877 resultados para User acceptance


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2015

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper shows how a high level matrix programming language may be used to perform Monte Carlo simulation, bootstrapping, estimation by maximum likelihood and GMM, and kernel regression in parallel on symmetric multiprocessor computers or clusters of workstations. The implementation of parallelization is done in a way such that an investigator may use the programs without any knowledge of parallel programming. A bootable CD that allows rapid creation of a cluster for parallel computing is introduced. Examples show that parallelization can lead to important reductions in computational time. Detailed discussion of how the Monte Carlo problem was parallelized is included as an example for learning to write parallel programs for Octave.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At present, Spain faces one of the key moments in planning the future design of the infrastructure network. As a consequence of the critical role played by haulage in intra-European trade, the most important investments are those that guarantee that road haulage traffic can move freely at the borders. That is why it is necessary to make serious evaluations of the economic and social profitability of these investments. Normally the most significant social benefit of investment projects in transport infrastructure is time saving, which in turn changes traffic intensity. In this article we analyse the changes in the user excess caused by public investment in transport infrastructure planned by the Spanish government and which will be located on the border between Spain and France. In particular, we study the increase in network user surplus for HGV traffic in the Spanish and French border zones in the Pyrenees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The acceptance of new queens in ant colonies has profound effects on colony kin structure and inclusive fitness of workers. Therefore, it is important to study the recognition and discrimination behaviour of workers towards reproductive individuals entering established colonies. We examined the acceptance rate of queens in populations of the highly polygynous ant F. paralugubris, where the genetic differentiation among nests and discrimination ability among workers suggest that workers might reject foreign queens. We experimentally introduced young queens in their natal nest and in foreign nests. Surprisingly, the survival rate of mated queens did not differ significantly when introduced in a foreign male-producing nest, a foreign female-producing nest, or the natal nest. Moreover, the survival of virgin queens in their natal nest was twice the one of mated queens, suggesting that mating status plays an important role for acceptance. The results indicate that other factors than queen discrimination by workers are implicated in the limited long-distance gene flow between nests in these populations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The user guide describes how to undertake an assessment using the nursing needs assessment tool.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While mobile technologies can provide great personalized services for mobile users, they also threaten their privacy. Such personalization-privacy paradox are particularly salient for context aware technology based mobile applications where user's behaviors, movement and habits can be associated with a consumer's personal identity. In this thesis, I studied the privacy issues in the mobile context, particularly focus on an adaptive privacy management system design for context-aware mobile devices, and explore the role of personalization and control over user's personal data. This allowed me to make multiple contributions, both theoretical and practical. In the theoretical world, I propose and prototype an adaptive Single-Sign On solution that use user's context information to protect user's private information for smartphone. To validate this solution, I first proved that user's context is a unique user identifier and context awareness technology can increase user's perceived ease of use of the system and service provider's authentication security. I then followed a design science research paradigm and implemented this solution into a mobile application called "Privacy Manager". I evaluated the utility by several focus group interviews, and overall the proposed solution fulfilled the expected function and users expressed their intentions to use this application. To better understand the personalization-privacy paradox, I built on the theoretical foundations of privacy calculus and technology acceptance model to conceptualize the theory of users' mobile privacy management. I also examined the role of personalization and control ability on my model and how these two elements interact with privacy calculus and mobile technology model. In the practical realm, this thesis contributes to the understanding of the tradeoff between the benefit of personalized services and user's privacy concerns it may cause. By pointing out new opportunities to rethink how user's context information can protect private data, it also suggests new elements for privacy related business models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This case study introduces our continuous work to enhance the virtual classroom in order to provide faculty and students with an environment open to their needs, compliant with learning standards and, therefore compatible with other e-learning environments, and based on open source software. The result is a modulable, sustainable and interoperable learning environment that can be adapted to different teaching and learning situations by incorporating the LMS integrated tools as well as wikis, blogs, forums and Moodle activities among others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Department of Health of the Government of Andalusia provides professionals of the Andalusian Public Health Care System a collaborative working environment (Entorno colaborativo de trabajo [ECT]) based on the principles of web 2.0. The ECT is organized into communities, understood as sets of people with a common interest who share a space with its own information and collaboration tools. This space is managed and powered autonomously by the communities themselves. This paper analyzes the use and degree of implementation of the ECT, considering the user communities and activity statistics in 2009 and 2010. From the data obtained we deduce that instrumental services have easier acceptance than collaboration and knowledge management services; content generation is focused on a small number of users; and communities associated with organizational units have less development than those associated with work areas or projects.