Beyond Requirements Dictator: How Agile Helped a Business Analyst Discover Her Real Value

2013 ◽  
Author(s):  
Diane Zajac-Woodie
Keyword(s):  
2006 ◽  
Vol 45 (01) ◽  
pp. 57-61
Author(s):  
M. Puille ◽  
D. Steiner ◽  
R. Bauer ◽  
R. Klett

Summary Aim: Multiple procedures for the quantification of activity leakage in radiation synovectomy of the knee joint have been described in the literature. We compared these procedures considering the real conditions of dispersion and absorption using a corpse phantom. Methods: We simulated different distributions of the activity in the knee joint and a different extra-articular spread into the inguinal lymph nodes. The activity was measured with a gammacamera. Activity leakage was calculated by measuring the retention in the knee joint only using an anterior view, using the geometric mean of anterior and posterior views, or using the sum of anterior and posterior views. The same procedures were used to quantify the activity leakage by measuring the activity spread into the inguinal lymph nodes. In addition, the influence of scattered rays was evaluated. Results: For several procedures we found an excellent association with the real activity leakage, shown by an r² between 0.97 and 0.98. When the real value of the leakage is needed, e. g. in dosimetric studies, simultaneously measuring of knee activity and activity in the inguinal lymph nodes in anterior and posterior views and calculation of the geometric mean with exclusion of the scatter rays was found to be the procedure of choice. Conclusion: When measuring of activity leakage is used for dosimetric calculations, the above-described procedure should be used. When the real value of the leakage is not necessary, e. g. for comparing different therapeutic modalities, several of the procedures can be considered as being equivalent.


Author(s):  
D. M. Nazarov ◽  
A. D. Nazarov

The article is a description of the Power Query technology training methodology implemented within the framework of the Federal State Educational Standard for Higher Education 3++ taking into account professional standards in the direction of the bachelor’s program “Business Informatics”. The authors propose a set of laboratory works in the form of situational tasks and cases that allow to create professional competencies and labor functions of a future specialist (business analyst) as part of the development of the ETL process for processing data using Power Query technology. The use of situational tasks and cases allows to effectively implement the development of a set of professional competencies, which are elements of generalized labor functions, without tying the material in question specifically to any discipline. As part of the implementation of situational tasks and cases described in the article, bachelors not only learn to use the basic elements of Power Query technology, but also gain the skills and abilities associated with the application of the studied technology in performing standard professional tasks stipulated by a professional standard. The format for describing the methodology is presented in the form of the traditional “Key-by-Key” technology, widely used in obtaining professional IT competencies.


2011 ◽  
Vol 30 (1) ◽  
pp. 130-133 ◽  
Author(s):  
Chun-di Zheng ◽  
Da-zheng Feng ◽  
Yi Zhou ◽  
Ge Lei
Keyword(s):  

2012 ◽  
Author(s):  
Stacey E. Jacobsen ◽  
Irina Stefanescu ◽  
Xiaoyun Yu
Keyword(s):  
The Real ◽  

Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1005
Author(s):  
Rakan A. Alsowail ◽  
Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.


1964 ◽  
Vol 37 (5) ◽  
pp. 1245-1298 ◽  
Author(s):  
F. A. Heckman

Abstract Although the microstructure of carbon black has been under investigation for more than fifty years, there are still many aspects which are controversial and some which are virtually unexplored. The inherently low degree of crystallinity and the finely-divided state of carbon blacks have greatly hindered efforts to understand them. The purpose of this article is to cite the principal contributors to our understanding of carbon black microstructure, to discuss the significance of their contribution, to present a clear picture of the present state of our knowledge, and to note areas where controversy exists and where our knowledge is incomplete. The scope of this article is necessarily limited to a reasonably complete treatment of the several aspects of carbon black microstructure; that is, the arrangement of carbon atoms to form graphite layer planes, the arrangement of layer planes to form crystallites, and the arrangement of crystallites to form the more familiar carbon black “particles” or aggregates. Particular attention is paid to more recent articles and those which have shaped our thinking on carbon black microstructure. This article also includes a fairly complete review of various studies on the changes in microstructure which are brought about by heat treatment or oxidation. In general, the rather large number of studies reporting on the microstructure of other forms of carbon have not been reviewed (except for the work of Franklin whose contribution to our understanding of carbon-black microstructure is so immense that it must be included). Although gross, morphological features such as particle size, primary aggregate size and shape are studied briefly in order to relate them to microstructure, no effort was made to review comprehensively the body of literature pertinent to this subject. Also porosity and surface characteristics per se (as measured by gas adsorption techniques) are not treated in detail here. Rather than review a dreary list of papers which have only the slightest bearing on carbon black, the author has taken the liberty of dividing the articles reviewed into two categories. The first category, which is reviewed in some detail, includes those publications in which an important contribution was made to the understanding of carbon-black microstructure. The second category includes all those articles which are discussed only briefly or not at all because the authors have reported superficial or routine studies or they (probably unknown to them) have essentially duplicated the work of an earlier worker, or have reported uncorrected results which are thus so inaccurate as to be without real value to this article; or because they comprise work which is only peripherally related to carbon black microstructure. Also, references taken from other papers, but not reviewed here, are included in the latter category. Articles by Warren, Hofmann and Wilm, Steward and Cook and Walker contain bibliographies which will be helpful to those interested in the earlier work or in the microstructure of carbons other than carbon black. For the reader whose time is limited, an adequate picture of current understanding of carbon black microstructure can be gained by reading Sections II, IV, and V which are relatively short. Finally, a word about the spirit in which the review was written. At the request of the late Dr. Craig, a critical review was prepared in which every effort was made to point out shortcomings as well as classic contributions contained in the pertinent literature. Where the experts have disagreed, the reviewer, often with skill unequal to the task, has attempted to decide which one was the more correct in the light of current knowledge. It is with deep humility and great respect for those who have gone before that this review is submitted.


2012 ◽  
Vol 13 (3) ◽  
pp. 10-14
Author(s):  
Jason Sokoloff ◽  
Amanda Hedrick
Keyword(s):  

Author(s):  
Qiwen Sun ◽  
Feng Jiao ◽  
Jianshe Yu

AbstractThe periodic transcription output is ubiquitously observed in an isogenic cell population. To understand mechanisms of cyclic behavior in transcription, we extend the gene activation process in the two-state model by assuming that the synthesis rate is periodic. We derive the analytical forms of the mean transcript level and the noise. The limits of them indicate that the mean level and the noise display periodic behaviors. Numerical examples strongly suggest that the transcription system with a periodic synthesis rate generates more noise than that with a constant rate but maintains transcription homeostasis in each period. It is also suggested that if the periodicity is not considered, the calculated noise may be greater than the real value.


Sign in / Sign up

Export Citation Format

Share Document