906 resultados para Corrective services system
Resumo:
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection.
Resumo:
Global environmental changes (GEC) such as climate change (CC) and climate variability have serious impacts in the tropics, particularly in Africa. These are compounded by changes in land use/land cover, which in turn are driven mainly by economic and population growth, and urbanization. These factors create a feedback loop, which affects ecosystems and particularly ecosystem services, for example plant-insect interactions, and by consequence agricultural productivity. We studied effects of GEC at a local level, using a traditional coffee production area in greater Nairobi, Kenya. We chose coffee, the most valuable agricultural commodity worldwide, as it generates income for 100 million people, mainly in the developing world. Using the coffee berry borer, the most serious biotic threat to global coffee production, we show how environmental changes and different production systems (shaded and sun-grown coffee) can affect the crop. We combined detailed entomological assessments with historic climate records (from 1929-2011), and spatial and demographic data, to assess GEC's impact on coffee at a local scale. Additionally, we tested the utility of an adaptation strategy that is simple and easy to implement. Our results show that while interactions between CC and migration/urbanization, with its resultant landscape modifications, create a feedback loop whereby agroecosystems such as coffee are adversely affected, bio-diverse shaded coffee proved far more resilient and productive than coffee grown in monoculture, and was significantly less harmed by its insect pest. Thus, a relatively simple strategy such as shading coffee can tremendously improve resilience of agro-ecosystems, providing small-scale farmers in Africa with an easily implemented tool to safeguard their livelihoods in a changing climate.
Resumo:
Online submission and peer review is emerging as the next step forward for many journal publishers in an ever increasing drive to take advantage of technological improvements in transferring data electronically over the internet. The Electronic Submission and PEer REview (ESPERE) project was initiated in 1996 as an electronic Libraries (eLib) initiative of the Higher Education Funding Council for England (HEFCE). Subsequently the project continued as a self-funding group composed of a consortium of learned society and commercial journal publishers intent on utilising the changes in technology to improve the services they provide to their authors as well as cutting their costs and increasing efficiencies.
Resumo:
Even though the use of recommender systems is already widely spread in several application areas, there is still a lack of studies for accessibility research field. One of these attempts to use recommender system benefits for accessibility needs is Vulcanus. The Vulcanus recommender system uses similarity analysis to compare user’s trails. In this way, it is possible to take advantage of the user’s past behavior and distribute personalized content and services. The Vulcanus combined concepts from ubiquitous computing, such as user profiles, context awareness, trails management, and similarity analysis. It uses two different approaches for trails similarity analysis: resources patterns and categories patterns. In this work we performed an asymptotic analysis, identifying Vulcanus’ algorithm complexity. Furthermore we also propose improvements achieved by dynamic programming technique, so the ordinary case is improved by using a bottom-up approach. With that approach, many unnecessary comparisons can be skipped and now Vulcanus 2.0 is presented with improvements in its average case scenario.
Resumo:
Seaports play a critical role as gateways and facilitators of economic interchange and logistics processes and thus have become crucial nodes in globalised production networks andmobility systems. Both the physical port infrastructure and its operational superstructure have undergone intensive evolution processes in an effort to adapt to changing economic environments, technological advances,maritime industry expectations and institutional reforms. The results, in terms of infrastructure, operator models and the role of an individual port within the port system, vary by region, institutional and economic context. While ports have undoubtedly developed in scale to respond to the changing volumes and structures in geographies of trade (Wilmsmeier, 2015), the development of hinterland access infrastructure, regulatory systems and institutional structures have in many instances lagged behind. The resulting bottlenecks reflect deficits in the interplay between the economic system and the factors defining port development (e.g. transport demand, the structure of trade, transport services, institutional capacities, etc. cf. Cullinane and Wilmsmeier, 2011). There is a wide range of case study approaches and analyses of individual ports, but analyses from a port system perspective are less common, and those that exist are seldom critical of the dominant discourse assuming the efficiency of market competition (cf. Debrie et al., 2013). This special section aims to capture the spectrum of approaches in current geography research on port system evolution. Thus, the papers reach from the traditional spatial approach (Rodrigue and Ashar, this volume) to network analysis (Mohamed-Chérif and Ducruet, this volume) to institutional discussions (Vonck and Notteboom, this volume; Wilmsmeier and Monios, this volume). The selection of papers allows an opening of discussion and reflection on current research, necessary critical analysis of the influences on port systemevolution and,most importantly, future directions. The remainder of this editorial aims to reflect on these challenges and identify the potential for future research.
Resumo:
Advances in FPGA technology and higher processing capabilities requirements have pushed to the emerge of All Programmable Systems-on-Chip, which incorporate a hard designed processing system and a programmable logic that enable the development of specialized computer systems for a wide range of practical applications, including data and signal processing, high performance computing, embedded systems, among many others. To give place to an infrastructure that is capable of using the benefits of such a reconfigurable system, the main goal of the thesis is to implement an infrastructure composed of hardware, software and network resources, that incorporates the necessary services for the operation, management and interface of peripherals, that coompose the basic building blocks for the execution of applications. The project will be developed using a chip from the Zynq-7000 All Programmable Systems-on-Chip family.
Resumo:
As academic student mobility is increasing, improving the functionality of international operations is recognised as a competitive advantage at tertiary education institutions. Although many scholars have researched the experiences of exchange students, the role of student tutors and their contribution to exchange students’ experiences is still an unknown factor. This research examines international tutoring at the University of Turku, and aims to understand better the way tutoring contributes to exchange experiences and to explore the functionality of the tutor system and discover areas for improvements. To achieve these goals, the research seeks to answer the fundamental research question: What is the role of tutors in mediating exchange experiences? The theoretical framework combines literature on mediating exchange experiences, the phenomenon of studying abroad, the process of adaptation, the importance of cross-cultural communication, and the role of student tutors as mediators. Based on the literature review, a theoretical model for studying the mediation of exchange experiences is introduced. The model’s applicability and validity is examined through a case study. Three methods were used in the empirical research: surveys, participant observations, and interviews. These methods provided extensive data from three major parties of the tutor system: tutors, exchange students, and the international office. The findings of the research reveal that tutoring – instrumental leading and social and cultural mediating – generates both negative and positive experiences depending on the individuals’ expectations, motivations, relationships, and the nature of the tutoring. Although functional, there are a few weaknesses in the tutor system. Tutors tend to act as effective instrumental leaders, but often fail to create a friendship and contribute to the exchange students’ experience through social and cultural mediation, which is significantly more important in the exchange students’ overall experience in terms of building networks, adapting, gaining emotional experiences, and achieving the stage of personal development and mental change. Based on the weaknesses, three improvements are suggested: (1) increasing comprehensive sharing of information, effective communication, and collective cooperation, (2) emphasising the importance of social and cultural mediation and increasing the frequency of interaction between tutors and exchange students, and (3) improving the recruitment and training, revising the process of reporting and rewarding, and finally, enhancing services and coordination.
Resumo:
Background: Understanding transcriptional regulation by genome-wide microarray studies can contribute to unravel complex relationships between genes. Attempts to standardize the annotation of microarray data include the Minimum Information About a Microarray Experiment (MIAME) recommendations, the MAGE-ML format for data interchange, and the use of controlled vocabularies or ontologies. The existing software systems for microarray data analysis implement the mentioned standards only partially and are often hard to use and extend. Integration of genomic annotation data and other sources of external knowledge using open standards is therefore a key requirement for future integrated analysis systems. Results: The EMMA 2 software has been designed to resolve shortcomings with respect to full MAGE-ML and ontology support and makes use of modern data integration techniques. We present a software system that features comprehensive data analysis functions for spotted arrays, and for the most common synthesized oligo arrays such as Agilent, Affymetrix and NimbleGen. The system is based on the full MAGE object model. Analysis functionality is based on R and Bioconductor packages and can make use of a compute cluster for distributed services. Conclusion: Our model-driven approach for automatically implementing a full MAGE object model provides high flexibility and compatibility. Data integration via SOAP-based web-services is advantageous in a distributed client-server environment as the collaborative analysis of microarray data is gaining more and more relevance in international research consortia. The adequacy of the EMMA 2 software design and implementation has been proven by its application in many distributed functional genomics projects. Its scalability makes the current architecture suited for extensions towards future transcriptomics methods based on high-throughput sequencing approaches which have much higher computational requirements than microarrays.
Resumo:
‘Systems thinking’ is an important feature of the emerging ‘patient safety’ agenda. As a key component of a ‘safety culture’, it encourages clinicians to look past individual error to recognise the latent factors that threaten safety. This paper investigates whether current medical thinking is commensurate with the idea of ‘systems thinking’ together with its implications for policy. The findings are based on qualitative semistructured interviews with specialist physicians working within one NHS District General Hospital in the English Midlands. It is shown that, rather then favouring a 'person-centred’ perspective, doctors readily identify ‘the system’ as a threat to patient safety. This is not necessarily a reflection of the prevailing safety discourse or knowledge of policy, but reflects a tacit understanding of how services are (dis)organised. This line of thinking serves to mitigate individual wrong-doing and protect professional credibility by encouraging doctors to accept and accommodate the shortcomings of the system, rather than participate in new forms of organisational learning.
Resumo:
Various environmental management systems, standards and tools are being created to assist companies to become more environmental friendly. However, not all the enterprises have adopted environmental policies in the same scale and range. Additionally, there is no existing guide to help them determine their level of environmental responsibility and subsequently, provide support to enable them to move forward towards environmental responsibility excellence. This research proposes the use of a Belief Rule-Based approach to assess an enterprise’s level commitment to environmental issues. The Environmental Responsibility BRB assessment system has been developed for this research. Participating companies will have to complete a structured questionnaire. An automated analysis of their responses (using the Belief Rule-Based approach) will determine their environmental responsibility level. This is followed by a recommendation on how to progress to the next level. The recommended best practices will help promote understanding, increase awareness, and make the organization greener. BRB systems consist of two parts: Knowledge Base and Inference Engine. The knowledge base in this research is constructed after an in-depth literature review, critical analyses of existing environmental performance assessment models and primarily guided by the EU Draft Background Report on "Best Environmental Management Practice in the Telecommunications and ICT Services Sector". The reasoning algorithm of a selected Drools JBoss BRB inference engine is forward chaining, where an inference starts iteratively searching for a pattern-match of the input and if-then clause. However, the forward chaining mechanism is not equipped with uncertainty handling. Therefore, a decision is made to deploy an evidential reasoning and forward chaining with a hybrid knowledge representation inference scheme to accommodate imprecision, ambiguity and fuzzy types of uncertainties. It is believed that such a system generates well balanced, sensible and Green ICT readiness adapted results, to help enterprises focus on making improvements on more sustainable business operations.
Resumo:
The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.
Resumo:
Background The study upon which this paper is based was undertaken to understand users’ and non-users’ perceptions concerning facilitators and barriers to equitable and universal access to health care in resource-poor countries such as Malawi. In this study, non-users of health services were defined as people who were not in need of health services or those who had stopped using them due to significant barriers. Methods A total of 80 interviews with non-users of health services were conducted in Rumphi, Ntchisi, Phalombe and Blantyre Districts of Malawi. Interviews focused on why informants were not using formal health services at the time of data collection. In order to identify non-users, snowballing was used health surveillance assistants, village headmen and community members also helped. One focus group discussion was also conducted with non-users of health services who were members of the Zion Church. Results Informants described themselves as non-users of health services due to several reasons: cost of health services; long distances to health facilities; poor attitude of health workers; belief in the effectiveness of traditional medicines; old age and their failure to walk. Others were non-users due to their disability; hence they could not walk over long distances or could not communicate effectively with health providers. Some of these non-users were complete non-users, namely members of the Zion Church and those who believed in traditional medicine, and they stated that nothing could be done to transform them into users of health services. Other non-users stated that they could become users if their challenges were addressed e.g. for those who were non-users of health services due to poor attitudes of health workers, they stated that if these health workers were transferred they would be able to access health services. Conclusions Public health education targeting both health workers and non-users, ensuring a functional outreach program and addressing other health system challenges such as shortage of drugs and human resources would assist in transforming non-users into users of health services.
Resumo:
significant amount of Expendable Bathythermograph (XBT) data has been collected in the Mediterranean Sea since 1999 in the framework of operational oceanography activities. The management and storage of such a volume of data poses significant challenges and opportunities. The SeaDataNet project, a pan-European infrastructure for marine data diffusion, provides a convenient way to avoid dispersion of these temperature vertical profiles and to facilitate access to a wider public. The XBT data flow, along with the recent improvements in the quality check procedures and the consistence of the available historical data set are described. The main features of SeaDataNet services and the advantage of using this system for long-term data archiving are presented. Finally, focus on the Ligurian Sea is included in order to provide an example of the kind of information and final products devoted to different users can be easily derived from the SeaDataNet web portal.
Resumo:
Part 20: Health and Care Networks
Resumo:
Dados suplementares associados com este artigo disponíveis na versão online em: http://dx.doi.org/10.1016/j.marpol.2016.06.021