Search results for "Variety"
showing 10 items of 569 documents
Proximal versus distal contextual factors: which impact on meal pleasure and food intake in the elderly living in a nursing home?
2014
Poster présenté lors de la conférence; Introduction: Several authors pointed out the importance of meal context on food intake in nursing home. Some authors assessed the impact of context improvement on food intake in nursing home, but they assessed ‘holistic’ strategies by improving physical environment, increasing choice level, changing staff organization… (Abbott et al. 2013). Despite some of these interventions were effective, these strategies are costly and thus difficult to be implemented in nursing home. The aim of the present experiment was to assess the impact of single contextual factors, three proximal factors (food contextual factors) and three distal factors (non-food contextua…
Breeding annual legumes for sustainable agricultures must target for new and more complex variety ideotypes
2013
International audience; Although yield and total biomass produced by annual legumes remain major objectives for breeders, environment-friendly, resource use efficient including symbiotic performance, resilient production in the context of climate change, adaptation to sustainable cropping systems (reducing leaching and glasshouse gas emissions), adaptation to diverse uses (seeds for feeds foods, non-food, forage or green manures), and finally new ecological services such as pollinator protection, imply the development of innovative genotypes, definition of new ideotypes and acceptance of their commercialisation. Taken as a whole, this means more complex and integrated objectives for breeder…
Remote Attestation of Software and Execution-Environment in Modern Machines
2015
The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…
Human-technology choreographies
2014
Bodily movements have traditionally had mostly instrumental value in interaction design. However, movements can also be given a central role in understanding behaviour and in designing technology for humans. This workshop is aiming at taking a fresh, movement-oriented look at the design and evaluation of technology in a wide variety of contexts.
SaaS architecture and pricing models
2014
In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…
Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices
2014
We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…
Student teachers and their identity construction and awareness of multilingualism: re-visiting three studies
2019
[EN] This article re-visits three studies that originally focused on beliefs about second language (L2) learning and teaching held by student teachers. The studies have been conducted in the same educational context (that is, at a Finnish university). The participants in the studies are majors or minors in English, Swedish, German, etc., and they range from first-year students to fifth-year students about to graduate as qualified L2 teachers. Data have been collected by a variety of means over the past few years (questionnaires, sentence-completion tasks, drawings), and partly longitudinally. The pools of data (verbal and visual) will be re-analysed from the perspective of identity construc…
Orientamento e inclusione: uno studio di caso nelle scuole secondarie palermitane di primo grado
2017
This paper presents the main results of the research work that promoted the design and implementation of training and guidance played in the territory of Palermo during the school years 2013/2014 and 2014/2015 in three secondary schools, with operating procedures, capable of promoting inclusive paths, based on the involvement of students, teachers and parents. The assumption from which we started is that the problems of dispersion and social marginalization can be addressed not only through direct guidance interventions with young people at risk, but also involving adults of reference because we are convinced that this will have, even at a distance of time a significant impact on students. …
Utility of Alternative Effect Size Statistics and the Development of a Web-Based Calculator: Shiny-AESC
2018
Alternative displays of effect size statistics can enhance the understandability and impact of validity evidence in a variety of applied settings. Arguably, the proliferation of alternative effect size statistics has been limited due to the lack of user-friendly tools to create them. Common statistical packages do not readily produce these alternative effect sizes and existing tools are outdated and inaccessible. In this paper, I introduce a free-to-use web-based calculator (https://dczhang.shinyapps.io/expectancyApp/) for generating alternative effect size displays from empirical data. This calculator requires no mathematical or programming expertise, and therefore, is ideal for academics …