935 resultados para Computer systems organization: general-emerging technologies
Resumo:
The purpose of this study was to determine the impact of selected factors on nurses' attitudes toward bedside computers. Bedside computer systems, also referred to as point-of-care systems, are clinical information systems that allow documentation of patient care and retrieval of data at the patient's bedside, or in close proximity to where care is delivered. The adoption of bedside computer systems appears to be increasing among U.S. institutions. As healthcare institutions undertake automation projects, they face many challenges associated with implementing large-scale change. ^ The study explored four factors and their relationship to nurses' attitudes toward bedside computers. A pre-bedside implementation survey of 184 staff nurses did not demonstrate a relationship between previous computer experience and nurses' attitudes toward bedside computers (p > .05). The data did not indicate a relationship between nurses' formal education and their attitude toward bedside computers (p > .05). The data did support a relationship between nurses' previous computer experience and their comfort in the use of bedside computers (p < .0005). Using a quasi-experimental control group design, attitudes of nurses were studied over an 18 month period. The Pre versus Post Survey data indicated that nurses who used bedside computers, the experimental group, had more positive attitudes than the nurses who did not use bedside computers, the control group (p < .0005). ^ The findings are significant to institutions implementing bedside computers, to the human resource development staff overseeing bedside computer training, and to the practice of clinical nursing. ^
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown viruses quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives. ^
Resumo:
In his discussion - Database As A Tool For Hospitality Management - William O'Brien, Assistant Professor, School of Hospitality Management at Florida International University, O’Brien offers at the outset, “Database systems offer sweeping possibilities for better management of information in the hospitality industry. The author discusses what such systems are capable of accomplishing.” The author opens with a bit of background on database system development, which also lends an impression as to the complexion of the rest of the article; uh, it’s a shade technical. “In early 1981, Ashton-Tate introduced dBase 11. It was the first microcomputer database management processor to offer relational capabilities and a user-friendly query system combined with a fast, convenient report writer,” O’Brien informs. “When 16-bit microcomputers such as the IBM PC series were introduced late the following year, more powerful database products followed: dBase 111, Friday!, and Framework. The effect on the entire business community, and the hospitality industry in particular, has been remarkable”, he further offers with his informed outlook. Professor O’Brien offers a few anecdotal situations to illustrate how much a comprehensive data-base system means to a hospitality operation, especially when billing is involved. Although attitudes about computer systems, as well as the systems themselves have changed since this article was written, there is pertinent, fundamental information to be gleaned. In regards to the digression of the personal touch when a customer is engaged with a computer system, O’Brien says, “A modern data processing system should not force an employee to treat valued customers as numbers…” He also cautions, “Any computer system that decreases the availability of the personal touch is simply unacceptable.” In a system’s ability to process information, O’Brien suggests that in the past businesses were so enamored with just having an automated system that they failed to take full advantage of its capabilities. O’Brien says that a lot of savings, in time and money, went un-noticed and/or under-appreciated. Today, everyone has an integrated system, and the wise business manager is the business manager who takes full advantage of all his resources. O’Brien invokes the 80/20 rule, and offers, “…the last 20 percent of results costs 80 percent of the effort. But times have changed. Everyone is automating data management, so that last 20 percent that could be ignored a short time ago represents a significant competitive differential.” The evolution of data systems takes center stage for much of the article; pitfalls also emerge.
Resumo:
Fast spreading unknown viruses have caused major damage on computer systems upon their initial release. Current detection methods have lacked capabilities to detect unknown virus quickly enough to avoid mass spreading and damage. This dissertation has presented a behavior based approach to detecting known and unknown viruses based on their attempt to replicate. Replication is the qualifying fundamental characteristic of a virus and is consistently present in all viruses making this approach applicable to viruses belonging to many classes and executing under several conditions. A form of replication called self-reference replication, (SR-replication), has been formalized as one main type of replication which specifically replicates by modifying or creating other files on a system to include the virus itself. This replication type was used to detect viruses attempting replication by referencing themselves which is a necessary step to successfully replicate files. The approach does not require a priori knowledge about known viruses. Detection was accomplished at runtime by monitoring currently executing processes attempting to replicate. Two implementation prototypes of the detection approach called SRRAT were created and tested on the Microsoft Windows operating systems focusing on the tracking of user mode Win32 API system calls and Kernel mode system services. The research results showed SR-replication capable of distinguishing between file infecting viruses and benign processes with little or no false positives and false negatives.
Resumo:
The solution of partial differential equation of seepage problems is difficult to find analytically, especially for situations that involve great complexity. To overcome this problem, software based on finite differences and finite elements are usually used. This work presents the use of a finite element software, the GEO5, to solve the seepage problem at a dam of very complex section, the dam Eng. Armando Ribeiro Gonçalves, which at the end of its construction suffered rupture of the upstream slope at the central dam and then went through a process of reconstruction and auscultation. The analyses were performed for the operating condition of the reservoir, with an established flow. A numerical model was developed based on the level readings of the reservoir water and their piezometric readings as a proposal for the evaluation and future behavior prediction of the dam on established flow conditions. The use of constitutive models with the aid of computer systems is reflected in a way to predict future risk situations so they can be prevented
Resumo:
Several are the areas in which digital images are used in solving day-to-day problems. In medicine the use of computer systems have improved the diagnosis and medical interpretations. In dentistry it’s not different, increasingly procedures assisted by computers have support dentists in their tasks. Set in this context, an area of dentistry known as public oral health is responsible for diagnosis and oral health treatment of a population. To this end, oral visual inspections are held in order to obtain oral health status information of a given population. From this collection of information, also known as epidemiological survey, the dentist can plan and evaluate taken actions for the different problems identified. This procedure has limiting factors, such as a limited number of qualified professionals to perform these tasks, different diagnoses interpretations among other factors. Given this context came the ideia of using intelligent systems techniques in supporting carrying out these tasks. Thus, it was proposed in this paper the development of an intelligent system able to segment, count and classify teeth from occlusal intraoral digital photographic images. The proposed system makes combined use of machine learning techniques and digital image processing. We first carried out a color-based segmentation on regions of interest, teeth and non teeth, in the images through the use of Support Vector Machine. After identifying these regions were used techniques based on morphological operators such as erosion and transformed watershed for counting and detecting the boundaries of the teeth, respectively. With the border detection of teeth was possible to calculate the Fourier descriptors for their shape and the position descriptors. Then the teeth were classified according to their types through the use of the SVM from the method one-against-all used in multiclass problem. The multiclass classification problem has been approached in two different ways. In the first approach we have considered three class types: molar, premolar and non teeth, while the second approach were considered five class types: molar, premolar, canine, incisor and non teeth. The system presented a satisfactory performance in the segmenting, counting and classification of teeth present in the images.
Resumo:
Several are the areas in which digital images are used in solving day-to-day problems. In medicine the use of computer systems have improved the diagnosis and medical interpretations. In dentistry it’s not different, increasingly procedures assisted by computers have support dentists in their tasks. Set in this context, an area of dentistry known as public oral health is responsible for diagnosis and oral health treatment of a population. To this end, oral visual inspections are held in order to obtain oral health status information of a given population. From this collection of information, also known as epidemiological survey, the dentist can plan and evaluate taken actions for the different problems identified. This procedure has limiting factors, such as a limited number of qualified professionals to perform these tasks, different diagnoses interpretations among other factors. Given this context came the ideia of using intelligent systems techniques in supporting carrying out these tasks. Thus, it was proposed in this paper the development of an intelligent system able to segment, count and classify teeth from occlusal intraoral digital photographic images. The proposed system makes combined use of machine learning techniques and digital image processing. We first carried out a color-based segmentation on regions of interest, teeth and non teeth, in the images through the use of Support Vector Machine. After identifying these regions were used techniques based on morphological operators such as erosion and transformed watershed for counting and detecting the boundaries of the teeth, respectively. With the border detection of teeth was possible to calculate the Fourier descriptors for their shape and the position descriptors. Then the teeth were classified according to their types through the use of the SVM from the method one-against-all used in multiclass problem. The multiclass classification problem has been approached in two different ways. In the first approach we have considered three class types: molar, premolar and non teeth, while the second approach were considered five class types: molar, premolar, canine, incisor and non teeth. The system presented a satisfactory performance in the segmenting, counting and classification of teeth present in the images.
Resumo:
This study was undertaken to examine how instructor use of emerging technologies can contribute to better quality pre-service teacher education. A group of nine Memorial University Faculty of Education instructors attempted to systematically incorporate mobile tablet (iPad) technologies into their on-campus instruction over the period of one academic year (2013-2014). Participants familiarized themselves with their device; evaluated a range of instructional applications (apps) specific to their discipline and/or teaching focus areas; and attempted to intentionally integrate the device into the classroom-learning environment. The research team utilized several focus groups and semi-structured interviews to elicit the representations of participants with respect to their impressions of the value of tablet technologies and their experiences in implementing tablet technology in their instructional practice.
Resumo:
Peer reviewed
Resumo:
Peer reviewed
Resumo:
Category hierarchy is an abstraction mechanism for efficiently managing large-scale resources. In an open environment, a category hierarchy will inevitably become inappropriate for managing resources that constantly change with unpredictable pattern. An inappropriate category hierarchy will mislead the management of resources. The increasing dynamicity and scale of online resources increase the requirement of automatically maintaining category hierarchy. Previous studies about category hierarchy mainly focus on either the generation of category hierarchy or the classification of resources under a pre-defined category hierarchy. The automatic maintenance of category hierarchy has been neglected. Making abstraction among categories and measuring the similarity between categories are two basic behaviours to generate a category hierarchy. Humans are good at making abstraction but limited in ability to calculate the similarities between large-scale resources. Computing models are good at calculating the similarities between large-scale resources but limited in ability to make abstraction. To take both advantages of human view and computing ability, this paper proposes a two-phase approach to automatically maintaining category hierarchy within two scales by detecting the internal pattern change of categories. The global phase clusters resources to generate a reference category hierarchy and gets similarity between categories to detect inappropriate categories in the initial category hierarchy. The accuracy of the clustering approaches in generating category hierarchy determines the rationality of the global maintenance. The local phase detects topical changes and then adjusts inappropriate categories with three local operations. The global phase can quickly target inappropriate categories top-down and carry out cross-branch adjustment, which can also accelerate the local-phase adjustments. The local phase detects and adjusts the local-range inappropriate categories that are not adjusted in the global phase. By incorporating the two complementary phase adjustments, the approach can significantly improve the topical cohesion and accuracy of category hierarchy. A new measure is proposed for evaluating category hierarchy considering not only the balance of the hierarchical structure but also the accuracy of classification. Experiments show that the proposed approach is feasible and effective to adjust inappropriate category hierarchy. The proposed approach can be used to maintain the category hierarchy for managing various resources in dynamic application environment. It also provides an approach to specialize the current online category hierarchy to organize resources with more specific categories.
Resumo:
Biological macromolecules can rearrange interdomain orientations when binding to various partners. Interdomain dynamics serve as a molecular mechanism to guide the transitions between orientations. However, our understanding of interdomain dynamics is limited because a useful description of interdomain motions requires an estimate of the probabilities of interdomain conformations, increasing complexity of the problem.
Staphylococcal protein A (SpA) has five tandem protein-binding domains and four interdomain linkers. The domains enable Staphylococcus aureus to evade the host immune system by binding to multiple host proteins including antibodies. Here, I present a study of the interdomain motions of two adjacent domains in SpA. NMR spin relaxation experiments identified a 6-residue flexible interdomain linker and interdomain motions. To quantify the anisotropy of the distribution of interdomain orientations, we measured residual dipolar couplings (RDCs) from the two domains with multiple alignments. The N-terminal domain was directly aligned by a lanthanide ion and not influenced by interdomain motions, so it acted as a reference frame to achieve motional decoupling. We also applied {\it de novo} methods to extract spatial dynamic information from RDCs and represent interdomain motions as a continuous distribution on the 3D rotational space. Significant anisotropy was observed in the distribution, indicating the motion populates some interdomain orientations more than others. Statistical thermodynamic analysis of the observed orientational distribution suggests that it is among the energetically most favorable orientational distributions for binding to antibodies. Thus, the affinity is enhanced by a pre-posed distribution of interdomain orientations while maintaining the flexibility required for function.
The protocol described above can be applied to other biological systems in general. Protein molecule calmodulin and RNA molecule trans-activation response element (TAR) also have intensive interdomain motions with relative small intradomain dynamics. Their interdomain motions were studied using our method based on published RDC data. Our results were consistent with literature results in general. The differences could be due to previous studies' use of physical models, which contain assumptions about potential energy and thus introduced non-experimental information into the interpretations.
Resumo:
Underground hardrock mining can be very energy intensive and in large part this can be attributed to the power consumption of underground ventilation systems. In general, the power consumed by a mine’s ventilation system and its overall scale are closely related to the amount of diesel power in operation. This is because diesel exhaust is a major source of underground air pollution, including diesel particulate matter (DPM), NO2 and heat, and because regulations tie air volumes to diesel engines. Furthermore, assuming the size of airways remains constant, the power consumption of the main system increases exponentially with the volume of air supplied to the mine. Therefore large diesel fleets lead to increased energy consumption and can also necessitate large capital expenditures on ventilation infrastructure in order to manage power requirements. Meeting ventilation requirements for equipment in a heading can result in a similar scenario with the biggest pieces leading to higher energy consumption and potentially necessitating larger ventilation tubing and taller drifts. Depending on the climate where the mine is located, large volumes of air can have a third impact on ventilation costs if heating or cooling the air is necessary. Annual heating and cooling costs, as well as the cost of the associated infrastructure, are directly related to the volume of air sent underground. This thesis considers electric mining equipment as a means for reducing the intensity and cost of energy consumption at underground, hardrock mines. Potentially, electric equipment could greatly reduce the volume of air needed to ventilate an entire mine as well as individual headings because they do not emit many of the contaminants found in diesel exhaust and because regulations do not connect air volumes to electric motors. Because of the exponential relationship between power consumption and air volumes, this could greatly reduce the amount of power required for mine ventilation as well as the capital cost of ventilation infrastructure. As heating and cooling costs are also directly linked to air volumes, the cost and energy intensity of heating and cooling the air would also be significantly reduced. A further incentive is that powering equipment from the grid is substantially cheaper than fuelling them with diesel and can also produce far fewer GHGs. Therefore, by eliminating diesel from the underground workers will enjoy safer working conditions and operators and society at large will gain from a smaller impact on the environment. Despite their significant potential, in order to produce a credible economic assessment of electric mining equipment their impact on underground systems must be understood and considered in their evaluation. Accordingly, a good deal of this thesis reviews technical considerations related to the use of electric mining equipment, especially ones that impact the economics of their implementation. The goal of this thesis will then be to present the economic potential of implementing the equipment, as well as to outline the key inputs which are necessary to support an evaluation and to provide a model and an approach which can be used by others if the relevant information is available and acceptable assumptions can be made.
Resumo:
Visualization and interpretation of geological observations into a cohesive geological model are essential to Earth sciences and related fields. Various emerging technologies offer approaches to multi-scale visualization of heterogeneous data, providing new opportunities that facilitate model development and interpretation processes. These include increased accessibility to 3D scanning technology, global connectivity, and Web-based interactive platforms. The geological sciences and geological engineering disciplines are adopting these technologies as volumes of data and physical samples greatly increase. However, a standardized and universally agreed upon workflow and approach have yet to properly be developed. In this thesis, the 3D scanning workflow is presented as a foundation for a virtual geological database. This database provides augmented levels of tangibility to students and researchers who have little to no access to locations that are remote or inaccessible. A Web-GIS platform was utilized jointly with customized widgets developed throughout the course of this research to aid in visualizing hand-sized/meso-scale geological samples within a geologic and geospatial context. This context is provided as a macro-scale GIS interface, where geophysical and geodetic images and data are visualized. Specifically, an interactive interface is developed that allows for simultaneous visualization to improve the understanding of geological trends and relationships. These developed tools will allow for rapid data access and global sharing, and will facilitate comprehension of geological models using multi-scale heterogeneous observations.