789 resultados para systematic mapping study
Resumo:
Context: Web services have been gaining popularity due to the success of service oriented architecture and cloud computing. Web services offer tremendous opportunity for service developers to publish their services and applications over the boundaries of the organization or company. However, to fully exploit these opportunities it is necessary to find efficient discovery mechanism thus, Web services discovering mechanism has attracted a considerable attention in Semantic Web research, however, there have been no literature surveys that systematically map the present research result thus overall impact of these research efforts and level of maturity of their results are still unclear. This thesis aims at providing an overview of the current state of research into Web services discovering mechanism using systematic mapping. The work is based on the papers published 2004 to 2013, and attempts to elaborate various aspects of the analyzed literature including classifying them in terms of the architecture, frameworks and methods used for web services discovery mechanism. Objective: The objective if this work is to summarize the current knowledge that is available as regards to Web service discovery mechanisms as well as to systematically identify and analyze the current published research works in order to identify different approaches presented. Method: A systematic mapping study has been employed to assess the various Web Services discovery approaches presented in the literature. Systematic mapping studies are useful for categorizing and summarizing the level of maturity research area. Results: The result indicates that there are numerous approaches that are consistently being researched and published in this field. In terms of where these researches are published, conferences are major contributing publishing arena as 48% of the selected papers were conference published papers illustrating the level of maturity of the research topic. Additionally selected 52 papers are categorized into two broad segments namely functional and non-functional based approaches taking into consideration architectural aspects and information retrieval approaches, semantic matching, syntactic matching, behavior based matching as well as QOS and other constraints.
Resumo:
The goal of this study was to explore and understand the definition of technical debt. Technical debt refers to situation in a software development, where shortcuts or workarounds are taken in technical decision. However, the original definition has been applied to other parts of software development and it is currently difficult to define technical debt. We used mapping study process as a research methodology to collect literature related to the research topic. We collected 159 papers that referred to original definition of technical debt, which were retrieved from scientific literature databases to conduct the search process. We retrieved 107 definitions that were split into keywords. The keyword map is one of the main results of this work. Apart from that, resulting synonyms and different types of technical debt were analyzed and added to the map as branches. Overall, 33 keywords or phrases, 6 synonyms and 17 types of technical debt were distinguished.
Resumo:
This thesis presented the overview of Open Data research area, quantity of evidence and establishes the research evidence based on the Systematic Mapping Study (SMS). There are 621 such publications were identified published between years 2005 and 2014, but only 243 were selected in the review process. This thesis highlights the implications of Open Data principals’ proliferation in the emerging era of the accessibility, reusability and sustainability of data transparency. The findings of mapping study are described in quantitative and qualitative measurement based on the organization affiliation, countries, year of publications, research method, star rating and units of analysis identified. Furthermore, units of analysis were categorized by development lifecycle, linked open data, type of data, technical platforms, organizations, ontology and semantic, adoption and awareness, intermediaries, security and privacy and supply of data which are important component to provide a quality open data applications and services. The results of the mapping study help the organizations (such as academia, government and industries), re-searchers and software developers to understand the existing trend of open data, latest research development and the demand of future research. In addition, the proposed conceptual framework of Open Data research can be adopted and expanded to strengthen and improved current open data applications.
Resumo:
Business-to-business terminology is relatively new as a business concept, so is the enterprise resource planning system in information technology. Research, implementation and integration of these two concept has been observed for last two decades in this paper. One of the major success point for growth in business-to-business environment is the availability of internal and partner data. Enterprise resource planning system facilitates storing, analysis of such data and enables different business process automation, forecasting and numerous value creating activity. In order to achieve such functionality for B2B customers, integrating them within ERP is very useful. This paper aims at understanding and suggesting such integration through investigating related documentation of similar integration scenarios, infrastructure, models and architectures. The investigation of the topic of this paper has been made using systematic mapping study of related papers and listing and suggesting necessary ingredients that enables such integration. Furthermore, this paper also suggests possibilities to overcome challenges integration experts might face during the integration phase and opens doors to future research scope in the related fields.
Resumo:
Abstract?Background: There is no globally accepted open source software development process to define how open source software is developed in practice. A process description is important for coordinating all the software development activities involving both people and technology. Aim: The research question that this study sets out to answer is: What activities do open source software process models contain? The activity groups on which it focuses are Concept Exploration, Software Requirements, Design, Maintenance and Evaluation. Method: We conduct a systematic mapping study (SMS). A SMS is a form of systematic literature review that aims to identify and classify available research papers concerning a particular issue. Results: We located a total of 29 primary studies, which we categorized by the open source software project that they examine and by activity types (Concept Exploration, Software Requirements, Design, Maintenance and Evaluation). The activities present in most of the open source software development processes were Execute Tests and Conduct Reviews, which belong to the Evaluation activities group. Maintenance is the only group that has primary studies addressing all the activities that it contains. Conclusions: The primary studies located by the SMS are the starting point for analyzing the open source software development process and proposing a process model for this community. The papers in our paper pool that describe a specific open source software project provide more regarding our research question than the papers that talk about open source software development without referring to a specific open source software project.
Resumo:
Context: Empirical Software Engineering (ESE) replication researchers need to store and manipulate experimental data for several purposes, in particular analysis and reporting. Current research needs call for sharing and preservation of experimental data as well. In a previous work, we analyzed Replication Data Management (RDM) needs. A novel concept, called Experimental Ecosystem, was proposed to solve current deficiencies in RDM approaches. The empirical ecosystem provides replication researchers with a common framework that integrates transparently local heterogeneous data sources. A typical situation where the Empirical Ecosystem is applicable, is when several members of a research group, or several research groups collaborating together, need to share and access each other experimental results. However, to be able to apply the Empirical Ecosystem concept and deliver all promised benefits, it is necessary to analyze the software architectures and tools that can properly support it.
Resumo:
Sentinel lymph node (SLN) detection techniques have the potential to change the standard of surgical care for patients with prostate cancer. We performed a lymphatic mapping study and determined the value of fluorescence SLN detection with indocyanine green (ICG) for the detection of lymph node metastases in intermediate- and high-risk patients undergoing radical prostatectomy and extended pelvic lymph node dissection. A total of 42 patients received systematic or specific ICG injections into the prostate base, the midportion, the apex, the left lobe, or the right lobe. We found (1) that external and internal iliac regions encompass the majority of SLNs, (2) that common iliac regions contain up to 22% of all SLNs, (3) that a prostatic lobe can drain into the contralateral group of pelvic lymph nodes, and (4) that the fossa of Marcille also receives significant drainage. Among the 12 patients who received systematic ICG injections, 5 (42%) had a total of 29 lymph node metastases. Of these, 16 nodes were ICG positive, yielding 55% sensitivity. The complex drainage pattern of the prostate and the low sensitivity of ICG for the detection of lymph node metastases reported in our study highlight the difficulties related to the implementation of SNL techniques in prostate cancer. PATIENT SUMMARY There is controversy about how extensive lymph node dissection (LND) should be during prostatectomy. We investigated the lymphatic drainage of the prostate and whether sentinel node fluorescence techniques would be useful to detect node metastases. We found that the drainage pattern is complex and that the sentinel node technique is not able to replace extended pelvic LND.
Resumo:
The Na,K-ATPase is a major ion-motive ATPase of the P-type family responsible for many aspects of cellular homeostasis. To determine the structure of the pathway for cations across the transmembrane portion of the Na,K-ATPase, we mutated 24 residues of the fourth transmembrane segment into cysteine and studied their function and accessibility by exposure to the sulfhydryl reagent 2-aminoethyl-methanethiosulfonate. Accessibility was also examined after treatment with palytoxin, which transforms the Na,K-pump into a cation channel. Of the 24 tested cysteine mutants, seven had no or a much reduced transport function. In particular cysteine mutants of the highly conserved "PEG" motif had a strongly reduced activity. However, most of the non-functional mutants could still be transformed by palytoxin as well as all of the functional mutants. Accessibility, determined as a 2-aminoethyl-methanethiosulfonate-induced reduction of the transport activity or as inhibition of the membrane conductance after palytoxin treatment, was observed for the following positions: Phe(323), Ile(322), Gly(326), Ala(330), Pro(333), Glu(334), and Gly(335). In accordance with a structural model of the Na,K-ATPase obtained by homology modeling with the two published structures of sarcoplasmic and endoplasmic reticulum calcium ATPase (Protein Data Bank codes 1EUL and 1IWO), the results suggest the presence of a cation pathway along the side of the fourth transmembrane segment that faces the space between transmembrane segments 5 and 6. The phenylalanine residue in position 323 has a critical position at the outer mouth of the cation pathway. The residues thought to form the cation binding site II ((333)PEGL) are also part of the accessible wall of the cation pathway opened by palytoxin through the Na,K-pump.
Resumo:
This is a study concerned with community based services aimed at smokers living on a low income and/or black and minority ethnic groups.
Resumo:
Pantomimes of object use require accurate representations of movements and a selection of the most task-relevant gestures. Prominent models of praxis, corroborated by functional neuroimaging studies, predict a critical role for left parietal cortices in pantomime and advance that these areas store representations of tool use. In contrast, lesion data points to the involvement of left inferior frontal areas, suggesting that defective selection of movement features is the cause of pantomime errors. We conducted a large-scale voxel-based lesion-symptom mapping analyses with configural/spatial (CS) and body-part-as-object (BPO) pantomime errors of 150 left and right brain-damaged patients. Our results confirm the left hemisphere dominance in pantomime. Both types of error were associated with damage to left inferior frontal regions in tumor and stroke patients. While CS pantomime errors were associated with left temporoparietal lesions in both stroke and tumor patients, these errors appeared less associated with parietal areas in stroke than in tumor patients and less associated with temporal in tumor than stroke patients. BPO errors were associated with left inferior frontal lesions in both tumor and stroke patients. Collectively, our results reveal a left intrahemispheric dissociation for various aspects of pantomime, but with an unspecific role for inferior frontal regions.
Resumo:
The production of object and action words can be dissociated in aphasics, yet their anatomical correlates have been difficult to distinguish in functional imaging studies. To investigate the extent to which the cortical neural networks underlying object- and action-naming processing overlap, we performed electrostimulation mapping (ESM), which is a neurosurgical mapping technique routinely used to examine language function during brain-tumor resections. Forty-one right-handed patients who had surgery for a brain tumor were asked to perform overt naming of object and action pictures under stimulation. Overall, 73 out of the 633 stimulated cortical sites (11.5%) were associated with stimulation-induced language interferences. These interference sites were very much localized (<1 cm(2) ), and showed substantial variability across individuals in their exact localization. Stimulation interfered with both object and action naming over 44 sites, whereas it specifically interfered with object naming over 19 sites and with action naming over 10 sites. Specific object-naming sites were mainly identified in Broca's area (Brodmann area 44/45) and the temporal cortex, whereas action-naming specific sites were mainly identified in the posterior midfrontal gyrus (Brodmann area 6/9) and Broca's area (P = 0.003 by the Fisher's exact test). The anatomical loci we emphasized are in line with a cortical distinction between objects and actions based on conceptual/semantic features, so the prefrontal/premotor cortex would preferentially support sensorimotor contingencies associated with actions, whereas the temporal cortex would preferentially underpin (functional) properties of objects. Hum Brain Mapp 35:429-443, 2014. © 2012 Wiley Periodicals, Inc.
Resumo:
Quaternary stratigraphy of the Kerala coast and the genetic aspects of the sediments are discussed. The age of limeshells, and peaty sediments determined by radio carbon dating have been used for reconstruction of sea level changes. Evolution of red sands occurring in some parts of the coastal tract of Kerala is also discussed, based on textural parameters and quartz grain morphology.
Resumo:
A new system for the generation of hydrodynamic modulated voltammetry (HMV) is presented. This system consists of an oscillating jet produced through the mechanical vibration of a large diaphragm. The structure of the cell is such that a relatively small vibration is transferred to a large fluid flow at the jet outlet. Positioning of an electrode (Pt, 0.5 mm or 25 mu m diameter) over the exit of this jet enables the detection of the modulated flow of liquid. While this flow creates modest mass transfer rates (time averaged similar to 0.015 cm s(-1)) it can also be used to create a HMV system where a 'lock-in' approach is adopted to investigate the redox chemistry in question. This is demonstrated for the Fe(CN)(6)(3-/4-) redox system. Here 'lock-in' to the modulated hydrodynamic signal is achieved through the deployment of bespoke software. The apparatus and procedure is shown to produce a simple and efficient way to obtain the desired signal. In addition the spatial variation of the HMV signal, phase correction and time averaged current with respect to the jet orifice is presented. (C) 2008 Elsevier B.V. All rights reserved.
Resumo:
The aim of this study was to identify candidate genes and genomic regions associated with ultrasound-derived measurements of the rib-eye area (REA), backfat thickness (BFT) and rumpfat thickness (RFT) in Nellore cattle. Data from 640 Nellore steers and young bulls with genotypes for 290 863 single nucleotide polymorphisms (SNPs) were used for genomewide association mapping. Significant SNP associations were explored to find possible candidate genes related to physiological processes. Several of the significant markers detected were mapped onto functional candidate genes including ARFGAP3, CLSTN2 and DPYD for REA; OSBPL3 and SUDS3 for BFT; and RARRES1 and VEPH1 for RFT. The physiological pathway related to lipid metabolism (CLSTN2, OSBPL3, RARRES1 and VEPH1) was identified. The significant markers within previously reported QTLs reinforce the importance of the genomic regions, and the other loci offer candidate genes that have not been related to carcass traits in previous investigations.
Resumo:
Access control is a key component of security in any computer system. In the last two decades, the research on Role Basead Access Control Models was intense. One of the most important components of a Role Based Model is the Role-Permission Relationship. In this paper, the technique of systematic mapping is used to identify, extract and analyze many approaches applied to establish the Role-Permission Relationship. The main goal of this mapping is pointing directions of significant research in the area of Role Based Access Control Models.