206 resultados para subscription
Resumo:
Introduction: distance education is defined as a learning mode in which pedagogical and didactic mediation in teaching and learning processes is characterized by the use of information and communication means and technology by both teachers and students, and the development of educational activities at different settings and technologyand. Objective: evaluate the knowledge obtained by students from the last year of Odontology about distance education and their opinions about the subject. Methods: across-sectional descriptive exploratory study was conducted. Of the total 140 university students, 120 participated in the study. A self-applied questionnaire was developed with questions related to the student, the use of the Internet and distance education. The professional updating alternatives included were graduate courses and subscription to newspapers. Results: 29.2 % of the students use the Internet on a daily basis; only one student stated that he did not use the Internet. Of the students interviewed, 63.34 % did not know any form of distance education. As a consequence, 97.5 % had never taken part in a distance education course and 62.5 % stated that they did not know whether they would. Conclusions: results show that odontology students are prejudiced against nontraditional learning modes, though they use the Internet on a regular basis. Despite the existence of legislation regulating distance education, students are still concerned about its quality and legality.
Resumo:
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).
Resumo:
This NebGuide provides a list of various market information sources, each followed by a brief summary of issue schedules and contents. It provides a listing of widely used and readily available market information sources that contain information which may be useful to agricultural producers, lenders and agribusiness firms when making livestock and poultry marketing decisions. Most of the available market information and statistical data comes from the U.S. Department of Agriculture (USDA). Many now require an annual subscription fee.
Resumo:
The Peer-to-Peer network paradigm is drawing the attention of both final users and researchers for its features. P2P networks shift from the classic client-server approach to a high level of decentralization where there is no central control and all the nodes should be able not only to require services, but to provide them to other peers as well. While on one hand such high level of decentralization might lead to interesting properties like scalability and fault tolerance, on the other hand it implies many new problems to deal with. A key feature of many P2P systems is openness, meaning that everybody is potentially able to join a network with no need for subscription or payment systems. The combination of openness and lack of central control makes it feasible for a user to free-ride, that is to increase its own benefit by using services without allocating resources to satisfy other peers’ requests. One of the main goals when designing a P2P system is therefore to achieve cooperation between users. Given the nature of P2P systems based on simple local interactions of many peers having partial knowledge of the whole system, an interesting way to achieve desired properties on a system scale might consist in obtaining them as emergent properties of the many interactions occurring at local node level. Two methods are typically used to face the problem of cooperation in P2P networks: 1) engineering emergent properties when designing the protocol; 2) study the system as a game and apply Game Theory techniques, especially to find Nash Equilibria in the game and to reach them making the system stable against possible deviant behaviors. In this work we present an evolutionary framework to enforce cooperative behaviour in P2P networks that is alternative to both the methods mentioned above. Our approach is based on an evolutionary algorithm inspired by computational sociology and evolutionary game theory, consisting in having each peer periodically trying to copy another peer which is performing better. The proposed algorithms, called SLAC and SLACER, draw inspiration from tag systems originated in computational sociology, the main idea behind the algorithm consists in having low performance nodes copying high performance ones. The algorithm is run locally by every node and leads to an evolution of the network both from the topology and from the nodes’ strategy point of view. Initial tests with a simple Prisoners’ Dilemma application show how SLAC is able to bring the network to a state of high cooperation independently from the initial network conditions. Interesting results are obtained when studying the effect of cheating nodes on SLAC algorithm. In fact in some cases selfish nodes rationally exploiting the system for their own benefit can actually improve system performance from the cooperation formation point of view. The final step is to apply our results to more realistic scenarios. We put our efforts in studying and improving the BitTorrent protocol. BitTorrent was chosen not only for its popularity but because it has many points in common with SLAC and SLACER algorithms, ranging from the game theoretical inspiration (tit-for-tat-like mechanism) to the swarms topology. We discovered fairness, meant as ratio between uploaded and downloaded data, to be a weakness of the original BitTorrent protocol and we drew inspiration from the knowledge of cooperation formation and maintenance mechanism derived from the development and analysis of SLAC and SLACER, to improve fairness and tackle freeriding and cheating in BitTorrent. We produced an extension of BitTorrent called BitFair that has been evaluated through simulation and has shown the abilities of enforcing fairness and tackling free-riding and cheating nodes.
Resumo:
La ricerca conduce un’indagine sull’azione di classe, introdotta nell’ordinamento italiano in epoca recente e foriera di numerose incertezze ed ambiguità interpretative, con riferimento sia allo specifico contenuto delle singole disposizioni normative che si sono alternate nel corso del tempo (determinate, sovente, dalla necessità di elidere le- di volta in volta riscontrate- anomalie e contraddizioni del tessuto normativo), sia alle possibili incongruenze tra taluni profili della disciplina oggi prevista dall’art. 140-bis del Codice del consumo e taluni principi generali dell’ordinamento, anche in materia di risarcimento del danno. Viene esaminato, anzitutto, il tema della legittimazione ad agire e del rapporto tra consumatore e l’ente rappresentativo cui questi, eventualmente, si rivolga, tentando la riconduzione di tale relazione alle ordinarie categorie privatistiche. Parimenti, è in termini di qualificazione secondo le tradizionali categorie del diritto civile che si tenta di apprezzare la natura dell’atto di adesione del soggetto che si vanti detentore di un diritto omogeneo a quello della classe cui pretende di appartenere. Vengono, quindi, esaminate le condizioni di ammissibilità dell’azione di classe e le caratteristiche peculiari della fase preliminare del giudizio di ammissibilità dell’azione. La ricerca indaga, quindi, la natura ed i possibili contenuti della sentenza che definisce il processo di classe, e conduce, nell’ultimo capitolo, una disamina relativa alle situazioni giuridiche tutelate.
Resumo:
Il Data Distribution Management (DDM) è un componente dello standard High Level Architecture. Il suo compito è quello di rilevare le sovrapposizioni tra update e subscription extent in modo efficiente. All'interno di questa tesi si discute la necessità di avere un framework e per quali motivi è stato implementato. Il testing di algoritmi per un confronto equo, librerie per facilitare la realizzazione di algoritmi, automatizzazione della fase di compilazione, sono motivi che sono stati fondamentali per iniziare la realizzazione framework. Il motivo portante è stato che esplorando articoli scientifici sul DDM e sui vari algoritmi si è notato che in ogni articolo si creavano dei dati appositi per fare dei test. L'obiettivo di questo framework è anche quello di riuscire a confrontare gli algoritmi con un insieme di dati coerente. Si è deciso di testare il framework sul Cloud per avere un confronto più affidabile tra esecuzioni di utenti diversi. Si sono presi in considerazione due dei servizi più utilizzati: Amazon AWS EC2 e Google App Engine. Sono stati mostrati i vantaggi e gli svantaggi dell'uno e dell'altro e il motivo per cui si è scelto di utilizzare Google App Engine. Si sono sviluppati quattro algoritmi: Brute Force, Binary Partition, Improved Sort, Interval Tree Matching. Sono stati svolti dei test sul tempo di esecuzione e sulla memoria di picco utilizzata. Dai risultati si evince che l'Interval Tree Matching e l'Improved Sort sono i più efficienti. Tutti i test sono stati svolti sulle versioni sequenziali degli algoritmi e che quindi ci può essere un riduzione nel tempo di esecuzione per l'algoritmo Interval Tree Matching.
Resumo:
A growing body of literature addresses possible health effects of mobile phone use in children and adolescents by relying on the study participants' retrospective reconstruction of mobile phone use. In this study, we used data from the international case-control study CEFALO to compare self-reported with objectively operator-recorded mobile phone use. The aim of the study was to assess predictors of level of mobile phone use as well as factors that are associated with overestimating own mobile phone use. For cumulative number and duration of calls as well as for time since first subscription we calculated the ratio of self-reported to operator-recorded mobile phone use. We used multiple linear regression models to assess possible predictors of the average number and duration of calls per day and logistic regression models to assess possible predictors of overestimation. The cumulative number and duration of calls as well as the time since first subscription of mobile phones were overestimated on average by the study participants. Likelihood to overestimate number and duration of calls was not significantly different for controls compared to cases (OR=1.1, 95%-CI: 0.5 to 2.5 and OR=1.9, 95%-CI: 0.85 to 4.3, respectively). However, likelihood to overestimate was associated with other health related factors such as age and sex. As a consequence, such factors act as confounders in studies relying solely on self-reported mobile phone use and have to be considered in the analysis.
Resumo:
Planning in realistic domains typically involves reasoning under uncertainty, operating under time and resource constraints, and finding the optimal subset of goals to work on. Creating optimal plans that consider all of these features is a computationally complex, challenging problem. This dissertation develops an AO* search based planner named CPOAO* (Concurrent, Probabilistic, Over-subscription AO*) which incorporates durative actions, time and resource constraints, concurrent execution, over-subscribed goals, and probabilistic actions. To handle concurrent actions, action combinations rather than individual actions are taken as plan steps. Plan optimization is explored by adding two novel aspects to plans. First, parallel steps that serve the same goal are used to increase the plan’s probability of success. Traditionally, only parallel steps that serve different goals are used to reduce plan execution time. Second, actions that are executing but are no longer useful can be terminated to save resources and time. Conventional planners assume that all actions that were started will be carried out to completion. To reduce the size of the search space, several domain independent heuristic functions and pruning techniques were developed. The key ideas are to exploit dominance relations for candidate action sets and to develop relaxed planning graphs to estimate the expected rewards of states. This thesis contributes (1) an AO* based planner to generate parallel plans, (2) domain independent heuristics to increase planner efficiency, and (3) the ability to execute redundant actions and to terminate useless actions to increase plan efficiency.
Resumo:
The Personal Response System Program at Huffington Center on Aging, Baylor College of Medicine, provides emergency call systems for elderly people living independently in Houston, Texas. The goal of the project was to complete a formative evaluation of the Personal Response System Program. The specific aims of the evaluation were three-fold. One aim was to evaluate participant health status and level of disability. The second aim was to develop a health care cost estimation strategy. Finally, a preliminary cost-effectiveness analysis was completed to evaluate the program's impact on health care costs and health status among the elderly target population. ^ The evaluation was a longitudinal, randomized experimental design. After the screening of 120 volunteers for eligibility, clients were asked to complete a written questionnaire and a monthly health service contact diary. Volunteers were contacted by telephone interviewers to collect health status information from 100 eligible clients (83%) on three occasions during the six months of follow-up. ^ Initially, volunteers were randomized to two experimental groups. The two groups were found to be comparable at the beginning of the study. No significant differences were detected related to health status, level of disability, or history of physician visits at baseline. However, the group with the Personal Response System (PRS) device had more adverse health events, higher IADL scores, more frequent use of walkers, lower average health status scores, and fewer community volunteers hours than the usual care comparison group. ^ The health care costs were estimated based on an algorithm adapted from the American Medical Association guidelines. Average total health care costs for the group with the PRS device ($912) were greater than the usual care group ($464). However, median health care values for the PRS group ($263) were similar to the usual care comparison group ($234). The preliminary findings indicated that the use of the PRS device was not associated with health care cost savings. ^ In the preliminary cost-effectiveness analysis, use of the personal response system was found to be associated with increased mental health status among elderly clients. The cost-effectiveness evaluation indicated that the associated cost for six months was $710 per unit increase in mental component score when the $150 PRS subscription was included. However, clients with the PRS device were found to have a greater decline in physical health status during the six-month follow-up. The beneficial effect on mental health status was found to be in contrast to negative findings associated with changes in physical health status. The implications for future research relate to the need to identify risk factors among geriatric populations to better target groups that would most likely benefit from PRS Program enrollment. ^
Resumo:
List of Physicians and Surgeons arranged by location, giving post office address with population and location, the School practiced, date and college of graduation, all the existing and extinct medical colleges in North America, with locations, officers, number of professors, lecturers, demonstrators, etc., the various medical societies, penal, reformatory and charitable state institutions, hospitals, sanitariums, dispensaries, asylums and other medical institutions, boards of health, boards of medical examiners, health officers at principal points, the laws of registration and other laws relating to the profession, medical journals with names of editors, frequency of publication and subscription rates, medical libraries, a therapeutic classification of American health resorts, mineral springs, official list of officers of the medical departments of the U.S. Army, Navy and Marine Hospital Service, the U.S. Indian Service, roster of examining surgeons of the U.S. Pension Department, a descriptive sketch of each state, territory and province, embodying such matters as location, boundary, extent in miles and acres, latitude and longitude, statistics relating to climate, temperature, rate of mortality, etc. Full particulars of all national and inter-state associations and societies relating to medicine and surgery, and an INDEX TO THE PHYSICIANS OF THE UNITED STATES. Arranged alphabetically, with the number of the page and column in which the name appears.
Resumo:
List of Physicians and Surgeons arranged by states and provinces, giving post office address with population and location, the School practiced, date and college of graduation, all the existing and extinct medical colleges in the United States and Canada, with locations, officers, number of professors, lecturers, demonstrators, etc., the various medical societies, state prisons, hospitals, sanitariums, dispensaries, asylums and other medical institutions, boards of health, boards of medical examiners, a synopsis of the laws of registration and other laws relating to the profession, medical journals with names of editors, frequency of publication and subscription rates, medical libraries, mineral springs, official list of officers of the medical departments of the U.S. Army, Navy and Marine Hospital Service, roster of examining surgeons of the U.S. Pension Department, a descriptive sketch of each state, territory and province, embodying such matters as location, boundary, extent in miles and acres, latitude and longitude, statistics relating to climate, temperature, rate of mortality, number of deaths from consumption, etc. full particulars of all national associations and societies relating to medicine and surgery, and an INDEX TO THE PHYSICIANS OF THE UNITED STATES. Arranged alphabetically, with the number of the page on which the name appears.
Resumo:
Este estudio tiene como objetivo estimar la influencia del acceso abierto en los patrones de publicación de la comunidad científica argentina en diferentes campos temáticos (Medicina; Física y Astronomía; Agricultura y Ciencias biológicas y Ciencias sociales y Humanidades), a partir del análisis del modelo de acceso de las revistas elegidas para comunicar los resultados de investigación en el período 2008-2010. La producción fue recogida de la base de datos SCOPUS y los modelos de acceso de las revistas determinados a partir de la consulta a las fuentes DOAJ, e-revist@s, SCielo, Redalyc, PubMed, Romeo-Sherpa y Dulcinea. Se analizó la accesibilidad real y potencial de la producción científica nacional por las vías dorada y verde, respectivamente, así como también por suscripción a través de la Biblioteca Electrónica de Ciencia y Tecnología del Ministerio de Ciencia, Tecnología e Innovación Productiva de la Nación Argentina. Los resultados muestran que en promedio, y para el conjunto de las temáticas estudiadas, el 70 de la producción científica argentina visible en SCOPUS se publica en revistas que adhieren de una u otra forma al movimiento de acceso abierto, en una relación del 27 para la vía dorada y del 43 para las que permiten el autoarchivo por la vía verde. Entre el 16 y el 30 (según las áreas temáticas) de los artículos publicados en revistas que permiten el autoarchivo se accede vía suscripción. El porcentaje de revistas sin acceso es del orden del 30 en Ciencias Sociales y Humanidades, y alcanza cerca del 45 en el resto de las áreas. Se concluye que Argentina presenta condiciones muy favorables para liberar un alto porcentaje de la literatura científica generada en el país bajo la modalidad del acceso abierto a través de repositorios institucionales y de mandatos para el auto-archivo, contribuyendo además a incrementar la accesibilidad y la preservación a largo plazo de la producción científica y tecnológica nacional
Resumo:
Este estudio tiene como objetivo estimar la influencia del acceso abierto en los patrones de publicación de la comunidad científica argentina en diferentes campos temáticos (Medicina; Física y Astronomía; Agricultura y Ciencias biológicas y Ciencias sociales y Humanidades), a partir del análisis del modelo de acceso de las revistas elegidas para comunicar los resultados de investigación en el período 2008-2010. La producción fue recogida de la base de datos SCOPUS y los modelos de acceso de las revistas determinados a partir de la consulta a las fuentes DOAJ, e-revist@s, SCielo, Redalyc, PubMed, Romeo-Sherpa y Dulcinea. Se analizó la accesibilidad real y potencial de la producción científica nacional por las vías dorada y verde, respectivamente, así como también por suscripción a través de la Biblioteca Electrónica de Ciencia y Tecnología del Ministerio de Ciencia, Tecnología e Innovación Productiva de la Nación Argentina. Los resultados muestran que en promedio, y para el conjunto de las temáticas estudiadas, el 70 de la producción científica argentina visible en SCOPUS se publica en revistas que adhieren de una u otra forma al movimiento de acceso abierto, en una relación del 27 para la vía dorada y del 43 para las que permiten el autoarchivo por la vía verde. Entre el 16 y el 30 (según las áreas temáticas) de los artículos publicados en revistas que permiten el autoarchivo se accede vía suscripción. El porcentaje de revistas sin acceso es del orden del 30 en Ciencias Sociales y Humanidades, y alcanza cerca del 45 en el resto de las áreas. Se concluye que Argentina presenta condiciones muy favorables para liberar un alto porcentaje de la literatura científica generada en el país bajo la modalidad del acceso abierto a través de repositorios institucionales y de mandatos para el auto-archivo, contribuyendo además a incrementar la accesibilidad y la preservación a largo plazo de la producción científica y tecnológica nacional
Resumo:
IP Multimedia Subsystem (IMS) is considered to provide multimedia services to users through an IP-based control plane. The current IMS service invocation mechanism, however, requires the Serving-Call Session Control Function (S-CSCF) invokes each Application Server (AS) sequentially to perform service subscription pro?le, which results in the heavy load of the S-CSCF and the long session set-up delay. To solve this issue, this paper proposes a linear chained service invocation mechanism to invoke each AS consecutively. By checking all the initial Filter Criteria (iFC) one-time and adding the addresses of all involved ASs to the ?Route? header, this new approach enables multiple services to be invoked as a linear chain during a session. We model the service invocation mechanisms through Jackson networks, which are validated through simulations. The analytic results verify that the linear chained service invocation mechanism can effectively reduce session set-up delay of the service layer and decrease the load level of the S-CSCF