994 resultados para 346.9861
Resumo:
This paper demonstrates an experimental study that examines the accuracy of various information retrieval techniques for Web service discovery. The main goal of this research is to evaluate algorithms for semantic web service discovery. The evaluation is comprehensively benchmarked using more than 1,700 real-world WSDL documents from INEX 2010 Web Service Discovery Track dataset. For automatic search, we successfully use Latent Semantic Analysis and BM25 to perform Web service discovery. Moreover, we provide linking analysis which automatically links possible atomic Web services to meet the complex requirements of users. Our fusion engine recommends a final result to users. Our experiments show that linking analysis can improve the overall performance of Web service discovery. We also find that keyword-based search can quickly return results but it has limitation of understanding users’ goals.
Resumo:
Purpose: - The purpose of this paper is to debate the evolving relationship between libraries and users, justify the idea of participatory library and the use of the "participatory library" term. The paper also discusses the development trend of the participatory library and calls for empirical research on this area. Design/methodology/approach - Various sources of literature are collected and examined. Together with the inclusion of personal ideas and experience, a wide range of opinions on the contemporary library is compared and synthesized. Findings - The paper presents changes in the relationship between libraries and users in various periods of library development. It indicates an excessive attention on Library 2.0 while neglecting the participatory nature of the contemporary library. It also suggests that the term "participatory library" should be used as this term reflects the true nature of the contemporary library, and calls for empirical work on participatory library. Originality/value - This discussion is moving forward and challenging our thinking about the participatory library. It provides librarians, library managers, scholars, and the library community with a fresh perspective of contemporary library.
Resumo:
Proteasomes can exist in several different molecular forms in mammalian cells. The core 20S proteasome, containing the proteolytic sites, binds regulatory complexes at the ends of its cylindrical structure. Together with two 19S ATPase regulatory complexes it forms the 26S proteasome, which is involved in ubiquitin-dependent proteolysis. The 20S proteasome can also bind 11S regulatory complexes (REG, PA28) which play a role in antigen processing, as do the three variable c-interferoninducible catalytic b-subunits (e.g. LMP7). In the present study, we have investigated the subcellular distribution of the different forms of proteasomes using subunit speci®c antibodies. Both 20S proteasomes and their 19S regulatory complexes are found in nuclear, cytosolic and microsomal preparations isolated from rat liver. LMP7 was enriched approximately two-fold compared with core a-type proteasome subunits in the microsomal preparations. 20S proteasomes were more abundant than 26S proteasomes, both in liver and cultured cell lines. Interestingly, some signi®cant differences were observed in the distribution of different subunits of the 19S regulatory complexes. S12, and to a lesser extent p45, were found to be relatively enriched in nuclear fractions from rat liver, and immuno¯uorescent labelling of cultured cells with anti-p45 antibodies showed stronger labelling in the nucleus than in the cytoplasm. The REG was found to be localized predominantly in the cytoplasm. Three- to six-fold increases in the level of REG were observed following cinterferon treatment of cultured cells but c-interferon had no obvious effect on its subcellular distribution. These results demonstrate that different regulatory complexes and subpopulations of proteasomes have different distributions within mammalian cells and, therefore, that the distribution is more complex than has been reported for yeast proteasomes.
Resumo:
The reliability of urban passenger trains is a critical performance measure for passenger satisfaction and ultimately market share. A delay to one train in a peak period can have a severe effect on the schedule adherence of other trains. This paper presents an analytically based model to quantify the expected positive delay for individual passenger trains and track links in an urban rail network. The model specifically addresses direct delay to trains, knock-on delays to other trains, and delays at scheduled connections. A solution to the resultant system of equations is found using an iterative refinement algorithm. Model validation, which is carried out using a real-life suburban train network consisting of 157 trains, shows the model estimates to be on average within 8% of those obtained from a large scale simulation. Also discussed, is the application of the model to assess the consequences of increased scheduled slack time as well as investment strategies designed to reduce delay.
Resumo:
This study examines disillusioned consumers. The theory proposes that this is a group learning to lower their expectations of firm integrity and who, to avoid being let down, ignore marketing activity directly from the firm. This kind of exchange orientation develops as a response to consistent failure in perceptions of firm integrity. The research includes six studies, including over 600 adult consumers, to outline the development and validation of a measure of consumer disillusionment toward marketing activity. Completing the process provides a valid and reliable four-item measure. In addition, the study includes the assessment of the nomological validity of the construct. The nomological validation includes using cue utilization theory to predict that disillusioned consumers favor advertising that provides evidence of verifiable integrity. The validation experiment uses print advertising containing high and low verifiable integrity stimuli. Results confirm the theory with disillusioned consumers focusing less on the firm as source of information. Further, these consumers respond more favorably than non-disillusioned consumers to third party endorsers who serve to verify the firm's attempts to show integrity.
Resumo:
In defining the contemporary role of the specialist nurse it is necessary to challenge the concept of nursing as merely a combination of skills and knowledge. Nursing must be demonstrated and defined in the context of client care and include the broader notions of professional development and competence. This qualitative study sought to identify the competency standards for nurse specialists in critical care and to articulate the differences between entry-to-practice standards and the advanced practice of specialist nurses. Over 800 hours of specialist critical care nursing practice were observed and grouped into 'domains' or major themes of specialist practice using a constant comparison qualitative technique. These domains were further refined to describe attributes of the registered nurses which resulted in effective and/or superior performance (competency standards) and to provide examples of performance (performance criteria) which met the defined standard. Constant comparison of the emerging domains, competency standards and performance criteria to observations of specialist critical care practice, ensured the results provided a true reflection of the specialist nursing role. Data analysis resulted in 20 competency standards grouped into six domains: professional practice, reflective practice, enabling, clinical problem solving, teamwork, and leadership. Each of these domains is comprised of between two and seven competency standards. Each standard is further divided into component parts or 'elements' and the elements are illustrated with performance criteria. The competency standards are currently being used in several Australian critical care educational programmes and are the foundation for an emerging critical care credentialling process. They have been viewed with interest by a variety of non-critical care specialty groups and may form a common precursor from which further specialist nursing practice assessment will evolve.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
In an increasingly business technology (BT) dependent world, the impact of the extraordinary changes brought about by the nexus of mobile and cloud technologies, social media and big data is increasingly being felt in the board room. As leaders of enterprises of every type and size, board directors can no longer afford to ignore, delegate or avoid BT-related decisions. Competitive, financial and reputational risk is increased if boards fail to recognize their role in governing technology as an asset and in removing barriers to improving enterprise business technology governance (EBTG). Directors’ awareness of the need for EBTG is increasing. However, industry research shows that board level willingness to rectify the gap between awareness and action is very low or non-existent. This literature review-based research identifies barriers to EBTG effectiveness. It provides a practical starting point for board analysis. We offer four outcomes that boards might focus on to ensure the organizations they govern are not left behind by those led by the upcoming new breed of technology-savvy leaders. Most extant research looks backward for examples, examining data pre-2010, the time when a tipping point in the personal and business use of multimedia and mobile-internet devices significantly deepened the impacts of the identified nexus technology forces, and began rapidly changing the way many businesses engage with their customers, employees and stakeholders. We situate our work amidst these nexus forces, discuss the board’s role in EBTG in this context, and modernize current definitions of enterprise technology governance. The primary limitation faced is the lack of scholarly research relating to EBTG in the rapidly changing digital economy. Although we have used recent (2011 - 2013) industry surveys, the volume of these surveys and congruence across them is significant in terms of levels of increased awareness and calls for increased board attention and competency in EBTG and strategic information use. Where possible we have used scholarly research to illustrate or discuss industry findings.
Resumo:
Vitamin D may have anti-skin cancer effects, but population-based evidence is lacking. We therefore assessed associations between vitamin D status and skin cancer risk in an Australian subtropical community. We analyzed prospective skin cancer incidence for 11 years following baseline assessment of serum 25(OH)-vitamin D in 1,191 adults (average age 54 years) and used multivariable logistic regression analysis to adjust risk estimates for age, sex, detailed assessments of usual time spent outdoors, phenotypic characteristics, and other possible confounders. Participants with serum 25(OH)-vitamin D concentrations above 75 nmol l(-1) versus those below 75 nmol l(-1) more often developed basal cell carcinoma (odds ratio (OR)=1.51 (95% confidence interval (CI): 1.10-2.07, P=0.01) and melanoma (OR=2.71 (95% CI: 0.98-7.48, P=0.05)). Squamous cell carcinoma incidence tended to be lower in persons with serum 25(OH)-vitamin D concentrations above 75 nmol l(-1) compared with those below 75 nmol l(-1) (OR=0.67 (95% CI: 0.44-1.03, P=0.07)). Vitamin D status was not associated with skin cancer incidence when participants were classified as above or below 50 nmol l(-1) 25(OH)-vitamin D. Our findings do not indicate that the carcinogenicity of high sun exposure can be counteracted by high vitamin D status. High sun exposure is to be avoided as a means to achieve high vitamin D status.
Resumo:
This chapter provides researchers with a guide to some of the types of dating techniques that can be used in geomorpological investigations and issues that need to be addressed when using gechronological data, specifically issues relating to accuracy and precision. This chapter also introduces the 'types' of dating methods that are commonly used in geomorphological studies. This includes sidereal, isotopic, radiogenic, and chemical dating methods.
Resumo:
In order to develop more inclusive products and services, designers need a means of assessing the inclusivity of existing products and new concepts. Following previous research on the development of scales for inclusive design at University of Cambridge, Engineering Design Centre (EDC) [1], this paper presents the latest version of the exclusion audit method. For a specific product interaction, this estimates the proportion of the Great British population who would be excluded from using a product or service, due to the demands the product places on key user capabilities. A critical part of the method involves rating of the level of demand placed by a task on a range of key user capabilities, so the procedure to perform this assessment was operationalised and then its reliability was tested with 31 participants. There was no evidence that participants rated the same demands consistently. The qualitative results from the experiment suggest that the consistency of participants’ demand level ratings could be significantly improved if the audit materials and their instructions better guided the participant through the judgement process.