155,541 research outputs found

    Simplifying knowledge creation and access for end-users on the SW

    No full text
    In this position paper, we argue that improved mechanisms for knowledge acquisition and access on the semantic web (SW) will be necessary before it will be adopted widely by end-users. In particular, we propose an investigation surrounding improved languages for knowledge exchange, better UI mechanisms for interaction, and potential help from user modeling to enable accurate, efficient, SW knowledge modeling for everyone

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Meson-exchange Model for πN\pi N scattering and ÎłN−>πN\gamma N -> \pi N reaction

    Full text link
    An effective Hamiltonian consisting of bare Δ↔πN\Delta \leftrightarrow\pi N, ÎłN\gamma N vertex interactions and energy-independent meson-exchange πN↔πN,ÎłN\pi N \leftrightarrow \pi N, \gamma N transition operators is derived by applying a unitary transformation to a model Lagrangian with N,Δ,πN,\Delta,\pi, ρ\rho, ω\omega, and Îł\gamma fields. With appropraite phenomenological form factors and coupling constants for ρ\rho and Δ\Delta, the model can give a good description of πN\pi N scattering phase shifts up to the Δ\Delta excitation energy region. It is shown that the best reproduction of the recent LEGS data of the photon-asymmetry ratios in Îłp→π0p\gamma p \rightarrow \pi ^0 p reactions provides rather restricted constraints on the coupling strengths GEG_E of the electric E2E2 and GMG_M of the magnetic M1M1 transitions of the bare Δ↔γN\Delta \leftrightarrow \gamma N vertex and the less well-determined coupling constant gωNNg_{\omega NN} of ω\omega meson. Within the ranges that GM=1.9±0.05G_M = 1.9 \pm 0.05, GE=0.0±0.025G_E = 0.0 \pm 0.025, and 7≀gωNN≀10.57 \leq g_{\omega NN}\leq 10.5, the predicted differential cross sections and photon-asymmetry ratios are in an overall good agreement with the data of Îłp→π0p\gamma p \rightarrow \pi ^0 p, Îłp→π+n\gamma p \rightarrow \pi ^+ n, and Îłn→π−p\gamma n\rightarrow \pi ^- p reactions from 180 MeV to the Δ\Delta excitation region. The predicted M1+M_{1^+} and E1+E_{1^+} multipole amplitudes are also in good agreement with the empirical values determined by the amplitude analyses. The constructed effective Hamiltonian is free of the nucleon renormlization problem and hence is suitable for nuclear many-body calculations. We have also shown that the assumptions made in the KK-matrix method, commonly used in extracting empirically the ÎłN→Δ\gamma N \rightarrow \Delta transition amplitudes from the data, are consistent withComment: 49 pages + 23 Figures, Revte

    Toward Semantics-aware Representation of Digital Business Processes

    Get PDF
    An extended enterprise (EE) can be described by a set of models each representing a specific aspect of the EE. Aspects can for example be the process flow or the value description. However, different models are done by different people, which may use different terminology, which prevents relating the models. Therefore, we propose a framework consisting of process flow and value aspects and in addition a static domain model with structural and relational components. Further, we outline the usage of the static domain model to enable relating the different aspects

    Ship product modelling

    Get PDF
    This paper is a fundamental review of ship product modeling techniques with a focus on determining the state of the art, to identify any shortcomings and propose future directions. The review addresses ship product data representations, product modeling techniques and integration issues, and life phase issues. The most significant development has been the construction of the ship Standard for the Exchange of Product Data (STEP) application protocols. However, difficulty has been observed with respect to the general uptake of the standards, in particular with the application to legacy systems, often resulting in embellishments to the standards and limiting the ability to further exchange the product data. The EXPRESS modeling language is increasingly being superseded by the extensible mark-up language (XML) as a method to map the STEP data, due to its wider support throughout the information technology industry and its more obvious structure and hierarchy. The associated XML files are, however, larger than those produced using the EXPRESS language and make further demands on the already considerable storage required for the ship product model. Seamless integration between legacy applications appears to be difficult to achieve using the current technologies, which often rely on manual interaction for the translation of files. The paper concludes with a discussion of future directions that aim to either solve or alleviate these issues

    Nitric Oxide Is Involved in Heavy Ion-Induced Non-Targeted Effects in Human Fibroblasts

    Get PDF
    Previously, we investigated the dose response for chromosomal aberration (CA) for exposures corresponding to less than one particle traversal per cell nucleus by high energy and charge (HZE) particles, and showed that the dose responses for simple exchanges for human fibroblast irradiated under confluent culture conditions were best fit by non-linear models motivated by a non-targeted effect (NTE). Our results suggested that the simple exchanges in normal human fibroblasts have an important NTE contribution at low particle fluence. Nitric oxide (NO) has been reported as a candidate for intercellular signaling for NTE in many studies. In order to estimate the contribution of NTE components in induced CA, we measured CA with and without an NO scavenger in normal skin fibroblasts cells after exposure to 600 MeV/u and 1 GeV/u 56Fe ions, less than one direct particle traversal per cell nucleus. Yields of CA were significantly lower in fibroblasts exposed to the NO scavenger compared to controls, suggesting involvement of NO in cell signaling for induction of CA. Media transferred from irradiated cells induced CA in non-irradiated cells, and this effect was abrogated with NO scavengers. Our results strongly support the importance of NTE contributions in the formation of CA at low-particle fluence in fibroblasts. View Full-Tex
    • 

    corecore