936 resultados para nonautonomous systems
Resumo:
The methodology undertaken, the channel model and the system model created for developing a novel adaptive equalization method and a novel channel tracking method for uplink of MU-MIMO-OFDM systems is presented in this paper. The results show that the channel tracking method works with 97% accuracy, while the training-based initial channel estimation method shows poor performance in estimating the actual channel comparatively.
Resumo:
I believe that studies of men's gendered experiences of information systems are needed. In order to support this claim, I introduce the area of Masculinity Studies to Information Systems research and, using this, present an exploratory analysis of an internet dating website for gay men – Gaydar. The information system, which forms part of the Gaydar community, is shown to shape, and be shaped by the members as they accept and challenge aspects of it as related to their identities. In doing this, I show how the intertwined processes of information systems development and use contribute to the creation of diverse interpretations of masculinity within a group of men. In sum, my analysis highlights different kinds of men and different versions of masculinity that can sometimes be associated with different experiences of information systems. The implications of this work centre on the need to expand our knowledge of men's gendered experiences with information systems, to reflect upon processes of technology facilitated categorisation and to consider the influences that contribute to the roll out of particular software features along with the underlying rationales for market segmentation in the software and software-based services industries.
Resumo:
The papers in this issue focus our attention to packaged software as an increasingly important, but still relatively poorly understood phenomena in the information systems research community. The topic is not new: Lucas et al. (1988) wrote a provocative piece focused on the issues with implementing packaged software. A decade later, Carmel (1997) argued that packaged software was both ideally suited for American entrepreneurial activity and rapidly growing. The information systems research community, however, has moved more slowly to engage this change (e.g., Sawyer, 2001). The papers in this special issue represent a significant step in better engaging the issues of packaged software relative to information systems research, and highlighting opportunities for additional relevant research.
Resumo:
This thesis highlights the limitations of the existing car following models to emulate driver behaviour for safety study purposes. It also compares the capabilities of the mainstream car following models emulating driver behaviour precise parameters such as headways and Time to Collisions. The comparison evaluates the robustness of each car following model for safety metric reproductions. A new car following model, based on the personal space concept and fish school model is proposed to simulate more precise traffic metrics. This new model is capable of reflecting changes in the headway distribution after imposing the speed limit form VSL systems. This research facilitates assessing Intelligent Transportation Systems on motorways, using microscopic simulation.
Resumo:
Business process management systems (BPMS) belong to a class of enterprise information systems that are characterized by the dependence on explicitly modeled process logic. Through the process logic, it is relatively easy to manage explicitly the routing and allocation of work items along a business process through the system. Inspired by the DeLone and McLean framework, we theorize that these process-aware system features are important attributes of system quality, which in turn will elevate key user evaluations such as perceived usefulness, and usage satisfaction. We examine this theoretical model using data collected from four different, mostly mature BPM system projects. Our findings validate the importance of input quality as well as allocation and routing attributes as antecedents of system quality, which, in turn, determines both usefulness and satisfaction with the system. We further demonstrate how service quality and workflow dependency are significant precursors to perceived usefulness. Our results suggest the appropriateness of a multi-dimensional conception of system quality for future research, and provide important design-oriented advice for the design and configuration of BPMSs.
Resumo:
The development of user expertise is a strategic imperative for organizations in hyper-competitive markets. This paper conceptualizes opreationalises and validates user expertise in contemporary Information Systems (IS) as a formative, multidimensional index. Such a validated and widely accepted index would facilitate progression of past research on user competence and efficacy of IS to complex contemporary IS, while at the same time providing a benchmark for organizations to track their user expertise. The validation involved three separate studies, including exploratory and confirmatory phases, using data from 244 respondents.
Resumo:
Recent literature has emphasized the pivotal role of knowledge integration in Enterprise Systems (ES) success. This research-in-progress paper, building upon Knowledge Based Theory of the firm (KBT), examines the efficiency of knowledge integration in the context of ES implementation and identifies the factors contributing to its enhancement. The proposed model in this paper suggests that the efficiency of knowledge integration in an ES implementation process depends upon the level of common knowledge and the level of coordination in the ES adopting organization. It further suggests that the level of common knowledge can be enhanced by proper training, improving ES users’intrinsic and extrinsic motivations and business process modeling and the level of coordination can be improved by articulating a clear unified organizational goal for the ES adoption in the organization, forming a competent ES team, enhancing interdepartmental communication and the cross-functionality in the organization structure.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
Retaining customers is a relevant topic throughout all service industries. However, only limited attention has been directed towards studying the antecedents of subscription renewal in the context of operational cloud enterprise systems. Cloud services have historically been offered as subscription-based services with the (theoretical) possibility of seamless service cancellation, in contrast to classical IT-Outsourcing contracts or license-based software installations of on-premise enterprise systems. In this work, we investigate the central concept of subscription renewal by focusing on different facets of IS success and their relevance for distinct employee cohorts. Analyzing inter-cohort differences has strong practical implications, as it helps IT vendors to focus on specific IT-related factors when trying to retain customers. Therefore an empirical study was undertaken. The hypotheses were developed on an individual level and tested using survey responses of IT decision makers within companies which adopted cloud enterprise systems. Gathered data was then analyzed using PLS. The results show that subscription renewal intention of the strategic cohort is mainly based on perceived system quality, whereas information quality explains most of the variance of subscription renewal in the management cohort. Beneath the cloud enterprise systems specific contributions, the work adds to the theoretical body of research related to IS success and IS continuation, as well as stakeholder perspectives.
Resumo:
Patient safety has become a significant and pressing policy issue. Around the world, governments, the health care sector and the public are increasingly cognizant of the need to improve the safety of care delivered by their health systems. Pressure for change has been created by highly publicized incidents in a number of countries involving unsafe acts that were significant both in scale and consequence and a number of empirical studies that revealed the high rates of unsafe acts and their consequences. The costs of unsafe health care – both personal and fiscal – to individuals, their families and their communities and to the state are massive. In this research project we explored one particular avenue for change – that is, the use of legal instruments by governments to improve patient safety. We did this through a comparative review of the use of legal instruments or frameworks in other countries (specifically Australia, Denmark, New Zealand, the United Kingdom, and the United States) as well as two non-health care related sectors in Canada (transportation and occupational health and safety). We began this research by reviewing the legal instruments and undertaking extensive literature reviews. Further information was gathered through in-person interviews with policy-makers and academics in the countries studied, and from policy-makers and academics expert in the health, occupational health and safety, and transportation sectors in Canada. Once descriptions of the various countries and sectors were drafted, we held small-group meetings with local experts on particular aspects of patient safety. We then hosted a national consultation meeting. We subsequently drafted this final report and the appendices, which fully describe the results of the background research. Finally, we prepared a summary version of the report as well as posters and papers to be published and delivered at conferences and meetings with relevant groups.
Resumo:
Increases in functionality, power and intelligence of modern engineered systems led to complex systems with a large number of interconnected dynamic subsystems. In such machines, faults in one subsystem can cascade and affect the behavior of numerous other subsystems. This complicates the traditional fault monitoring procedures because of the need to train models of the faults that the monitoring system needs to detect and recognize. Unavoidable design defects, quality variations and different usage patterns make it infeasible to foresee all possible faults, resulting in limited diagnostic coverage that can only deal with previously anticipated and modeled failures. This leads to missed detections and costly blind swapping of acceptable components because of one’s inability to accurately isolate the source of previously unseen anomalies. To circumvent these difficulties, a new paradigm for diagnostic systems is proposed and discussed in this paper. Its feasibility is demonstrated through application examples in automotive engine diagnostics.
Resumo:
Adaptation is increasingly being viewed as a necessary response tool in respect of climate change effects. Though the subject of significant scholarly and professional attention, adaptation still continues to lag behind mitigation in the climate change discourse. However, this situation looks likely to change over the coming years due to a increasing scientific acceptance that certain climate change effects are now inevitable. The purpose of this research is to illustrate, consider and demonstrate how urban planning regimes can use some of their professional tools to develop adaptation strategies and interventions in urban systems. These tools include plan-making, development management, urban design and place-making. Urban systems contribute disproportionately to climate change and will also likely suffer considerably from the resulting effects. Moreover, the majority of the world’s population is now urbanised, suggesting that adaptation will be crucial in order to develop urban systems that are resilient to climate change effects. Informed by a reflexive, qualitative methodology, this paper offers an informed understanding and illustration of adaptation as a climate change response, its use in urban systems and some of the roles and strategies that planning may take in developing and implementing urban adaptation. It concludes that urban planning regimes can have key roles in adapting urban systems to numerous climate change effects.
Resumo:
eHealth systems promise enviable benefits and capabilities for healthcare delivery. However, the technologies that make these capabilities possible introduce undesirable drawbacks such as information security related threats, which need to be appropriately addressed. Lurking in these threats are information privacy concerns. Addressing them has proven to be difficult because they often conflict with information access requirements of healthcare providers. Therefore, it is important to achieve an appropriate balance between these requirements. We contend that information accountability (IA) can achieve this balance. In this paper, we introduce accountable-eHealth (AeH) systems, which are eHealth systems that utilise IA as a measure of information privacy. We discuss how AeH system protocols can successfully achieve the aforementioned balance of requirements. As a means of implementation feasibility, we compare characteristics of AeH systems with Australia’s Personally Controlled Electronic Health Record (PCEHR) sys-tem and identify similarities and highlight the differences and the impact those differences would have to the eHealth domain.
Resumo:
For construction stakeholders to fully embrace sustainability, its long-term benefits and associated risks need to be identified through holistic approaches. Consensus among key stakeholders is very important to the improvement of the ecological performance of industrialized building systems (IBS), a building construction method gaining momentum in Malaysia. A questionnaire survey examines the relative significance of 16 potentially important sustainability factors for IBS applications. To present possible solutions,semi-structured interviews solicit views from experienced IBS practitioners, representing the professions involved. Three most critical factors agreed by key stakeholders are material consumption, waste generation and waste disposal. Using SWOT analysis, the positive and negative aspects of these factors are investigated, with action plans formulated for IBS design practitioners. The SWOT analysis based guidelines have the potential to become part of IBS design briefing documents against which sustainability solutions are contemplated, selected and implemented. Existing knowledge on ecological performance issues is extended by considering the unique characteristics of IBS and identifying not only the benefits, but also the potential risks and challenges of pursuing sustainability. This is largely missing in previous research efforts. Findings to date focus on providing much-needed assistance to IBS designers, who are at the forefront of decision-making with a significant level of project influence. Ongoing work will be directed towards other project development phases and consider the inherent linkage between design decisions and subsequent sustainability deliverables in the project life cycle.
Resumo:
A new simple test method using small scale models has been developed for testing profiled steel cladding systems under wind uplift/suction forces. This simple method should replace the large scale test method using two-span claddings used at present. It can be used for roof or wall cladding systems fastened with screw fasteners at crests or valleys.