A largely recognised fact is that knowledge creates the base for innovations in technology development. This means that enterprises need to adopt the newest technology knowledge in order to develop and create new innovations. This research is based on the assumption that technology knowledge transfer should be executed according to a plan based on need recognition in order to enable open innovation processes between higher education institutions and industry. In this paper, the two types of open innovation processes are modelled. The models are described and evaluated with case examples. The models are based on the research and innovation projects carried out with university and enterprise partners during the last seven years. The projects have varied from technology evaluating projects executed mainly by the students to targeted open innovation projects conducted by the researchers. In the paper, e.g. the processes and models are illustrated with case examples. The paper models technology transfer processes that have been created combined with targeted innovation processes and have been executed in practice. Comparisons between cases will be done, best practices will be pointed and filtering of explicit knowledge based on our tacit knowledge will be explained. Writers assume that partnerships based on trust will be one significant method to identify drivers towards targeted open innovation. As the main outcome of this research, two models of open innovation processes between a university and industry are modelled and evaluated. In the paper also, this modelling with the help of technology knowledge transfer process is presented. The open innovation process modelled and called innovation targeting participatory research process can be used by universities and enterprises which aim for open innovation process where university has an important role as a knowledge and technology source
Purpose – Cognitive self-rehabilitation lacks updated means and tools. The purpose of this paper is to evaluate the effect of cognitively simulating mobile games on the cognitive skills and recreation of older people with memory impairment. Design/methodology/approach – Mobile games that require cognitive skills were developed. The games were tested by memory-impaired older adults, average age of 90. Gaming interventions took place for three months on a daily basis. Game outcomes were automatically recorded and user feedback was collected by interviews. The progress of the testees was also evaluated by means of Trial Making Test A. Findings – Improvement in game scores was found. Other significant effects of game play were enhanced recreation and self-managed activity level. Game play did not have any effect on the traditional Trail Making Test results but the results of the Trail Making game showed improvement. The Trail Making game also showed a large variance in daily scores, which implies that performing just a single Trail Making Test might lead to misreading a person's condition. Research limitations/implications – The results are an encouragement for conducting further testing (on a larger test group, over a longer time) and continuing with game development for cognitively impaired older adults. A similar game trial will also be arranged for a younger population with better overall health condition. Practical implications – New business opportunities are also possible in game development and gaming services. Social implications – Games have the potential for self-rehabilitation and to support extending independent living at home. Originality/value – The paper provides a synopsis of novel cognitive recreation tools, an analysis of their effect and user feedback from professional staff as well as potential new ideas for game developers.
Abstract. Dafny [2] is a programming language and program verifier. The language is type-safe and sequential, and it includes common imperative features, dynamic object allocation, and inductive datatypes. It also includes specification constructs like pre-and postconditions, which let a programmer record the intended behavior of the program along with the executable code that is supposed to cause that behavior. Because the Dafny verifier runs continuously in the background, the consistency of a program and its specifications is always enforced.Dafny has been used to verify a number of challenging algorithms, including Schorr-Waite graph marking, Floyd's "tortoise and hare" cycle-detection algorithm, and snapshotable trees with iterators. Dafny is also being used in teaching and it was a popular choice in the VSTTE 2012 program verification competition. Its open-source implementation has also been used as a foundation for other verification tools.In this tutorial, I will give a taste of how to use Dafny in program development. This will include an overview of Dafny, basics of writing specifications, how to debug verification attempts, how to formulate and prove lemmas, and some newer features for staged program development.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.