Search results for "Database"
showing 10 items of 2136 documents
Customer segmentation based on commitment and ICT use
2009
PurposeThe purpose of this paper is to determine and characterize groups of retail customers, based on their perception of commitment to the retailer and the degree of use of its technological equipment.Design/methodology/approachA CHAID algorithm is performed and differences between the resulting segments are tested through the analysis of variance.FindingsFour segments are obtained that differ significantly in commitment to the retailer and level of use of the store's information and communication technology (ICT) facilities, as well as in other variables related to the retailer‐consumer relationship. In particular, customer segments differ in their use of retailers' payment facilities.Pr…
The Relation Between Stretching Typology and Stretching Duration: The Effects on Range of Motion.
2018
AbstractDifferent stretching strategies and protocols are widely used to improve flexibility or maintain health, acting on the muscle tendon-unit, in order to improve the range of motion (ROM) of the joints. This review aims to evaluate the current body of literature in order to understand the relation between stretching typology and ROM, and secondly to evaluate if a relation exists between stretching volume (either as a single training session, weekly training and weekly frequency) and ROM, after long-term stretching. Twenty-three articles were considered eligible and included in the quantitative synthesis. All stretching typologies showed ROM improvements over a long-term period, however…
Going beyond a conflict of approaches in psychiatric care: the perks of interdisciplinary research
2021
International audience; Our research studied the interactions between mental health care (MHC) professionals and users in French public psychiatry, focusing on the “tools” which professionals use in their interactions with users. We draw a typology of four main "therapeutic styles" in relation to tool use;1- Absence of identifiable tools. Interaction is personalized and improvised. 2- Use of rituals and habits. 3- Use of methods that have otherwise been written and formalized.4- Use of tools, be they written or computerized, protocols guiding the interactions, or strictly standardized tools.The psychologist involved in the research (HH) intends to show how the practice of interdisciplinary …
Reduction of UML Class Diagrams
2002
One and the same “real world” can be modeled by different UML class diagrams, which in such a case can be considered “intuitively equivalent”. A formalization of this “intuitive equivalence” of class diagrams is proposed. An algorithm is constructed that for two class diagrams determines if they model the same “real world”. This algorithm can be used in CASE tools to compare alternative models of a system, and for diagram “compression” to facilitate understanding of large diagrams.
Terminología y traducción económica francés-español: evaluación de recursos terminológicos en el ámbito contable
2014
The aim of this paper is to evaluate a series of terminology resources and determine their suitability to the practice of French-Spanish translation of accounting documents. First we identify the terminology needs of a specific group of translator trainees when facing business translation, as well as the resources they use particularly when translating annual accounts. Then, we select various terminology resources used in this context and evaluate them according to their needs. The results suggest the development of a French-Spanish dictionary of accounting terms adapted to the terminology needs of the practice of translation in this area.
The social and environmental impacts of mining activitieson indigenious communities : the case of Newmont Gold (Gh) limited (Kenyasi) in Ghana
2010
Masteroppgave i development management- Universitetet i Agder 2010 The study explores and assesses mining and its impacts on communities within which mining activities takes place. The focus has been on a mining community in Ghana called Kenyasi where mining is vigorously carried out by an American mining giant, Newmont Mining Corporation. The study investigates the real and latent impacts of mining activities on the community in the light of the numerous promises and prospects that mining is said to provide for communities. Mining for many decades served as an important component of countries‟ revenue source especially for developing countries that have been endowed with the mineral wealth…
Ontonuts: Reusable Semantic Components for Multi-agent Systems
2009
The volumes of data in information systems are growing drastically. The systems become increasingly complex in trying to handle heterogeneity of ubiquitous components, standards, data formats, etc. According to the vision of Autonomic Computing, the complexity can be handled by introducing self-manageable components able to "run themselves." Agent Technology fits this vision, whereas interoperability among autonomic components can be tackled by Semantic Technologies. The problem of efficient heterogeneous data sharing, exchange and reuse within such systems plays a key role. We present an approach of constructing semantic capabilities (self-descriptive functional components) for software ag…
Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine
2005
Legacy systems are information systems that have been developed by means of methods, tools and database management systems that have become obsolete, but they are still being used due to their reliability. As time goes on, the maintenance of this software becomes more complex, expensive and painful. The MOMENT framework supports automatic formal model transformations in MDA. This model transformation approach is based on the algebraic specification of models and benefits from mature term rewriting system technology to perform model transformation using rewriting logic. In this paper, we present how we apply this formal transformation mechanism to recover a legacy relational database, obtain…
Evaluation of a hash-compress-encrypt pipeline for storage system applications
2015
Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.
Olive oil intake and cancer risk: A systematic review and meta-analysis
2022
Background Research evidence has established the beneficial effects of diet in cancer prevention; various epidemiological studies have suggested that olive oil component could play a role in decreasing cancer risk. This systematic review and meta-analysis aims to investigate the association between olive oil consumption, cancer risk and prognosis. Methods A systematic search was conducted in PubMed, EMBASE and Google Scholar databases (end-of-search: May 10, 2020). Pooled relative risk (RR) and 95% confidence intervals (95% CIs) were estimated with random-effects (DerSimonian-Laird) models. Subgroup analyses, sensitivity analyses and meta-regression analysis were also performed. Results 45…