing models of PMDD by confirmatory factor analysis. PCA allowed us to extract two correlated factors, i.e., dysphoric-somatic and behavioral-impairment factors. The two-dimensional latent model derived from PCA showed the best overall fit among three models tested by confirmatory factor analysis (c²53 = 64.39, P = 0.13; goodness-of-fit indices = 0.96; adjusted goodness-of-fit indices = 0.95; root mean square residual = 0.05; root mean square error of approximation = 0.03; 90%CI = 0.00 to 0.05; Akaike's information criterion = -41.61). The items "out of control" and "physical symptoms" loaded conspicuously on the first factor and "interpersonal impairment" loaded higher on the second factor. The construct validity for PMDD was accounted for by two highly correlated dimensions. These results support the argument for focusing on the core psychopathological dimension of PMDD in future studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Optimization of quantum measurement processes has a pivotal role in carrying out better, more accurate or less disrupting, measurements and experiments on a quantum system. Especially, convex optimization, i.e., identifying the extreme points of the convex sets and subsets of quantum measuring devices plays an important part in quantum optimization since the typical figures of merit for measuring processes are affine functionals. In this thesis, we discuss results determining the extreme quantum devices and their relevance, e.g., in quantum-compatibility-related questions. Especially, we see that a compatible device pair where one device is extreme can be joined into a single apparatus essentially in a unique way. Moreover, we show that the question whether a pair of quantum observables can be measured jointly can often be formulated in a weaker form when some of the observables involved are extreme. Another major line of research treated in this thesis deals with convex analysis of special restricted quantum device sets, covariance structures or, in particular, generalized imprimitivity systems. Some results on the structure ofcovariant observables and instruments are listed as well as results identifying the extreme points of covariance structures in quantum theory. As a special case study, not published anywhere before, we study the structure of Euclidean-covariant localization observables for spin-0-particles. We also discuss the general form of Weyl-covariant phase-space instruments. Finally, certain optimality measures originating from convex geometry are introduced for quantum devices, namely, boundariness measuring how ‘close’ to the algebraic boundary of the device set a quantum apparatus is and the robustness of incompatibility quantifying the level of incompatibility for a quantum device pair by measuring the highest amount of noise the pair tolerates without becoming compatible. Boundariness is further associated to minimum-error discrimination of quantum devices, and robustness of incompatibility is shown to behave monotonically under certain compatibility-non-decreasing operations. Moreover, the value of robustness of incompatibility is given for a few special device pairs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A review of the literature reveals that there are a number of children in the educational system who are characterized by Attention Deficit Disorder. Further review of the literature reveals that there are information processing programs which have had some success in increasing the learning of these children. Currently, an information processing program which is based on schema theory is being implemented in Lincoln County. Since schema theory based programs build structural, conditional, factual, and procedural schemata which assist the learner in attending to salient factors, learning should be increased. Thirty-four children were selected from a random sampling of Grade Seven classes in Lincoln County. Seventeen of these children were identified by the researcher and classroom teacher as being characterized by Attention Deficit Disorder. From the remaining population, 17 children who were not characterized by Attention Deficit Disorder were randomly selected. The data collected were compared using independent t-tests, paired t-tests, and correlation analysis. Significant differences were found in all cases. The Non-Attention Deficit Disorder children scored significantly higher on all the tests but the Attention Defici t Disorder children had a significantly higher ratio of gain between the pretests and posttests.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The design of a large and reliable DNA codeword library is a key problem in DNA based computing. DNA codes, namely sets of fixed length edit metric codewords over the alphabet {A, C, G, T}, satisfy certain combinatorial constraints with respect to biological and chemical restrictions of DNA strands. The primary constraints that we consider are the reverse--complement constraint and the fixed GC--content constraint, as well as the basic edit distance constraint between codewords. We focus on exploring the theory underlying DNA codes and discuss several approaches to searching for optimal DNA codes. We use Conway's lexicode algorithm and an exhaustive search algorithm to produce provably optimal DNA codes for codes with small parameter values. And a genetic algorithm is proposed to search for some sub--optimal DNA codes with relatively large parameter values, where we can consider their sizes as reasonable lower bounds of DNA codes. Furthermore, we provide tables of bounds on sizes of DNA codes with length from 1 to 9 and minimum distance from 1 to 9.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The purpose of this study was to investigate the learning preferences and the post-secondary educational experiences of a group of Net-Gen adult learners, aged between 18 and 35, currently working in the knowledge economy workplace, and their assessment of how adequately they were prepared to meet the requirements of the knowledge economy workplace. This study utilized an explanatory mixed-method research design. Participants completed a questionnaire providing information on their self-reported learning style preferences, their use of digital tools for formal and informal learning, their use of digital technologies in postsecondary educational experiences, and their use of digital technologies in their workplace. Four volunteers from the questionnaire respondents were selected to participate in interviews based on the diversity of their experiences in higher education, including digital environments, and the diversity of their knowledge economy workplaces. Data collected from the questionnaire were analyzed for descriptive and demographic statistics, and categorized so that common patterns could be identified from information gathered from the online questionnaire and interviews. Findings based on this study indicated that these Net-Gen adult learners were fluent with all types of digital technologies in collaborative environments, expecting their educational experiences to provide a similar experience. Participants clearly expressed an understanding that digital/collaborative aptitudes are essential to successful employment in the knowledge economy workplace. The findings of this study indicated that the majority of participants felt that their post-secondary educational experiences did not adequately prepare them to meet the expectations of this type of working environment.