941 resultados para OPEN-CIRCUIT INTERACTION
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
We explored the mediation effect of caregiver self-efficacy on the influences of behavioral and psychological symptoms (BPSD) of dementia care recipients (CRs) or family caregivers’ (CGs) social supports (informational, tangible and affectionate support and positive social interaction) on CGs’ mental health. We interviewed 196 CGs, using a battery of measures including demographic data of the dyads, CRs’ dementia-related impairments, and CGs’ social support, self-efficacy and the Medical Outcome Study (MOS) Short-Form (SF-36) Health Survey. Multiple regression analyses showed that gathering information on self-efficacy and managing CG distress self-efficacy were the partial mediators of the relationship between positive social interaction and CG mental health. Managing caregiving distress self-efficacy also partial mediated the impact of BPSD on CG mental health. We discuss implications of the results for improving mental health of the target population in mainland China.
Resumo:
The concept of affordance has different interpretations in the field of Human-Computer Interaction (HCI). However, its treatment has been merely as a one-to-one relationship between a user and a technology. We believe that a broader view of affordances is needed which encompasses social and cultural aspects of our everyday life. We propose an interaction-centered view of affordance that can be useful for developing better understandings of designed artefacts. An interaction-centered view of affordance suggests that affordance is an interpretative relationship between users and the technology that emerges during the users' interaction with the technology in the lived environments. We distinguish two broad classes of affordances: affordance in Information and affordance in Articulation. Affordance in information refers to users' understanding of a technology based on their semantic and syntactic interpretation; and affordance in articulation refers to users' interpretations about the use of the technology. We also argue that the notion of affordance should be treated at two levels: at the 'artefact level' and at the 'practice level'. Consequently, we provide two examples to demonstrate our arguments.
Resumo:
The Comment by Mayers and Reiter criticizes our work on two counts. Firstly, it is claimed that the quantum decoherence effects that we report in consequence of our experimental analysis of neutron Compton scattering from H in gaseous H2 are not, as we maintain, outside the framework of conventional neutron scatteringtheory. Secondly, it is claimed that we did not really observe such effects, owing to a faulty analysis of the experimental data, which are claimed to be in agreement with conventional theory. We focus in this response on the critical issue of the reliability of our experimental results and analysis. Using the same standard Vesuvio instrument programs used by Mayers et al., we show that, if the experimental results for H in gaseous H2 are in agreement with conventional theory, then those for D in gaseous D2 obtained in the same way cannot be, and vice-versa. We expose a flaw in the calibration methodology used by Mayers et al. that leads to the present disagreement over the behaviour of H, namely the ad hoc adjustment of the measured H peak positions in TOF during the calibration of Vesuvio so that agreement is obtained with the expectation of conventional theory. We briefly address the question of the necessity to apply the theory of open quantum systems.
Resumo:
Decoherence of quantum entangled particles is observed in most systems, and is usually caused by system-environment interactions. Disentangling two subsystems A and B of a quantum systemAB is tantamount to erasure of quantum phase relations between A and B. It is widely believed that this erasure is an innocuous process, which e.g. does not affect the energies of A and B. Surprisingly, recent theoretical investigations by different groups showed that disentangling two systems, i.e. their decoherence, can cause an increase of their energies. Applying this result to the context of neutronCompton scattering from H2 molecules, we provide for the first time experimental evidence which supports this prediction. The results reveal that the neutron-proton collision leading to the cleavage of the H-H bond in the sub-femtosecond timescale is accompanied by larger energy transfer (by about 3%) than conventional theory predicts. It is proposed to interpreted the results by considering the neutron-proton collisional system as an entangled open quantum system being subject to decoherence owing to the interactions with the “environment” (i.e., two electrons plus second proton of H2).
Resumo:
A growing number of online journals and academic platforms are adopting light peer review or 'publish then filter' models of scholarly communication. These approaches have the advantage of enabling instant exchanges of knowledge between academics and are part of a wider search for alternatives to traditional peer review and certification processes in scholarly publishing. However, establishing credibility and identifying the correct balance between communication and scholarly rigour remains an important challenge for digital communication platforms targeting academic communities. This paper looks at a highly influential, government-backed, open publishing platform in China: Science Paper Online, which is using transparent post-publication peer-review processes to encourage innovation and address systemic problems in China's traditional academic publishing system. There can be little doubt that the Chinese academic publishing landscape differs in important ways from counterparts in the United States and Western Europe. However, this article suggests that developments in China also provide important lessons about the potential of digital technology and government policy to facilitate a large-scale shift towards more open and networked models of scholarly communication.
Resumo:
Smart Material Interface (SMI) is the latest generation of user interface that makes use of engineered materials and leverages their special properties. SMIs are capable of changing their physical properties such as shape, size and color, and can be controlled under certain (external) conditions. We provide an example of such an SMI in the form of a prototype of a vacuum cleaner. The prototype uses schematic electrochromic polymer at the suction nozzle of the vacuum cleaner, which changes its color depending on the dust level on a floor. We emphasize on the new affordances and communication language supported by SMIs, which challenges the current metaphors of user interfaces in the field of HCI.
Resumo:
In this Article, Petia Wohed, Arthur H. M. ter Hofstede, Nick Russell, Birger Andersson, and Wil M. P. van der Aalst present the results of their examination of existing open source BPM systems. Their conclusions are illuminating for both Open Source developers as well as the user community. Read their Article for the details of their study.
Resumo:
This Article is about legal scholarly publication in a time of plenitude. It is an attempt to explain why the most pressing questions in legal scholarly publishing are about how we ensure access to an infinity of content. It explains why standard assumptions about resource scarcity in publication are wrong in general, and how the changes in the modality of publication affect legal scholarship. It talks about the economics of open access to legal material, and how this connects to a future where there is infinite content. And because student-edited law reviews fit this future better than their commercially-produced, peer-refereed cousins, this Article is, in part, a defense of the crazy-beautiful institution that is the American law review.
Resumo:
Adversarial multiarmed bandits with expert advice is one of the fundamental problems in studying the exploration-exploitation trade-o. It is known that if we observe the advice of all experts on every round we can achieve O(√KTlnN) regret, where K is the number of arms, T is the number of game rounds, and N is the number of experts. It is also known that if we observe the advice of just one expert on every round, we can achieve regret of order O(√NT). Our open problem is what can be achieved by asking M experts on every round, where 1 < M < N.
Resumo:
In the structure of the title complex [Cs(C8H4Cl3O2)(H2O)]n, the Cs salt of the commercial herbicide fenac [(2,3,6-trichlorophenyl)acetic acid], the irregular eight-coordination about Cs+ comprises a bidentate chelate (O:Cl) interaction involving a carboxyl O-atom and an ortho-related ring substituted Cl atom which is also bridging, a triple-bridging carboxyl O-atom and a bridging water molecule. A two-dimensional sheet polymer is generated, lying parallel to (100), within which there are water O---H...O(carboxyl) hydrogen-bonding interactions.
Resumo:
In the structure of the title complex [Cs(C7H4N2O2)(H2O)2]n, the Cs salt of 4-nitrobenzoic acid, the irregular CsO9 coordination sphere comprises three bridging nitro O-donors, a bidentate carboxyl (O,O')-chelate interaction, a triple-bridging water molecule and a monodentate water molecule. A three-dimensional framework polymer is generated, within which there are water O-H...Ocarboxyl and water O-H...O(water) hydrogen-bonding interactions.
Resumo:
In the title compound, [K2(C7H3Cl2O2)2(H2O)]n, the potassium salt of 2,4-dichlorobenzoic acid, the repeating unit in the polymeric structure consists of two identical irregular KO6Cl complex units related by twofold rotational symmetry, linked by a bridging water molecule lying on the twofold axis. The coordination polyhedron about each K+ comprises a carboxyl O-atom and a Cl-atom donor from a bidentate chelate ligand interaction, four O-atom donors from a doubly bridging bidentate carboxyl (O,O')-chelate interaction and the water molecule. A two-dimensional layered coordination polymer structure lying parallel to (100) is generated through a series of conjoined cyclic bridges between K centres and is stabilized by water O-H...O(carboxyl) hydrogen-bonding interactions.
Resumo:
Lean construction and building information modeling (BIM) are quite different initiatives, but both are having profound impacts on the construction industry. A rigorous analysis of the myriad specific interactions between them indicates that a synergy exists which, if properly understood in theoretical terms, can be exploited to improve construction processes beyond the degree to which it might be improved by application of either of these paradigms independently. Using a matrix that juxtaposes BIM functionalities with prescriptive lean construction principles, 56 interactions have been identified, all but four of which represent constructive interaction. Although evidence for the majority of these has been found, the matrix is not considered complete but rather a framework for research to explore the degree of validity of the interactions. Construction executives, managers, designers, and developers of information technology systems for construction can also benefit from the framework as an aid to recognizing the potential synergies when planning their lean and BIM adoption strategies.