363 resultados para Enterprise Architecture Mangement


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will explore the relationship between the giant South American waterlily, the Victoria regia (today named Victoria amazonica), and the 1914 Glashaus exposition building by the German architect, Bruno Taut. Starting with a general botanical introduction of Victoria regia, the paper exposes the first European cultivation of the lily by Joseph Paxton at Chatsworth,England, in 1849. Following this initial cultivation, Paxton subsequently develops a specialist greenhouse for the plant, that later becomes the prototype for all Victoria regia greenhouses. However, from about 1860 as Victoria regia cultivation spreads to continental Europe, a greenhouse that differs from Paxton’s prototype subsequently evolves. An investigation of these later continental European greenhouses, coupled with an exposure of Taut’s own writings concerning Victoria regia, reveals startling similarities to the Glashaus, which ultimately reveals the Glashaus as directly inspired by Victoria regia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Dynamic Data eXchange (DDX) is our third generation platform for building distributed robot controllers. DDX allows a coalition of programs to share data at run-time through an efficient shared memory mechanism managed by a store. Further, stores on multiple machines can be linked by means of a global catalog and data is moved between the stores on an as needed basis by multi-casting. Heterogeneous computer systems are handled. We describe the architecture of DDX and the standard clients we have developed that let us rapidly build complex control systems with minimal coding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This teaching case aims to contribute to understanding the phenomenon of Enterprise Systems (ES) implementations in universities. Through this case, students will gain understanding of the importance of ‘contextual elements’ for large scale information systems (IS) implementations, in particular ES. This teaching case illustrates how these contextual factors contribute to the success or failure of such implementations, and how they can influence the decisions that dictate the lifecycle of such systems. The case describes ES implementations at a leading Australian university, and presents a rich account of the institutional, national and industry-sector contexts that have influenced the directions and decisions taken. The journey encountered with the main Enterprise Systems that support Financials, Human Resources and Facilities are described suggesting the lifecycle phases, critical success factors and lessons learnt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the deconstruction of an enterprise into business services using value chain analysis as each element in the value chain can be rendered as a business service in the SOA. These business services are explicitly linked to the attainment of specific organizational strategies and their contribution to the attainment of strategy is assessed and recorded. This contribution is then used to provide a rank order of business service to strategy. This information facilitates executive decision making on which business service to develop into the SOA. The paper describes an application of this Critical Service Identification Methodology (CSIM) to a case study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over many centuries of settlement, Vietnamese inhabitants have developed a vernacular architecture that is well adapted to the region’s climatic and topographical conditions. Vernacular Vietnamese housing uses natural systems to create a built environment that integrates well with nature. The vernacular combines site-sensitive, passive solar design, natural materials and appropriate structure to achieve harmony among nature, humans and the built environment. Unfortunately, these unique features have not been applied in contemporary Vietnamese architecture, which displays energy-intensive materials and built forms. This research is analysing how environmentally-responsive elements of vernacular architecture could be applied to modern sustainable housing in Vietnam. Elements of many types of vernacular architecture throughout the country are reviewed as precedents for future building planning and design. The paper also looks at culturally and ecologically appropriate legislative and voluntary options for encouraging more sustainable housing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The pore architecture of scaffolds is known to play a critical role in tissue engineering as it provides the vital framework for seeded cells to organize into a functioning tissue. In this report we have investigated the effects of different concentrations of silk fibroin protein on three-dimensional (3D) scaffold pore microstructure. Four pore size ranges of silk fibroin scaffolds were made by the freeze drying technique, with the pore sizes ranging from 50 to 300 lm. The pore sizes of the scaffolds decreased as the concentration of fibroin protein increased. Human bone marrow mesenchymal stromal cells (BMSC) transfected with the BMP7 gene were cultured in these scaffolds. A cell viability colorimetric assay, alkaline phosphatase assay and reverse transcription-polymerase chain reaction were performed to analyze the effect of pore size on cell growth, the secretion of extracellular matrix (ECM) and osteogenic differentiation. Cell migration in 3D scaffolds was confirmed by confocal microscopy. Calvarial defects in SCID mice were used to determine the bone forming ability of the silk fibroin scaffolds incorporating BMSC expressing BMP7. The results showed that BMSC expressing BMP7 preferred a pore size between 100 and 300 lm in silk fibroin protein fabricated scaffolds, with better cell proliferation and ECM production. Furthermore, in vivo transplantation of the silk fibroin scaffolds combined with BMSC expressing BMP7 induced new bone formation. This study has shown that an optimized pore architecture of silk fibroin scaffolds can modulate the bioactivity of BMP7-transfected BMSC in bone formation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis considers Max Dupain (1911-1992) and his contribution to the development of architectural photography in Australia. Through his continuous and prolific output over six decades of professional photography Dupain greatly stimulated awareness of and interest in Australian architecture. Before Dupain began specialising in the field, little consistent professional architectural photography had been practised in Australia. He and some of his close associates subsequently developed architectural photography as both a specialised branch of photography and - perhaps more significantly - as a necessary adjunct to architectural practice. In achieving these dual accomplishments, Dupain and like-minded practitioners succeeded in elevating architectural photography to the status of a discipline in its own right. They also gave Australians generally a deeper understanding of the heritage represented by the nation's built environment. At the same time, some of the photographic images he created became firmly fixed in the public imagination as historical icons within the development of a distinctive Australian tradition in the visual arts. Within his chosen field Dupain was the dominant Australian figure of his time. He was instrumental in breaking the link with Pictorialism by bringing Modernist and Documentary perspectives to Australian architectural photography. He was an innovator in the earlier decades of his professional career, however, his photographic techniques and practice did not develop beyond that. By the end of the 1980s he had largely lost touch with the technology and techniques of contemporary practice. Dupain's reputation, which has continued growing since his death in 1992, therefore arises from reasons other than his photographic images alone. It reflects his accomplishment in raising his fellow citizens' awareness of a worthwhile home-grown artistic tradition.