991 resultados para Veterinary service, Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tinnitus is a frequent consequence of noise trauma. Usually, however, the main focus regarding the consequences of noise trauma is placed on hearing loss, instead of tinnitus. The objectives of the present study were to assess various aspects of noise-related tinnitus in Finland, such as to determine the main causes of conscript acute acoustic traumas (AAT) in the military, assess tinnitus prevalence after noise trauma, characterize long-term AAT-related tinnitus prevalence and characteristics, assess occupational tinnitus, and evaluate the efficacy of hearing protection regulations in preventing hearing loss and tinnitus. The study comprised several independent noise-exposed groups: conscripts performing their military duty, former conscripts who suffered an AAT over a decade earlier, bomb explosion victims, and retired army personnel. Tinnitus questionnaires were used to assess tinnitus prevalence and characteristics. For occupational tinnitus, occupational noise-induced hearing loss (NIHL) reports to the Finnish Institute of Occupational Health were reviewed. Tinnitus is a common result of AAT, blast exposure and long-term noise exposure. Despite hearing protection regulations, up to hundreds of AATs occur annually among conscripts in the Finnish Defence Forces (FDF). The most common cause is an accidental shot, accounting for approximately half of the cases. Conscript AATs are mainly due to accidental shots, while the ear is unprotected. Only seldom is an AAT due to negligence. The most common causative weapon of conscript AATs is the assault rifle, accounting for 81% of conscript AATs. After AAT, the majority of tinnitus cases resolve during military service and become asymptomatic. However, in one-fifth of the cases, tinnitus persists, causing problems such as sleeping and concentration difficulties in many. In Finland, occupational tinnitus often remains unreported in conjunction with NIHL reports. In a survey of occupational NIHL cases, tinnitus was mentioned in only four per cent. However, a subsequent inquiry revealed that almost 90% in fact had tinnitus, indicating that most cases remained undetected and unreported. The best way to prevent noise-related tinnitus is prevention of noise trauma. In the military, hearing protection guidelines have been revised several times over the years. These regulations have been effective in reducing hearing loss of professional soldiers. There has also been a reduction in cases with tinnitus, but the decrease was not significant. However, with improved hearing protection regulations, a significant reduction in the risk of more serious, disturbing tinnitus was observed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The management and coordination of business-process collaboration experiences changes because of globalization, specialization, and innovation. Service-oriented computing (SOC) is a means towards businessprocess automation and recently, many industry standards emerged to become part of the service-oriented architecture (SOA) stack. In a globalized world, organizations face new challenges for setting up and carrying out collaborations in semi-automating ecosystems for business services. For being efficient and effective, many companies express their services electronically in what we term business-process as a service (BPaaS). Companies then source BPaaS on the fly from third parties if they are not able to create all service-value inhouse because of reasons such as lack of reasoures, lack of know-how, cost- and time-reduction needs. Thus, a need emerges for BPaaS-HUBs that not only store service offers and requests together with information about their issuing organizations and assigned owners, but that also allow an evaluation of trust and reputation in an anonymized electronic service marketplace. In this paper, we analyze the requirements, design architecture and system behavior of such a BPaaS-HUB to enable a fast setup and enactment of business-process collaboration. Moving into a cloud-computing setting, the results of this paper allow system designers to quickly evaluate which services they need for instantiationg the BPaaS-HUB architecture. Furthermore, the results also show what the protocol of a backbone service bus is that allows a communication between services that implement the BPaaS-HUB. Finally, the paper analyzes where an instantiation must assign additional computing resources vor the avoidance of performance bottlenecks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The dissertation examines aspects of asymmetrical warfare in the war-making of the German military entrepreneur Ernst von Mansfeld during his involvement in the Thirty Years War. Due to the nature of the inquiry, which combines history with military-political theory, the methodological approach of the dissertation is interdisciplinary. The theoretical framework used is that of asymmetrical warfare. The primary sources used in the dissertation are mostly political pamphlets and newsletters. Other sources include letters, documents, and contemporaneous chronicles. The secondary sources are divided into two categories, literature on the history of the Thirty Years War and textbooks covering the theory of asymmetrical warfare. The first category includes biographical works on Ernst von Mansfeld, as well as general histories of the Thirty Years War and seventeenth-century warfare. The second category combines military theory and political science. The structure of the dissertation consists of eight lead chapters, including an introduction and conclusion. The introduction covers the theoretical approach and aims of the dissertation, and provides a brief overlook of the sources and previous research on Ernst von Mansfeld and asymmetrical warfare in the Thirty Years War. The second chapter covers aspects of Mansfeld s asymmetrical warfare from the perspective of operational art. The third chapter investigates the illegal and immoral aspects of Mansfeld s war-making. The fourth chapter compares the differing methods by which Mansfeld and his enemies raised and financed their armies. The fifth chapter investigates Mansfeld s involvement in indirect warfare. The sixth chapter presents Mansfeld as an object and an agent of image and information war. The seventh chapter looks into the counter-reactions, which Mansfeld s asymmetrical warfare provoked from his enemies. The eighth chapter offers a conclusion of the findings. The dissertation argues that asymmetrical warfare presented itself in all the aforementioned areas of Mansfeld s conduct during the Thirty Years War. The operational asymmetry arose from the freedom of movement that Mansfeld enjoyed, while his enemies were constrained by the limits of positional warfare. As a non-state operator Mansfeld was also free to flout the rules of seventeenth-century warfare, which his enemies could not do with equal ease. The raising and financing of military forces was another source of asymmetry, because the nature of early seventeenth-century warfare favoured private military entrepreneurs rather than embryonic fiscal-military states. The dissertation also argues that other powers fought their own asymmetrical and indirect wars against the Habsburgs through Mansfeld s agency. Image and information were asymmetrical weapons, which were both aimed against Mansfeld and utilized by him. Finally, Mansfeld s asymmetrical threat forced the Habsburgs to adapt to his methods, which ultimately lead to the formation of a subcontracted Imperial Army under the management and leadership of Albrecht von Wallenstein. Therefore Mansfeld s asymmetrical warfare ultimately paved way for the kind of state-monopolized, organised, and symmetrical warfare that has prevailed from 1648 onwards. The conclusion is that Mansfeld s conduct in the Thirty Years War matched the criteria for asymmetrical warfare. While traditional historiography treated Mansfeld as an anomaly in the age of European state formation, his asymmetrical warfare has begun to bear resemblance to the contemporary conflicts, where nation states no longer hold the monopoly of violence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Finnish society developed rapidly in the 1960´s and 1970´s. This was result of international trends. Development of education, urbanization and wide organization of society increased discontent towards prevailing social structure and towards the power elite. Development of technology created possibility to present radical perspectives in mass media. This caused widely spread discussions dividing opinions. The purpose of this thesis was to complement research on national defence and the Finnish Defence Forces especially between years 1965 and 1975. The task of research was to clarify how changes in society and how the significance of this change was interpreted in public discussion about national defence and development of the Defence Forces. The most essential points for this thesis turned out to be discourses structured from public discussion. Main research material consisted of approximately 35000 news, editorials, articles and opinions presented in mass media supplemented by literature, committee reports and other archival sources. Frame of reference for this thesis is based on relativistic worldview. According to this, social reality is relative and there is no single truth. Environment has significant influence on the issue how knowledge and truth are formed. Data analysis was based on critical discourse. The key objective was to clarify the effects of broad changes in society using discursive methods. One essential goal was to form order of discourse using linguistic analysis and also connect discourses to wider sociocultural custom. On this thesis I came to the conclusion that on the review period there were five significant ensembles of discourse. They consisted of several discussions focused on different themes. The discourse of official security policy aimed to define national defence and the position of the Defence Forces as parts of foreign policy. Foreign policy is often perceived as the most significant part of security policy. Historical memory, geographical position of Finland and also the state contracts, changes in international warfare, tasks of the Defence Forces and increasing critic of national defence and the difference in thinking between generations formed the discourse of security policy. In the discourse of the liability to military service, the issue was about individual responsibility to society and national defence. Resisters and unarmed defence demands, encouraged by international examples were the themes. The discourse pointed out how mass media is used to influence and forced the Defence Forces to develop the practices in public information. The discourses of democracy and politics were closer to internal development of the Defence Forces to integrate more into society. The discourse of democracy focused in changing power relationships of the Defence Forces that were known as authoritarian. Issues like conscript and personnel union activity had lot of similarities to general social development. The discourse of politics presented how the Defence Forces were pushed towards parliamentary decision making. The personnel was granted the same rights as other population. Themes related to the discourse on the will to national defence were development of mental national defence, increasing education on national defence and creation of more open public information culture. According to discourses presented above I can state, that the position of the Defence Forces in society was changed between years 1965-1975. This change was advanced by the Defence Forces reformed attitude towards mass media and public information in general. Active participation in public information important became important instead of only answering topics. This positive development created an atmosphere, that was easier for the public to understand and create own pictures of the armed forces. Due to this, I can describe that the defenders and supporters of the armed forces were stuck in their trenches, until discussions presented in discourses and themes developed the Defence Forces to be better fitting part of society. Key words; society, national defence, Defence Forces, discourse, mass media, security policy, liability to military service, conscription, democracy

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to further develop the logic of service, value creation, value co-creation and value have to be formally and rigorously defined, so that the nature, content and locus of value and the roles of service providers and customers in value creation can be unambiguously assessed. In the present article, following the underpinning logic of value-in-use, it is demonstrated that in order to achieve this, value creation is best defined as the customer’s creation of value-in-use. The analysis shows that the firm’s and customer’s processes and activities can be divided into a provider sphere, closed for the customer, and a customer sphere, closed for the firm. Value creation occurs in the customer sphere, whereas firms in the provider sphere facilitate value creation by producing resources and processes which represent potential value or expected value-in use for their customers. By getting access to the closed customer sphere, firms can create a joint value sphere and engage in customers’ value creation as co-creators of value with them. This approach establishes a theoretically sound foundation for understanding value creation in service logic, and enables meaningful managerial implications, for example as to what is required for co-creation of value, and also further theoretical elaborations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A number of companies are trying to migrate large monolithic software systems to Service Oriented Architectures. A common approach to do this is to first identify and describe desired services (i.e., create a model), and then to locate portions of code within the existing system that implement the described services. In this paper we describe a detailed case study we undertook to match a model to an open-source business application. We describe the systematic methodology we used, the results of the exercise, as well as several observations that throw light on the nature of this problem. We also suggest and validate heuristics that are likely to be useful in partially automating the process of matching service descriptions to implementations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Consider a single-server multiclass queueing system with K classes where the individual queues are fed by K-correlated interrupted Poisson streams generated in the states of a K-state stationary modulating Markov chain. The service times for all the classes are drawn independently from the same distribution. There is a setup time (and/or a setup cost) incurred whenever the server switches from one queue to another. It is required to minimize the sum of discounted inventory and setup costs over an infinite horizon. We provide sufficient conditions under which exhaustive service policies are optimal. We then present some simulation results for a two-class queueing system to show that exhaustive, threshold policies outperform non-exhaustive policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service discovery is vital in ubiquitous applications, where a large number of devices and software components collaborate unobtrusively and provide numerous services without user intervention. Existing service discovery schemes use a service matching process in order to offer services of interest to the users. Potentially, the context information of the users and surrounding environment can be used to improve the quality of service matching. To make use of context information in service matching, a service discovery technique needs to address certain challenges. Firstly, it is required that the context information shall have unambiguous representation. Secondly, the devices in the environment shall be able to disseminate high level and low level context information seamlessly in the different networks. And thirdly, dynamic nature of the context information be taken into account. We propose a C-IOB(Context-Information, Observation and Belief) based service discovery model which deals with the above challenges by processing the context information and by formulating the beliefs based on the observations. With these formulated beliefs the required services will be provided to the users. The method has been tested with a typical ubiquitous museum guide application over different cases. The simulation results are time efficient and quite encouraging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of wireless channel allocation to multiple users. A slot is given to a user with a highest metric (e.g., channel gain) in that slot. The scheduler may not know the channel states of all the users at the beginning of each slot. In this scenario opportunistic splitting is an attractive solution. However this algorithm requires that the metrics of different users form independent, identically distributed (iid) sequences with same distribution and that their distribution and number be known to the scheduler. This limits the usefulness of opportunistic splitting. In this paper we develop a parametric version of this algorithm. The optimal parameters of the algorithm are learnt online through a stochastic approximation scheme. Our algorithm does not require the metrics of different users to have the same distribution. The statistics of these metrics and the number of users can be unknown and also vary with time. Each metric sequence can be Markov. We prove the convergence of the algorithm and show its utility by scheduling the channel to maximize its throughput while satisfying some fairness and/or quality of service constraints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Because of frequent topology changes and node failures, providing quality of service routing in mobile ad hoc networks becomes a very critical issue. The quality of service can be provided by routing the data along multiple paths. Such selection of multiple paths helps to improve reliability and load balancing, reduce delay introduced due to route rediscovery in presence of path failures. There are basically two issues in such a multipath routing Firstly, the sender node needs to obtain the exact topology information. Since the nodes are continuously roaming, obtaining the exact topology information is a tough task. Here, we propose an algorithm which constructs highly accurate network topology with minimum overhead. The second issue is that the paths in the path set should offer best reliability and network throughput. This is achieved in two ways 1) by choice of a proper metric which is a function of residual power, traffic load on the node and in the surrounding medium 2) by allowing the reliable links to be shared between different paths.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Web services are now a key ingredient of software services offered by software enterprises. Many standardized web services are now available as commodity offerings from web service providers. An important problem for a web service requester is the web service composition problem which involves selecting the right mix of web service offerings to execute an end-to-end business process. Web service offerings are now available in bundled form as composite web services and more recently, volume discounts are also on offer, based on the number of executions of web services requested. In this paper, we develop efficient algorithms for the web service composition problem in the presence of composite web service offerings and volume discounts. We model this problem as a combinatorial auction with volume discounts. We first develop efficient polynomial time algorithms when the end-to-end service involves a linear workflow of web services. Next we develop efficient polynomial time algorithms when the end-to-end service involves a tree workflow of web services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider a fluid queue in discrete time with random service rate. Such a queue has been used in several recent studies on wireless networks where the packets can be arbitrarily fragmented. We provide conditions on finiteness of moments of stationary delay, its Laplace-Stieltjes transform and various approximations under heavy traffic. Results are extended to the case where the wireless link can transmit in only a few slots during a frame.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A resource interaction based game theoretical model for military conflicts is presented in this paper. The model includes both the spatial decision capability of adversaries (decision regarding movement and subsequent distribution of resources) as well as their temporal decision capability (decision regarding level of allocation of resources for conflict with adversary’s resources). Attrition is decided at present by simple deterministic models. An additional feature of this model is the inclusion of the possibility of a given resource interacting with several resources of the adversary.The decisions of the adversaries is determined by solving for the equilibrium Nash strategies given that the objectives of the adversaries may not be in direct conflict. Examples are given to show the applicability of these models and solution concepts.