360 resultados para software management
Resumo:
Management of groundwater systems requires realistic conceptual hydrogeological models as a framework for numerical simulation modelling, but also for system understanding and communicating this to stakeholders and the broader community. To help overcome these challenges we developed GVS (Groundwater Visualisation System), a stand-alone desktop software package that uses interactive 3D visualisation and animation techniques. The goal was a user-friendly groundwater management tool that could support a range of existing real-world and pre-processed data, both surface and subsurface, including geology and various types of temporal hydrological information. GVS allows these data to be integrated into a single conceptual hydrogeological model. In addition, 3D geological models produced externally using other software packages, can readily be imported into GVS models, as can outputs of simulations (e.g. piezometric surfaces) produced by software such as MODFLOW or FEFLOW. Boreholes can be integrated, showing any down-hole data and properties, including screen information, intersected geology, water level data and water chemistry. Animation is used to display spatial and temporal changes, with time-series data such as rainfall, standing water levels and electrical conductivity, displaying dynamic processes. Time and space variations can be presented using a range of contouring and colour mapping techniques, in addition to interactive plots of time-series parameters. Other types of data, for example, demographics and cultural information, can also be readily incorporated. The GVS software can execute on a standard Windows or Linux-based PC with a minimum of 2 GB RAM, and the model output is easy and inexpensive to distribute, by download or via USB/DVD/CD. Example models are described here for three groundwater systems in Queensland, northeastern Australia: two unconfined alluvial groundwater systems with intensive irrigation, the Lockyer Valley and the upper Condamine Valley, and the Surat Basin, a large sedimentary basin of confined artesian aquifers. This latter example required more detail in the hydrostratigraphy, correlation of formations with drillholes and visualisation of simulation piezometric surfaces. Both alluvial system GVS models were developed during drought conditions to support government strategies to implement groundwater management. The Surat Basin model was industry sponsored research, for coal seam gas groundwater management and community information and consultation. The “virtual” groundwater systems in these 3D GVS models can be interactively interrogated by standard functions, plus production of 2D cross-sections, data selection from the 3D scene, rear end database and plot displays. A unique feature is that GVS allows investigation of time-series data across different display modes, both 2D and 3D. GVS has been used successfully as a tool to enhance community/stakeholder understanding and knowledge of groundwater systems and is of value for training and educational purposes. Projects completed confirm that GVS provides a powerful support to management and decision making, and as a tool for interpretation of groundwater system hydrological processes. A highly effective visualisation output is the production of short videos (e.g. 2–5 min) based on sequences of camera ‘fly-throughs’ and screen images. Further work involves developing support for multi-screen displays and touch-screen technologies, distributed rendering, gestural interaction systems. To highlight the visualisation and animation capability of the GVS software, links to related multimedia hosted online sites are included in the references.
Resumo:
Background Women undergoing Cesarean Section (CS) are vulnerable to the adverse effects associated with perioperative core temperature drop, in part due to the tendency for CS to be performed under neuraxial anesthesia, blood and fluid loss, and vasodilation. Inadvertent perioperative hypothermia (IPH) is a common condition that affects patients undergoing surgery of all specialties and is detrimental to all age groups, including neonates. Previous systematic reviews on IPH prevention largely focus on either adult or all ages populations, and have mainly overlooked pregnant or CS patients as a distinct group. Not all recommendations made by systematic reviews targeting all adult patients may be transferable to CS patients. Alternative, effective methods for preventing or managing hypothermia in this group would be valuable. Objectives To synthesize the best available evidence in relation to preventing and/or treating hypothermia in mothers after CS surgery. Types of participants Adult patients over the age of 18 years, of any ethnic background, with or without co-morbidities, undergoing any mode of anesthesia for any type of CS (emergency or planned) at healthcare facilities who have received interventions to limit or manage perioperative core heat loss were included. Types of intervention(s) Active or passive warming methods versus usual care or placebo, that aim to limit or manage core heat loss as applied to women undergoing CS were included. Types of studies Randomized controlled trials (RCTs) that met the inclusion criteria, with reduction of perioperative hypothermia a primary or secondary outcome were considered. Types of outcomes Primary outcome: maternal core temperature measured during the preoperative, intraoperative and postoperative phases of care Secondary outcomes: newborn core temperature at birth, umbilical pH obtained immediately after birth, Apgar scores, length of Post Anesthetic Care Unit (PACU) stay, maternal thermal comfort. Search strategy A comprehensive search was undertaken of the following databases from their inception until May 2012: ProQuest, Web of Science, Scopus, Dissertation and Theses PQDT (via ProQuest), Current Contents, CENTRAL, Mednar, OpenGrey, Clinical Trials. There were no language restrictions. Methodological quality Retrieved papers were assessed for methodological quality by two independent reviewers prior to inclusion using JBI software. Disagreements were resolved via consultation with the third reviewer. An assessment of quality of the included papers was also made in relation to five key quality factors. Data collection Two independent reviewers extracted data from the included papers using a previously piloted customized data extraction tool. Results 12 studies with a combined total of 719 participants were included. Three broad intervention groups were identified; intravenous (IV) fluid warming, warming devices, leg wrapping. IV fluid warming, whether administered intraoperatively or preoperatively, was found to be effective at maintaining maternal (but not neonatal) temperature and preventing shivering, but does not improve thermal comfort. The effectiveness of IV fluid warming on Apgar scores and umbilical pH remains unclear. Warming devices, including forced air warming and under body carbon polymer mattresses, were effective at preventing hypothermia and reduced shivering, however were most effective if applied preoperatively. The effectiveness of warming devices to improve thermal comfort remains unclear. Preoperative forced air warming appears to aid maintenance of neonatal temperature, while intraoperative forced air warming does not. Forced air warming was not effective at improving Apgar scores and the effects for umbilical pH remain unclear. Conclusions Intravenous fluid warming, by any method, improves maternal temperature and reduces shivering for women undergoing CS. Preoperative body warming devices also improve maternal temperature, in addition to reducing shivering.
Resumo:
Cloud computing is an emerging computing paradigm in which IT resources are provided over the Internet as a service to users. One such service offered through the Cloud is Software as a Service or SaaS. SaaS can be delivered in a composite form, consisting of a set of application and data components that work together to deliver higher-level functional software. SaaS is receiving substantial attention today from both software providers and users. It is also predicted to has positive future markets by analyst firms. This raises new challenges for SaaS providers managing SaaS, especially in large-scale data centres like Cloud. One of the challenges is providing management of Cloud resources for SaaS which guarantees maintaining SaaS performance while optimising resources use. Extensive research on the resource optimisation of Cloud service has not yet addressed the challenges of managing resources for composite SaaS. This research addresses this gap by focusing on three new problems of composite SaaS: placement, clustering and scalability. The overall aim is to develop efficient and scalable mechanisms that facilitate the delivery of high performance composite SaaS for users while optimising the resources used. All three problems are characterised as highly constrained, large-scaled and complex combinatorial optimisation problems. Therefore, evolutionary algorithms are adopted as the main technique in solving these problems. The first research problem refers to how a composite SaaS is placed onto Cloud servers to optimise its performance while satisfying the SaaS resource and response time constraints. Existing research on this problem often ignores the dependencies between components and considers placement of a homogenous type of component only. A precise problem formulation of composite SaaS placement problem is presented. A classical genetic algorithm and two versions of cooperative co-evolutionary algorithms are designed to now manage the placement of heterogeneous types of SaaS components together with their dependencies, requirements and constraints. Experimental results demonstrate the efficiency and scalability of these new algorithms. In the second problem, SaaS components are assumed to be already running on Cloud virtual machines (VMs). However, due to the environment of a Cloud, the current placement may need to be modified. Existing techniques focused mostly at the infrastructure level instead of the application level. This research addressed the problem at the application level by clustering suitable components to VMs to optimise the resource used and to maintain the SaaS performance. Two versions of grouping genetic algorithms (GGAs) are designed to cater for the structural group of a composite SaaS. The first GGA used a repair-based method while the second used a penalty-based method to handle the problem constraints. The experimental results confirmed that the GGAs always produced a better reconfiguration placement plan compared with a common heuristic for clustering problems. The third research problem deals with the replication or deletion of SaaS instances in coping with the SaaS workload. To determine a scaling plan that can minimise the resource used and maintain the SaaS performance is a critical task. Additionally, the problem consists of constraints and interdependency between components, making solutions even more difficult to find. A hybrid genetic algorithm (HGA) was developed to solve this problem by exploring the problem search space through its genetic operators and fitness function to determine the SaaS scaling plan. The HGA also uses the problem's domain knowledge to ensure that the solutions meet the problem's constraints and achieve its objectives. The experimental results demonstrated that the HGA constantly outperform a heuristic algorithm by achieving a low-cost scaling and placement plan. This research has identified three significant new problems for composite SaaS in Cloud. Various types of evolutionary algorithms have also been developed in addressing the problems where these contribute to the evolutionary computation field. The algorithms provide solutions for efficient resource management of composite SaaS in Cloud that resulted to a low total cost of ownership for users while guaranteeing the SaaS performance.
Resumo:
The role of government in developing policies and guidelines for asset management is becoming increasingly important especially in view of ageing infrastructure and increasing financial risks for building infrastructure. This paper reviews policies and guidelines developed by Australian state authorities against industry developed principles. It utilizes the software program Leximancer to; a) produce conceptual visualisations of the key themes and concepts embedded within state-wide policies and guidelines, and b) systematically compare the differing asset management foci between states. The analyses reveal mixed results in terms of policy priorities and guidelines for managing assets at a strategic level across states. This paper outlines a rigorous analytical methodology to inform specific policy changes.
Resumo:
This paper presents an illustrative demonstration of the qualitative data analysis tool NVivo (version 2.0), as employed across a multi-method research design as a comprehensive tool in support of overall research management. The paper will be of interest to (a) novice researchers, as a reference in their research design efforts; (b) academics, involved in research training, where this narrative can be used as a rich teaching case and; potentially to (c) vendors, of similar software tools, who may identify potential new tool applications and valuable tool enhancements.
Resumo:
Safety of repair, maintenance, alteration, and addition (RMAA) works have long been neglected because RMAAworks are often minute and only last for a short period of time. With rising importance of the RMAA sector in many developed societies, safety of RMAA works has begun to draw attention. Many RMAA contracting companies are small- and medium-sized enterprises (SMEs) that do not have comprehensive safety management systems. Existing safety legislation and regulations for new construction sites are not fully applicable to RMAAworks. Instead of relying on explicit and well-established safety systems, tacit safety knowledge plays an extremely important role in RMAA projects. To improve safety of RMAAworks, safety knowledge should be better managed. However, safety knowledge is difficult to capture in RMAA works. This study aims to examine safety management practices of RMAA contracting companies to see how safety knowledge of RMAA projects is managed. Findings show that RMAA contracting companies undertaking large-scale RMAA projects have more initiatives of safety management. Safety management of small-scale RMAA works relies heavily on the motivation of site supervisors and self-regulation of workers. Better tacit knowledge management improves safety performance. To enhance safety capability of RMAA contracting companies, a knowledge sharing culture should be cultivated. The government should provide assistance to SMEs to implement proper safety management practices in small-sized projects. Potentials of applying computer software technology in RMAA projects to capture, store, and retrieve safety information should be explored. Employees should be motivated to share safety knowledge by giving proper recognition to those who are willing to share.
Resumo:
The adoption of packaged software is becoming increasingly common in a variety of organizations and much of the packaged software literature presents this as a straightforward, linear process based on rationalistic evaluation. This paper applies the framework of power relations developed by Markus and Bjørn-‐Anderson (1987) to a longitudinal study concerning the adoption of a customer relationship management package in a small organization. This is used to highlight both overt and covert power issues within the selection and procurement of the product and illustrate the interplay of power between senior management, IT managers, IT vendors and consultants, and end-‐users. The paper contributes to the growing body of literature on packaged software and also to our understanding of how power is deeply embedded within the surrounding processes.
Resumo:
Purpose – This paper seeks to analyse the process of packaged software selection in a small organization, focussing particularly on the role of IT consultants as intermediaries in the process. Design/methodology/approach – This is based upon a longitudinal, qualitative field study concerning the adoption of a customer relationship management package in an SME management consultancy. Findings – The authors illustrate how the process of “salesmanship”, an activity directed by the vendor/consultant and focussed on the interests of senior management, marginalises user needs and ultimately secures the procurement of the software package. Research limitations/implications – Despite the best intentions the authors lose something of the rich detail of the lived experience of technology in presenting the case study as a linear narrative. Specifically, the authors have been unable to do justice to the complexity of the multifarious ways in which individual perceptions of the project were influenced and shaped by the opinions of others. Practical implications – Practitioners, particularly those from within SMEs, should be made aware of the ways in which external parties may have a vested interest in steering projects in a particular direction, which may not necessarily align with their own interests. Originality/value – This study highlights in detail the role of consultants and vendors in software selection processes, an area which has received minimal attention to date. Prior work in this area emphasises the necessary conditions for, and positive outcomes of, appointing external parties in an SME context, with only limited attention being paid to the potential problems such engagements may bring.
Resumo:
Customer Relationship Management (CRM) packaged software has become a key contributor to attempts at aligning business and IT strategies in recent years. Throughout the 1990s there was, in many organisations strategies, a shift from the need to manage transactions and toward relationship management. Where Enterprise Resource Planning packages dominated the management of transactions era, CRM packages lead in regard to relationships. At present, balanced views of CRM packages are scantly presented instead relying on vendor rhetoric. This paper uses case study research to analyse some of the issues associated with CRM packages. These issues include the limitations of CRM packages, the need for a relationship orientation and the problems of a dominant management perspective of CRM. It is suggested that these issues could be more readily accommodated by organisational detachment from beliefs in IT as utopia, consideration of prior IS theory and practice and a more informed approach to CRM package selection.
Resumo:
Purpose The purpose of this paper is to explore and compare the asset management policies and practices of six Australian states – New South Wales, Victoria, Queensland, South Australia, Western Australia and Tasmania – to improve understanding of the policy context to best shape policy focus and guidelines. Australian state-wide asset management policies and guidelines are an emergent policy domain, generating a substantial body of knowledge. However, these documents are spread across the layers of government and are therefore largely fragmented and lack coherency. Design/methodology/approach The comparative study is based on the thematic mapping technique using the Leximancer software. Findings Asset management policies and guidelines of New South Wales and Victoria have more interconnected themes as compared to other states in Australia. Moreover, based on the findings, New South Wales has covered most of the key concepts in relation to asset management; the remaining five states are yet to develop a comprehensive and integrated approach to asset management policies and guidelines. Research limitations/implications This review and its findings have provided a number of directions on which government policies can now be better constructed and assessed. In doing so, the paper contributes to a coherent way forward to satisfy national emergent and ongoing asset management challenges. This paper outlines a rigorous analytical methodology to inform specific policy changes. Originality/value This paper provides a basis for further research focused on analyzing the context and processes of asset management guidelines and policies.
Resumo:
This study examines how call centres adopt different types of human resource practices (involvement and control oriented) to manage frontline employees in Indian call centres. Data were collected from 250 call centre representatives to test the research hypotheses. The research model was analyzed using Mplus software. Findings showed that involvement and control oriented human resource practices resulted in more employee exhaustion and disengagement. Involvement oriented HRM had a positive impact on job satisfaction as well as, a positive relationship between employee exhaustion and disengagement. The findings suggest that, while involvement oriented HRM enhances job satisfaction, its implementation comes with a cost, that is, an increase in employee exhaustion and disengagement at work.
Resumo:
This chapter analyses the copyright law framework needed to ensure open access to outputs of the Australian academic and research sector such as journal articles and theses. It overviews the new knowledge landscape, the principles of copyright law, the concept of open access to knowledge, the recently developed open content models of copyright licensing and the challenges faced in providing greater access to knowledge and research outputs.
Resumo:
This article provides a general review of the literature on the nature and role of empathy in social interaction for information professionals working in a variety of information and knowledge environments. Relational agency theory (Edwards, 2005) is used asa framework to re-conceptualize education for empathic social interaction between information professionals and their clients. Past, present and future issues relevant to empathic interaction in information and knowledge management are discussed in the context of three shifts identified from the literature: (a) the continued increase in communication channels, both physical and virtual, for reference, information and re-search services, (b) the transition from the information age to the conceptual age and(c) the growing need for understanding of the affective paradigm in the information and knowledge professions. Findings from the literature review on the relationships between empathy and information behavior, social networking, knowledge management and information and knowledge services are presented. Findings are discussed in relation to the development of guidelines for the affective education and training of information and knowledge professionals and the potential use of virtual learning software such as Second Life in developing empathic communication skills
Resumo:
QUT Library Research Support has simplified and streamlined the process of research data management planning, storage, discovery and reuse through collaboration and the use of integrated and tailored online tools, and a simplification of the metadata schema. This poster presents the integrated data management services a QUT, including QUT’s Data Management Planning Tool, Research Data Finder, Spatial Data Finder and Software Finder, and information on the simplified Registry Interchange Format – Collections and Services (RIF-CS) Schema. The QUT Data Management Planning (DMP) Tool was built using the Digital Curation Centre’s DMP Online Tool and modified to QUT’s needs and policies. The tool allows researchers and Higher Degree Research students to plan how to handle research data throughout the active phase of their research. The plan is promoted as a ‘live’ document’ and researchers are encouraged to update it as required. The information entered into the plan can be made private or shared with supervisors, project members and external examiners. A plan is mandatory when requesting storage space on the QUT Research Data Storage Service. QUT’s Research Data Finder is integrated with QUT’s Academic Profiles and the Data Management Planning Tool to create a seamless data management process. This process aims to encourage the creation of high quality rich records which facilitate discovery and reuse of quality data. The Registry Interchange Format – Collections and Services (RIF-CS) Schema that is used in the QUT Research Data Finder was simplified to “RIF-CS lite” to reflect mandatory and optional metadata requirements. RIF-CS lite removed schema fields that were underused or extra to the needs of the users and system. This has reduced the amount of metadata fields required from users and made integration of systems a far more simple process where field content is easily shared across services making the process of collecting metadata as transparent as possible.
Resumo:
Since their inception in 1962, Petri nets have been used in a wide variety of application domains. Although Petri nets are graphical and easy to understand, they have formal semantics and allow for analysis techniques ranging from model checking and structural analysis to process mining and performance analysis. Over time Petri nets emerged as a solid foundation for Business Process Management (BPM) research. The BPM discipline develops methods, techniques, and tools to support the design, enactment, management, and analysis of operational business processes. Mainstream business process modeling notations and workflow management systems are using token-based semantics borrowed from Petri nets. Moreover, state-of-the-art BPM analysis techniques are using Petri nets as an internal representation. Users of BPM methods and tools are often not aware of this. This paper aims to unveil the seminal role of Petri nets in BPM.