918 resultados para Auditing of computer systems
Resumo:
The lack of flexibility in logistic systems currently on the market leads to the development of new innovative transportation systems. In order to find the optimal configuration of such a system depending on the current goal functions, for example minimization of transport times and maximization of the throughput, various mathematical methods of multi-criteria optimization are applicable. In this work, the concept of a complex transportation system is presented. Furthermore, the question of finding the optimal configuration of such a system through mathematical methods of optimization is considered.
Resumo:
Abstract Purpose – The purpose of this paper is to present a case study regarding the deployment of a previously developed model for the integration of management systems (MSs). The case study is developed at a manufacturing site of an international enterprise. The implementation of this model in a real business environment is aimed at assessing its feasibility. Design/methodology/approach – The presented case study takes into account different management systems standards (MSSs) progressively implemented, along the years, independently. The implementation of the model was supported by the results obtained from an investigation performed according to a structured diagnosis that was conducted to collect information related to the organizational situation of the enterprise. Findings – The main findings are as follows: a robust integrated management system (IMS), objectively more lean, structured and manageable was found to be feasible; this study provided an holistic view of the enterprise’s global management; clarifications of job descriptions and boundaries of action and responsibilities were achieved; greater efficiency in the use of resources was attained; more coordinated management of the three pillars of sustainability – environmental, economic and social, as well as risks, providing confidence and added value to the company and interested parties was achieved. Originality/value – This case study is pioneering in Portugal in respect to the implementation, at the level of an industrial organization, of the model previously developed for the integration of individualized MSs. The case study provides new insights regarding the implementation of IMSs including the rationalization of several resources and elimination of several types of organizational waste leveraging gains of efficiency. Due to its intrinsic characteristics, the model is able to support, progressively, new or revised MSSs according to the principles of annex SL (normative) – proposals for MSSs – of the International Organization for Standardization and the International Electrotechnical Commission, that the industrial organization can adopt beyond the current ones.
Resumo:
Computer-based simulation games (CSG) are a form of innovation in learning and teaching. CGS are used more pervasively in various ways such as a class activity (formative exercises) and as part of summative assessments (Leemkuil and De Jong, 2012; Zantow et al., 2005). This study investigates the current and potential use of CGS in Worcester Business School’s (WBS) Business Management undergraduate programmes. The initial survey of off-the-shelf simulation reveals that there are various categories of simulations, with each offering varying levels of complexity and learning opportunities depending on the field of study. The findings suggest that whilst there is marginal adoption of the use CSG in learning and teaching, there is significant opportunity to increase the use of CSG in enhancing learning and learner achievement, especially in Level 5 modules. The use of CSG is situational and its adoption should be undertaken on a case-by-case basis. WBS can play a major role by creating an environment that encourages and supports the use of CSG as well as other forms of innovative learning and teaching methods. Thus the key recommendation involves providing module teams further support in embedding and integrating CSG into their modules.
Resumo:
Abstract not available
Resumo:
Computer game technology produces compelling ‘immersive environments’ where our digitally-native youth play and explore. Players absorb visual, auditory and other signs and process these in real time, making rapid choices on how to move through the game-space to experience ‘meaningful play’. How can immersive environments be designed to elicit perception and understanding of signs? In this paper we explore game design and gameplay from a semiotic perspective, focusing on the creation of meaning for players as they play the game. We propose a theory of game design based on semiotics.
Resumo:
Resumo:
Objective: In the setting of the increasing use of closed systems for reconstitution and preparation of these drugs, we intend to analyze the correct use of these systems in the Hospital Pharmacy, with the objective to minimize the risks of exposure not only for those professionals directly involved, but also for all the staff in the unit, taking also into account efficiency criteria. Method: Since some systems protect against aerosol formation but not from vapours, we decided to review which cytostatics should be prepared using an awl with an air inlet valve, in order to implement a new working procedure. We reviewed the formulations available in our hospital, with the following criteria: method of administration, excipients, and potential hazard for the staff handling them. We measured the diameters of the vials. We selected drugs with Level 1 Risk and also those including alcohol-based excipients, which could generate vapours. Outcomes: Out of the 66 reviewed formulations, we concluded that 11 drugs should be reconstituted with this type of awl: busulfan, cabazitaxel, carmustine, cyclophosphamide, eribulin, etoposide, fotemustine, melphalan, paclitaxel, temsirolimus and thiotepa; these represented an 18% of the total volume of formulations. Conclusions: The selection of healthcare products must be done at the Hospital Pharmacy, because the use of a system with an air valve inlet only for those drugs selected led to an outcome of savings and a more efficient use of materials. In our experience, we confirmed that the use of the needle could only be avoided when the awl could adapt to the different formulations of cytostatics, and this is only possible when different types of awls are available. Besides, connections were only really closed when a single awl was used for each vial. The change in working methodology when handling these drugs, as a result of this study, will allow us to start different studies about environmental contamination as a future line of work.
Resumo:
This article presents an interdisciplinary experience that brings together two areas of computer science; didactics and philosophy. As such, the article introduces a relatively unexplored area of research, not only in Uruguay but in the whole Latin American region. The reflection on the ontological status of computer science, its epistemic and educational problems, as well as their relationship with technology, allows us to elaborate a critical analysis of the discipline and a social perception of it as a basic science.
Resumo:
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.
Resumo:
The main objective of this work was to develop an application capable of determining the diffusion times and diffusion coefficients of optical clearing agents and water inside a known type of muscle. Different types of chemical agents can also be used with the method implemented, such as medications or metabolic products. Since the diffusion times can be calculated, it is possible to describe the dehydration mechanism that occurs in the muscle. The calculation of the diffusion time of an optical clearing agent allows to characterize the refractive index matching mechanism of optical clearing. By using both the diffusion times and diffusion of water and clearing agents not only the optical clearing mechanisms are characterized, but also information about optical clearing effect duration and magnitude is obtained. Such information is crucial to plan a clinical intervention in cooperation with optical clearing. The experimental method and equations implemented in the developed application are described in throughout this document, demonstrating its effectiveness. The application was developed in MATLAB code, but the method was personalized so it better fits the application needs. This process significantly improved the processing efficiency, reduced the time to obtain he results, multiple validations prevents common errors and some extra functionalities were added such as saving application progress or export information in different formats. Tests were made using glucose measurements in muscle. Some of the data, for testing purposes, was also intentionally changed in order to obtain different simulations and results from the application. The entire project was validated by comparing the calculated results with the ones found in literature, which are also described in this document.
Resumo:
INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.
Resumo:
Extrasolar planets abound in almost any possible configuration. However, until five years ago, there was a lack of planets orbiting closer than 0.5 au to giant or subgiant stars. Since then, recent detections have started to populated this regime by confirming 13 planetary systems. We discuss the properties of these systems in terms of their formation and evolution off the main sequence. Interestingly, we find that 70.0 ± 6.6% of the planets in this regime are inner components of multiplanetary systems. This value is 4.2σ higher than for main-sequence hosts, which we find to be 42.4 ± 0.1%. The properties of the known planets seem to indicate that the closest-in planets (a< 0.06 au) to main-sequence stars are massive (i.e., hot Jupiters) and isolated and that they are subsequently engulfed by their host as it evolves to the red giant branch, leaving only the predominant population of multiplanetary systems in orbits 0.06 of this emerging observational trend in the context of formation and evolution of hot Jupiters.
Resumo:
We investigate the secular dynamics of three-body circumbinary systems under the effect of tides. We use the octupolar non-restricted approximation for the orbital interactions, general relativity corrections, the quadrupolar approximation for the spins, and the viscous linear model for tides. We derive the averaged equations of motion in a simplified vectorial formalism, which is suitable to model the long-term evolution of a wide variety of circumbinary systems in very eccentric and inclined orbits. In particular, this vectorial approach can be used to derive constraints for tidal migration, capture in Cassini states, and stellar spin–orbit misalignment. We show that circumbinary planets with initial arbitrary orbital inclination can become coplanar through a secular resonance between the precession of the orbit and the precession of the spin of one of the stars. We also show that circumbinary systems for which the pericenter of the inner orbit is initially in libration present chaotic motion for the spins and for the eccentricity of the outer orbit. Because our model is valid for the non-restricted problem, it can also be applied to any three-body hierarchical system such as star–planet–satellite systems and triple stellar systems.