521 |
Quality of service analysis for distributed multimedia systems in a local area networking environmentChung, Edward Chi-Fai January 1996 (has links)
No description available.
|
522 |
Småföretag och nyttan av att utveckla open source - en fallstudieZalas, Pierre January 2017 (has links)
Open source eller öppen källkod innebär att vem som helst kan se, justera och dela koden. Företag, organisationer och individer investerar såväl tid som resurser att utveckla open source-projekt, där majoriteten av projekten inte genererar någon form av ekonomisk vinning. Pocketsize är en Malmöbaserad webbyrå som har utvecklat ett front-end ramverk vid namn Bolts samt ett automatiseringsverktyg vid namn Toolbelt som avses släppas som open source.Denna studie syftar till att bidra med kunskap om vad det är som driver småföretag, idella organisationer eller individer till investera tid i att utveckla open source-projekt. Därmed har en fallstudie på webbyrån Pocketsize i Malmö gjorts där en analys av ramverket Bolts och verktyget Toolbelt, utvecklat av Pocketsize, har genomförts. Detta för att erhålla kunskap om varför Pocketsize väljer att släppa de open source. Teori och tidigare forskning presenterar aspekter som motiverande faktorer och drivkrafter bakom utveckling av open source-projekt. Studien har har antagit ett kvalitativt perspektiv där observationer och semistrukturerade intervjuer har gjorts för att kartlägga handlingsmönster och för att återge hur en individ tänker och resonerar kring ämnet. Resultatet redogör för hur utvecklare ofta skapar en produkt utifrån sina egna behov samt hur känslan av altruism och att viljan att ”ge tillbaka” till open source-communityt är några av de största motiverande faktorer och drivkrafter bakom att bidra till open source-projekt. / Open source or open source-code means that anyone can view, adjust and share the code. Companies, organizations and individuals invest their time and resources to develop open source projects, where the majority of projects doesn’t even generate any kind of financial gain. Pocketsize is a Malmö based web agency that has developed a front-end framework called Bolts as well as an automation tool called Toolbelt intended to be released as open source.This study aims to contribute knowledge of what drives small businesses, non-profit organizations or individuals to invest time and resources in developing open source projects. Therefore, a case study has been made at the web development agency Pocketsize in Malmö, where an analysis of the Bolts framework and Toolbelt automation tool that Pocketsize has developed has been conducted. In an attempt to understand why Pocketsize chooses to release them as open source. Theory and previous research presents aspects as motivational factors and driving forces behind the development of open source projects. The study has adopted a qualitative perspective where observations and semi structured interviews have been made to map action patterns and to reflect how an individual contemplates on the subject. The result states that developers often create aproduct based on their own needs and how a feeling of altruism and the willingness to “pay it forward” to the open source community are some of the major motivatiors and driving forces behind contributing to open source projects.
|
523 |
The Economic Burden of End-stage Renal Disease in Canada: Present and Future / Economic Burden of End-Stage Renal Disease in CanadaZelmer, Jennifer 02 1900 (has links)
End-stage renal disease (ESRD), or kidney failure, is a serious illness with significant health consequences and high-cost treatment options. Since the early 1980s, the number of Canadians with ESRD has more than quadrupled (CIHI, 2001), leading to questions about the current and future impact of the disease on public health, quality of life, health spending, and patients’ productivity. Using an economic burden of illness approach, this thesis estimates ESRD’s “direct” health care costs and “indirect” costs, such as productivity losses due to premature death and short- and long-term disability. It also projects future results under various alternative assumptions using a multi-state discrete time Markov model. The analysis suggests that, although less than 0.1% of Canadians have ESRD, it generated direct health care costs of $1.3 billion in 2000 or $51,099 per person with ESRD. That compares to $3,183 per capita for Canadians overall (CIHI, 2002b). Adding indirect morbidity and mortality costs brings the total to $1.9 billion. Rising ESRD numbers suggest higher costs in the future. Further analysis explored the effect of various assumptions about drivers of past trends, such as population growth, changes in the age structure, and the prevalence of conditions known to cause ESRD (e.g. diabetes). Projections were most sensitive to assumptions about the rate at which new cases are diagnosed. If current trends continue, the total economic burden of the disease can be expected to reach $7.9 billion by 2015 (year 2000 dollars). On the other hand, if the rate of new cases in 2000 were maintained, the economic burden of illness would be $5.7 billion in 2015. Nevertheless, under this and many other assumptions, there is likely to be a significant gap between available organs for transplant and the demand for transplantation. The likely effects of various options for addressing this gap are also explored. / Thesis / Doctor of Philosophy (PhD)
|
524 |
Usability-Driven Security Enhancements in Person-to-Person CommunicationYadav, Tarun Kumar 01 February 2024 (has links) (PDF)
In the contemporary digital landscape, ensuring secure communication amid widespread data exchange is imperative. This dissertation focuses on enhancing the security and privacy of end-to-end encryption (E2EE) applications while maintaining or improving usability. The dissertation first investigates and proposes improvements in two areas of existing E2EE applications: countering man-in-the-middle and impersonation attacks through automated key verification and studying user perceptions of cryptographic deniability. Insights from privacy-conscious users reveal concerns about the lack of E2EE support, app siloing, and data accessibility by client apps. To address these issues, we propose an innovative user-controlled encryption system, enabling encryption before data reaches the client app. Finally, the dissertation evaluates local threats in the FIDO2 protocol and devises defenses against these risks. Additionally, it explores streamlining FIDO2 authentication management across multiple websites for user convenience and security.
|
525 |
Structured Information Flow (SIF) Framework for Automating End-to-End Information Flow for Large OrganizationsBhatia, Shishir 09 March 2006 (has links)
For almost five decades, since the advent of the first computers for commercial use, the dream of the Paperless Office, a.k.a. total Information flow automation, has eluded the industry. Now, with the emergence of Internet- and Web-based technologies, daily we see examples of organizations like eBay and Amazon that perform their business in a fully automated manner without the use of paper or pen. However, bigger and older organizations that have more complex functions, like government organizations, have not been very successful in harnessing the latest technological innovations to completely automate their Information flow. We propose a Structured Information Flow (SIF) framework that provides the conceptual infrastructure to automate small and big, new and old organizations alike. The ease of the transformation is due to three key features of SIF that set it apart from any other Information flow automation scheme.
First, SIF utilizes the attributes of the organization, such as the existing reporting structure, to model the automated Information flow. The rules governing the flow of Information are based on the hierarchy already in place, for example: A senior can view any Information owned by any of his/her direct subordinates. Second, SIF characterizes external organization entities as a special case of internal organization entities, allowing for seamless integration of the Information flow to and from them. Third, the SIF framework is independent of platform, method, organization, or technology. This gives it a generic nature that makes it applicable as a platform to implement multiple types of automated e-systems such as e-commerce, e-education, e-training, e-governance, etc.
In this body of work, we formally define the SIF framework using state transformation language and a visual representation scheme specifically developed for this purpose. We also define the Information Interfaces, which are the mechanism for implementing rules- and constraint-based Information flow in SIF. / Master of Science
|
526 |
Energy-efficient privacy homomorphic encryption scheme for multi-sensor data in WSNsVerma, Suraj, Pillai, Prashant, Hu, Yim Fun 04 May 2015 (has links)
Yes / The recent advancements in wireless sensor hardware ensures sensing multiple sensor data such as temperature, pressure, humidity, etc. using a single hardware unit, thus defining it as multi-sensor data communication in wireless sensor networks (WSNs). The in-processing technique of data aggregation is crucial in energy-efficient WSNs; however, with the requirement of end-to-end data confidentiality it may prove to be a challenge. End-to-end data confidentiality along with data aggregation is possible with the implementation of a special type of encryption scheme called privacy homomorphic (PH) encryption schemes. This paper proposes an optimized PH encryption scheme for WSN integrated networks handling multi-sensor data. The proposed scheme ensures light-weight payloads, significant energy and bandwidth consumption along with lower latencies. The performance analysis of the proposed scheme is presented in this paper with respect to the existing scheme. The working principle of the multi-sensor data framework is also presented in this paper along with the appropriate packet structures and process. It can be concluded that the scheme proves to decrease the payload size by 56.86% and spend an average energy of 8-18 mJ at the aggregator node for sensor nodes varying from 10-50 thereby ensuring scalability of the WSN unlike the existing scheme.
|
527 |
Usuário da Busca Informatizada: Avaliação do Curso MEDLINE/LILACS no Contexto Acadêmico / End-user searching: considerations for CD-ROM MEDLINE / LILACS databases course in the academic context.Cuenca, Angela Maria Belloni 09 December 1997 (has links)
Objetivo: Avaliar os resultados da capacitação de usuários de buscas informatizadas, através do Curso de Acesso às Bases em CD-ROM MEDLINE e LILACS, modalidade do Programa Educativo da Biblioteca da Faculdade de Saúde Publica da USP, oferecido a docentes e alunos da pós-graduação em saúde pública. Método: Questionário estruturado enviado aos 92 participantes dos Cursos, no período de 1993 e 1995. Resultados: Os resultados mostraram que após a participação no Curso 65,2% deles conseguiram autonomia no acesso às bases de dados, 15,2% solicitaram buscas intermediadas pelo bibliotecário, e 19,6% não realizaram forma alguma de busca nas bases da Biblioteca. O usuário que busca esse tipo de capacitação é principalmente o aluno de cursos de pós-graduação (79,3%), com formação básica na área de ciências biológicas (81,5%), para suas atividades acadêmicas (79,4%), com o objetivo de buscar autonomia no acesso à informação (72,8%). A intermediação dos bibliotecários foi solicitada por motivos como: pouca familiaridade com as bases, dificuldade em lidar com tecnologia, confiança na busca realizada pelo bibliotecário e falta de tempo para busca, evidenciando a necessidade do usuário contar também com os serviços de busca realizado pelo bibliotecário, confirmada por 79,4% dos participantes do Curso. O Curso também foi avaliado quanto ao seu conteúdo, estrutura, metodologia, material didático e demais aspectos específicos à organização de capacitação desse nível. Conclusão: O Curso MEDLINE/LILACS está atendendo às necessidades dos usuários das buscas informatizadas, porém a Biblioteca deve ter o compromisso de mantê-lo pois quanto mais tecnologia a Biblioteca disponibiliza, maior é o seu compromisso em capacitar seu usuário. / This study analyses the results of end-user instruction through the databases modulated course in CD-ROM MEDLINE / LILACS, modality of the Library of the School of Public Health of University of S.Paulo Educational Program, offered to health sciences scientists and postgraduate students. It uses a mailed questionnaire which was answered by 66% of the 140 course participants between November/1993 and November/1995. The whole of the category studied was 92 end-users. The results demonstrate that former students, who have done researches in the Library, managed, in most cases (65,2%), to acquire autonomy in using databases, some of them (15,2%) requested librarians interventions, and some of them (19,6%) didn´t use the databases of the Public Health Library, during this period. It determines the end-user searching profile and it shows that the course is mainly looked for by the postgraduate students (79,3%), health area (81,5%), for their academic activities (79,4%) and by those who look for information access autonomy (72,8%) when they decide to participate in such courses. The users who do intermediary searching, appear to use an intermediary mainly for reasons such as: the lack of information technology, lack of familiarity with databases, reliability in the searches made by librarians and, lack of time for searching. The results demonstrate that 79,4% of end-users would like to do both end-user searching and intermediary searching. This study also analyses the Course contents, structure, methodology and didactic materials. This paper gets to the conclusion that end-users, in the whole, consider to be more important that the Library maintains this course and this kind of information user continuous educational program. This survey findings suggests other evaluations to be held to check the end-users performance.
|
528 |
Estudo experimental de técnicas de dupla inervação muscular em ratos / Experimental study of double muscle innervation technique in ratsNepomuceno, André Coelho 16 August 2017 (has links)
A contração muscular gerada por impulsos elétricos provenientes de duas fontes nervosas distintas pode ser alternativa no tratamento de lesões do plexo braquial e na paralisia facial. O objetivo desta tese foi avaliar e comparar diferentes técnicas de reinervação dupla com a técnica de reinervação única do músculo gastrocnêmio em ratos. Cinquenta ratos Wistar adultos, após terem seu nervo fibular direito seccionado, foram divididos em cinco grupos com relação ao procedimento realizado no nervo tibial: controle (C); seccionado (S); neurorrafia término-terminal (TT); neurorrafia primária associada à transferência nervosa fibular para tibial de maneira término-lateral (TL); e neurorrafia término-terminal convergente entre os cotos proximais dos nervos tibial e fibular com o coto distal do nervo tibial (TTC). Os resultados foram avaliados 12 semanas após o experimento por meio do teste da marcha, eletromiografia, índice de massa do músculo gastrocnêmio e contagem axonal no coto distal do nervo tibial. Os grupos de reinervação dupla (TL e TTC) revelaram maiores resultados funcionais (p < 0,05) em relação ao grupo de reinervação única (TT). O grupo TTC apresentou maior amplitude (p=0,006) e maior latência (p=0,041) do que o grupo TT. Em relação ao índice de massa muscular, não houve diferença entre os grupos de reinervação (p > 0,705). A análise histológica revelou maior densidade axonal no grupo TTC em relação ao grupo TT (p=0,001) e ao grupo TL (p=0,002). Ambas técnicas de dupla reinervação revelaram recuperação funcional do músculo gastrocnêmio mais precoce e maior quando comparadas à técnica de reinervação única (TT). Os animais do grupo TTC apresentaram maior número de axônios regenerados no coto distal do nervo tibial do que os do grupo TT e TL / Muscle contraction generated by electrical impulses simultaneously originating from two different neural sources may be an interesting treatment alternative for facial palsy and brachial plexus injury. The purpose of this thesis was to evaluate and compare distinct double reinnervation techniques with single reinnervation technique of gastrocnemius muscle in rats. Fifty adult Wistar rats underwent transection of their right peroneal nerve and were divided into five groups related to tibial nerve procedure: the control group (C), tibial nerve section group (S), tibial nerve end-to-end neurorrhaphy (EE) group, tibial nerve primary repair associated with end-to-side peroneal-to-tibial nerve transfer (ES) group, and tibial nerve repair by convergent end-to-end neurorrhaphy between the proximal stumps of the tibial and peroneal nerves to the distal stump of the tibial nerve (CEE) group. The outcomes were assessed 12 weeks after the experiment by use of a walking track, electromyography, gastrocnemius muscle mass index, and histomorphometric analysis of the distal tibial nerve. The double reinnervation groups (ES and CEE) showed greater functional recovery (p < 0.05) than the single reinnervation group (EE). The CEE group showed greater amplitude (p=0.006) and higher latency (p=0.041) than the EE group. There was no difference in the muscle mass index among the reinnervation groups (p > 0.705). Histologic analysis revealed greater axonal density in the CEE group than EE group (p=0.001) and ES group (p=0.002). The double reinnervation techniques showed earlier and greater functional recovery of the gastrocnemius muscle than did the single reinnervation technique. The CEE group showed a higher number of regenerated axons in the distal tibial nerve stump
|
529 |
Family Caregivers' Perspectives on Establishing Hospice Care in BelizeBattle, Rachael Florita 01 January 2019 (has links)
End-of-life (EOL) care decisions present a challenge for family caregivers. Despite the increasing number of terminally ill patients in need of pain management and comfort care, there is limited qualitative data about how populations in the developing world can access culturally appropriate resources and EOL support. In this phenomenological study, 17 Garifuna family caregivers in southern Belize were interviewed about their experience caring for terminally family members. The conceptual frameworks were Kübler-Ross’s hospice approach and Watson’s theory of human caring. The two theories were selected based on their significance to this process: Kübler Ross’s hospice approach and its impact on the family system during the end stage of life and Watson’s theory of human caring for its emphasis on the impact of the importance of meeting the basic needs of individuals. NVivo 12 was used to code and generate themes for further analysis. Caregivers who said they would not utilize support outside of the home were those who were committed not do so at the request of the patient. Caregivers who cared for their family member and those who could financially afford to hire caregivers in their home to assist with their relative said they would not utilize nonfamily support. All others, regardless of relationship to the patient, indicated they would have accepted care if the environment were safe, caring, and culturally sensitive. Additionally, the caregivers saw their needs as secondary and insignificant compared to the comfort and care of the patient. This study may contribute to positive social change by revealing strategies and services that could be included in the design of a health services delivery system to meet the needs of individuals facing EOL decisions.
|
530 |
System Support for End-to-End Performance ManagementAgarwala, Sandip 09 July 2007 (has links)
This dissertation introduces, implements, and evaluates the novel concept of
"Service Paths", which are system-level abstractions that capture and describe
the dynamic dependencies between the different components of a distributed
enterprise application. Service paths are dynamic because they capture the
natural interactions between application services dynamically composed to offer
some desired end user functionality. Service paths are distributed because such
sets of services run on networked machines in distributed enterprise data
centers. Service paths cross multiple levels of abstraction because they link
end user application components like web browsers with system services like
http providing communications with embedded services like hardware-supported
data encryption. Service paths are system-level abstractions that are created
without end user, application, or middleware input, but despite these facts,
they are able to capture application-relevant performance metrics, including
end-to-end latencies for client requests and the contributions to these
latencies from application-level processes and from software/hardware resources
like protocol stacks or network devices.
Beyond conceiving of service paths and demonstrating their utility, this thesis
makes three concrete technical contributions. First, we propose a set of signal
analysis techniques called ``E2Eprof' that identify the service paths taken
by different request classes across a distributed IT infrastructure and
the time spent in each such path. It uses a novel algorithm called ``pathmap'
that computes the correlation between the message arrival and departure
timestamps at each participating node and detect dependencies among them. A
second contribution is a system-level monitoring toolkit called ``SysProf',
which captures monitoring information at different levels of granularity,
ranging from tracking the system-level activities triggered by a single system
call, to capturing the client-server interactions associated with a service
paths, to characterizing the server resources consumed by sets of clients or
client behaviors.
The third contribution of the thesis is a publish-subscribe based monitoring
data delivery framework called ``QMON'. QMON offers high levels of
predictability for service delivery and supports utility-aware monitoring
while also able to differentiate between different levels of service
for monitoring, corresponding to the different classes of SLAs maintained for
applications.
|
Page generated in 0.0319 seconds