289 resultados para ERP implementation
Resumo:
This paper proposes a plan to evaluate ways in which EQ Staff undertake their responsibility to implement the substantive policy, Inclusive Education Statement- 2005, Education Queensland. The Inclusive Education Statement, 2005 (Education Queensland), is a substantive policy that drove the development of the subsequent procedures, CRP-PR-009: Inclusive Education. These procedures state that “All Education Queensland (EQ) staff have responsibilities ........to implement the Inclusive Education Statement 2005”.
Resumo:
In Orissa state, India, the DakNet system supports asynchronous Internet communication between an urban hub and rural nodes. DakNet is noteworthy in many respects, not least in how the system leverages existing transport infrastructure. Wi-Fi transceivers mounted on local buses send and receive user data from roadside kiosks, for later transfer to/from the Internet via wireless protocols. This store-and-forward system allows DakNet to offer asynchronous communication capacity to rural users at low cost. The original ambition of the DakNet system was to provide email and SMS facilities to rural communities. Our 2008 study of the communicative ecology surrounding the DakNet system revealed that this ambition has now evolved – in response to market demand – to the extent that e-shopping (rather than email) has become the primary driver behind the DakNet offer.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
In this paper, a fixed-switching-frequency closed-loop modulation of a voltage-source inverter (VSI), upon the digital implementation of the modulation process, is analyzed and characterized. The sampling frequency of the digital processor is considered as an integer multiple of the modulation switching frequency. An expression for the determination of the modulation design parameter is developed for smooth modulation at a fixed switching frequency. The variation of the sampling frequency, switching frequency, and modulation index has been analyzed for the determination of the switching condition under closed loop. It is shown that the switching condition determined based on the continuous-time analysis of the closed-loop modulation will ensure smooth modulation upon the digital implementation of the modulation process. However, the stability properties need to be tested prior to digital implementation as they get deteriorated at smaller sampling frequencies. The closed-loop modulation index needs to be considered maximum while determining the design parameters for smooth modulation. In particular, a detailed analysis has been carried out by varying the control gain in the sliding-mode control of a two-level VSI. The proposed analysis of the closed-loop modulation of the VSI has been verified for the operation of a distribution static compensator. The theoretical results are validated experimentally on both single- and three-phase systems.
Resumo:
In response to a range of contextual drivers, the worldwide adoption of ERP Systems in Higher Education Institutions (HEIs) has increased substantially over the past decade. Though this demand continues to grow, with HEIs now a main target market for ERP vendors, little has been published on the topic. This paper reports a sub-study of a larger research effort that aims to contribute to understanding the phenomenon of ERP adoption and evaluation in HEIs in the Australasian region. It presents a descriptive case study conducted at Queensland University of Technology (QUT) in Australia, with emphasis on challenges with ERP adoption. The case study provides rich contextual details about ERP system selection, customisation, integration and evaluation, and insights into the role of consultants in the HE sector. Through this analysis, the paper (a) provides evidence of the dearth of ERP literature pertaining to the HE sector; (b) yields insights into differentiating factors in the HE sector that warrants specific research attention, and (c) offers evidence of how key ERP decisions such as systems selection, customisation, integration, evaluation, and consultant engagement are influenced by the specificities of the HE sector.
Resumo:
Networks are increasingly recognised as advantageous when creating and embedding cultural change within organisations. This paper explores andproblematises ideas around networks for education for sustainability (EfS), Australian Sustainable Schools Initiative (AuSSI), a national, whole-school approach to EfS. In three Australian states - New South Wales, Victoria and Queensland – AuSSI has been implemented in different ways. In examining the use of products, facilitators and networks to embed initiatives such as AuSSI in Australian schools, we propose a “continuum of cultural change strategies” as a framework for thinking about each of these approaches to creating organisational and cultural change for sustainability. We anticipate that such a framework may assist where choices need to be made in relation to the kinds of capacity building processes that might best achieve “deep and wide” change within schools hoping to engender significant cultural change.
Resumo:
Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.
Resumo:
In an automotive environment, the performance of a speech recognition system is affected by environmental noise if the speech signal is acquired directly from a microphone. Speech enhancement techniques are therefore necessary to improve the speech recognition performance. In this paper, a field-programmable gate array (FPGA) implementation of dual-microphone delay-and-sum beamforming (DASB) for speech enhancement is presented. As the first step towards a cost-effective solution, the implementation described in this paper uses a relatively high-end FPGA device to facilitate the verification of various design strategies and parameters. Experimental results show that the proposed design can produce output waveforms close to those generated by a theoretical (floating-point) model with modest usage of FPGA resources. Speech recognition experiments are also conducted on enhanced in-car speech waveforms produced by the FPGA in order to compare recognition performance with the floating-point representation running on a PC.
Resumo:
Improved public awareness and strong sentiments towards environmental issues will continue to create increasing demand for sustainable housing (SH) in the coming years. Despite this potential, the up-take rate of sustainable housing in new build and through home renovation is not as high as expected within the housing industry. This is in contrast to the influx of emerging building technologies, new materials and innovative designs seen in exemplar homes built worldwide. How we should use the increasing awareness of SH and emerging technologies as an impetus to change the un-sustainable designs and practices of the building industry is high on the agenda of the government and majority of the stakeholders involved. This warrants the study of multifaceted strategies that meet the needs of multiple stakeholders and integrated seamlessly into housing development processes. Specifically, the different perceptions, roles and incentives of stakeholders, who inevitably need to ensure their benefits and commercial returns, should be highlighted and acted upon. ----- This paper discusses the preliminary findings of a research project that aims to promote SH implementation by identifying and materializing the mutual benefits among key stakeholders. The aim is to be achieved through questionnaire surveys, structural equation modelling, interviews and case studies with seven major stakeholders within the Australian housing industry. This research identifies the influence and relationship of relevant factors, investigates preferences, similarities and differences between stakeholders on perceived benefits and in turn explores the mutual-benefit strategy package that facilitates decision making towards sustainable housing development.
Resumo:
This paper has two main sections, the first of which presents a summarized review of the literature concerning previous studies on the implementation of ISO 9000 quality management systems (QMSs) both in global construction companies as well as in Indonesian construction firms, and the perceived correlation between organisational culture and QMS practices in the construction sector. The first section of the paper contributes to the development of the second section, which presents details of the research project being undertaken. Based on the fundamental questions that led to the development of the main research objectives, suitable research methods have been developed in order to meet these objectives. Primary data will be collected by use of a mixed methods approach, i.e., questionnaire surveys and focus group discussions/interviews in order to obtain opinions from respondents drawn from targeted ISO construction firms. Most of the data expected to be obtained will be in future be analyzed using statistical software then the findings will be discussed in order to ultimately develop a culture-based QMS framework.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
The RAP-A Indigenous supplement has been designed to provide guidelines for the Adaptation and implementation of the RAP Program for indigenous adolescents. It describes a variety of adaptations that have been made to RAP-A to make it more suitable for indigenous teenagers.