161 resultados para Ad Hoc Outreach Committee


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dhaka doesn’t have a mature transport system. Lacking in institutional arrangements, policy and planning, and law enforcement, the transport system operates has developed ad hoc and is situationally problematic. Absence of proper coordination between modes, poor public transport system, inadequate pedestrian facilities, and environmental degradation justify full consideration of Bus Rapid Transit (BRT) in Dhaka. BRT centres on sustainable transport principles. BRT is a system, which is capable to mitigate Dhaka’s transport problem if properly planned. In Strategic transport plan of Dhaka three BRT transport corridor has been proposed and BRT pre-feasibility study came up with one pilot corridor for early implementation of BRT. This paper first reviews international best practices then explores various BRT system packages and evaluates the suitability of these BRT packages by analyzing current bus service condition and physical and geometric configuration along the BRT pilot corridor. It concludes by proposing some BRT scenarios, which can be considered for further evaluation with respect to speed, delay, travel time and environmental pollution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The INEX 2010 Focused Relevance Feedback track offered a refined approach to the evaluation of Focused Relevance Feedback algorithms through simulated exhaustive user feedback. As in traditional approaches we simulated a user-in-the loop by re-using the assessments of ad-hoc retrieval obtained from real users who assess focused ad-hoc retrieval submissions. The evaluation was extended in several ways: the use of exhaustive relevance feedback over entire runs; the evaluation of focused retrieval where both the retrieval results and the feedback are focused; the evaluation was performed over a closed set of documents and complete focused assessments; the evaluation was performed over executable implementations of relevance feedback algorithms; and �finally, the entire evaluation platform is reusable. We present the evaluation methodology, its implementation, and experimental results obtained for nine submissions from three participating organisations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Technology-oriented young firms play an important role for innovation and commercialisation of new ideas. These firms are often founded by engineers, scientists or academics who posses great scientific/technological knowledge, but limited know-how in other aspects of managing a business including knowledge management. Successful managing and integrating their specialised knowledge is of particular importance when it comes to developing a new product or process. This article therefore focuses on the particularities of the knowledge management process in technopreneurial firms. Using a qualitative investigation from a sample of Australian SMEs, a number of key observations are derived which show the challenges of managing knowledge and how important knowledge management is as a management tool for R&D and innovation process in technology-oriented SMEs. Findings suggest that knowledge management and integration processes in these firms are very much project focused and mainly based on ad hoc and informal processes and not embedded within the overall organisational routines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ad hoc growth of administrative controls on land use has produced an information management problem. Land registries face growing demands to record on the Torrens register particulars of rights, obligations and restrictions created under public law statutes, in order to reduce information costs, promote compliance and inform planning. As sustainable management of land and natural resources will require more legislative regulation, this paper proposes a framework of principles for the more coherent and consistent management of public law controls on private land use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents the method and results of a survey of 27 of the 33 Australian universities teaching engineering education in late 2007, undertaken by The Natural Edge Project (hosted by Griffith University and the Australian National University) and supported by the National Framework for Energy Efficiency. This survey aimed to ascertain the extent of energy efficiency (EE) education, and to identify preferred methods to assist in increasing the extent to which EE education is embedded in engineering curriculum. In this paper the context for the survey is supported by a summary of the key results from a variety of surveys undertaken over the last decade internationally. The paper concludes that EE education across universities and engineering disciplines in Australia is currently highly variable and ad hoc. Based on the results of the survey, this paper highlights a number of preferred options to support educators to embed sustainability within engineering programs, and future opportunities for monitoring EE, within the context of engineering education for sustainable development (EESD).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Twitter has become a major instrument for the rapid dissemination and subsequent debate of news stories. It has been instrumental both in drawing attention to events as they unfolded (such as the emergency landing of a plane in New York’s Hudson River in 2009) and in facilitating a sustained discussion of major stories over timeframes measured in weeks and months (including the continuing saga around Wikileaks and Julian Assange), sometimes still keeping stories alive even if mainstream media attention has moved on elsewhere. More comprehensive methodologies for research into news discussion on Twitter – beyond anecdotal or case study approaches – are only now beginning to emerge. This paper presents a large-scale quantitative approach to studying public communication in the Australian Twittersphere, developed as part of a three-year ARC Discovery project that also examines blogs and other social media spaces. The paper will both outline the innovative research tools developed for this work, and present outcomes from an application of these methodologies to recent and present news themes. Our methodology enables us to identify major themes in Twitter’s discussion of these events, trace their development and decline over time, and map the dynamics of the discussion networks formed ad hoc around specific themes (in part with the help of Twitter #hashtags: brief identifiers which mark a tweet as taking part in an established discussion). It is also able to identify links to major news stories and other online resources, and to track their dissemination across the wider Twittersphere.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the rapid and ad hoc development and interactions of participative citizen communities during acute events, using the examples of the 2011 floods in Queensland, Australia, and the global controversy surrounding Wikileaks and its spokesman, Julian Assange. The self-organising community responses to such events which can be observed in these cases bypass or leapfrog, at least temporarily, most organisational or administrative hurdles which may otherwise frustrate the establishment of online communities; they fast-track the processes of community development and structuration. By understanding them as a form of rapid prototyping, e-democracy initiatives can draw important lessons from observing the community activities around such acute events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In information retrieval, a user's query is often not a complete representation of their real information need. The user's information need is a cognitive construction, however the use of cognitive models to perform query expansion have had little study. In this paper, we present a cognitively motivated query expansion technique that uses semantic features for use in ad hoc retrieval. This model is evaluated against a state-of-the-art query expansion technique. The results show our approach provides significant improvements in retrieval effectiveness for the TREC data sets tested.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Building an efficient and an effective search engine is a very challenging task. In this paper, we present the efficiency and effectiveness of our search engine at the INEX 2009 Efficiency and Ad Hoc Tracks. We have developed a simple and effective pruning method for fast query evaluation, and used a two-step process for Ad Hoc retrieval. The overall results from both tracks show that our search engine performs very competitively in terms of both efficiency and effectiveness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

How bloggers and other independent online commentators criticise, correct, and otherwise challenge conventional journalism has been known for years, but has yet to be fully accepted by journalists; hostilities between the media establishment and the new generation of citizen journalists continue to flare up from time to time. The old gatekeeping monopoly of the mass media has been challenged by the new practice of gatewatching: by individual bloggers and by communities of commentators which may not report the news first-hand, but curate and evaluate the news and other information provided by official sources, and thus provide an important service. And this now takes place ever more rapidly, almost in real time: using the latest social networks, which disseminate, share, comment, question, and debunk news reports within minutes, and using additional platforms that enable fast and effective ad hoc collaboration between users. When hundreds of volunteers can prove within a few days that a German minister has been guilty of serious plagiarism, when the world first learns of earthquakes and tsunamis via Twitter – how does journalism manage to keep up?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the 2007 Australian federal election was notable for the use of social media by the Australian Labor Party in campaigning, the 2010 election took place in a media landscape in which social media–especially Twitter–had become much more embedded in both political journalism and independent political commentary. This article draws on the computer-aided analysis of election-related Twitter messages, collected under the #ausvotes hashtag, to describe the key patterns of activity and thematic foci of the election’s coverage in this particular social media site. It introduces novel metrics for analysing public communication via Twitter, and describes the related methods. What emerges from this analysis is the role of the #ausvotes hashtag as a means of gathering an ad hoc ‘issue public’– a finding which is likely to be replicated for other hashtag communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper analyses particularities of the knowledge management process in technopreneurial firms with particular focus on knowledge identification, acquisition, utilisation and integration. Using a qualitative investigation from a sample of Australian SMEs, a number of key observations are derived which show the challenges of managing knowledge and how important knowledge management is as a management tool for R&D and innovation process in technology-oriented SMEs. Findings suggest that knowledge management and integration processes in these firms are very much project focused and mainly based on ad hoc and informal processes and not embedded within the overall organisational routines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several authors stress the importance of data’s crucial foundation for operational, tactical and strategic decisions (e.g., Redman 1998, Tee et al. 2007). Data provides the basis for decision making as data collection and processing is typically associated with reducing uncertainty in order to make more effective decisions (Daft and Lengel 1986). While the first series of investments of Information Systems/Information Technology (IS/IT) into organizations improved data collection, restricted computational capacity and limited processing power created challenges (Simon 1960). Fifty years on, capacity and processing problems are increasingly less relevant; in fact, the opposite exists. Determining data relevance and usefulness is complicated by increased data capture and storage capacity, as well as continual improvements in information processing capability. As the IT landscape changes, businesses are inundated with ever-increasing volumes of data from both internal and external sources available on both an ad-hoc and real-time basis. More data, however, does not necessarily translate into more effective and efficient organizations, nor does it increase the likelihood of better or timelier decisions. This raises questions about what data managers require to assist their decision making processes.