199 resultados para Linear available transfer capability (ATC)
Resumo:
The dynamic interaction between building systems and external climate is extremely complex, involving a large number of difficult-to-predict variables. In order to study the impact of global warming on the built environment, the use of building simulation techniques together with forecast weather data are often necessary. Since all building simulation programs require hourly meteorological input data for their thermal comfort and energy evaluation, the provision of suitable weather data becomes critical. Based on a review of the existing weather data generation models, this paper presents an effective method to generate approximate future hourly weather data suitable for the study of the impact of global warming. Depending on the level of information available for the prediction of future weather condition, it is shown that either the method of retaining to current level, constant offset method or diurnal modelling method may be used to generate the future hourly variation of an individual weather parameter. An example of the application of this method to the different global warming scenarios in Australia is presented. Since there is no reliable projection of possible change in air humidity, solar radiation or wind characters, as a first approximation, these parameters have been assumed to remain at the current level. A sensitivity test of their impact on the building energy performance shows that there is generally a good linear relationship between building cooling load and the changes of weather variables of solar radiation, relative humidity or wind speed.
Resumo:
Knowledge has been recognised as an important organisational asset that increases in value when shared; the opposite to other organisational assets which decrease in value during their exploitation. Effective knowledge transfer in organisations helps to achieve and maintain competitive advantage and ultimately organisational success. So far, the research on knowledge transfer has focused on traditional (functional) organisations. Only recently has attention been directed towards knowledge transfer in projects. Existing research on project learning has recognised the need for knowledge transfer within and across projects in project-based organisations (PBOs). Most projects can provide valuable new knowledge from unexpected actions, approaches or problems experienced during the project phases. The aim of this paper is to demonstrate the impact of unique projects characteristics on knowledge transfer in PBO. This is accomplished through review of the literature and a series of interviews with senior project practitioners. The interviews complement the findings from the literature. Knowledge transfer in projects occurs by social communication and transfer of lessons learned where project management offices (PMOs) and project managers play significant roles in enhancing knowledge transfer and communication within the PBO and across projects. They act as connectors between projects and the PBO ‘hub’. Moreover, some project management processes naturally facilitate knowledge transfer across projects. On the other hand, PBOs face communication challenges due to unique and temporary characteristics of projects. The distance between projects and the lack or weakness of formal links across projects, create communication problems that impede knowledge transfer across projects. The main contribution of this paper is to demonstrate that both social communication and explicit informational channels play important role in inter-project knowledge transfer. Interviews also revealed the important role organisational culture play in knowledge transfer in PBOs.
Resumo:
The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.
Resumo:
Principal Topic A small firm is unlikely to possess internally the full range of knowledge and skills that it requires or could benefit from for the development of its business. The ability to acquire suitable external expertise - defined as knowledge or competence that is rare in the firm and acquired from the outside - when needed thus becomes a competitive factor in itself. Access to external expertise enables the firm to focus on its core competencies and removes the necessity to internalize every skill and competence. However, research on how small firms access external expertise is still scarce. The present study contributes to this under-developed discussion by analysing the role of trust and strong ties in the small firm's selection and evaluation of sources of external expertise (henceforth referred to as the 'business advisor' or 'advisor'). Granovetter (1973, 1361) defines the strength of a network tie as 'a (probably linear) combination of the amount of time, the emotional intensity, the intimacy (mutual confiding) and the reciprocal services which characterize the tie'. Strong ties in the context of the present investigation refer to sources of external expertise who are well known to the owner-manager, and who may be either informal (e.g., family, friends) or professional advisors (e.g., consultants, enterprise support officers, accountants or solicitors). Previous research has suggested that strong and weak ties have different fortes and the choice of business advisors could thus be critical to business performance) While previous research results suggest that small businesses favour previously well known business advisors, prior studies have also pointed out that an excessive reliance on a network of well known actors might hamper business development, as the range of expertise available through strong ties is limited. But are owner-managers of small businesses aware of this limitation and does it matter to them? Or does working with a well-known advisor compensate for it? Hence, our research model first examines the impact of the strength of tie on the business advisor's perceived performance. Next, we ask what encourages a small business owner-manager to seek advice from a strong tie. A recent exploratory study by Welter and Kautonen (2005) drew attention to the central role of trust in this context. However, while their study found support for the general proposition that trust plays an important role in the choice of advisors, how trust and its different dimensions actually affect this choice remained ambiguous. The present paper develops this discussion by considering the impact of the different dimensions of perceived trustworthiness, defined as benevolence, integrity and ability, on the strength of tie. Further, we suggest that the dimensions of perceived trustworthiness relevant in the choice of a strong tie vary between professional and informal advisors. Methodology/Key Propositions Our propositions are examined empirically based on survey data comprising 153 Finnish small businesses. The data are analysed utilizing the partial least squares (PLS) approach to structural equation modelling with SmartPLS 2.0. Being non-parametric, the PLS algorithm is particularly well-suited to analysing small datasets with non-normally distributed variables. Results and Implications The path model shows that the stronger the tie, the more positively the advisor's performance is perceived. Hypothesis 1, that strong ties will be associated with higher perceptions of performance is clearly supported. Benevolence is clearly the most significant predictor of the choice of a strong tie for external expertise. While ability also reaches a moderate level of statistical significance, integrity does not have a statistically significant impact on the choice of a strong tie. Hence, we found support for two out of three independent variables included in Hypothesis 2. Path coefficients differed between the professional and informal advisor subsamples. The results of the exploratory group comparison show that Hypothesis 3a regarding ability being associated with strong ties more pronouncedly when choosing a professional advisor was not supported. Hypothesis 3b arguing that benevolence is more strongly associated with strong ties in the context of choosing an informal advisor received some support because the path coefficient in the informal advisor subsample was much larger than in the professional advisor subsample. Hypothesis 3c postulating that integrity would be more strongly associated with strong ties in the choice of a professional advisor was supported. Integrity is the most important dimension of trustworthiness in this context. However, integrity is of no concern, or even negative, when using strong ties to choose an informal advisor. The findings of this study have practical relevance to the enterprise support community. First of all, given that the strength of tie has a significant positive impact on the advisor's perceived performance, this implies that small business owners appreciate working with advisors in long-term relationships. Therefore, advisors are well advised to invest into relationship building and maintenance in their work with small firms. Secondly, the results show that, especially in the context of professional advisors, the advisor's perceived integrity and benevolence weigh more than ability. This again emphasizes the need to invest time and effort into building a personal relationship with the owner-manager, rather than merely maintaining a professional image and credentials. Finally, this study demonstrates that the dimensions of perceived trustworthiness are orthogonal with different effects on the strength of tie and ultimately perceived performance. This means that entrepreneurs and advisors should consider the specific dimensions of ability, benevolence and integrity, rather than rely on general perceptions of trustworthiness in their advice relationships.
Resumo:
In dynamic environments, firms seek to build capabilities which will permit them to become innovation and change ready. Programs offered by intermediaries, while varying greatly in content and format, are designed to support those firms wishing to enhance their competitiveness. Firms which participate in intermediary programs have displayed their willingness to overcome deficiencies or barriers to competitiveness through acquiring knowledge which is external to the firm. This paper reports on interviews with 24 firms who were involved in a MAP or TAP program offered by QMI Solutions. The findings of the research suggest that knowledge intermediaries serve to disrupt organisational paths and in so doing establish mechanisms for ongoing learning and change. They do this first by disrupting the firm with a positive learning experience and also by establishing processes for developing new relationships and access to knowledge which are critical for learning and change. It is the experience of learning through knowledge exchange which can trigger the pursuit of new paths and it is the processes involving new relations and knowledge processing that provides the micro-foundations for ongoing learning and change. This suggests that the role of intermediaries goes well beyond merely knowledge transfer to include longer term effects on the capability of organisations to innovate, which is critical to economic competitiveness and the survival rate of firms.
Resumo:
This paper aims to develop the methodology and strategy for concurrent finite element modeling of civil infrastructures at the different scale levels for the purposes of analyses of structural deteriorating. The modeling strategy and method were investigated to develop the concurrent multi-scale model of structural behavior (CMSM-of-SB) in which the global structural behavior and nonlinear damage features of local details in a large complicated structure could be concurrently analyzed in order to meet the needs of structural-state evaluation as well as structural deteriorating. In the proposed method, the “large-scale” modeling is adopted for the global structure with linear responses between stress and strain and the “small-scale” modeling is available for nonlinear damage analyses of the local welded details. A longitudinal truss in steel bridge decks was selected as a case to study how a CMSM-of-SB was developed. The reduced-scale specimen of the longitudinal truss was studied in the laboratory to measure its dynamic and static behavior in global truss and local welded details, while the multi-scale models using constraint equations and substructuring were developed for numerical simulation. The comparison of dynamic and static response between the calculated results by different models indicated that the proposed multi-scale model was found to be the most efficient and accurate. The verification of the model with results from the tested truss under the specific loading showed that, responses at the material scale in the vicinity of local details as well as structural global behaviors could be obtained and fit well with the measured results. The proposed concurrent multi-scale modeling strategy and implementation procedures were applied to Runyang cable-stayed bridge (RYCB) and the CMSM-of-SB of the bridge deck system was accordingly constructed as a practical application.
Resumo:
This paper uses the case study of a hybrid public-private strategic alliance as data to complement and contrast with the traditional views on knowledge transfer and learning between alliance partners. In particular, the paper explores whether the concept of competitive collaboration conceptualized by Hamel (1991) in his seminal work holds true for all forms of strategic alliances. Conceptualizing the knowledge boundaries of organisations in alliances as a ‘collaborative membrane’, we focus attention on the permeability of these boundaries rather than the actual location of the boundaries. In this vein, we present a case study of a major public sector organization that illustrates how these principles have allowed it to start rebuilding its internal capabilities adopting a more collaborative stance and ensuring their knowledge boundaries are highly porous as they move more major projects into hybrid public private alliance contracts.
Resumo:
Tract consultants are a landscape architecture practice, founded in 1973 as an offshoot to the highly innovative, interdisciplinary design and build company Merchant Builders, and was perhaps the first truly corporate practice of this type in Australia. Founding directors Rodney Wulff and Steve Calhoun were both instrumental in establishing the undergraduate landscape architecture course at RMIT University, and bringing our Jim Sinatra, who had taught Calhoun at the University of Iowa. Wulff remained for many years the holder of the only doctorate in landscape architecture in the country. This combination of an academic, design and professional agenda was a rich one for Tract in their early days. This founding generosity and interest in the intellectual aspects of landscape architecture continues in relation to the university in a number of ways, including information ones, such as the regular employment of applicants who fail to get into the course at RMIT. In preparing them for re-applying, he has given a number of individuals a way into the profession that the university could not allow.