189 resultados para Real-life Projects
Resumo:
This paper proposes a new multi-resource multi-stage mine production timetabling problem for optimising the open-pit drilling, blasting and excavating operations under equipment capacity constraints. The flow process is analysed based on the real-life data from an Australian iron ore mine site. The objective of the model is to maximise the throughput and minimise the total idle times of equipment at each stage. The following comprehensive mining attributes and constraints are considered: types of equipment; operating capacities of equipment; ready times of equipment; speeds of equipment; block-sequence-dependent movement times; equipment-assignment-dependent operational times; etc. The model also provides the availability and usage of equipment units at multiple operational stages such as drilling, blasting and excavating stages. The problem is formulated by mixed integer programming and solved by ILOG-CPLEX optimiser. The proposed model is validated with extensive computational experiments to improve mine production efficiency at the operational level.
Resumo:
This paper explores consumer behavioural patterns on a magazine website. By using a unique dataset of real-life click stream data from 295 magazine website visitors, interesting behavioural patterns are noted: most importantly, 86 % of all sessions only visit the blogs hosted by the magazine. This means that the visitors short-circuit the start page and are not exposed to any editorial content at all, and consequently not to any commercial content on those pages. Sessions visiting editorial content, commercial content or social media links actually represent only one (1) per cent or less of all sessions recorded. Consequently, the online platform gives very limited support for the business model. Our data questions the general assumption that online platforms are key components of a contemporary magazine’s business model.
Resumo:
This paper explores consumer behavioural patterns on a magazine website. By using a unique dataset of real-life click stream data from 295 magazine website visitors, individual sessions are grouped according to the different sections visited on the websites. Interesting behavioural patterns are noted: most importantly, 86 % of all sessions only visit the blogs. This means that the visitors are not exposed to any editorial content at all, and choose to avoid also commercial contents. Sessions visiting editorial content, commercial content or social media links are very few in numbers (each 1 per cent or less of the sessions), thus giving only very limited support to the magazine business model. We noted that consumer behaviour on the magazine website seems to be very goal-oriented and instrumental, rather than exploratory and ritualized. This paper contributes to the current knowledge of media management by shedding light on consumer behaviour on media websites, and opening up the challenges with current media business models. From a more practical perspective, our data questions the general assumption of online platforms as supporter of the print business.
Resumo:
Permissions are special case of deontic effects and play important role compliance. Essentially they are used to determine the obligations or prohibitions to contrary. A formal language e.g., temporal logic, event-calculus et., not able to represent permissions is doomed to be unable to represent most of the real-life legal norms. In this paper we address this issue and extend deontic-event-calculus (DEC) with new predicates for modelling permissions enabling it to elegantly capture the intuition of real-life cases of permissions.
Resumo:
The purpose of this article is to show the applicability and benefits of the techniques of design of experiments as an optimization tool for discrete simulation models. The simulated systems are computational representations of real-life systems; its characteristics include a constant evolution that follows the occurrence of discrete events along the time. In this study, a production system, designed with the business philosophy JIT (Just in Time) is used, which seeks to achieve excellence in organizations through waste reduction in all the operational aspects. The most typical tool of JIT systems is the KANBAN production control that seeks to synchronize demand with flow of materials, minimize work in process, and define production metrics. Using experimental design techniques for stochastic optimization, the impact of the operational factors on the efficiency of the KANBAN / CONWIP simulation model is analyzed. The results show the effectiveness of the integration of experimental design techniques and discrete simulation models in the calculation of the operational parameters. Furthermore, the reliability of the methodologies found was improved with a new statistical consideration.
Resumo:
Existing process mining techniques provide summary views of the overall process performance over a period of time, allowing analysts to identify bottlenecks and associated performance issues. However, these tools are not de- signed to help analysts understand how bottlenecks form and dissolve over time nor how the formation and dissolution of bottlenecks – and associated fluctua- tions in demand and capacity – affect the overall process performance. This paper presents an approach to analyze the evolution of process performance via a notion of Staged Process Flow (SPF). An SPF abstracts a business process as a series of queues corresponding to stages. The paper defines a number of stage character- istics and visualizations that collectively allow process performance evolution to be analyzed from multiple perspectives. The approach has been implemented in the ProM process mining framework. The paper demonstrates the advantages of the SPF approach over state-of-the-art process performance mining tools using two real-life event logs publicly available.
Resumo:
All of Us is a ground-breaking Australian government approved anti-bullying educational resource comprised of seven online videos that feature gender diverse, sexual diverse and intersex youths. The videos, along with unit guides and student handouts, have been designed to address a gap in high school curriculum as they teach not just about sexual diversity and gender diversity but also the values of empathy and respect, which has been demonstrated to improve students’ wellbeing and educational engagement. The resource captures the real life experiences of lesbian, gay, bisexual, transgender and intersex young people through a collection of short videos and teaching activities that are aligned to the Year 7/8 Health and Physical Education learning area of the Australian Curriculum. All Of Us has been developed to have a real impact on student attitudes towards lesbian, gay, bisexual, transgender and intersex people and to encourage whole school change that affirms and supports the right of all students, staff and families to feel safe at school. This free video resource is widely available and allows all schools, regardless of experience, location or funding, the chance to create an environment where every student can learn, every teacher can teach and every family can belong from the beginning of 2016. The resource was launched on Thursday, 26 November 2015 at Treasury Theatre, 1 Macarthur St, Melbourne. The launch was attended by almost 200 people including former Safe Schools Coalition Ambassador Jason Ball, Victorian Commissioner for Gender and Sexuality Ro Allen, Chris Bush, Executive Producer of All Of Us, Micah Scott, CEO of Minus18, All Of Us Margot Fink; Safe Schools Coalition Victoria's Manager Roz Ward and; Sally Richardson, National Program Director of Safe Schools Coalition Australia.
Resumo:
Overprocessing waste occurs in a business process when effort is spent in a way that does not add value to the customer nor to the business. Previous studies have identied a recurrent overprocessing pattern in business processes with so-called "knockout checks", meaning activities that classify a case into "accepted" or "rejected", such that if the case is accepted it proceeds forward, while if rejected, it is cancelled and all work performed in the case is considered unnecessary. Thus, when a knockout check rejects a case, the effort spent in other (previous) checks becomes overprocessing waste. Traditional process redesign methods propose to order knockout checks according to their mean effort and rejection rate. This paper presents a more fine-grained approach where knockout checks are ordered at runtime based on predictive machine learning models. Experiments on two real-life processes show that this predictive approach outperforms traditional methods while incurring minimal runtime overhead.
Resumo:
This paper addresses the following predictive business process monitoring problem: Given the execution trace of an ongoing case,and given a set of traces of historical (completed) cases, predict the most likely outcome of the ongoing case. In this context, a trace refers to a sequence of events with corresponding payloads, where a payload consists of a set of attribute-value pairs. Meanwhile, an outcome refers to a label associated to completed cases, like, for example, a label indicating that a given case completed “on time” (with respect to a given desired duration) or “late”, or a label indicating that a given case led to a customer complaint or not. The paper tackles this problem via a two-phased approach. In the first phase, prefixes of historical cases are encoded using complex symbolic sequences and clustered. In the second phase, a classifier is built for each of the clusters. To predict the outcome of an ongoing case at runtime given its (uncompleted) trace, we select the closest cluster(s) to the trace in question and apply the respective classifier(s), taking into account the Euclidean distance of the trace from the center of the clusters. We consider two families of clustering algorithms – hierarchical clustering and k-medoids – and use random forests for classification. The approach was evaluated on four real-life datasets.
Resumo:
This article presents a method for checking the conformance between an event log capturing the actual execution of a business process, and a model capturing its expected or normative execution. Given a business process model and an event log, the method returns a set of statements in natural language describing the behavior allowed by the process model but not observed in the log and vice versa. The method relies on a unified representation of process models and event logs based on a well-known model of concurrency, namely event structures. Specifically, the problem of conformance checking is approached by folding the input event log into an event structure, unfolding the process model into another event structure, and comparing the two event structures via an error-correcting synchronized product. Each behavioral difference detected in the synchronized product is then verbalized as a natural language statement. An empirical evaluation shows that the proposed method scales up to real-life datasets while producing more concise and higher-level difference descriptions than state-of-the-art conformance checking methods.
Resumo:
Neglect of children is a significant social issue worldwide and is typically the most frequently reported form of maltreatment in Western nations, with its severe forms sometimes resulting in significant illness and disablement or death. Yet, paradoxically, it remains ‘neglected’ and largely in the shadow of physical and sexual abuse, often being viewed as less serious despite the real-life consequences of its insidious and compounding nature and the lasting damage it causes to intergenerational familial relationships and the life outcomes of those affected. This chapter explores the many complex forms of child neglect, its causes and impacts and the strategies to prevent it. In particular, a critical standpoint is taken in analysing the rationale and merits of mandatory reporting of neglect and their effects, systemically and for children.
Resumo:
This paper draws on the theoretical arguments outlined in Hayes (2014) to frame critical analyses of two real life domestic violence narratives. The authors are both academic criminologists and victims/survivors of domestic violence, but within differing contexts – one a conventional heterosexual relationship, the other a female same-sex relationship. Their experiences are intertwined in an extensive collaborative auto-ethnographic analysis that spans seven years of working and socialising together, in which each provided a sounding board and support for the other. The analysis therefore documents two personal journeys. The academic and theoretical are intertwined with the personal and subjective to elicit an evocative and yet empirically validated study. The theoretical underpinnings of romantic love distortion, misogyny and sexism are used to frame these experiences of domestic violence and the differing sexualities of the authors provide a rich context for exploring the ways in which domestic violence victimisation experiences are impacted by gender, sexuality, and heteronormative discourses of love, sex and relationships.
Resumo:
Anticipating the number and identity of bidders has significant influence in many theoretical results of the auction itself and bidders’ bidding behaviour. This is because when a bidder knows in advance which specific bidders are likely competitors, this knowledge gives a company a head start when setting the bid price. However, despite these competitive implications, most previous studies have focused almost entirely on forecasting the number of bidders and only a few authors have dealt with the identity dimension qualitatively. Using a case study with immediate real-life applications, this paper develops a method for estimating every potential bidder’s probability of participating in a future auction as a function of the tender economic size removing the bias caused by the contract size opportunities distribution. This way, a bidder or auctioner will be able to estimate the likelihood of a specific group of key, previously identified bidders in a future tender.
Resumo:
The paper presents initial findings from an Austroads funded project NT1782 Ability to Absorb Information through Electronic and Static Signs. The paper aims to investigate how easily messages displayed on co-located signs can be absorbed, and if drivers can absorb messages and take appropriate action without any adverse impact on the safety and efficiency of driving. Co-location of three types of signs under motorway conditions was investigated: direction signs (DS), variable message signs (VMS) and variable speed limits/lane control signs (VSL/LCS). The authors reviewed global wide practices and research evidence on different types of sign co-locations. It was found that dual co-location of VSL/LCS, VMS and/or DS is a practical arrangement which has been widely practised overseas and in Australia. Triple co-location of VSL/LCS, VMS and DS is also practised overseas but is still new to the Australian driving community. The NT1782 project also employed an advanced driving simulator (ADS) to further investigate the possible impacts of sign co-location on drivers’ responses in an emergency situation and there were no obviously adverse impacts have been identified from the ADS study. The authors consolidated all findings and concluded that although there is no clear evidence showing that triple co-location gives rise to riskier behaviour, this proposition should be viewed with caution. Further evaluation of triple co-location in a real-life setting is called for.
Resumo:
This paper explores the endeavours of five small firms to develop web-based commerce capabilities within their existing operations. The focus is upon the strategic acquisition and exploitation of knowledge which underpins new value creating activates related to web-based commerce. A normative web-based commerce adoption model developed from a review of the extant literature related to electronic marketing, entrepreneurship, and the diffusion of new innovations was empirically tested. A multiple case study design enabled the exploration of contemporary marketing and entrepreneurship issues within the real life context of five small firms. The model aimed to emphasis best-practice adoption methods emphasizing the value of a firm's market orientation and entrepreneurial capabilities. A preliminary test of the model's theoretical contentions lent support to its overall focus, but found that the firm's existing learning capabilities were diminished during the adoption of web-based commerce, and that a lack of vision and prior knowledge produced sub-optimal adoption outcomes.