992 resultados para memory access complexity
Resumo:
The purpose of this study is to contribute to the changing innovation management literature by providing an overview of different innovation types and organizational complexity factors. Aiming at a better understanding of effective innovation management, innovation and complexity are related to the formulation of an innovation strategy and interaction between different innovation types is further explored. The chosen approach in this study is to review the existing literature on different innovation types and organizational complexity factors in order to design a survey which allows for statistical measurement of their interactions and relationships to innovation strategy formulation. The findings demonstrate interaction between individual innovation types. Additionally, organizational complexity factors and different innovation types are significantly related to innovation strategy formulation. In particular, more closed innovation and incremental innovation positively influence the likelihood of innovation strategy formulation. Organizational complexity factors have an overall negative influence on innovation strategy formulation. In order to define best practices for innovation management and to guide managerial decision making, organizations need to be aware of the co-existence of different innovation types and formulate an innovation strategy to more closely align their innovation objectives.
Resumo:
RESUMO - Contexto Os indivíduos, tal como as instituições, não são imunes a incentivos. No entanto, enquanto os modelos de incentivos das instituições têm sido alvo de diferentes evoluções, o mesmo não se verificou ao nível dos profissionais. Esta situação não se figura compatível com a complexidade de gestão de recursos humanos, devendo ser obviada para potenciar o alinhamento entre os interesses institucionais e os dos próprios profissionais. Objectivos Estudar a atribuição de incentivos a profissionais de saúde no contexto de organizações com integração vertical de cuidados. Metodologia A metodologia adoptada compreendeu três fases. Numa primeira procedeu-se à revisão sistemática de literatura relativa à: (1) construção de modelos de incentivo a profissionais em diferentes sistemas de saúde e tipo de prestadores; e (2) identificação de medidas de custo-efectividade comprovada. Tendo por base esta evidência, a par de documentação oficial ao nível do modelo de financiamento das ULS, procedeu-se, numa segunda fase, à construção de um modelo de incentivo base com recurso à ferramenta Microsoft Excel. Por último, numa terceira etapa, procedeu-se à adaptação do modelo base construído na etapa transacta tendo por base informação obtida mediante a realização de um estudo retrospectivo in loco na ULS do Baixo Alentejo (ULSBA). Em adição, procedeu-se à estimativa do impacto na perspectiva da ULS e dos profissionais para o cenário base e diversas análises de sensibilidade. Resultados No que respeita à estrutura, o modelo base de incentivos a profissionais apresenta 44 indicadores, distribuídos por cinco dimensões de análise, sendo que 28 indicadores (63,6%) são de processo e 14 (31,8%) de resultado. Relativamente às dimensões em análise, verifica-se uma predominância de indicadores ao nível da dimensão eficiência e qualidade assistencial, totalizando 35 (i.e. 79,5% dos 44 indicadores). No que respeita ao destinatário, 14 indicadores (31,8%) apresentam uma visão holística da ULS, 17 (38,6%) encontram-se adstritos unicamente aos cuidados primários e os remanescentes 13 (29,5%) aos cuidados hospitalares. Cerca de 85% dos actuais incentivos da ULSBA decorre da unidade de pagamento salarial secundada pelo pagamento de suplementos (12%). Não obstante, o estudo retrospectivo da ULSBA confirmou o cenário expectável de ausência de um modelo de incentivo homogéneos e transversal à ULS, transparecendo importantes assimetrias entre diferentes unidades prestadoras e/ou profissionais de saúde. De forma relevante importa apontar a insuficiência de incentivos capitacionais (ao contrário do que sucede com o modelo de incentivo da própria ULSBA) ou adstritos a índices de desempenho. Tendo em consideração o modelo de incentivo concebido e adaptado à realidade da ULSBA, a par do plano de implementação, estima-se que o modelo de incentivos gere: (1) poupanças na perspectiva da ULS (entre 2,5% a 3,5% do orçamento global da ULSBA); e (2) um incremento de remuneração ao nível dos profissionais (entre 5% a 15% do salario base). O supracitado – aparentemente contraditório - decorre da aposta em medidas de custo-efectividade contrastada e um alinhamento entre o modelo proposto e o vigente para o próprio financiamento da unidade, apostando numa clara estratégia de ganhos mútuos. As análises de sensibilidade realizadas permitem conferir a solidez e robustez do modelo a significativas variações em parâmetros chave.
Resumo:
The next pages will describe my experience and results of making connections between cognitive sciences and art; the transformations of my memories being the object of study and motivation for this process of self-discovery. The human body reacts according to innumerable neural functions and external stimuli. Neurons respond to the evocation of experienced events, building virtual images, map-like constellations sometimes fulfilled by imagination, desires or knowledge promoting in this way their constant reshaping. This document offers an insight into my recollections as matter. As matter these recollections take on different states and I hope to give you a better sense of my personal voice using my experience with glass to explore this transformation and accompanying my journey with lectures and scientific readings about the mind functions.
Resumo:
This paper studies the drivers of heuristic application in different decision types. The study compares differences in frequencies of heuristic classes' such as recognition, one-reason choice and trade-off applied in, respectively, memory-based and stimulus-based choices as well as in high and low involvement decisions. The study has been conducted online among 205 participants from 28 countries.
Resumo:
ABSTRACT: Background. In India, prevalence rates of dementia and prodromal amnestic Mild Cognitive Impairment (MCI) are 3.1% and 4.3% respectively. Most Indians refer to the full spectrum of cognitive disorders simply as ‘memory loss.’ Barring prevention or cure, these conditions will rise rapidly with population aging. Evidence-based policies and practices can improve the lives of affected individuals and their caregivers, but will require timely and sustained uptake. Objectives. Framed by social cognitive theories of health behavior, this study explores the knowledge, attitudes and practices concerning cognitive impairment and related service use by older adults who screen positive for MCI, their primary caregivers, and health providers. Methods. I used the Montreal Cognitive Assessment to screen for cognitive impairment in memory camps in Mumbai. To achieve sampling diversity, I used maximum variation sampling. Ten adults aged 60+ who had no significant functional impairment but screened positive for MCI and their caregivers participated in separate focus groups. Four other such dyads and six doctors/ traditional healers completed in-depth interviews. Data were translated from Hindi or Marathi to English and analyzed in Atlas.ti using Framework Analysis. Findings. Knowledge and awareness of cognitive impairment and available resources were very low. Physicians attributed the condition to disease-induced pathology while lay persons blamed brain malfunction due to normal aging. Main attitudes were that this condition is not a disease, is not serious and/or is not treatable, and that it evokes stigma toward and among impaired persons, their families and providers. Low knowledge and poor attitudes impeded help-seeking. Conclusions. Cognitive disorders of aging will take a heavy toll on private lives and public resources in developing countries. Early detection, accurate diagnosis, systematic monitoring and quality care are needed to compress the period of morbidity and promote quality of life. Key stakeholders provide essential insights into how scientific and indigenous knowledge and sociocultural attitudes affect use and provision of resources.
Resumo:
The life of humans and most living beings depend on sensation and perception for the best assessment of the surrounding world. Sensorial organs acquire a variety of stimuli that are interpreted and integrated in our brain for immediate use or stored in memory for later recall. Among the reasoning aspects, a person has to decide what to do with available information. Emotions are classifiers of collected information, assigning a personal meaning to objects, events and individuals, making part of our own identity. Emotions play a decisive role in cognitive processes as reasoning, decision and memory by assigning relevance to collected information. The access to pervasive computing devices, empowered by the ability to sense and perceive the world, provides new forms of acquiring and integrating information. But prior to data assessment on its usefulness, systems must capture and ensure that data is properly managed for diverse possible goals. Portable and wearable devices are now able to gather and store information, from the environment and from our body, using cloud based services and Internet connections. Systems limitations in handling sensorial data, compared with our sensorial capabilities constitute an identified problem. Another problem is the lack of interoperability between humans and devices, as they do not properly understand human’s emotional states and human needs. Addressing those problems is a motivation for the present research work. The mission hereby assumed is to include sensorial and physiological data into a Framework that will be able to manage collected data towards human cognitive functions, supported by a new data model. By learning from selected human functional and behavioural models and reasoning over collected data, the Framework aims at providing evaluation on a person’s emotional state, for empowering human centric applications, along with the capability of storing episodic information on a person’s life with physiologic indicators on emotional states to be used by new generation applications.
Resumo:
In this study in the field of Consumer Behavior, brand name memory of consumers with regard to verbal and visual incongruent and congruent information such as memory structure of brands was tested. Hence, four experimental groups with different constellations of verbal and visual congruity and incongruity were created to compare their brand name memory performance. The experiment was conducted in several classes with 128 students, each group with 32 participants. It was found that brands, which are presented in a congruent or moderately incongruent relation to their brand schema, result in a better brand recall than their incongruent counterparts. A difference between visual congruity and moderately incongruity could not be confirmed. In contrast to visual incongruent information, verbal incongruent information does not result in a worse brand recall performance.
Resumo:
Existing wireless networks are characterized by a fixed spectrum assignment policy. However, the scarcity of available spectrum and its inefficient usage demands for a new communication paradigm to exploit the existing spectrum opportunistically. Future Cognitive Radio (CR) devices should be able to sense unoccupied spectrum and will allow the deployment of real opportunistic networks. Still, traditional Physical (PHY) and Medium Access Control (MAC) protocols are not suitable for this new type of networks because they are optimized to operate over fixed assigned frequency bands. Therefore, novel PHY-MAC cross-layer protocols should be developed to cope with the specific features of opportunistic networks. This thesis is mainly focused on the design and evaluation of MAC protocols for Decentralized Cognitive Radio Networks (DCRNs). It starts with a characterization of the spectrum sensing framework based on the Energy-Based Sensing (EBS) technique considering multiple scenarios. Then, guided by the sensing results obtained by the aforementioned technique, we present two novel decentralized CR MAC schemes: the first one designed to operate in single-channel scenarios and the second one to be used in multichannel scenarios. Analytical models for the network goodput, packet service time and individual transmission probability are derived and used to compute the performance of both protocols. Simulation results assess the accuracy of the analytical models as well as the benefits of the proposed CR MAC schemes.
Resumo:
Mutable state can be useful in certain algorithms, to structure programs, or for efficiency purposes. However, when shared mutable state is used in non-local or nonobvious ways, the interactions that can occur via aliases to that shared memory can be a source of program errors. Undisciplined uses of shared state may unsafely interfere with local reasoning as other aliases may interleave their changes to the shared state in unexpected ways. We propose a novel technique, rely-guarantee protocols, that structures the interactions between aliases and ensures that only safe interference is possible. We present a linear type system outfitted with our novel sharing mechanism that enables controlled interference over shared mutable resources. Each alias is assigned separate, local roles encoded in a protocol abstraction that constrains how an alias can legally use that shared state. By following the spirit of rely-guarantee reasoning, our rely-guarantee protocols ensure that only safe interference can occur but still allow many interesting uses of shared state, such as going beyond invariant and monotonic usages. This thesis describes the three core mechanisms that enable our type-based technique to work: 1) we show how a protocol models an alias’s perspective on how the shared state evolves and constrains that alias’s interactions with the shared state; 2) we show how protocols can be used while enforcing the agreed interference contract; and finally, 3) we show how to check that all local protocols to some shared state can be safely composed to ensure globally safe interference over that shared memory. The interference caused by shared state is rooted at how the uses of di↵erent aliases to that state may be interleaved (perhaps even in non-deterministic ways) at run-time. Therefore, our technique is mostly agnostic as to whether this interference was the result of alias interleaving caused by sequential or concurrent semantics. We show implementations of our technique in both settings, and highlight their di↵erences. Because sharing is “first-class” (and not tied to a module), we show a polymorphic procedure that enables abstract compositions of protocols. Thus, protocols can be specialized or extended without requiring specific knowledge of the interference produce by other protocols to that state. We show that protocol composition can ensure safety even when considering abstracted protocols. We show that this core composition mechanism is sound, decidable (without the need for manual intervention), and provide an algorithm implementation.
Resumo:
Current computer systems have evolved from featuring only a single processing unit and limited RAM, in the order of kilobytes or few megabytes, to include several multicore processors, o↵ering in the order of several tens of concurrent execution contexts, and have main memory in the order of several tens to hundreds of gigabytes. This allows to keep all data of many applications in the main memory, leading to the development of inmemory databases. Compared to disk-backed databases, in-memory databases (IMDBs) are expected to provide better performance by incurring in less I/O overhead. In this dissertation, we present a scalability study of two general purpose IMDBs on multicore systems. The results show that current general purpose IMDBs do not scale on multicores, due to contention among threads running concurrent transactions. In this work, we explore di↵erent direction to overcome the scalability issues of IMDBs in multicores, while enforcing strong isolation semantics. First, we present a solution that requires no modification to either database systems or to the applications, called MacroDB. MacroDB replicates the database among several engines, using a master-slave replication scheme, where update transactions execute on the master, while read-only transactions execute on slaves. This reduces contention, allowing MacroDB to o↵er scalable performance under read-only workloads, while updateintensive workloads su↵er from performance loss, when compared to the standalone engine. Second, we delve into the database engine and identify the concurrency control mechanism used by the storage sub-component as a scalability bottleneck. We then propose a new locking scheme that allows the removal of such mechanisms from the storage sub-component. This modification o↵ers performance improvement under all workloads, when compared to the standalone engine, while scalability is limited to read-only workloads. Next we addressed the scalability limitations for update-intensive workloads, and propose the reduction of locking granularity from the table level to the attribute level. This further improved performance for intensive and moderate update workloads, at a slight cost for read-only workloads. Scalability is limited to intensive-read and read-only workloads. Finally, we investigate the impact applications have on the performance of database systems, by studying how operation order inside transactions influences the database performance. We then propose a Read before Write (RbW) interaction pattern, under which transaction perform all read operations before executing write operations. The RbW pattern allowed TPC-C to achieve scalable performance on our modified engine for all workloads. Additionally, the RbW pattern allowed our modified engine to achieve scalable performance on multicores, almost up to the total number of cores, while enforcing strong isolation.
Resumo:
O presente estudo tem como objetivo compreender a valoração de uma mensagem de correio eletrónico em ambiente corporativo, e respetiva integração no arquivo empresarial. Objetivamos, nos primeiros capítulos, descrever o modelo metodológico aplicado. Seguidamente, apresentamos uma revisão bibliográfica assente em literatura inerente à temática dos circuitos informacionais na empresa, e documentação eletrónica resultante dos mesmos, com ênfase nas mensagens de correio eletrónico. A investigação empírica teve por base a aplicação de um inquérito por questionário, tendo por amostra um grupo profissional pré-selecionado, com acesso regular a um sistema de correio eletrónico. Os resultados obtidos através da análise do material empírico permitem-nos observar uma utilização preferencial do correio eletrónico face a outros suportes comunicacionais, constituindo-se as mensagens eletrónicas no documento produzido em maior escala, em ambiente profissional. Foram igualmente verificados casos de ausência de regulamentação para criação, gestão ou arquivo de mensagens, ou mesmo de um sistema de gestão documental que permita integração das mesmas. Com base na análise empírica, e em associação com a revisão bibliográfica explanada, concluímos que estas, e outras questões enunciadas ao longo do estudo, poderão constituir-se num sério obstáculo à gestão, preservação, recuperação e integridade da informação registada por meio de mensagens de correio eletrónico, caso não sejam criados e aplicados procedimentos e sistemas de gestão orientados para a documentação eletrónica, de forma a garantir o acesso a informação de fulcral importância para empresa, enquanto evidência e memória dos processos e atividades organizacionais.
Resumo:
Degeneration (WetAMD) and Diabetic Macular Edema (DME) patients’ access to treatment in public hospitals, by identifying bottlenecks and stress points that prevent timely and adequate care to patients who suffer from a degenerative disease, and consequently for whom the lack of access to treatment can have disastrous consequences. Considering the specificity and degenerative traits of these conditions, the long queues for specialty appointments in public hospitals are a significant threat to patients’ health, as the disease may be misdiagnosed and or progress significantly, causing unnecessary permanent and non-reversible loss in visual acuity. Therefore optimizing the patient journey will increase patients’ access to adequate treatment, and prevent avoidable progress of a degenerative condition which causes permanent and non-reversible blindness. Following the investigation which supports this thesis, the patient journey was broken down into its different phases, so that key issues could be identified, and referred back to the main stress points highlighted during the interviews with physicians and administrators. Finally results were scrutinized and systematized, and a set of action points was proposed, considering what may cause major impact and is actually feasible to implement.
Resumo:
Bioactive glass nanoparticles (BGNPs) promote an apatite surface layer in physiologic conditions that lead to a good interfacial bonding with bone.1 A strategy to induce bioactivity in non-bioactive polymeric biomaterials is to incorporate BGNPs in the polymer matrix. This combination creates a nanocomposite material with increased osteoconductive properties. Chitosan (CHT) is a polymer obtained by deacetylation of chitin and is biodegradable, non-toxic and biocompatible. The combination of CHT and the BGNPs aims at designing biocompatible spheres promoting the formation of a calcium phosphate layer at the nanocomposite surface, thus enhancing the osteoconductivity behaviour of the biomaterial. Shape memory polymers (SMP) are stimuli-responsive materials that offer mechanical and geometrical action triggered by an external stimulus.2 They can be deformed and fixed into a temporary shape which remains stable unless exposed to a proper stimulus that triggers recovery of their original shape. This advanced functionality makes such SMPs suitable to be implanted using minimally invasive surgery procedures. Regarding that, the inclusion of therapeutic molecules becomes attractive. We propose the synthesis of shape memory bioactive nanocomposite spheres with drug release capability.3 1. L. L. Hench, Am. Ceram. Soc. Bull., 1993, 72, 93-98. 2. A. Lendlein and S. Kelch, Angew Chem Int Edit, 2002, 41, 2034-2057. 3. Ã . J. Leite, S. G. Caridade and J. F. Mano, Journal of Non-Crystalline Solids (in Press)
Resumo:
Data traces, consisting of logs about the use of mobile and wireless networks, have been used to study the statistics of encounters between mobile nodes, in an attempt to predict the performance of opportunistic networks. Understanding the role and potential of mobile devices as relaying nodes in message dissemination and delivery depends on the knowledge about patterns and number of encounters among nodes. Data traces about the use of WiFi networks are widely available and can be used to extract large datasets of encounters between nodes. However, these logs only capture indirect encounters between nodes, and the resulting encounters datasets might not realistically represent the spatial and temporal behaviour of nodes. This paper addresses the impact of overlapping between the coverage areas of different Access Points of WiFi networks in extracting encounters datasets from the usage logs. Simulation and real-world experimental results show that indirect encounter traces extracted directly from these logs strongly underestimate the opportunities for direct node-to- node message exchange in opportunistic networks.