983 resultados para information controls
Resumo:
Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.
Resumo:
A major challenge in human genetics is to devise a systematic strategy to integrate disease-associated variants with diverse genomic and biological data sets to provide insight into disease pathogenesis and guide drug discovery for complex traits such as rheumatoid arthritis (RA)1. Here we performed a genome-wide association study meta-analysis in a total of >100,000 subjects of European and Asian ancestries (29,880 RA cases and 73,758 controls), by evaluating ~10 million single-nucleotide polymorphisms. We discovered 42 novel RA risk loci at a genome-wide level of significance, bringing the total to 101 (refs 2, 3, 4). We devised an in silico pipeline using established bioinformatics methods based on functional annotation5, cis-acting expression quantitative trait loci6 and pathway analyses7, 8, 9—as well as novel methods based on genetic overlap with human primary immunodeficiency, haematological cancer somatic mutations and knockout mouse phenotypes—to identify 98 biological candidate genes at these 101 risk loci. We demonstrate that these genes are the targets of approved therapies for RA, and further suggest that drugs approved for other indications may be repurposed for the treatment of RA. Together, this comprehensive genetic study sheds light on fundamental genes, pathways and cell types that contribute to RA pathogenesis, and provides empirical evidence that the genetics of RA can provide important information for drug discovery.
Resumo:
HIV risk in vulnerable groups such as itinerant male street labourers is often examined via a focus on individual determinants. This study provides a test of a modified Information-Motivation-Behavioral Skills (IMB) model to predict condom use behaviour among male street workers in urban Vietnam. In a cross-sectional survey using a social mapping technique, 450 male street labourers from 13 districts of Hanoi, Vietnam were recruited and interviewed. Collected data were first examined for completeness; structural equation modelling was then employed to test the model fit. Condoms were used inconsistently by many of these men, and usage varied in relation to a number of factors. A modified IMB model had a better fit than the original IMB model in predicting condom use behaviour. This modified model accounted for 49% of the variance, versus 10% by the original version. In the modified model, the influence of psychosocial factors was moderately high, whilst the influence of HIV prevention information, motivation and perceived behavioural skills was moderately low, explaining in part the limited level of condom use behaviour. This study provides insights into social factors that should be taken into account in public health planning to promote safer sexual behaviour among Asian male street labourers.
Resumo:
Developing innovative library services requires a real world understanding of faculty members' desired curricular goals. This study aimed to develop a comprehensive and deeper understanding of Purdue's nutrition science and political science faculties' expectations for student learning related to information and data information literacies. Course syllabi were examined using grounded theory techniques that allowed us to identify how faculty were addressing information and data information literacies in their courses, but it also enabled us to understand the interconnectedness of these literacies to other departmental intentions for student learning, such as developing a professional identity or learning to conduct original research. The holistic understanding developed through this research provides the necessary information for designing and suggesting information literacy and data information literacy services to departmental faculty in ways supportive of curricular learning outcomes.
Identifying relevant information for emergency services from twitter in response to natural disaster
Resumo:
This project proposes a framework that identifies high‐value disaster-based information from social media to facilitate key decision-making processes during natural disasters. At present it is very difficult to differentiate between information that has a high degree of disaster relevance and information that has a low degree of disaster relevance. By digitally harvesting and categorising social media conversation streams automatically, this framework identifies highly disaster-relevant information that can be used by emergency services for intelligence gathering and decision-making.
Resumo:
The literature around Library 2.0 remains largely theoretical with few empirical studies and is particularly limited in developing countries such as Indonesia. This study addresses this gap and aims to provide information about the current state of knowledge on Indonesian LIS professionals’ understanding of Library 2.0. The researchers used qualitative and quantitative approaches for this study, asking thirteen closed- and open-ended questions in an online survey. The researchers used descriptive and in vivo coding to analyze the responses. Through their analysis, they identified three themes: technology, interactivity, and awareness of Library 2.0. Respondents demonstrated awareness of Library 2.0 and a basic understanding of the roles of interactivity and technology in libraries. However, overreliance on technology used in libraries to conceptualize Library 2.0 without an emphasis on its core characteristics and principles could lead to the misalignment of limited resources. The study results will potentially strengthen the research base for Library 2.0 practice as well as inform LIS curriculum in Indonesia so as to develop practitioners who are able to adapt to users’ changing needs and expectations. It is expected that the preliminary data from this study could be used to design a much larger and more complex future research project in this area.
Resumo:
Copy number variants (CNVs) account for a major proportion of human genetic polymorphism and have been predicted to have an important role in genetic susceptibility to common disease. To address this we undertook a large, direct genome-wide study of association between CNVs and eight common human diseases. Using a purpose-designed array we typed 19,000 individuals into distinct copy-number classes at 3,432 polymorphic CNVs, including an estimated 50% of all common CNVs larger than 500 base pairs. We identified several biological artefacts that lead to false-positive associations, including systematic CNV differences between DNAs derived from blood and cell lines. Association testing and follow-up replication analyses confirmed three loci where CNVs were associated with diseaseIRGM for Crohns disease, HLA for Crohns disease, rheumatoid arthritis and type 1 diabetes, and TSPAN8 for type 2 diabetesalthough in each case the locus had previously been identified in single nucleotide polymorphism (SNP)-based studies, reflecting our observation that most common CNVs that are well-typed on our array are well tagged by SNPs and so have been indirectly explored through SNP studies. We conclude that common CNVs that can be typed on existing platforms are unlikely to contribute greatly to the genetic basis of common human diseases. © 2010 Macmillan Publishers Limited. All rights reserved.
Resumo:
Information available on company websites can help people navigate to the offices of groups and individuals within the company. Automatically retrieving this within-organisation spatial information is a challenging AI problem This paper introduces a novel unsupervised pattern-based method to extract within-organisation spatial information by taking advantage of HTML structure patterns, together with a novel Conditional Random Fields (CRF) based method to identify different categories of within-organisation spatial information. The results show that the proposed method can achieve a high performance in terms of F-Score, indicating that this purely syntactic method based on web search and an analysis of HTML structure is well-suited for retrieving within-organisation spatial information.
Resumo:
Heat shock promoters of mycobacteria are strong promoters that become rapidly upregulated during macrophage infection and thus serve as valuable candidates for expressing foreign antigens in recombinant BCG vaccine. In the present study, a new heat shock promoter controlling the expression of the groESL1 operon was identified and characterized. Mycobacterium tuberculosis groESL1 operon codes for the immunodominant 10 kDa (Rv3418c, GroES/Cpn10/Hsp10) and 60 kDa (Rv3417c, GroEL1/Cpn60.1/Hsp60) heat shock proteins. The basal promoter region was 115 bp, while enhanced activity was seen only with a 277-bp fragment. No promoter element was seen in the groES-groEL1 intergenic region. This operon codes for a bicistronic mRNA transcript as determined by reverse transcriptase-PCR and Northern blot analysis. Primer extension analysis identified two transcriptional start sites (TSSs) TSS1 (-236) and TSS2 (-171), out of which one (TSS2) was heat inducible. The groE promoter was more active than the groEL2 promoter in Mycobacterium smegmatis. Further, it was found to be differentially regulated under stress conditions, while the groEL2 promoter was constitutive.
Resumo:
From a relational perspective of information literacy, health information literacy is interpreted as the different ways in which people experience using information to learn about health. Phenomenography was used as a research approach to explore variation in people's experience of using information to learn about health from data collected through semi-structured interviews. The findings identify seven categories that describe the qualitatively different ways in which people experience health information literacy: building a new knowledge base;weighing up information; discerning valid information; paying attention to bodily information; staying informed about health; Participating in learning communities, and envisaging health. These findings can be used to enhance awareness about the different ways of experiencing health information literacy, and to contribute to a nascent trajectory of research that has explored information literacy within the context of everyday life.
Resumo:
In this paper, we present a decentralized dynamic load scheduling/balancing algorithm called ELISA (Estimated Load Information Scheduling Algorithm) for general purpose distributed computing systems. ELISA uses estimated state information based upon periodic exchange of exact state information between neighbouring nodes to perform load scheduling. The primary objective of the algorithm is to cut down on the communication and load transfer overheads by minimizing the frequency of status exchange and by restricting the load transfer and status exchange within the buddy set of a processor. It is shown that the resulting algorithm performs almost as well as a perfect information algorithm and is superior to other load balancing schemes based on the random sharing and Ni-Hwang algorithms. A sensitivity analysis to study the effect of various design parameters on the effectiveness of load balancing is also carried out. Finally, the algorithm's performance is tested on large dimensional hypercubes in the presence of time-varying load arrival process and is shown to perform well in comparison to other algorithms. This makes ELISA a viable and implementable load balancing algorithm for use in general purpose distributed computing systems.
Resumo:
Sustainability practices in government regulations and within the society influence the delivery of sustainable housing. The actual delivery rate of Australian sustain-able housing is not as high as other countries. There is an absence of engagement by stakeholders in adopting sustainable housing practices. This may be due, in the current Australian property market, to confusion as to what sustainability features should be considered, given the large range of environmental, economic and social sustainability options possible. One of the main problems appears to be that information demanders, especially real estate agents, valuers, insurance agents and mortgage lenders do not include sustainability perspectives in their advice or in their decision processes. Information distribution in the Australian property market is flawed, resulting in a lack of return-on-investment value of ‘green’ features implemented by some stakeholders. This paper reviewed the global sustainable development concept and Australian sustainable assessment methods. This review identified the possibility of a research project which aimed at identifying and integrating different perceptions and priority needs of the information demanders, for developing a model for the potential implementation of sustainability features distribution in the property industry. This research will reduce confusion on the sustainability-related information which can influence the decision making of stakeholders in the supply and demand of sustainable housing.
Resumo:
This research aimed to inform the design of effective information literacy lessons in higher education. Phenomenography, a research approach designed to study human experience, was used to explore the experiences of a teacher and undergraduate students using information to learn about language and gender issues. The findings show that the way learners use information influences content-focused learning outcomes, and reveal an instructional pattern for enabling students to use information while becoming aware of the topic they are investigating. Based on the findings, a design model is offered in which learning outcomes are realized through targeted information literacy activities.
Resumo:
This research explored how small and medium enterprises can achieve success with software as a service (SaaS) applications from cloud. Based upon an empirical investigation of six growth oriented and early technology adopting small and medium enterprises, this study proposes a SaaS for small and medium enterprise success model with two approaches: one for basic and one for advanced benefits. The basic model explains the effective use of SaaS for achieving informational and transactional benefits. The advanced model explains the enhanced use of software as a service for achieving strategic and transformational benefits. Both models explicate the information systems capabilities and organizational complementarities needed for achieving success with SaaS.
Resumo:
Shared eHealth records systems offer promising benefits for improving healthcare through high availability of information and improved decision making; however, their uptake has been hindered by concerns over the privacy of patient information. To address these privacy concerns while balancing the requirements of healthcare professionals to have access to the information they need to provide appropriate care, the use of an Information Accountability Framework (IAF) has been proposed. For the IAF and so called Accountable-eHealth systems to become a reality, the framework must provide for a diverse range of users and use cases. The initial IAF model did not provide for more diverse use cases including the need for certain users to delegate access to another user in the system to act on their behalf while maintaining accountability. In this paper, we define the requirements for delegation of access in the IAF, how such access policies would be represented in the Framework, and implement and validate an expanded IAF model.