312 resultados para Legacy object oriented code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

While changes in work and employment practices in the mining sector have been profound, the literature addressing mining work is somewhat partial as it focuses primarily on the workplace as the key (or only) site of analysis, leaving the relationship between mining work and families and communities under-theorized. This article adopts a spatially oriented, case-study approach to the sudden closure of the Ravensthorpe nickel mine in the south-west of Western Australia to explore the interplay between the new scales and mobilities of labour and capital and work–family–community connections in mining. In the context of the dramatically reconfigured industrial arena of mining work, the study contributes to a theoretical engagement between employment relations and the spatial dimensions of family and community in resource-affected communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Complexity is a major concern which is aimed to be overcome by people through modeling. One way of reducing complexity is separation of concerns, e.g. separation of business process from applications. One sort of concerns are cross-cutting concerns i.e. concerns which are scattered and tangled through one of several models. In business process management, examples of such concerns are security and privacy policies. To deal with these cross-cutting concerns, the aspect orientated approach was introduced in the software development area and recently also in the business process management area. The work presented in this paper elaborates on aspect oriented process modelling. It extends earlier work by defining a mechanism for capturing multiple concerns and specifying a precedence order according to which they should be handled in a process. A formal syntax of the notation is presented precisely capturing the extended concepts and mechanisms. Finally, the relevant of the approach is demonstrated through a case study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While frontline employees (FLEs) are known to bend the rules or act in non-conforming ways for customers, the phenomenon of FLEs over-servicing customers is not well understood. This paper proposes a behavioural concept termed customer-oriented deviance (COD) and a conceptual model of its key drivers. Using a qualitative study involving 22 in-depth interviews with FLEs, the analysis reveals three categories of COD behaviours: deviant service adaptation (DSA), deviant service communication (DSC), and deviant use of resources (DUR). The drivers of COD are categorised as individual (risk-taking, service aptitude, and pro-social moral values), situational (resource availability, social capita with customers, legitimacy of customer problems, and avoidance of hassles), and organisational (unconducive service climate and anticipated rewards). This paper contributes to understanding how and why FLEs over-service customers and extends current research by exploring multiple categories of behaviours within a services marketing context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transit oriented developments (TODs) are master planned communities constructed to reduce the dependence on the private car and promote the modes of transport such as public transport, walking and cycling, which are presumed by many transport professionals to be more sustainable. This paper tests this assumption that TOD is a more sustainable form of development than traditional development, with respect to travel demand, by conducting travel surveys for a case study TOD and comparing the travel characteristics of TOD residents with the travel characteristics of residents of Brisbane, Australia who live in non TOD suburbs. The results of a household comparison showed that the Kelvin Grove Urban Village (KGUV) households had slightly smaller household size, lower vehicle and bicycle ownership compared to Brisbane Statistical Division (BSD), Brisbane’s inner north and inner south suburbs. The comparison of average trip characteristics showed that on an average KGUV residents undertook fewer trips on the given travel day (2.6 trips/person) compared to BSD (3.1 trips/person), Brisbane Inner North Suburbs (BINS) (3.6 trips/person) and Brisbane Inner South Suburbs (BISS) (3.5 trips/person) residents. The mode share comparison indicated that KGUV residents used more public transport and made more walk-only trips in comparison to BSD, BINS and BISS residents. Overall, 72.4 percent of KGUV residents used a sustainable mode of transport for their travel on a typical weekday. On the other hand, only 17.4 percent, 22.2 percent and 24.4 percent residents of BSD, BINS and BISS used sustainable modes of transport for this travel. The results of trip length comparison showed that overall KGUV residents have smaller average trip lengths as compared to its counterparts. KGUV & BINS residents used car for travelling farther and used public transport for accessing destinations located closer to their homes. On the contrary, BSD and BISS residents exhibited an opposite trend. These results support the transportation claims of many transport professionals that TODs are more transport efficient and therefore more sustainable in this respect.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

TOD: - A fully planned, mixed use development equipped with good quality transit service and infrastructure for walking and cycling Hypothesis: -TOD will help to reduce urban transport congestion Method: -Comparison of a TOD with non TOD urban environments -Residents’ trip characteristics

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of Trusted Platform Module (TPM) is be- coming increasingly popular in many security sys- tems. To access objects protected by TPM (such as cryptographic keys), several cryptographic proto- cols, such as the Object Specific Authorization Pro- tocol (OSAP), can be used. Given the sensitivity and the importance of those objects protected by TPM, the security of this protocol is vital. Formal meth- ods allow a precise and complete analysis of crypto- graphic protocols such that their security properties can be asserted with high assurance. Unfortunately, formal verification of these protocols are limited, de- spite the abundance of formal tools that one can use. In this paper, we demonstrate the use of Coloured Petri Nets (CPN) - a type of formal technique, to formally model the OSAP. Using this model, we then verify the authentication property of this protocol us- ing the state space analysis technique. The results of analysis demonstrates that as reported by Chen and Ryan the authentication property of OSAP can be violated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present paper presents and discusses the use of dierent codes regarding the numerical simulation of a radial-in ow turbine. A radial-in ow turbine test case was selected from published literature [1] and commercial codes (Fluent and CFX) were used to perform the steady-state numerical simulations. An in-house compressible- ow simulation code, Eilmer3 [2] was also adapted in order to make it suitable to perform turbomachinery simulations and preliminary results are presented and discussed. The code itself as well as its adaptation, comprising the addition of terms for the rotating frame of reference, programmable boundary conditions for periodic boundaries and a mixing plane interface between the rotating and non-rotating blocks are also discussed. Several cases with dierent orders of complexity in terms of geometry were considered and the results were compared across the dierent codes. The agreement between these results and published data is also discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Leadership writing has tended to present a positive picture about leadership practice yet, in recent times, researchers have highlighted the ‘dark side’ of leadership. In this exploratory conceptual paper, we juxtapose two contrasting forms of leadership: narcissistic leadership and service-oriented leadership (that draws heavily upon servant leadership) in order to provide a better understanding of both of these forms. In particular, we explore four core constructs of leadership: service, power, role of followers, and morality, to provide a constrast. Given that little empirical works exists on narcissistic and servant leadership in educational contexts, the paper concludes by arguing for further research in the field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article suggests that the issue of proportionality in anti-doping sanctions has been inconsistently dealt with by the Court of Arbitration for Sport (CAS). Given CAS’s pre-eminent role in interpreting and applying the World Anti-Doping Code under the anti-doping policies of its signatories, an inconsistent approach to the application of the proportionality principle will cause difficulties for domestic anti-doping tribunals seeking guidance as to the appropriateness of their doping sanctions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with the unsupervised learning of object representations by fusing visual and motor information. The problem is posed for a mobile robot that develops its representations as it incrementally gathers data. The scenario is problematic as the robot only has limited information at each time step with which it must generate and update its representations. Object representations are refined as multiple instances of sensory data are presented; however, it is uncertain whether two data instances are synonymous with the same object. This process can easily diverge from stability. The premise of the presented work is that a robot's motor information instigates successful generation of visual representations. An understanding of self-motion enables a prediction to be made before performing an action, resulting in a stronger belief of data association. The system is implemented as a data-driven partially observable semi-Markov decision process. Object representations are formed as the process's hidden states and are coordinated with motor commands through state transitions. Experiments show the prediction process is essential in enabling the unsupervised learning method to converge to a solution - improving precision and recall over using sensory data alone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Image representations derived from simplified models of the primary visual cortex (V1), such as HOG and SIFT, elicit good performance in a myriad of visual classification tasks including object recognition/detection, pedestrian detection and facial expression classification. A central question in the vision, learning and neuroscience communities regards why these architectures perform so well. In this paper, we offer a unique perspective to this question by subsuming the role of V1-inspired features directly within a linear support vector machine (SVM). We demonstrate that a specific class of such features in conjunction with a linear SVM can be reinterpreted as inducing a weighted margin on the Kronecker basis expansion of an image. This new viewpoint on the role of V1-inspired features allows us to answer fundamental questions on the uniqueness and redundancies of these features, and offer substantial improvements in terms of computational and storage efficiency.