394 resultados para Service-oriented computing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Travel surveys were conducted for collecting data related to school students’ travel at Kelvin Grove Urban Village (KGUV). Currently, KGUV has school students studying at grade 10 to 12. As a part of data collection process, travel surveys were undertaken for school students studying. This document contains the questionnaire form used to collect the demographic and travel data related to school students at KGUV. The surveys forms were hand delivered to the school and the responses were collected back via reply paid envelop provided with the questionnaire form.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impact their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Governments around the world are increasingly investing in information and communications technology (ICT) as a means of improving service delivery to citizens. Government ICT adoption is also being driven by a desire to streamline information accessibility and information flows within government - both between different levels of government and between different departments at the same level. Increasing the availability of information internally and to citizens has clear and compelling benefits but it also carries risks that must be carefully managed. This talk will examine the implications of such E-government initiatives for a range of compliance obligations, with a focus on information privacy. It will review recent developments in the area of systems-based enforcement of privacy policies and the particular privacy challenges presented by the aggregation of geospatial information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ‘Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the testbed is to study the effectiveness of different DDoS mitigation strategies and to allow for the testing of defense appliances. Experiments are saved and edited in XML as abstract descriptions of an attack/defense strategy that is only mapped to real resources at run-time. It also provides a web-application portal interface that can start, stop and monitor an attack remotely. Rather than monitoring a service under attack indirectly, by observing traffic and general system parameters, monitoring of the target application is performed directly in real time via a customised SNMP agent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

If the student wellbeing pedagogy characterised by the troika metaphor is to become more widely adopted, beginning teachers need to be inducted into service learning. In this chapter, we discuss the implementation and outcomes of a service learning program in a Bachelor of Education course in Australia. The program provides pre-service teachers with insights into service learning practice. Pre-service teachers are given supported opportunities to examine and challenge traditional beliefs and values about student diversity and the role of schools in developing a more inclusive society. They are supported in developing ethics of care and concern for inclusive and equitable practices – characteristics necessary for quality teaching. Thus, the Queensland University of Technology (QUT) service learning program is an ideal example of the troika effect in practice, in that the pedagogy fuses values education, quality teaching and service learning to develop within each student an inclusive ethical framework that will inform their classroom practice as beginning quality teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The holistic conception of the troika, as described in the first chapter, centres on the relationship between the implicit and explicit teaching of values the nurturing of the specific dimensions of quality teaching and the opportunity to ‘walk the talk’ of the values education program through aspects such as practical citizenship (Lovat, Toomey, Clement, Crotty & Nielsen, 2009). It is proposed in this chapter that the conception can be realized through the embedding of Philosophy in the Classroom within pre-service teaching programs. The troika, a Russian sleigh with three horses, only function well when there is complete synergy and balance between all Classroom is a scaffold for ensuring that all three elements of the troika, namely, quality teaching, values education and service learning in the form of education for citizenship, exist within the classroom to achieve an optimal learning, growth and wellbeing for all students. For this to be more widely accomplished Philosophy in the Classroom and discusses how it constitutes a successful synergy and balance of the troika for effective teaching. It then proposes how it might be embedded into pre-service teacher education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In an open railway access market, the Infrastructure Provider (IP), upon the receipts of service bids from the Train Service Providers (TSPs), assigns track access rights according to its own business objectives and the merits of the bids; and produces the train service timetable through negotiations. In practice, IP chooses to negotiate with the TSPs one by one in such a sequence that IP optimizes its objectives. The TSP bids are usually very complicated, containing a large number of parameters in different natures. It is a difficult task even for an expert to give a priority sequence for negotiations from the contents of the bids. This study proposes the application of fuzzy ranking method to compare and prioritize the TSP bids in order to produce a negotiation sequence. The results of this study allow investigations on the behaviors of the stakeholders in bid preparation and negotiation, as well as evaluation of service quality in the open railway market.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A schedule coordination problem involving two train services provided by different operators is modeled as an optimization of revenue intake. The coordination is achieved through the adjustment of commencement times of the train services by negotiation. The problem is subject to constraints regarding to passenger demands and idle costs of rolling-stocks from both operators. This paper models the operators as software agents having the flexibility to incorporate one of the two (and potentially more) proposed negotiation strategies. Empirical results show that agents employing different combination of strategies have significant impact on the quality of solution and negotiation time.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the findings of a small pilot study conducted with a group of final year pre-service teachers studying a secondary social science curriculum method unit in an Australian university. One of the study’s research objectives aimed at identifying how students responded to efforts to embed intercultural understanding through Studies of Asia in their final curriculum method unit. The unit was designed and taught by the researcher on the assumption that beginning social science teachers need to be empowered with pedagogical skills and new dispositions to deal with value laden emerging regional and global concerns in their Australian secondary school classrooms. This pilot study’s research methodology was located within the qualitative framework of a participatory action research model whereby the lecturer who designed, coordinated and taught the unit was also the researcher. Its scope was limited to one semester with volunteer students. The pilot study sought to investigate responses to several issues, and this paper reports on pre-service teacher reflections on the content, pedagogy and learning they experienced in their weekly sessions with specific reference to cultural understanding, Studies of Asia and the development of Asia literacy. It also reports on pre-service teacher reflections about their own evolving capacity as beginning teachers. The findings indicate that pre-service teachers valued the opportunity to engage with learning experiences which enhanced their conceptual understandings about culture whilst also extending their pedagogical and content knowledge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter aims to situate values education as a core component of social science pre-service teacher education. In particular, it reflects on an experiment in embedding a values laden Global Education perspective in a fourth year social science curriculum method unit. This unit was designed and taught by the researcher on the assumption that beginning social science teachers need to be empowered with pedagogical skills and new dispositions to deal with value laden emerging global and regional concerns in their secondary school classrooms. Moreover, it was assumed that when pre-service teachers engage in dynamic and interactive learning experiences in their curriculum unit, they commence the process of ‘capacity building’ those skills which prepare them for their own lifelong professional learning. This approach to values education also aimed at providing pre-service teachers with opportunities to ‘create deep understandings of teaching and learning’ (Barnes, 1989, p. 17) by reflecting on the ways in which ‘pedagogy can be transformative’ (Lovat and Toomey, 2011 add page no from Chapter One). It was assumed that this tertiary experience would foster the sine qua non of teaching – a commitment to students and their learning. Central to fostering new ‘dispositions’ through this approach, was the belief in the power of pedagogy to make the difference in enhancing student participation and learning. In this sense, this experiment in values education in secondary social science pre-service teacher education aligns with the Troika metaphor for a paradigm change, articulated by Lovat and Toomey (2009) in Chapter One.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many infrastructure and necessity systems such as electricity and telecommunication in Europe and the Northern America were used to be operated as monopolies, if not state-owned. However, they have now been disintegrated into a group of smaller companies managed by different stakeholders. Railways are no exceptions. Since the early 1980s, there have been reforms in the shape of restructuring of the national railways in different parts of the world. Continuous refinements are still conducted to allow better utilisation of railway resources and quality of service. There has been a growing interest for the industry to understand the impacts of these reforms on the operation efficiency and constraints. A number of post-evaluations have been conducted by analysing the performance of the stakeholders on their profits (Crompton and Jupe 2003), quality of train service (Shaw 2001) and engineering operations (Watson 2001). Results from these studies are valuable for future improvement in the system, followed by a new cycle of post-evaluations. However, direct implementation of these changes is often costly and the consequences take a long period of time (e.g. years) to surface. With the advance of fast computing technologies, computer simulation is a cost-effective means to evaluate a hypothetical change in a system prior to actual implementation. For example, simulation suites have been developed to study a variety of traffic control strategies according to sophisticated models of train dynamics, traction and power systems (Goodman, Siu and Ho 1998, Ho and Yeung 2001). Unfortunately, under the restructured railway environment, it is by no means easy to model the complex behaviour of the stakeholders and the interactions between them. Multi-agent system (MAS) is a recently developed modelling technique which may be useful in assisting the railway industry to conduct simulations on the restructured railway system. In MAS, a real-world entity is modelled as a software agent that is autonomous, reactive to changes, able to initiate proactive actions and social communicative acts. It has been applied in the areas of supply-chain management processes (García-Flores, Wang and Goltz 2000, Jennings et al. 2000a, b) and e-commerce activities (Au, Ngai and Parameswaran 2003, Liu and You 2003), in which the objectives and behaviour of the buyers and sellers are captured by software agents. It is therefore beneficial to investigate the suitability or feasibility of applying agent modelling in railways and the extent to which it might help in developing better resource management strategies. This paper sets out to examine the benefits of using MAS to model the resource management process in railways. Section 2 first describes the business environment after the railway 2 Modelling issues on the railway resource management process using MAS reforms. Then the problems emerge from the restructuring process are identified in section 3. Section 4 describes the realisation of a MAS for railway resource management under the restructured scheme and the feasible studies expected from the model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term “cloud computing” has emerged as a major ICT trend and has been acknowledged by respected industry survey organizations as a key technology and market development theme for the industry and ICT users in 2010. However, one of the major challenges that faces the cloud computing concept and its global acceptance is how to secure and protect the data and processes that are the property of the user. The security of the cloud computing environment is a new research area requiring further development by both the academic and industrial research communities. Today, there are many diverse and uncoordinated efforts underway to address security issues in cloud computing and, especially, the identity management issues. This paper introduces an architecture for a new approach to necessary “mutual protection” in the cloud computing environment, based upon a concept of mutual trust and the specification of definable profiles in vector matrix form. The architecture aims to achieve better, more generic and flexible authentication, authorization and control, based on a concept of mutuality, within that cloud computing environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To maximise the capacity of the rail lineand provide a reliable service for pas-sengers throughout the day, regulation of train service to maintain steady service headway is es-sential. In most current metro systems, train usually starts coasting at a fixed distance from the departed station to achieve service regulation. However, this approach is only effective with re-spect to a nominal operational condition of train schedule but not necessarily the current service demand. Moreover, it is not simply to identify the necessary starting point for coasting under the run time constraints of current service conditions since train movement is attributed by a large number of factors, most of which are non-linear and inter-dependent. This paper presents an ap-plication of classical measures to search for the appropriate coasting point to meet a specified inter-station run time and they can be integrated in the on-board Automatic Train Operation (ATO) system and have the potential for on-line implementation in making a set of coasting command decisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Popular wireless network standards, such as IEEE 802.11/15/16, are increasingly adopted in real-time control systems. However, they are not designed for real-time applications. Therefore, the performance of such wireless networks needs to be carefully evaluated before the systems are implemented and deployed. While efforts have been made to model general wireless networks with completely random traffic generation, there is a lack of theoretical investigations into the modelling of wireless networks with periodic real-time traffic. Considering the widely used IEEE 802.11 standard, with the focus on its distributed coordination function (DCF), for soft-real-time control applications, this paper develops an analytical Markov model to quantitatively evaluate the network quality-of-service (QoS) performance in periodic real-time traffic environments. Performance indices to be evaluated include throughput capacity, transmission delay and packet loss ratio, which are crucial for real-time QoS guarantee in real-time control applications. They are derived under the critical real-time traffic condition, which is formally defined in this paper to characterize the marginal satisfaction of real-time performance constraints.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless network technologies, such as IEEE 802.11 based wireless local area networks (WLANs), have been adopted in wireless networked control systems (WNCS) for real-time applications. Distributed real-time control requires satisfaction of (soft) real-time performance from the underlying networks for delivery of real-time traffic. However, IEEE 802.11 networks are not designed for WNCS applications. They neither inherently provide quality-of-service (QoS) support, nor explicitly consider the characteristics of the real-time traffic on networked control systems (NCS), i.e., periodic round-trip traffic. Therefore, the adoption of 802.11 networks in real-time WNCSs causes challenging problems for network design and performance analysis. Theoretical methodologies are yet to be developed for computing the best achievable WNCS network performance under the constraints of real-time control requirements. Focusing on IEEE 802.11 distributed coordination function (DCF) based WNCSs, this paper analyses several important NCS network performance indices, such as throughput capacity, round trip time and packet loss ratio under the periodic round trip traffic pattern, a unique feature of typical NCSs. Considering periodic round trip traffic, an analytical model based on Markov chain theory is developed for deriving these performance indices under a critical real-time traffic condition, at which the real-time performance constraints are marginally satisfied. Case studies are also carried out to validate the theoretical development.