968 resultados para Capabilities Approach


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An efficient numerical method to compute nonlinear solutions for two-dimensional steady free-surface flow over an arbitrary channel bottom topography is presented. The approach is based on a boundary integral equation technique which is similar to that of Vanden-Broeck's (1996, J. Fluid Mech., 330, 339-347). The typical approach for this problem is to prescribe the shape of the channel bottom topography, with the free-surface being provided as part of the solution. Here we take an inverse approach and prescribe the shape of the free-surface a priori while solving for the corresponding bottom topography. We show how this inverse approach is particularly useful when studying topographies that give rise to wave-free solutions, allowing us to easily classify eleven basic flow types. Finally, the inverse approach is also adapted to calculate a distribution of pressure on the free-surface, given the free-surface shape itself.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication processes are vital in the lifecycle of BPM projects. With this in mind, much research has been performed into facilitating this key component between stakeholders. Amongst the methods used to support this process are personalized process visualisations. In this paper, we review the development of this visualization trend, then, we propose a theoretical analysis framework based upon communication theory. We use this framework to provide theoretical support to the conjecture that 3D virtual worlds are powerful tools for communicating personalised visualisations of processes within a workplace. Meta requirements are then derived and applied, via 3D virtual world functionalities, to generate example visualisations containing personalized aspects, which we believe enhance the process of communcation between analysts and stakeholders in BPM process (re)design activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: As an increasing number of Taiwanese people live out the final stages of their lives with chronic and complex conditions. Care decisions at the end of life can also be complex, overwhelming and stressful for an individual, family and health professionals. Understanding individuals’ wishes for end-of-life care and factors which influence individuals' decisions is important so that the provision of quality end-of-life care for all can be promoted and ensured.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main purpose of this longitudinal study was to investigate the role of motivational climates, perceived competence and motivational regulations as antecedents of self-reported physical activity during junior high school years. The participants included 237 Finnish students (101 girls, 136 boys) that were 13 years old at the first stage of the study. Students completed the motivational climate and perceived competence questionnaires at Grade 7, motivation towards physical education questionnaire at Grade 8, and self-reported physical activity questionnaire at Grade 9. A path analysis revealed a path from task-involving motivational climate via perceived competence and intrinsic motivation to self-reported physical activity. Perceived competence and intrinsic motivation were statistically significant mediators between task-involving motivational climate and self-reported physical activity. This finding supports the four-stage causal sequence model of motivation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge Management (KM) is a process that focuses on knowledge-related activities to facilitate knowledge creation, capture, transformation and use, with the ultimate aim of leveraging organisations’ intellectual capital to achieve organisational objectives. The KM process receives input from its context (e.g. internal business environment), and produces output (i.e. knowledge). It is argued that the validity of such knowledge should be justified by business performance. The study, this paper reports on, provides enhanced empirical understanding of such an input-process-output relationship through investigating the interactions among different KM activities in the context of how construction organisations in Hong Kong manage knowledge. To this end, a theoretical framework along with a number of hypotheses are proposed and empirically tested through correlation, regression and path analyses. A questionnaire survey was administered to a sample of construction contractors operating in Hong Kong to facilitate testing the proposed relationships. More than 140 respondents from 99 organisations responded to the survey. The study findings demonstrate that both organisational and technical environments have the potential to predict the intensity of KM activities. Furthermore, different categories of KM activities interact with each other, and collectively they could be used to predict business performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes an approach to investigate the adoption of Web 2.0 in the classroom using a mixed methods study. By using a combination of qualitative or quantitative data collection and analysis techniques, we attempt to synergize the results and provide a more valid understanding of Web 2.0 adoption for learning by both teachers and students. This approach is expected to yield a better holistic view on the adoption issues associated with the e-learning 2.0 concept in current higher education as opposed to single method studies done previously. This paper also presents some early findings of e-learning 2.0 adoption using this research method

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Visuals are a central feature of STEM in all levels of education and many areas of employment. The wide variety of visuals that students are expected to master in STEM prevents an approach that aims to teach students about every type of visual that they may encounter. This paper proposes a pedagogy that can be applied across year levels and learning areas, allowing a school-wide, cross-curricular, approach to teaching about visual, that enhances learning in STEM and all other learning areas. Visuals are classified into six categories based on their properties, unlike traditional methods that classify visuals according to purpose. As visuals in the same category share common properties, students are able to transfer their knowledge from the familiar to unfamiliar in each category. The paper details the classification and proposes some strategies that can be can be incorporated into existing methods of teaching students about visuals in all learning areas. The approach may also assist students to see the connections between the different learning areas within and outside STEM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Currently the development of a national system for the ongoing enhancement of teacher professionalism across Australia is underway. The initiative led by Australian Institute of Teaching and School Leadership (AITSL) on behalf of the Ministerial Council for Education, Early Childhood Development and Youth Affairs (now SCSEEC) is progressing rapidly with a finalised set of Professional Standards for Teachers and a set of Professional Standards for Principals approved by Ministers in 2011. It is clear that there is an inextricable link between the newly proposed professional standards and the professional education of teachers and principals across Australia. Further, it is imperative that the education sector will need to work in a unified manner through ongoing consultations to ensure the standards truly reflect what teachers and principals desire of the profession, in terms of teacher preparation, professional learning and training, and professional recognition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the corporate regulation landscape, 'meta-regulation' is a comparatively new legal approach. The sketchy role of state promulgated authoritative laws in pluralized society and scepticism in corporate self-regulation's role have resulted in the development of this legal approach. It has opened up possibilities to synthesize corporate governance to add social values in corporate self-regulation. The core of this approach is the fusion of responsive and reflexive legal strategies to combine regulators and regulatees for reaching a particular goal. This paper argues that it is a potential strategy that can be successfully deployed to develop a socially responsible corporate culture for the business enterprises, so that they will be able to acquire social, environmental and ethical values in their self-regulation sustainably. Taking Bangladeshi corporate laws as an instance, this paper also evaluates the scope of incorporating this approach in laws of the least developed common law countries in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the primary desired capabilities of any future air traffic separation management system is the ability to provide early conflict detection and resolution effectively and efficiently. In this paper, we consider the risk of conflict as a primary measurement to be used for early conflict detection. This paper focuses on developing a novel approach to assess the impact of different measurement uncertainty models on the estimated risk of conflict. The measurement uncertainty model can be used to represent different sensor accuracy and sensor choices. Our study demonstrates the value of modelling measurement uncertainty in the conflict risk estimation problem and presents techniques providing a means of assessing sensor requirements to achieve desired conflict detection performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Corporate governance (CG) denotes the rules of business decision-making and directs the internal mechanism of companies to follow the output of the rules. It includes the customs, policies, laws and institutions as a set of processes that affects the way in which a corporation is directed, administered or controlled.