929 resultados para user preferences
Resumo:
This paper describes an end-user model for a domestic pervasive computing platform formed by regular home objects. The platform does not rely on pre-planned infrastructure; instead, it exploits objects that are already available in the home and exposes their joint sensing, actuating and computing capabilities to home automation applications. We advocate an incremental process of the platform formation and introduce tangible, object-like artifacts for representing important platform functions. One of those artifacts, the application pill, is a tiny object with a minimal user interface, used to carry the application, as well as to start and stop its execution and provide hints about its operational status. We also emphasize streamlining the user's interaction with the platform. The user engages any UI-capable object of his choice to configure applications, while applications issue notifications and alerts exploiting whichever available objects can be used for that purpose. Finally, the paper briefly describes an actual implementation of the presented end-user model. © (2010) by International Academy, Research, and Industry Association (IARIA).
Resumo:
In this paper, we analyze the performance of cognitive amplify-and-forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi-antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information-assisted AF mode, and the signals undergo independent Nakagami-m fading. In particular, closed-form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami-m fading are presented. More importantly, asymptotic closed-form expressions for the outage probability and SER are derived. These tractable closed-form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network
Resumo:
AIMS AND OBJECTIVES: This cross sectional descriptive study was designed to survey patient opinion towards dental clinical attire, name badges and commonly used cross-infection control measures.
METHOD: Patients attending a dental hospital for a consultation appointment were asked to complete a questionnaire accompanied by photographs of models portraying a range of clinical attire. A representative sample of patients completed 188 questionnaires over a four week period.
RESULTS: The study found that the majority of patients felt clinical attire was important and that they preferred dental professionals to wear name badges. The majority of patients also preferred dentists to use both safety glasses and face masks. When asked to indicate which clinical attire was most appropriate for a consultant/specialist to wear, the overwhelming opinion was that of smart dress accompanied with a white coat. In addition, most respondents wished their dentist to wear a traditional white, dental tunic.
CONCLUDING REMARKS: It is hoped that this study will be informative for the dental team and that the results will be taken into consideration when considering appropriate clinical attire in accordance with patient opinions.
Resumo:
The conventional wisdom in the transitional justice literature is that there is no one-size-fits-all approach. This article suggests that this may also be true within a given state. The current paper reports on quantitative and qualitative data from 184 participants in a survey conducted in the Caribbean coast of Colombia. Results suggest widespread support for transitional justice mechanisms – such as perpetrator accountability, public acknowledgement and structural change – but dissatisfaction with national-level initiatives, specifically the 2005 Justice and Peace Law. Yet, despite a distrust of the national government and protracted conflict, individuals report social trust, community cohesion and reliance on local government institutions. These attitudes and behaviours suggest that decentralised transitional justice mechanisms may be more effective in meeting victims' needs. Moreover, analyses indicate that individual preferences are influenced by community factors, such as the presence of demobilised paramilitaries, which can be addressed through more localised approaches to promote peacebuilding. The paper concludes with best practices derived from the findings.
Resumo:
We consider an application scenario where points of interest (PoIs) each have a web presence and where a web user wants to iden- tify a region that contains relevant PoIs that are relevant to a set of keywords, e.g., in preparation for deciding where to go to conve- niently explore the PoIs. Motivated by this, we propose the length- constrained maximum-sum region (LCMSR) query that returns a spatial-network region that is located within a general region of in- terest, that does not exceed a given size constraint, and that best matches query keywords. Such a query maximizes the total weight of the PoIs in it w.r.t. the query keywords. We show that it is NP- hard to answer this query. We develop an approximation algorithm with a (5 + ǫ) approximation ratio utilizing a technique that scales node weights into integers. We also propose a more efficient heuris- tic algorithm and a greedy algorithm. Empirical studies on real data offer detailed insight into the accuracy of the proposed algorithms and show that the proposed algorithms are capable of computingresults efficiently and effectively.
Resumo:
In this Letter, an unambiguous synthetic strategy is reported for the preparation of enantiomerically purecis-5-halo-piperazic acid derivatives in single diastereoisomer form. Contrary to the recent report by Shin and co-workers (Chem. Lett. 2001, 1172), in which it is claimed that the Ph3P and N-chlorosuccinimide (NCS)-mediated chlorination of (3R,5S)-trans-N(1),N(2)-di-t-Boc-5-hydroxy-piperazic acid derivative 1proceeds with retention of configuration at C(5) to give 2, we now show that this and related Ph3P-mediated halogenations all occur with SN2 inversion at the alcohol center, as is customary for such reactions. Specifically, we demonstrate that the (3R,5S)-trans-5-Cl-piperazic acid derivative 2 claimed by Shin and co-workers (Chem. Lett. 2001, 1172) is in actual fact the chlorinated (3S,5R)-enantiomer 6, which must have been prepared from the cis-(3S,5S)-alcohol 3, a molecule whose synthesis is not formally described in the Shin paper. We further show here that the cis-(3R,5R)-5-Cl-Piz 13 claimed by Shin and co-workers inChem. Lett. 2001, 1172, is also (3S,5R)-trans-5-Cl-Piz 6. Authentic 13 has now been synthesized by us, for the very first time, here. Since Lindsley and Kennedy have recently utilized the now invalid Shin and co-workers’ retentive Ph3P/NCS chlorination procedure on 1 in their synthetic approach to piperazimycin A (Tetrahedron Lett. 2010, 51, 2493), it follows that their claimed 5-Cl-Piz-containing dipeptide 25 probably has the alternate structure 26, where the 5-Cl-Piz residue has a 3,5-cis-configuration. The aforementioned stereochemical misassignments appear to have come from a mix-up of starting materials by Shin and co-workers (Chem. Lett. 2001, 1172), and an under-appreciation of the various steric and conformational effects that operate in N(2)-acylated piperazic acid systems, most especially rotameric A1,3-strain. The latter has now been unambiguously delineated and defined here under the banner of the A1,3-rotamer effect.