122 resultados para implementations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Australia, it has been increasingly accepted that sustainability needs to be at the top of the agenda when contemplating infrastructure development. In practice however, many companies struggle to find effective ways to embrace sustainable ideas and implement them in real projects beyond minimum compliance. One of the reasons is the lack of underpinning knowledge and evidence to demonstrate and measure the linkage between sustainability implementations and the relevant outcomes. This is compounded by the fact that very often there are no common understandings between the stakeholders on sustainability and there is a big divide between research advancement and real-life applications. Therefore it is both feasible and timely to develop and expand the body of sustainability knowledge on infrastructure development and investigate better ways of communicating with and managing it within the infrastructure sector. Although knowledge management (KM) is a relatively new and emerging discipline, it has shown its value and promise in existing applications in the construction industry. Considering the existing KM mechanisms and tools employed in practice, this research is aimed at establishing a specific KM approach to facilitate sustainability knowledge identification, acquisition, sharing, maintenance and application within the infrastructure sector, and promote integrated decision-making for sustainable infrastructure development. A triangulation of questionnaire survey, semi-structured interviews and case studies was employed in this research to collect required qualitative and quantitative data. The research studied the unique characteristics of the infrastructure sector, the nature of sustainability knowledge, and evaluated and validated the critical elements, key processes, and priority issues of KM for the Australian infrastructure sector. A holistic KM framework was developed to set the overall context for managing sustainability knowledge in the infrastructure sector by outlining (1) the main aims and outcomes of managing sustainability knowledge, (2) the key knowledge activities, (3) effective KM strategies and instruments, and (4) KM enablers. Because of the highly project-oriented nature of the infrastructure sector, knowledge can only add value when it is being used in real projects. Implementation guidelines were developed to help the industry practitioners and project teams to apply sustainability knowledge and implement KM in infrastructure project scenarios. This research provides the Australian infrastructure sector with tools to better understand KM, helps the industry practitioners to prioritize attention on relevant sustainability issues, and recommends effective practices to manage sustainability knowledge, especially in real life implementation of infrastructure projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge based urban development (KBUD) is a new paradigm in urban planning tailoring to the era of knowledge economy. It aims mainly to assist a contemporary city to promote a more sustainable socio-spatial order. The paper reports on the investigation of KBUD initiative in Malaysia which is manifested through the establishment of a project called Multimedia Super Corridor (MSC). MSC Malaysia aims to attract knowledge workers and industries to invest and operate within the area by creating a world class urban corridor with state-of-the-art multimedia infrastructure, efficient transportation system and an attractive living environment. Based on documents analysis and interviews, this paper analyses the strategies, implementations, and achievements of KBUD initiative in Cyberjaya, being the leading intelligent city of the unique Malaysia’s KBUD project-MSC Malaysia. A critical evaluation is made to assess the achievements of MSC, by looking at the physical changes after about ten years since its official launching. The findings recommend some valuable lessons for other cities that strive to develop KBUD strategies, strengthen their sustainable socio-spatial policies, and seek a global recognition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Web 2.0 technology and concepts are being used increasingly by organisations to enhance knowledge, efficiency, engagement and reputation. Understanding the concepts of Web 2.0, its characteristics, and how the technology and concepts can be adopted, is essential to successfully reap the potential benefits. In fact, there is a debate about using the Web 2.0 idiom to refer to the concept behind it; however, this term is widely used in literature as well as in industry. In this paper, the definition of Web 2.0 technology, its characteristics and the attributes, will be presented. In addition, the adoption of such technology is further explored through the presentation of two separate case examples of Web 2.0 being used: to enhance an enterprise; and to enhance university teaching. The similarities between these implementations are identified and discussed, including how the findings point to generic principles of adoption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mentors (cooperating classroom teachers) have a shared responsibility with universities for developing preservice teachers’ pedagogical practices, particularly towards becoming reflective practitioners. Preservice teachers need to participate actively in their own learning, by reflecting and acting on the mentor’s constructive feedback provided during planning and feedback dialogue sessions. This case study uses feedback practices outlined within a five-factor mentoring model to analyse dialogue between a mentor and her respective mentee during different stages in their school-based programs (first practicum). This investigation uses multiple data sources such as video and audio-recorded interviews, archival documents from participants such as lesson plans, reflections and reports to examine preservice teacher’s reflections and implementations of practice as a result of her mentor’s feedback (e.g., establish expectations, review lesson plans, observe teaching then provide oral and written feedback, and evaluate progress). Findings indicated that reflective thinking was more apparent when the mentor did not dominate conversations but instead asked astute pedagogical knowledge questions to facilitate the mentee’s reflections on practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is concerned with investigating existing and potential scope of Dublin Core metadata in Knowledge Management contexts. Modelling knowledge is identified as a conceptual prerequisite in this investigation, principally for the purpose of clarifying scope prior to identifying the range of tasks associated with organising knowledge. A variety of models is presented and relationships between data, information, and knowledge discussed. It is argued that the two most common modes of organisation, hierarchies and networks, influence the effectiveness and flow of knowledge. Practical perspective is provided by reference to implementations and projects providing evidence of how DC metadata is applied in such contexts. A sense-making model is introduced that can be used as a shorthand reference for identifying useful facets of knowledge that might be described using metadata. Discussion is aimed at presenting this model in a way that both validates current applications and points to potential novel applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, No-Wait, No-Buffer, Limited-Buffer, and Infinite-Buffer conditions for the flow-shop problem (FSP) have been investigated. These four different buffer conditions have been combined to generate a new class of scheduling problem, which is significant for modelling many real-world scheduling problems. A new heuristic algorithm is developed to solve this strongly NP-hard problem. Detailed numerical implementations have been analysed and promising results have been achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Experts’ views and commentary have been highly respected in every discipline. However, unlike traditional disciplines like medicine, mathematics and engineering, Information System (IS) expertise is difficult to define. Despite seeking expert advice and views is common in the areas of IS project management, system implementations and evaluations. This research-in-progress paper attempts to understand the characteristics of IS-expert through a comprehensive literature review of analogous disciplines and then derives a formative research model with three main constructs. A validated construct of expertise of IS will have a wide range of implications for research and practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Optimising the container transfer schedule at the multimodal terminals is known to be NP-hard, which implies that the best solution becomes computationally infeasible as problem sizes increase. Genetic Algorithm (GA) techniques are used to reduce container handling/transfer times and ships' time at the port by speeding up handling operations. The GA is chosen due to the relatively good results that have been reported even with the simplest GA implementations to obtain near-optimal solutions in reasonable time. Also discussed, is the application of the model to assess the consequences of increased scheduled throughput time as well as different strategies such as the alternative plant layouts, storage policies and number of yard machines. A real data set used for the solution and subsequent sensitivity analysis is applied to the alternative plant layouts, storage policies and number of yard machines.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Thermal-infrared imagery is relatively robust to many of the failure conditions of visual and laser-based SLAM systems, such as fog, dust and smoke. The ability to use thermal-infrared video for localization is therefore highly appealing for many applications. However, operating in thermal-infrared is beyond the capacity of existing SLAM implementations. This paper presents the first known monocular SLAM system designed and tested for hand-held use in the thermal-infrared modality. The implementation includes a flexible feature detection layer able to achieve robust feature tracking in high-noise, low-texture thermal images. A novel approach for structure initialization is also presented. The system is robust to irregular motion and capable of handling the unique mechanical shutter interruptions common to thermal-infrared cameras. The evaluation demonstrates promising performance of the algorithm in several environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Workflow patterns have been recognized as the theoretical basis to modeling recurring problems in workflow systems. A form of workflow patterns, known as the resource patterns, characterise the behaviour of resources in workflow systems. Despite the fact that many resource patterns have been discovered, people still preclude them from many workflow system implementations. One of reasons could be obscurityin the behaviour of and interaction between resources and a workflow management system. Thus, we provide a modelling and visualization approach for the resource patterns, enabling a resource behaviour modeller to intuitively see the specific resource patterns involved in the lifecycle of a workitem. We believe this research can be extended to benefit not only workflow modelling, but also other applications, such as model validation, human resource behaviour modelling, and workflow model visualization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a combined structure for using real, complex, and binary valued vectors for semantic representation. The theory, implementation, and application of this structure are all significant. For the theory underlying quantum interaction, it is important to develop a core set of mathematical operators that describe systems of information, just as core mathematical operators in quantum mechanics are used to describe the behavior of physical systems. The system described in this paper enables us to compare more traditional quantum mechanical models (which use complex state vectors), alongside more generalized quantum models that use real and binary vectors. The implementation of such a system presents fundamental computational challenges. For large and sometimes sparse datasets, the demands on time and space are different for real, complex, and binary vectors. To accommodate these demands, the Semantic Vectors package has been carefully adapted and can now switch between different number types comparatively seamlessly. This paper describes the key abstract operations in our semantic vector models, and describes the implementations for real, complex, and binary vectors. We also discuss some of the key questions that arise in the field of quantum interaction and informatics, explaining how the wide availability of modelling options for different number fields will help to investigate some of these questions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Building prefabrication is known as Industrialised Building Systems (IBS) in Malaysia. This construction method possesses unique characteristics that are central to sustainable construction. For example, offsite construction enables efficient management of construction wastage by identifying major causes of waste arising during both the design and construction stages. These causes may then be eliminated by the improvement process in IBS component's manufacturing. However, current decisions on using IBS are typically financial driven and hinder the wider ranged adoption. In addition, current IBS misconceptions and the failure of rating schemes in evaluating the sustainability of IBS affect its implementation. A new approach is required to provide better understanding on the sustainability potential of IBS among stakeholders. Such approach should also help project the outcomes of each levels of decision-making to respond to social, economy and environmental challenges. This paper presents interim findings of research aimed at developing a framework for sustainable IBS development and suggests a more holistic approach to achieve sustainability. A framework of embedding sustainability factors is considered in three main phases of IBS construction; 1) Pre-construction, 2) Construction and 3) Post-construction phase. SWOT analysis was used to evaluate the strengths, weaknesses, opportunities and threats involved in the IBS implementations. The action plans are formulated from the analysis of sustainable objectives. This approach will show where and how sustainability should be integrated to improve IBS construction. A mix of quantitative and qualitative methodology was used in this research to explore the potential of IBS in integrating sustainability. The tools used in the study are questionnaires and semi-structured interviews. Outcomes from these tools lead to the identification of viable approaches involving 18 critical factors to improve sustainability in IBS constructions. Finally, guidelines for decision-making are being developed to provide a useful source of information and support to mutual benefit of the stakeholders in integrating sustainability issues and concepts into IBS applications.