957 resultados para hard hats


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives: To measure tear film surface quality (TFSQ) using dynamic high-speed videokeratoscopy during short-term (8 hours) use of rigid and soft contact lenses. Methods: A group of fourteen subjects wore 3 different types of contact lenses on 3 different non-consecutive days (order randomized) in one eye only. Subjects were screened to exclude those with dry eye. The lenses included a PMMA hard, an RGP (Boston XO) and a soft silicone hydrogel lens. Three 30 second long high speed videokeratoscopy recordings were taken with contact lenses in-situ, in the morning and again after 8 hours of contact lens wear, both in normal and suppressed blinking conditions. Recordings were also made on a baseline day with no contact lens wear. Results: The presence of a contact lens in the eye had a significant effect on the mean TFSQ in both natural and suppressed blinking conditions (p=0.001 and p=0.01 respectively, repeated measures ANOVA). TFSQ was worse with all the lenses compared to no lens in the eye (in the afternoon during both normal and suppressed blinking conditions (all p<0.05). In natural blinking conditions, the mean TFSQ for the PMMA and RGP lenses was significantly worse than the baseline day (no lens) for both morning and afternoon measures (p<0.05). Conclusions: This study shows that both rigid and soft contact lenses adversely affect the TFSQ in both natural and suppressed blinking conditions. No significant differences were found between the lens types and materials. Keywords: Tear film surface quality, rigid contact lens, soft contact lens, dynamic high-speed videokeratoscopy

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two representations have dominated public perceptions of the largest living marsupial carnivore, the Tasmanian devil. One is the voracious, hurricane-like innocent savage Taz of Looney Tunes cartoon fame. The other, familiar in nineteenth- and twentieth-century rural Tasmania, is the ferocious predator and scavenger that wantonly kills livestock — and perhaps even people, should they become immobilized in the wilderness at night. Devils can take prey nearly three times their size and eat more than a third of their body weight in a sitting. Even so, it is hard to imagine how this species, being only slightly larger than a fox terrier, could be so maligned in name and image...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This working paper reflects upon the opportunities and challenges of designing a form of digital noticeboard system with a remote Aboriginal community that supports their aspirations for both internal and external communication. The project itself has evolved from a relationship built through ecological work between scientists and the local community on the Groote Eylandt archipelago to study native populations of animal species over the long term. In the course of this work the aspiration has emerged to explore how digital noticeboards might support communication on the island and externally. This paper introduces the community, the context and the history of the project. We then reflect upon the science project, its outcomes and a framework empowering the Aboriginal viewpoint, in order to draw lessons for extending what we see as a pragmatic and relationship based approach towards cross-cultural design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The professional identity of management accountants (MAs) is evolving. According to 8,727 descriptors expressed by 1,158 participants, a range of characteristics of MAs are competing in shaping the identity of future MAs. Respondents strongly valued qualities such as professional principles, hard work, intelligence, analytical and forward thinking in MAs. Further, more innovative, dynamic and people-oriented qualities were strongly suggested for future MAs, with roles relating to multi-skilled business integrator, business partner/advisor, leader, change agent, and decision enabler/maker. Cultivating leadership qualities in the management accounting profession is critical according to participants. Projecting a positive image of the profession and CIMA, and innovative training in management and leadership skills can further support MAs to meet future challenges. Most of all, understanding business and continued personal development by individual MAs is highly valued in shaping the future leadership identity of MAs. Our quantitative data show positive relationships between the professional identification, image and reputation, and leadership qualities of MAs. This suggests that the more one identifies with the profession, the more one is likely to report higher levels of leadership qualities that support members to internalise the desired meaning of their profession and to create a positive image and reputation. After the financial crisis of 2008–2009, the image of financial professions has been tarnished and unpredictable markets and unstable employment opportunities have challenged the profession across all sectors. Many respondents, especially CIMA members, suggested that the turmoil of the financial crisis did not impact negatively but rather elevated the pivotal role of MAs in contributing to cost efficiency and value creation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Earthquake precursor monitoring is the foundation of earthquake prediction and geothermal monitoring is one of the basic methods of earthquake precursor monitoring. High temperature well contains more information and therefore its monitoring is more important. However, electric sensors are hard to meet the monitoring requirements of high sensitivity and long lifetime. For a better observation of the earthquake precursor, a high sensitive fiber Bragg grating (FBG) temperature sensor is designed to monitoring a well at 87.5±1◦C. The performance of the FBG sensor demonstrates that it’s quite possible that applying FBG to high-sensitivity temperature-monitoring fields, such as geothermal monitoring. As far as we known, it is the first time that trying a high sensitive FBG temperature sensor in a practical application, let alone in the field of geothermal monitoring.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic services are a leitmotif in ‘hot’ topics like Software as a Service, Service Oriented Architecture (SOA), Service oriented Computing, Cloud Computing, application markets and smart devices. We propose to consider these in what has been termed the Service Ecosystem (SES). The SES encompasses all levels of electronic services and their interaction, with human consumption and initiation on its periphery in much the same way the ‘Web’ describes a plethora of technologies that eventuate to connect information and expose it to humans. Presently, the SES is heterogeneous, fragmented and confined to semi-closed systems. A key issue hampering the emergence of an integrated SES is Service Discovery (SD). A SES will be dynamic with areas of structured and unstructured information within which service providers and ‘lay’ human consumers interact; until now the two are disjointed, e.g., SOA-enabled organisations, industries and domains are choreographed by domain experts or ‘hard-wired’ to smart device application markets and web applications. In a SES, services are accessible, comparable and exchangeable to human consumers closing the gap to the providers. This requires a new SD with which humans can discover services transparently and effectively without special knowledge or training. We propose two modes of discovery, directed search following an agenda and explorative search, which speculatively expands knowledge of an area of interest by means of categories. Inspired by conceptual space theory from cognitive science, we propose to implement the modes of discovery using concepts to map a lay consumer’s service need to terminologically sophisticated descriptions of services. To this end, we reframe SD as an information retrieval task on the information attached to services, such as, descriptions, reviews, documentation and web sites - the Service Information Shadow. The Semantic Space model transforms the shadow's unstructured semantic information into a geometric, concept-like representation. We introduce an improved and extended Semantic Space including categorization calling it the Semantic Service Discovery model. We evaluate our model with a highly relevant, service related corpus simulating a Service Information Shadow including manually constructed complex service agendas, as well as manual groupings of services. We compare our model against state-of-the-art information retrieval systems and clustering algorithms. By means of an extensive series of empirical evaluations, we establish optimal parameter settings for the semantic space model. The evaluations demonstrate the model’s effectiveness for SD in terms of retrieval precision over state-of-the-art information retrieval models (directed search) and the meaningful, automatic categorization of service related information, which shows potential to form the basis of a useful, cognitively motivated map of the SES for exploratory search.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process-aware information systems, ranging from generic workflow systems to dedicated enterprise information systems, use work-lists to offer so-called work items to users. In real scenarios, users can be confronted with a very large number of work items that stem from multiple cases of different processes. In this jungle of work items, users may find it hard to choose the right item to work on next. The system cannot autonomously decide which is the right work item, since the decision is also dependent on conditions that are somehow outside the system. For instance, what is “best” for an organisation should be mediated with what is “best” for its employees. Current work-list handlers show work items as a simple sorted list and therefore do not provide much decision support for choosing the right work item. Since the work-list handler is the dominant interface between the system and its users, it is worthwhile to provide an intuitive graphical interface that uses contextual information about work items and users to provide suggestions about prioritisation of work items. This paper uses the so-called map metaphor to visualise work items and resources (e.g., users) in a sophisticated manner. Moreover, based on distance notions, the work-list handler can suggest the next work item by considering different perspectives. For example, urgent work items of a type that suits the user may be highlighted. The underlying map and distance notions may be of a geographical nature (e.g., a map of a city or office building), but may also be based on process designs, organisational structures, social networks, due dates, calendars, etc. The framework proposed in this paper is generic and can be applied to any process-aware information system. Moreover, in order to show its practical feasibility, the paper discusses a full-fledged implementation developed in the context of the open-source workflow environment YAWL, together with two real examples stemming from two very different scenarios. The results of an initial usability evaluation of the implementation are also presented, which provide a first indication of the validity of the approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nowadays, Workflow Management Systems (WfMSs) and, more generally, Process Management Systems (PMPs) are process-aware Information Systems (PAISs), are widely used to support many human organizational activities, ranging from well-understood, relatively stable and structures processes (supply chain management, postal delivery tracking, etc.) to processes that are more complicated, less structured and may exhibit a high degree of variation (health-care, emergency management, etc.). Every aspect of a business process involves a certain amount of knowledge which may be complex depending on the domain of interest. The adequate representation of this knowledge is determined by the modeling language used. Some processes behave in a way that is well understood, predictable and repeatable: the tasks are clearly delineated and the control flow is straightforward. Recent discussions, however, illustrate the increasing demand for solutions for knowledge-intensive processes, where these characteristics are less applicable. The actors involved in the conduct of a knowledge-intensive process have to deal with a high degree of uncertainty. Tasks may be hard to perform and the order in which they need to be performed may be highly variable. Modeling knowledge-intensive processes can be complex as it may be hard to capture at design-time what knowledge is available at run-time. In realistic environments, for example, actors lack important knowledge at execution time or this knowledge can become obsolete as the process progresses. Even if each actor (at some point) has perfect knowledge of the world, it may not be certain of its beliefs at later points in time, since tasks by other actors may change the world without those changes being perceived. Typically, a knowledge-intensive process cannot be adequately modeled by classical, state of the art process/workflow modeling approaches. In some respect there is a lack of maturity when it comes to capturing the semantic aspects involved, both in terms of reasoning about them. The main focus of the 1st International Workshop on Knowledge-intensive Business processes (KiBP 2012) was investigating how techniques from different fields, such as Artificial Intelligence (AI), Knowledge Representation (KR), Business Process Management (BPM), Service Oriented Computing (SOC), etc., can be combined with the aim of improving the modeling and the enactment phases of a knowledge-intensive process. The 1st International Workshop on Knowledge-intensive Business process (KiBP 2012) was held as part of the program of the 2012 Knowledge Representation & Reasoning International Conference (KR 2012) in Rome, Italy, in June 2012. The workshop was hosted by the Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti of Sapienza Universita di Roma, with financial support of the University, through grant 2010-C26A107CN9 TESTMED, and the EU Commission through the projects FP7-25888 Greener Buildings and FP7-257899 Smart Vortex. This volume contains the 5 papers accepted and presented at the workshop. Each paper was reviewed by three members of the internationally renowned Program Committee. In addition, a further paper was invted for inclusion in the workshop proceedings and for presentation at the workshop. There were two keynote talks, one by Marlon Dumas (Institute of Computer Science, University of Tartu, Estonia) on "Integrated Data and Process Management: Finally?" and the other by Yves Lesperance (Department of Computer Science and Engineering, York University, Canada) on "A Logic-Based Approach to Business Processes Customization" completed the scientific program. We would like to thank all the Program Committee members for the valuable work in selecting the papers, Andrea Marrella for his valuable work as publication and publicity chair of the workshop, and Carola Aiello and the consulting agency Consulta Umbria for the organization of this successful event.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although mobile phones are often used in public urban places to interact with one’s geographically dispersed social circle, they can also facilitate interactions with people in the same public urban space. The PlaceTagz study investigates how physical artefacts in public urban places can be utilised and combined with mobile phone technologies to facilitate interactions. Printed on stickers, PlaceTagz are QR codes linking to a digital message board enabling collocated users to interact with each other over time resulting in a place-based digital memory. This exploratory project set out to investigate if and how PlaceTagz are used by urban dwellers in a real world deployment. We present findings from analysing content received through PlaceTagz and interview data from application users. QR codes, which do not contain any contextual information, piqued the curiosity of users wondering about the embedded link’s destination and provoked comments in regards to people, place and technology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through the rise of cloud computing, on-demand applications, and business networks, services are increasingly being exposed and delivered on the Internet and through mobile communications. So far, services have mainly been described through technical interface descriptions. The description of business details, such as pricing, service-level, or licensing, has been neglected and is therefore hard to automatically process by service consumers. Also, third-party intermediaries, such as brokers, cloud providers, or channel partners, are interested in the business details in order to extend services and their delivery and, thus, further monetize services. In this paper, the constructivist design of the UnifiedServiceDescriptionLanguage (USDL), aimed at describing services across the human-to-automation continuum, is presented. The proposal of USDL follows well-defined requirements which are expressed against a common service discourse and synthesized from currently available servicedescription efforts. USDL's concepts and modules are evaluated for their support of the different requirements and use cases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.