345 resultados para Applying
Resumo:
The aim of this paper is to investigate the relationship between research and design through an applied example of how architects can approach the design for a building guided by data derived from morphological research. An Expert Focus Group consisting of nine leading architects and urban designers from Brisbane, Australia was given the task of testing this proposition. Analysis of the workshop outcomes are examined, and the design drawings of each participant are assessed to determine the relative congruence of the design proposals within the morphological commodity of the specific context. In addition, qualitative data, captured through verbal and written feedback is assessed highlighting the participants' observations and experiences of the workshop. This paper makes a contribution to the current debate within the field on the opportunities of integrating research with practice.
Resumo:
Fleck and Johnson (Int. J. Mech. Sci. 29 (1987) 507) and Fleck et al. (Proc. Inst. Mech. Eng. 206 (1992) 119) have developed foil rolling models which allow for large deformations in the roll profile, including the possibility that the rolls flatten completely. However, these models require computationally expensive iterative solution techniques. A new approach to the approximate solution of the Fleck et al. (1992) Influence Function Model has been developed using both analytic and approximation techniques. The numerical difficulties arising from solving an integral equation in the flattened region have been reduced by applying an Inverse Hilbert Transform to get an analytic expression for the pressure. The method described in this paper is applicable to cases where there is or there is not a flat region.
Resumo:
Metaphor is a multi-stage programming language extension to an imperative, object-oriented language in the style of C# or Java. This paper discusses some issues we faced when applying multi-stage language design concepts to an imperative base language and run-time environment. The issues range from dealing with pervasive references and open code to garbage collection and implementing cross-stage persistence.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
This paper is a detailed case narrative on how a Faculty of a leading Australian University conducted a rigorous process improvement project, applying fundamental Business Process Management (BPM) concepts. The key goal was to increase the efficiency of the faculty’s service desk. The decrease of available funds due to reducing student numbers and the ever increasing costs associated with service desk prompted this project. The outcomes of the project presented a set of recommendations which leads to organizational innovation having information technology as an enabler for change. The target audience includes general BPM practitioners or academics who are interested in BPM related case studies, and specific organisations who might be interested in conducting BPM within their service desk processes.
Resumo:
Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.
Resumo:
This paper examines the experiences of one middle years’ English and Studies of Society and Environment (SoSE) teacher who adopted a multiliteracies project-based orientation to a unit on War and Refugees. It details the multiliteracies teaching and learning cycle, which is based on four non-hierarchical, pedagogical orientations: situated practice, overt instruction, critical framing and transformed practice (New London Group, 2000; Kalantzis & Cope, 2005a). Following the work of Kalantzis and Cope (2005a), it draws out the knowledge processes exacted in each of these four phases: experiencing the known and the new; conceptualising by naming and theorising; analysing functionally and critically; and, applying appropriately and creatively. Two parents were invited to enter the study as coteachers with the teacher and researcher. Using Bourdieu’s (1992) construct of capital, the findings report on how the multiliteracies approach enabled them to engage in school-based literacy practices differently than they had done previously in classrooms. An unexpected finding concerns the teacher’s altered view about how his role and status were perceived by the parents.
Resumo:
Aided by the development of information technology, the balance of power in the market place is rapidly shifting from marketers towards consumers and nowhere is this more obvious than in the online environment (Denegri-Knott, Zwick, & Schroeder, 2006; Moynagh & Worsley, 2002; Newcomer, 2000; Samli, 2001). From the inception and continuous development of the Internet, consumers are becoming more empowered. They can choose what they want to click on the Internet, they can shop and transact payments, watch and download video, chat with others, be it friends or even total strangers. Especially in online communities, like-minded consumers share and exchange information, ideas and opinions. One form of online community is the online brand community, which gathers specific brand lovers. As with any social unit, people form different roles in the community and exert different effects on each other. Their interaction online can greatly influence the brand and marketers. A comprehensive understanding of the operation of this special group form is essential to advancing marketing thought and practice (Kozinets, 1999). While online communities have strongly shifted the balance of power from marketers to consumers, the current marketing literature is sparse on power theory (Merlo, Whitwell, & Lukas, 2004). Some studies have been conducted from an economic point of view (Smith, 1987), however their application to marketing has been limited. Denegri-Knott (2006) explored power based on the struggle between consumers and marketers online and identified consumer power formats such as control over the relationship, information, aggregation and participation. Her study has built a foundation for future power studies in the online environment. This research project bridges the limited marketing literature on power theory with the growing recognition of online communities among marketing academics and practitioners. Specifically, this study extends and redefines consumer power by exploring the concept of power in online brand communities, in order to better understand power structure and distribution in this context. This research investigates the applicability of the factors of consumer power identified by Denegri-Knott (2006) to the online brand community. In addition, by acknowledging the model proposed by McAlexander, Schouten, & Koenig (2002), which emphasized that community study should focus on the role of consumers and identifying multiple relationships among the community, this research further explores how member role changes will affect power relationships as well as consumer likings of the brand. As a further extension to the literature, this study also considers cultural differences and their effect on community member roles and power structure. Based on the study of Hofstede (1980), Australia and China were chosen as two distinct samples to represent differences in two cultural dimensions, namely individualism verses collectivism and high power distance verses low power distance. This contribution to the research also helps answer the research gap identified by Muñiz Jr & O'Guinn (2001), who pointed out the lack of cross cultural studies within the online brand community context. This research adopts a case study methodology to investigate the issues identified above. Case study is an appropriate research strategy to answer “how” and “why” questions of a contemporary phenomenon in real-life context (Yin, 2003). The online brand communities of “Haloforum.net” in Australia and “NGA.cn” in China were selected as two cases. In-depth interviews were used as the primary data collection method. As a result of the geographical dispersion and the preference of a certain number of participants, online synchronic interviews via MSN messenger were utilized along with the face-to-face interviews. As a supplementary approach, online observation was carried over two months, covering a two week period prior to the interviews and a six week period following the interviews. Triangulation techniques were used to strengthen the credibility and validity of the research findings (Yin, 2003). The findings of this research study suggest a new definition of power in an online brand community. This research also redefines the consumer power types and broadens the brand community model developed by McAlexander et al. (2002) in an online context by extending the various relationships between brand and members. This presents a more complete picture of how the perceived power relationships are structured in the online brand community. A new member role is discovered in the Australian online brand community in addition to the four member roles identified by Kozinets (1999), in contrast however, all four roles do not exist in the Chinese online brand community. The research proposes a model which links the defined power types and identified member roles. Furthermore, given the results of the cross-cultural comparison between Australia and China showed certain discrepancies, the research suggests that power studies in the online brand community should be country-specific. This research contributes to the body of knowledge on online consumer power, by applying it to the context of an online brand community, as well as considering factors such as cross cultural difference. Importantly, it provides insights for marketing practitioners on how to best leverage consumer power to serve brand objective in online brand communities. This, in turn, should lead to more cost effective and successful communication strategies. Finally, the study proposes future research directions. The research should be extended to communities of different sizes, to different extents of marketer control over the community, to the connection between online and offline activities within the brand community, and (given the cross-cultural findings) to different countries. In addition, a greater amount of research in this area is recommended to determine the generalizability of this study.
Resumo:
The behavioral theory of “entrepreneurial bricolage” attempts to understand what entrepreneurs do when faced with resource constraints. Most research about bricolage, defined as “making do by applying combinations of the resources at hand to new problems and opportunities” (Baker & Nelson 2005: 333), has been qualitative and inductive (Garud & Karnoe, 2003). Although this has created a small body of rich descriptions and interesting insights, little deductive theory has been developed and the relationship between bricolage and firm performance has not been systematically tested. In particular, prior research has suggested bricolage can have both beneficial and harmful effects. Ciborra’s (1996) study of Olivetti suggested that bricolage helped Olivetti to adapt, but simultaneously constrained firm effectiveness. Baker & Nelson (2005) suggested that bricolage may be harmful at very high levels, but more helpful if used judiciously. Other research suggests that firm innovativeness may play an important role in shaping the outcomes of bricolage (Anderson 2008). In this paper, we theorize and provide preliminary test of the bricolage-performance relationship and how it is affected by firm innovativeness.
Resumo:
Principal Topic: It is well known that most new ventures suffer from a significant lack of resources, which increases the risk of failure (Shepherd, Douglas and Shanley, 2000) and makes it difficult to attract stakeholders and financing for the venture (Bhide & Stevenson, 1999). The Resource-Based View (RBV) (Barney, 1991; Wernerfelt, 1984) is a dominant theoretical base increasingly drawn on within Strategic Management. While theoretical contributions applying RBV in the domain of entrepreneurship can arguably be traced back to Penrose (1959), there has been renewed attention recently (e.g. Alvarez & Busenitz, 2001; Alvarez & Barney, 2004). This said, empirical work is in its infancy. In part, this may be due to a lack of well developed measuring instruments for testing ideas derived from RBV. The purpose of this study is to develop a measurement scales that can serve to assist such empirical investigations. In so doing we will try to overcome three deficiencies in current empirical measures used for the application of RBV to the entrepreneurship arena. First, measures for resource characteristics and configurations associated with typical competitive advantages found in entrepreneurial firms need to be developed. These include such things as alertness and industry knowledge (Kirzner, 1973), flexibility (Ebben & Johnson, 2005), strong networks (Lee et al., 2001) and within knowledge intensive contexts, unique technical expertise (Wiklund and Shepard, 2003). Second, the RBV has the important limitations of being relatively static and modelled on large, established firms. In that context, traditional RBV focuses on competitive advantages. However, newly established firms often face disadvantages, especially those associated with the liabilities of newness (Aldrich & Auster, 1986). It is therefore important in entrepreneurial contexts to expand to an investigation of responses to competitive disadvantage through an RBV lens. Conversely, recent research has suggested that resource constraints actually have a positive effect on firm growth and performance under some circumstances (e.g., George, 2005; Katila & Shane, 2005; Mishina et al., 2004; Mosakowski, 2002; cf. also Baker & Nelson, 2005). Third, current empirical applications of RBV measured levels or amounts of particular resources available to a firm. They infer that these resources deliver firms competitive advantage by establishing a relationship between these resource levels and performance (e.g. via regression on profitability). However, there is the opportunity to directly measure the characteristics of resource configurations that deliver competitive advantage, such as Barney´s well known VRIO (Valuable, Rare, Inimitable and Organized) framework (Barney, 1997). Key Propositions and Methods: The aim of our study is to develop and test scales for measuring resource advantages (and disadvantages) and inimitability for entrepreneurial firms. The study proceeds in three stages. The first stage developed our initial scales based on earlier literature. Where possible, we adapt scales based on previous work. The first block of the scales related to the level of resource advantages and disadvantages. Respondents were asked the degree to which each resource category represented an advantage or disadvantage relative to other businesses in their industry on a 5 point response scale: Major Disadvantage, Slight Disadvantage, No Advantage or Disadvantage, Slight Advantage and Major Advantage. Items were developed as follows. Network capabilities (3 items) were adapted from (Madsen, Alsos, Borch, Ljunggren & Brastad, 2006). Knowledge resources marketing expertise / customer service (3 items) and technical expertise (3 items) were adapted from Wiklund and Shepard (2003). flexibility (2 items), costs (4 items) were adapted from JIBS B97. New scales were developed for industry knowledge / alertness (3 items) and product / service advantages. The second block asked the respondent to nominate the most important resource advantage (and disadvantage) of the firm. For the advantage, they were then asked four questions to determine how easy it would be for other firms to imitate and/or substitute this resource on a 5 point likert scale. For the disadvantage, they were asked corresponding questions related to overcoming this disadvantage. The second stage involved two pre-tests of the instrument to refine the scales. The first was an on-line convenience sample of 38 respondents. The second pre-test was a telephone interview with a random sample of 31 Nascent firms and 47 Young firms (< 3 years in operation) generated using a PSED method of randomly calling households (Gartner et al. 2004). Several items were dropped or reworded based on the pre-tests. The third stage (currently in progress) is part of Wave 1 of CAUSEE (Nascent Firms) and FEDP (Young Firms), a PSED type study being conducted in Australia. The scales will be tested and analysed with a random sample of approximately 700 Nascent and Young firms respectively. In addition, a judgement sample of approximately 100 high potential businesses in each category will be included. Findings and Implications: The paper will report the results of the main study (stage 3 – currently data collection is in progress) will allow comparison of the level of resource advantage / disadvantage across various sub-groups of the population. Of particular interest will be a comparison of the high potential firms with the random sample. Based on the smaller pre-tests (N=38 and N=78) the factor structure of the items confirmed the distinctiveness of the constructs. The reliabilities are within an acceptable range: Cronbach alpha ranged from 0.701 to 0.927. The study will provide an opportunity for researchers to better operationalize RBV theory in studies within the domain of entrepreneurship. This is a fundamental requirement for the ability to test hypotheses derived from RBV in systematic, large scale research studies.
Resumo:
In this article I outline and demonstrate a synthesis of the methods developed by Lemke (1998) and Martin (2000) for analyzing evaluations in English. I demonstrate the synthesis using examples from a 1.3-million-word technology policy corpus drawn from institutions at the local, state, national, and supranational levels. Lemke's (1998) critical model is organized around the broad 'evaluative dimensions' that are deployed to evaluate propositions and proposals in English. Martin's (2000) model is organized with a more overtly systemic-functional orientation around the concept of 'encoded feeling'. In applying both these models at different times, whilst recognizing their individual usefulness and complementarity, I found specific limitations that led me to work towards a synthesis of the two approaches. I also argue for the need to consider genre, media, and institutional aspects more explicitly when claiming intertextual and heteroglossic relations as the basis for inferred evaluations. A basic assertion made in this article is that the perceived Desirability of a process, person, circumstance, or thing is identical to its 'value'. But the Desirability of anything is a socially and thus historically conditioned attribution that requires significant amounts of institutional inculcation of other 'types' of value-appropriateness, importance, beauty, power, and so on. I therefore propose a method informed by critical discourse analysis (CDA) that sees evaluation as happening on at least four interdependent levels of abstraction.
Resumo:
The construction industry has adapted information technology in its processes in terms of computer aided design and drafting, construction documentation and maintenance. The data generated within the construction industry has become increasingly overwhelming. Data mining is a sophisticated data search capability that uses classification algorithms to discover patterns and correlations within a large volume of data. This paper presents the selection and application of data mining techniques on maintenance data of buildings. The results of applying such techniques and potential benefits of utilising their results to identify useful patterns of knowledge and correlations to support decision making of improving the management of building life cycle are presented and discussed.
Using Agents for Mining Maintenance Data while interacting in 3D Objectoriented Virtual Environments
Resumo:
This report demonstrates the development of: (a) object-oriented representation to provide 3D interactive environment using data provided by Woods Bagot; (b) establishing basis of agent technology for mining building maintenance data, and (C) 3D interaction in virtual environments using object-oriented representation. Applying data mining over industry maintenance database has been demonstrated in the previous report.