264 resultados para Software maintenance
Resumo:
It is debated that for sustainable STEM education and knowledge investment, human centered learning design approach is critical and important. Sustainability in this context is enduring maintenance of technological trajectories for productive economical and social interactions by demonstrating life critical scenarios through life critical system development and life experiences. Technology influences way of life and the learning and teaching process. Social software application development is more than learning of how to program a software application and extracting information from the Internet. Hence, our research challenge is, how do we attract learners to STEM social software application development? Our realisation processes begin with comparing Science and Technology education in developed (e.g., Australia) and developing (e.g., Sri Lanka) countries with distinction on final year undergraduates’ industry ready training programmes. Principal components analysis was performed to separate patterns of important factors. To measure behavioural intention of perceived usefulness and attitudes of the training, the measurement model was analysed to test its validity and reliability using partial least square (PLS) analysis of structural equation modelling (SEM). Our observation is that the relationship is more complex than we argue for. Our initial conclusions were that life critical system development and life experience trajectories as determinant factors while technological influences were unavoidable. A further investigation should involve correlations between human centered learning design approach and economical development in the long run.
Resumo:
QUT Software Finder is a searchable repository of metadata describing software and source code, which has been created as a result of QUT research activities. It was launched in December 2013. https://researchdatafinder.qut.edu.au/scf The registry was designed to aid the discovery and visibility of QUT research outputs and encourage sharing and re-use of code and software throughout the research community, both nationally and internationally. The repository platform used is VIVO (an open source product initially developed at Cornell University). QUT Software Finder records that describe software or code are connected to information about researchers involved, the research groups, related publications and related projects. Links to where the software or code can be accessed from are also provided alongside licencing and re-use information.
Computation of ECG signal features using MCMC modelling in software and FPGA reconfigurable hardware
Resumo:
Computational optimisation of clinically important electrocardiogram signal features, within a single heart beat, using a Markov-chain Monte Carlo (MCMC) method is undertaken. A detailed, efficient data-driven software implementation of an MCMC algorithm has been shown. Initially software parallelisation is explored and has been shown that despite the large amount of model parameter inter-dependency that parallelisation is possible. Also, an initial reconfigurable hardware approach is explored for future applicability to real-time computation on a portable ECG device, under continuous extended use.
Resumo:
Even when no baseline data are available, the impacts of 150 years of livestock grazing on natural grasslands can be assessed using a combined approach of grazing manipulation and regional-scale assessment of the flora. Here, we demonstrate the efficacy of this method across 18 sites in the semidesert Mitchell grasslands of northeastern Australia. Fifteen-year-old exclosures (ungrazed and macropod grazed) revealed that the dominant perennial grasses in the genus Astrebla do not respond negatively to grazing disturbance typical of commercial pastoralism. Neutral, positive, intermediate, and negative responses to grazing disturbance were recorded amongst plant species with no single life-form group associated with any response type. Only one exotic species, Cenchrus ciliaris, was recorded at low frequency. The strongest negative response was from a native annual grass, Chionachne hubbardiana, an example of a species that is highly sensitive to grazing disturbance. Herbarium records revealed only scant evidence that species with a negative response to grazing have declined through the period of commercial pastoralism. A regional analysis identified 14 from a total of 433 plant species in the regional flora that may be rare and potentially threatened by grazing disturbance. However, a targeted survey precluded grazing as a cause of decline for seven of these based on low palatability and positive responses to grazing and other disturbance. Our findings suggest that livestock grazing of semidesert grasslands with a short evolutionary history of ungulate grazing has altered plant composition, but has not caused declines in the dominant perennial grasses or in species richness as predicted by the preceding literature. The biggest impact of commercial pastoralism is the spread of woody leguminous trees that can transform grassland to thorny shrubland. The conservation of plant biodiversity is largely compatible with commercial pastoralism provided these woody weeds are controlled, but reserves strategically positioned within water remote areas are necessary to protect grazing-sensitive species. This study demonstrates that a combination of experimental studies and regional surveys can be used to understand anthropogenic impacts on natural ecosystems where reference habitat is not available.
Resumo:
language (such as C++ and Java). The model used allows to insert watermarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watermarking schemes were presented and their security discussed.
Resumo:
A significant number of privatizations utilized to operate and maintain critical networked infrastructures have failed to meet contractual expectations and the expectations of the community. The author carried out empirical research ex-ploring four urban water systems. This research revealed that of the four forms of privatization the alliance form was particularly suited to the stewardship of an ur-ban water system. The question then is whether these findings from urban water can be generalised to O&M of infrastructure generally. The answer is increasingly important as governments seek financial sustainability through reapplying the contestability strategy and outsource and privatise further services and activities. This paper first examines the issues encountered with O & M privatisations. Second the findings as to the stewardship achieved by the four case study water systems are unpacked with particular focus upon the alliance form. Third the key variables which were found to have distinct causal links to the stewardship-like behaviour of the private participants in the Alliance case study are described. Fourth the variables which may be crucial to the successful application of the alliance form to the broader range of infrastructures are separated out. Fifth this paper then sets the path for research into these crucial features of the alliance form.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
The preventive maintenance of traction equipment for Very High Speed Trains (VHST) nowadays is becoming very expensive owing to the high complexity and quality of these components that require high reliability. An efficient maintenance approach like the Condition-Based Maintenance (CBM) should be implemented to reduce the costs. For this purpose, an experimental full-scale test rig for the CBM of VHST traction equipment has been designed to investigate in detail failures in the main mechanical components of system, i.e. motor, bearings and gearbox. The paper describes the main characteristics of this unique test rig, able to reproduce accurately the train operating conditions, including the relative movements of the motor, the gearbox and the wheel axle. Gearbox, bearing seats and motor are equipped by accelerometers, thermocouples, torque meter and other sensors in different positions. The testing results give important information about the most suitable sensor position and type to be installed for each component and show the effectiveness of the techniques used for the signal analysis in order to identify faults of the gearbox and motor bearings.
Resumo:
Abstract - Enterprise Resource Planning (ERP) software has become the dominant strategic platform for supporting enterprise-wide business processes. However, single vendor ERP software systems have been criticised for not meeting specific organisation and industry requirements. An alternative approach ‘Best of Breed (BoB)’, integrates components of software from multiple standard package vendors, and in some cases custom components. The objective is to develop enterprise systems that are more closely aligned with the requirements of an organisation. Although this approach may not be common at present it is likely to grow in importance due to business needs and technology advances such as the componentisation of ERP software. A case study analysis of a BoB implementation at a global entertainment's company is used as a platform for the discussion of the issues associated with this strategy and a comparison is made with the single vendor ERP alternative. The analysis centres on the complexity of implementation, the differences in the levels of functionality and business fit and the maintenance requirements.
Resumo:
With increased consolidation and a few large vendors dominating the market, how can software vendors distinguish themselves in order to maintain profitability and gain market share? Increasingly customers are becoming more proactive in selecting a vendor and a product, drawing upon various publications, market surveys, mailing lists, and, of course, other users. In particular, though, a company's Web site is the obvious place to begin information gathering. In sum, it may seem that the days of the uninformed customer prepared to be "sold to" are potentially all but gone.
Resumo:
The adoption of packaged software is becoming increasingly common in a variety of organizations and much of the packaged software literature presents this as a straightforward, linear process based on rationalistic evaluation. This paper applies the framework of power relations developed by Markus and Bjørn-‐Anderson (1987) to a longitudinal study concerning the adoption of a customer relationship management package in a small organization. This is used to highlight both overt and covert power issues within the selection and procurement of the product and illustrate the interplay of power between senior management, IT managers, IT vendors and consultants, and end-‐users. The paper contributes to the growing body of literature on packaged software and also to our understanding of how power is deeply embedded within the surrounding processes.
Resumo:
Purpose – This paper seeks to analyse the process of packaged software selection in a small organization, focussing particularly on the role of IT consultants as intermediaries in the process. Design/methodology/approach – This is based upon a longitudinal, qualitative field study concerning the adoption of a customer relationship management package in an SME management consultancy. Findings – The authors illustrate how the process of “salesmanship”, an activity directed by the vendor/consultant and focussed on the interests of senior management, marginalises user needs and ultimately secures the procurement of the software package. Research limitations/implications – Despite the best intentions the authors lose something of the rich detail of the lived experience of technology in presenting the case study as a linear narrative. Specifically, the authors have been unable to do justice to the complexity of the multifarious ways in which individual perceptions of the project were influenced and shaped by the opinions of others. Practical implications – Practitioners, particularly those from within SMEs, should be made aware of the ways in which external parties may have a vested interest in steering projects in a particular direction, which may not necessarily align with their own interests. Originality/value – This study highlights in detail the role of consultants and vendors in software selection processes, an area which has received minimal attention to date. Prior work in this area emphasises the necessary conditions for, and positive outcomes of, appointing external parties in an SME context, with only limited attention being paid to the potential problems such engagements may bring.
Resumo:
As organisations increasingly engage in the selection, purchase, and adoption of packaged software products, how these activities are carried out in practice becomes increasingly relevant for researchers and practitioners. Our focus in this paper is to propose a framework for understanding the packaged software selection process. The functionalist literature on this area of study suggests a number of generic recommendations, which are based on rational assumptions about the process and view the decision making that takes place as producing the “best technology solution.’” To explore this, we conducted a longitudinal, in-depth study of packaged software selection in a small organisation. For interpretation of the case, we draw upon the Social Construction of Technology, a theoretical framework arguing that technology is socially constituted and regarding the process of development as contradictory and uncertain. We offer a number of contributions. First, we further our understanding of packaged software selection with the critique that we offer of the functionalist literature, drawing insights from the emerging critical/constructivist literature and expanding our domain of interest to encompass the wider environment. Second, we weave this together with our experiences in the field, drawing on social constructivism for theoretical support, to develop a framework of packaged software selection that shows how various actors shape the process.
Resumo:
Customer Relationship Management (CRM) packaged software has become a key contributor to attempts at aligning business and IT strategies in recent years. Throughout the 1990s there was, in many organisations strategies, a shift from the need to manage transactions and toward relationship management. Where Enterprise Resource Planning packages dominated the management of transactions era, CRM packages lead in regard to relationships. At present, balanced views of CRM packages are scantly presented instead relying on vendor rhetoric. This paper uses case study research to analyse some of the issues associated with CRM packages. These issues include the limitations of CRM packages, the need for a relationship orientation and the problems of a dominant management perspective of CRM. It is suggested that these issues could be more readily accommodated by organisational detachment from beliefs in IT as utopia, consideration of prior IS theory and practice and a more informed approach to CRM package selection.