525 resultados para Systems Biology
Resumo:
Networked control over data networks has received increasing attention in recent years. Among many problems in networked control systems (NCSs) is the need to reduce control latency and jitter and to deal with packet dropouts. This paper introduces our recent progress on a queuing communication architecture for real-time NCS applications, and simple strategies for dealing with packet dropouts. Case studies for a middle-scale process or multiple small-scale processes are presented for TCP/IP based real-time NCSs. Variations of network architecture design are modelled, simulated, and analysed for evaluation of control latency and jitter performance. It is shown that a simple bandwidth upgrade or adding hierarchy does not necessarily bring benefits for performance improvement of control latency and jitter. A co-design of network and control is necessary to maximise the real-time control performance of NCSs
Resumo:
Enterprise System (ES) implementation and management are knowledge intensive tasks that inevitably draw upon the experience of a wide range of people with diverse knowledge capabilities. Knowledge Management (KM) has been identified as a critical success factor in ES projects. Despite the recognized importance of managing knowledge for ES benefits realization, systematic attempts to conceptualize KM-structures have been few. Where the adequacy of KM-structures is assessed, the process and measures are typically idiosyncratic and lack credibility. Using the ‘KM-process’, itself based in sociology of knowledge, this paper conceptualizes four main constructs to measure the adequacy of KM-structures. The SEM model is tested using 310 responses gathered from 27 ES installations that had implemented SAP R/3. The findings reveal six constructs for KM-structure. Furthermore, the paper demonstrates the application of KM-structures in the context of ES using the Adaptive Structuration Theory. The results demonstrate that having adequate KM-structures in place, while necessary, is not sufficient. These rules and resources must be appropriated to have greater positive influence on the Enterprise System. Furthermore, the study provides empirical support for knowledge-based theory by illustrating the importance of knowledge use/re-use (vs. knowledge creation) as the most important driver in the process of KM.
Resumo:
This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.