Search results for "550"
showing 10 items of 1192 documents
Determinants of Blockchain Technology Introduction in Organizations: an Empirical Study among Experienced Practitioners
2021
Abstract Blockchain is expected to enable new types of interorganizational relationships, new approaches to governance and new approaches to settlement and clearing processes. Neverthless, although the interest on blockchain is on the rise, there are not many blockchain implementations in organizations and there is limited empirical research investigating the reasons for this. This paper contributes to filling this gap by investigating the following research question: what are the impeding and motivating factors for organizational blockchain adoption? Data were collected through a survey based on pairwise comparisons of key factors identified in the literature. The data collected were analy…
Contextualización iconográfica e intervención en las pinturas murales de la Capilla de la Comunión de la iglesia parroquial de san Nicolás de Bari y …
2018
Microtomographic Quantification of Hydraulic Clay Mineral Displacement Effects During a CO2 Sequestration Experiment with Saline Aquifer Sandstone
2013
We combined a noninvasive tomographic imaging technique with an invasive open-system core-flooding experiment and compared the results of the pre- and postflooded states of an experimental sandstone core sample from an ongoing field trial for carbon dioxide geosequestration. For the experiment, a rock core sample of 80 mL volume was taken from the 629 m Stuttgart Formation storage domain of a saline sandstone aquifer at the CCS research pilot plant Ketzin, Germany. Supercritical carbon dioxide and synthetical brine were injected under in situ reservoir p/T-conditions at an average flow rate of 0.1 mL/min for 256 h. X-ray computed microtomographic imaging was carried out before and after the…
El Terç del Cartoixà de Joan Roís de Corella. Edició i estudi
2016
La tesi doctoral "El Terç del Cartoixà de Joan Roís de Corella. Edició i estudi" fixa el text d'aquest incunable i el compara a doble columna amb el text del qual és deutor, la Vita Christi de Ludolf de Saxònia. La datació de l'obra, entre febrer i març de 1495, i l'atribució a un taller, el de Hagenbach-Hutz a la ciutat de València, es realitza per mitjà de l'anàlisi de dades codicològiques i d'història de la impremta en aquesta ciutat. Aquesta anàlisi permet també situar adequadament el projecte d'edició dels quatre volums que conformen el Cartoixà de Corella a finals del segle XV. La comparació del text català amb el llatí permet descobrir les diferents tècniques usades per l'autor valen…
Intrinsic Acidity of Surface Sites in Calcium Silicate Hydrates and Its Implication to Their Electrokinetic Properties
2014
Calcium Silicate Hydrates (C–S–H) are the major hydration products of portland cement paste. The accurate description of acid–base reactions at the surface of C–S–H particles is essential for both understanding the ion sorption equilibrium in cement and prediction of mechanical properties of the hardened cement paste. Ab initio molecular dynamics simulations at the density functional level of theory were applied to calculate intrinsic acidity constants (pKa’s) of the relevant ≡SiOH and ≡CaOH2 groups on the C–S–H surfaces using a thermodynamic integration technique. Ion sorption equilibrium in C–S–H was modeled applying ab initio calculated pKa’s in titrating Grand Canonical Monte Carlo simu…
Endringskapasitet – en nøkkel for å lykkes med gevinstrealisering i spesialisthelsetjenesten? : En studie av hvordan mellomledere opplever at endring…
2018
Masteroppgave i helse- og sosialinformatikk HSI500 - Universitetet i Agder 2018 Background: If an organisation is to reap the potential benefits of new technology, it must modify its work processes. However, the specialist health service appears to be experiencing significant challenges because it is constantly under pressure to change and improve its efficiency. This can weaken its capacity for change and, at worst, lead to long-term reductions in productivity and efficiency. Purpose: The purpose of this study is to examine how middle managers in the specialist health service feel they can influence developments in change capacity. The aim is to contribute to an awareness of the importance…
Anomaly detection in dynamic systems using weak estimators
2011
Accepted version of an article from the journal: ACM transactions on internet technology. Published version available from the ACM: http://dx.doi.org/10.1145/1993083.1993086 Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “normal” or not. Most state-of-the-art approaches, especially those which belong to the family of parameterized statistical schemes, work under the assumption that the underlying…
An RF-Based Positioning Method for Tracing a Cluster of Moving Scatterers in Non-Stationary Indoor Environments
2021
Author's accepted manuscript © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. This letter presents a novel iterative positioning method for tracing the body segments of a person moving indoors using radio-frequency (RF) signals. The indoor space is equipped with a multiple-input multiple-output (MIMO) communication system. The person is modelled by a cluster of …
Ideal Chaotic Pattern Recognition is achievable: The Ideal-M-AdNN - its design and properties
2013
Published version of a chapter in the book: Transactions on Computational Collective Intelligence XI. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-41776-4_2 This paper deals with the relatively new field of designing a Chaotic Pattern Recognition (PR) system. The benchmark of such a system is the following: First of all, one must be able to train the system with a set of “training” patterns. Subsequently, as long as there is no testing pattern, the system must be chaotic. However, if the system is, thereafter, presented with an unknown testing pattern, the behavior must ideally be as follows. If the testing pattern is not one of the trained patterns, the system …
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
2022
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…