911 resultados para EVALUATION PROCESS


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The study assesses firstly the evaluation process of the first generation of asylum instruments while underlining the possibilities to improve it. It analyses secondly the asylum "acquis" regarding distribution of refugees between Member States, the eligibility for protection, the status of protected persons regarding detention and vulnerability, asylum procedures and the external dimension by formulating short-term recommendations of each area. Its last part is devoted to the long term evolution of the Common European Asylum System regarding the legal context including the accession of the EU to the Geneva Convention, the institutional perspectives including the new European Support Office, the jurisdictional perspective, the substantive perspective, the distributive perspective and the external perspective.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A avaliação de desempenho docente tem vindo a ser conceptualizada entre duas lógicas: a de controlo e a de desenvolvimento profissional, que originam, na sua implementação, diferentes modos de organização e avaliação do trabalho escolar e, consequentemente, de encarar a profissão docente. A investigação aborda as perspetivas de professores, de gestores e de diretores das escolas do Ensino Básico Integrado e do Ensino Secundário, para compreender se e em que medida o processo de avaliação do pessoal docente tem contribuído para melhorar a prestação pedagógica e o profissionalismo dos docentes em Cabo Verde. Foram definidos os seguintes objetivos: identificar as mudanças ocorridas nas práticas efetivas nas escolas a partir da lei nº 10/2000; analisar as relações estabelecidas entre a avaliação do pessoal docente e as suas práticas profissionais; verificar até que ponto avaliação docente contribui para melhoria do sistema de ensino. A investigação, de natureza qualitativa, utilizou o inquérito por entrevista semiestruturada como principal instrumento de recolha de dados. Os dados foram analisados com recurso à análise de conteúdo. Os inquiridos foram professores (8), diretores da Escola Secundária (2) e gestores do Ensino Básico Integrado (2), em exercício nas 4 escolas públicas de Santiago - Cabo Verde (2 na Praia, 1 em São Domingos e 1 no Tarrafal). Os resultados revelam que os professores entrevistados consideram que o modelo de avaliação existente contribuiria para a melhoria do desenvolvimento profissional, bem como para a progressão e distinção do mérito se fosse dado cumprimento à legislação. O incumprimento origina uma certa fuga dos professores mais novos para outros serviços, bem como uma desmotivação significativa. Os fatores mais negativos da avaliação do desempenho docente prendem-se com o facto de os professores não concordarem com os avaliadores por não terem formação específica na área, bem como com o sistema de quotas para progressão e promoção na carreira. Para que a avaliação de desempenho docente seja um processo mais justo e com alguma equidade, os entrevistados consideram que devem ser criados conselhos científicos nas regiões e na administração central.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Due to various contexts and processes, forensic science communities may have different approaches, largely influenced by their criminal justice systems. However, forensic science practices share some common characteristics. One is the assurance of a high (scientific) quality within processes and practices. For most crime laboratory directors and forensic science associations, this issue is conditioned by the triangle of quality, which represents the current paradigm of quality assurance in the field. It consists of the implementation of standardization, certification, accreditation, and an evaluation process. It constitutes a clear and sound way to exchange data between laboratories and enables databasing due to standardized methods ensuring reliable and valid results; but it is also a means of defining minimum requirements for practitioners' skills for specific forensic science activities. The control of each of these aspects offers non-forensic science partners the assurance that the entire process has been mastered and is trustworthy. Most of the standards focus on the analysis stage and do not consider pre- and post-laboratory stages, namely, the work achieved at the investigation scene and the evaluation and interpretation of the results, intended for intelligence beneficiaries or for court. Such localized consideration prevents forensic practitioners from identifying where the problems really lie with regard to criminal justice systems. According to a performance-management approach, scientific quality should not be restricted to standardized procedures and controls in forensic science practice. Ensuring high quality also strongly depends on the way a forensic science culture is assimilated (into specific education training and workplaces) and in the way practitioners understand forensic science as a whole.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this work, a previously-developed, statistical-based, damage-detection approach was validated for its ability to autonomously detect damage in bridges. The damage-detection approach uses statistical differences in the actual and predicted behavior of the bridge caused under a subset of ambient trucks. The predicted behavior is derived from a statistics-based model trained with field data from the undamaged bridge (not a finite element model). The differences between actual and predicted responses, called residuals, are then used to construct control charts, which compare undamaged and damaged structure data. Validation of the damage-detection approach was achieved by using sacrificial specimens that were mounted to the bridge and exposed to ambient traffic loads and which simulated actual damage-sensitive locations. Different damage types and levels were introduced to the sacrificial specimens to study the sensitivity and applicability. The damage-detection algorithm was able to identify damage, but it also had a high false-positive rate. An evaluation of the sub-components of the damage-detection methodology and methods was completed for the purpose of improving the approach. Several of the underlying assumptions within the algorithm were being violated, which was the source of the false-positives. Furthermore, the lack of an automatic evaluation process was thought to potentially be an impediment to widespread use. Recommendations for the improvement of the methodology were developed and preliminarily evaluated. These recommendations are believed to improve the efficacy of the damage-detection approach.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The objective of the investigation was the development of a test that would readily identify the potential of an aggregate to cause D-cracking because of its susceptivity to critical saturation. A Press-Ur-Meter was modified by replacing the air chamber with a one-inch diameter plastic tube calibrated in milli-. It was concluded that the pore index was sufficiently reliable to determine the D-cracking potential of limestone aggregates in all but a few cases where marginal results were obtained. Consistently poor or good results were always in agreement with established service records or concrete durability testing. In those instances where marginal results are obtained, the results of concrete durability testing should be considered when making the final determination of the D-cracking susceptibility of the aggregate in question. The following applications for the pore index test have been recommended for consideration: concrete durability testing be discontinued in the evaluation process of new aggregate sources with pore index results between 0-20 (Class 2 durability) and over 35 (Class 1) durability; composite aggregates with intermediate pore index results of 20-35 be tested on each stone type to facilitate the possible removal of low durability stone from the production process; and additional investigation should be made to evaluate the possibility of using the test to monitor and upgrade the acceptance of aggregate from sources associated with D-cracking.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The purpose of this Interstate Corridor Plan (plan) is to provide the Iowa Department of Transportation (Iowa DOT) with an initial screening and prioritization of interstate corridors/segments. This process evaluates the entire interstate system, independent of current financial constraints, using a select group of criteria weighted in terms of their relative significance. The resulting segments would then represent those areas that should be considered for further study (e.g., environmental, design, engineering), with the possibility of being considered for programming by the Iowa Transportation Commission. There was a dominant theme present in conversations with those department stakeholders who have a keen interest in the product of this planning effort. A statement that was often heard was that staff needed more information to help answer the question, “Where do we need to be looking to next, and when?” There was a strong desire to be able to use this plan to help populate that initial pool of candidate segments that would progress towards further study, as discussed below. It was this theme that framed the need for this plan and ultimately guided its development. Further study: As acknowledged at the beginning of this section, the product of this planning effort will be an initial screening and prioritization of interstate corridors/segments. While this initial screening will assist the Iowa DOT in identifying those areas that should be considered for further study, the plan will not identify specific projects or alternatives that could be directly considered as part of the programming process. Bridging the gap between this plan and the programming process are a variety of environmental, design, and engineering activities conducted by various Iowa DOT offices. It is these activities that will further refine the priority corridors/segments identified in this plan into candidate projects. In addition, should the evaluation process developed through this planning effort prove to be successful, it is possible that there will be additional applications, such as future primary system highway plans and statewide freight plans.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Institutional digital repositories are a basic piece to provide preservation and reutilization of learning resources. However, their creation and maintenance is usually performed following a top-down approach, causing limitations in the search and reutilization of learning resources. In order to avoid this problem we propose to use web 2.0 functionalities. In this paper we present how tagging can be used to enhance the search and reusability functionalities of institutional learning repositories as well as promoting their usage. The paper also describes the evaluation process that was performed in a pilot experience involving open educational resources.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tämän työn tavoitteena on tarkastella keskijänniteverkonja sähköasemien kehittämistarpeita kahdella kohdealueella Kymenlaakson Sähköverkko Oy:n verkossa. Tarkastelun pohjatiedoiksi selvitettiin verkon sähköinen nykytila, luotettavuus, verkon topologia, kuormitusten jakautuminen ja muodostettiintulevaisuuden kuormitusennusteet. Lisäksi tarkasteltiin sähköasemien korvattavuus. Keskeiseksi työn sisällöksi muodostui kevytsähköasemien eri sijoituspaikkojen kannattavuustarkastelut, ottaen huomioon uuden keskijännitesyöttöpisteen vaikutukset keskijänniteverkon vahvistustarpeisiin, häviöihin ja käyttövarmuuteen. Laskelmat suoritettiin elinkaarikustannusperiaatteella huomioiden investointien, keskeytyksestä aiheutuneen haitan, häviöiden, kunnossapidon javiankorjauksen kustannukset. Työn tuloksena saatiin investointistrategiaehdotukset, joiden pohjalta verkkoyhtiö voi tehdä lähitulevaisuuden ratkaisuja sekä valmistautua tuleviin investointeihin.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Organisaatio tarvitsee työkaluja toimittajien suorituskyvyn mittaukseen ja kehittämiseen. Ilman systemaattista mittaamista ja arviointia ostajat eivät tiedä kuinka hyvin toimittajat suoriutuvat velvoitteistaan. Tutkielman tavoit-teena oli analysoida vähittäiskaupan tavarantoimittajien arviointiprosessia keskittyen päivittäistavarakaupan toimialaan ja tavarantoimittajiin sekä luoda toimittajien arviointiin pilottiraportti. Tutkielma on tehty päivittäistavarakaupan kohdeyrityksen toimeksiannosta. Tutkielman teoreettinen aineisto pohjautuu aikaisempaan kirjallisuuteen ja tutkimukseen. Tutkielman empiiriseen osaan aineistoa kerättiin kohdeyrityksen henkilöstön haastatteluilla sekä osallistuvan havainnoinnin avulla. Lisäksi tutkija perehtyi kohdeyrityksessä käytössä olevaan tietovarastointi-sovellukseen. Kirjallisen aineiston avulla rakennettu tutkimuksen teoreettinen osa perustuu aikaisempaan tutkimukseen. Empiirinen osa muodostuu neljästä teemahaastattelusta, jotka suoritettiin kohdeyrityksessä. Haastattelujen tarkoituksena oli rakentaa tutkijalle kuva kohdeyrityksen tavarantoimittaja-arvioinnin nykytilasta. Tutkielmassa havainnollistettiin yksinkertainen raportointimalli yhden tavararyhmän arviointiin ja arviointitiedon analysointiin. Raportointimallilla havainnollistetaan tavarantoimittaja-arviointidatan käyttöä toimittaja-arvioinnissa. Jatkossa on olennaista keskittyä systemaattisen raportoinnin edelleen kehittämiseen ja arviointitiedon hyväksikäyttöön neuvotteluissa toimittajan kanssa. Lisäksi toimittajien luokittelu tavararyhmien sisällä on tärkeää jotta arvioinnissa voidaan keskittyä kaikista tärkeimpiin toimittajiin.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Among all activities related to the management of science and technology in Brazil, program monitoring and evaluation is certainly one of the less developed and most needed. There are no universal methodologies that can be applied. In essence programs can be evaluated by relating their achievements to pre-established goals. A second strategy is to compare programs similar in nature, utilizing as reference common indicators. Finally programs can be evaluated by their socio-economic impact comparing investments to outcomes. All strategies mentioned require appropriate program design monitoring and expert independent evaluation. In Brazil as in many other countries including developed ones this activity is complicated by the fact that programs vary widely in their scope and goals. In Brazil program designs often do not specify clearly their purposes and output indicators, many are not monitored properly which makes evaluation difficult. Consequently science and technology programs are difficult to be compared to each other, and even evaluated on the basis of pre-established goals. In PADCT monitoring and evaluation proved to be the most challenging activities. Two lessons however were learnt. One is that the process of monitoring and evaluation has to be continuously exposed to criticism to be perfected; and the second is that the evaluation process must not be exhausted shortly after investments since translation of scientific knowledge into industrial applications may prove to be a lengthy process. In this exercise we certainly do not pretend to evaluate the QEQ subprogram but to organize some of the information produced by different sources related to this subject, including the PADCT administration. We use somewhat each strategy described: compare the outputs of the QEQ to predetermined proposed goals (particularly in PADCT II), compare the QEQ to other PADCT subprograms, and specify some outputs in terms of technological and industrial applications. Finally, we utilize this opportunity to discuss science and technology M&E in general and the complexity of developing this area in Brazil.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tässä kandidaatintyössä selvitetään yhteisvikaparametrien määritysprosessia todennäköisyysperustaista riskianalyysia varten Teollisuuden Voiman Olkiluodossa käytössä olevien Olkiluoto-1 ja Olkiluoto-2 ydinvoimalaitosyksiköiden osalta. Kandidaatintyön tavoitteena on selvittää yhteisvikaparametrien määrittämisen yleiset työvaiheet ja tutkia alkuperäisen selvityksen jälkeen käytettäväksi tulleen ICDE-yhteisvika-aineiston soveltamismahdollisuudet Olkiluodon laitosyksiköihin.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The drug discovery process is facing new challenges in the evaluation process of the lead compounds as the number of new compounds synthesized is increasing. The potentiality of test compounds is most frequently assayed through the binding of the test compound to the target molecule or receptor, or measuring functional secondary effects caused by the test compound in the target model cells, tissues or organism. Modern homogeneous high-throughput-screening (HTS) assays for purified estrogen receptors (ER) utilize various luminescence based detection methods. Fluorescence polarization (FP) is a standard method for ER ligand binding assay. It was used to demonstrate the performance of two-photon excitation of fluorescence (TPFE) vs. the conventional one-photon excitation method. As result, the TPFE method showed improved dynamics and was found to be comparable with the conventional method. It also held potential for efficient miniaturization. Other luminescence based ER assays utilize energy transfer from a long-lifetime luminescent label e.g. lanthanide chelates (Eu, Tb) to a prompt luminescent label, the signal being read in a time-resolved mode. As an alternative to this method, a new single-label (Eu) time-resolved detection method was developed, based on the quenching of the label by a soluble quencher molecule when displaced from the receptor to the solution phase by an unlabeled competing ligand. The new method was paralleled with the standard FP method. It was shown to yield comparable results with the FP method and found to hold a significantly higher signal-tobackground ratio than FP. Cell-based functional assays for determining the extent of cell surface adhesion molecule (CAM) expression combined with microscopy analysis of the target molecules would provide improved information content, compared to an expression level assay alone. In this work, immune response was simulated by exposing endothelial cells to cytokine stimulation and the resulting increase in the level of adhesion molecule expression was analyzed on fixed cells by means of immunocytochemistry utilizing specific long-lifetime luminophore labeled antibodies against chosen adhesion molecules. Results showed that the method was capable of use in amulti-parametric assay for protein expression levels of several CAMs simultaneously, combined with analysis of the cellular localization of the chosen adhesion molecules through time-resolved luminescence microscopy inspection.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Fraud is an increasing phenomenon as shown in many surveys carried out by leading international consulting companies in the last years. Despite the evolution of electronic payments and hacking techniques there is still a strong human component in fraud schemes. Conflict of interest in particular is the main contributing factor to the success of internal fraud. In such cases anomaly detection tools are not always the best instruments, since the fraud schemes are based on faking documents in a context dominated by lack of controls, and the perpetrators are those ones who should control possible irregularities. In the banking sector audit team experts can count only on their experience, whistle blowing and the reports sent by their inspectors. The Fraud Interactive Decision Expert System (FIDES), which is the core of this research, is a multi-agent system built to support auditors in evaluating suspicious behaviours and to speed up the evaluation process in order to detect or prevent fraud schemes. The system combines Think-map, Delphi method and Attack trees and it has been built around audit team experts and their needs. The output of FIDES is an attack tree, a tree-based diagram to ”systematically categorize the different ways in which a system can be attacked”. Once the attack tree is built, auditors can choose the path they perceive as more suitable and decide whether or not to start the investigation. The system is meant for use in the future to retrieve old cases in order to match them with new ones and find similarities. The retrieving features of the system will be useful to simplify the risk management phase, since similar countermeasures adopted for past cases might be useful for present ones. Even though FIDES has been built with the banking sector in mind, it can be applied in all those organisations, like insurance companies or public organizations, where anti-fraud activity is based on a central anti-fraud unit and a reporting system.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Corporate events as an effective part of marketing communications strategy seem to be underestimated in Finnish companies. In the rest of the Europe and the USA, investments in events are increasing, and their share of the marketing budget is significant. The growth of the industry may be explained by the numerous advantages and opportunities that events provide for attendees, such as face-to-face marketing, enhancing corporate image, building relationships, increasing sales, and gathering information. In order to maximize these benefits and return on investment, specific measurement strategies are required, yet there seems to exist a lack of understanding of how event performance should be perceived or evaluated. To address this research gap, this research attempts to describe the perceptions of and strategies for evaluating corporate event performance in the Finnish events industry. First, corporate events are discussed in terms of definitions and characteristics, typologies, and their role in marketing communications. Second, different theories on evaluating corporate event performance are presented and analyzed. Third, a conceptual model is presented based on the literature review, which serves as a basis for the empirical research conducted as an online questionnaire. The empirical findings are to a great extent in line with the existing literature, suggesting that there remains a lack of understanding corporate event performance evaluation, and challenges arise in determining appropriate measurement procedures for it. Setting clear objectives for events is a significant aspect of the evaluation process, since the outcomes of events are usually evaluated against the preset objectives. The respondent companies utilize many of the individual techniques that were recognized in theory, such as calculating the number of sales leads and delegates. However, some of the measurement tools may require further investments and resources, thus restricting their application especially in smaller companies. In addition, there seems to be a lack of knowledge of the most appropriate methods in different contexts, which take into account the characteristics of the organizing party as well as the size and nature of the event. The lack of inhouse expertise enhances the need for third-party service-providers in solving problems of corporate event measurement.