12 resultados para Reusing

em Queensland University of Technology - ePrints Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new stormwater quality improvement device (SQID) called ‘Green Gully’ has been designed and developed in this study with an aim to re-using stormwater for irrigating plants and trees. The main purpose of the Green Gully is to collect road runoff/stormwater, make it suitable for irrigation and provide an automated network system for watering roadside plants and irrigational areas. This paper presents the design and development of Green Gully along with experimental and computational investigations of the performance of Green Gully. Performance (in the form of efficiency, i.e. the percentage of water flow through the gully grate) was experimentally determined using a gully model in the laboratory first, then a three dimensional numerical model was developed and simulated to predict the efficiency of Green Gully as a function of flow rate. Computational Fluid Dynamics (CFD) code FLUENT was used for the simulation. GAMBIT was used for geometry creation and mesh generation. Experimental and simulation results are discussed and compared in this paper. The predicted efficiency was compared with the laboratory measured efficiency. It was found that the simulated results are in good agreement with the experimental results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the quest for shorter time-to-market, higher quality and reduced cost, model-driven software development has emerged as a promising approach to software engineering. The central idea is to promote models to first-class citizens in the development process. Starting from a set of very abstract models in the early stage of the development, they are refined into more concrete models and finally, as a last step, into code. As early phases of development focus on different concepts compared to later stages, various modelling languages are employed to most accurately capture the concepts and relations under discussion. In light of this refinement process, translating between modelling languages becomes a time-consuming and error-prone necessity. This is remedied by model transformations providing support for reusing and automating recurring translation efforts. These transformations typically can only be used to translate a source model into a target model, but not vice versa. This poses a problem if the target model is subject to change. In this case the models get out of sync and therefore do not constitute a coherent description of the software system anymore, leading to erroneous results in later stages. This is a serious threat to the promised benefits of quality, cost-saving, and time-to-market. Therefore, providing a means to restore synchronisation after changes to models is crucial if the model-driven vision is to be realised. This process of reflecting changes made to a target model back to the source model is commonly known as Round-Trip Engineering (RTE). While there are a number of approaches to this problem, they impose restrictions on the nature of the model transformation. Typically, in order for a transformation to be reversed, for every change to the target model there must be exactly one change to the source model. While this makes synchronisation relatively “easy”, it is ill-suited for many practically relevant transformations as they do not have this one-to-one character. To overcome these issues and to provide a more general approach to RTE, this thesis puts forward an approach in two stages. First, a formal understanding of model synchronisation on the basis of non-injective transformations (where a number of different source models can correspond to the same target model) is established. Second, detailed techniques are devised that allow the implementation of this understanding of synchronisation. A formal underpinning for these techniques is drawn from abductive logic reasoning, which allows the inference of explanations from an observation in the context of a background theory. As non-injective transformations are the subject of this research, there might be a number of changes to the source model that all equally reflect a certain target model change. To help guide the procedure in finding “good” source changes, model metrics and heuristics are investigated. Combining abductive reasoning with best-first search and a “suitable” heuristic enables efficient computation of a number of “good” source changes. With this procedure Round-Trip Engineering of non-injective transformations can be supported.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RatSLAM is a vision-based SLAM system based on extended models of the rodent hippocampus. RatSLAM creates environment representations that can be processed by the experience mapping algorithm to produce maps suitable for goal recall. The experience mapping algorithm also allows RatSLAM to map environments many times larger than could be achieved with a one to one correspondence between the map and environment, by reusing the RatSLAM maps to represent multiple sections of the environment. This paper describes experiments investigating the effects of the environment-representation size ratio and visual ambiguity on mapping and goal navigation performance. The experiments demonstrate that system performance is weakly dependent on either parameter in isolation, but strongly dependent on their joint values.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software transactional memory has the potential to greatly simplify development of concurrent software, by supporting safe composition of concurrent shared-state abstractions. However, STM semantics are defined in terms of low-level reads and writes on individual memory locations, so implementations are unable to take advantage of the properties of user-defined abstractions. Consequently, the performance of transactions over some structures can be disappointing. ----- ----- We present Modular Transactional Memory, our framework which allows programmers to extend STM with concurrency control algorithms tailored to the data structures they use in concurrent programs. We describe our implementation in Concurrent Haskell, and two example structures: a finite map which allows concurrent transactions to operate on disjoint sets of keys, and a non-deterministic channel which supports concurrent sources and sinks. ----- ----- Our approach is based on previous work by others on boosted and open-nested transactions, with one significant development: transactions are given types which denote the concurrency control algorithms they employ. Typed transactions offer a higher level of assurance for programmers reusing transactional code, and allow more flexible abstract concurrency control.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Just Fast Keying (JFK) is a simple, efficient and secure key exchange protocol proposed by Aiello et al. (ACM TISSEC, 2004). JFK is well known for its novel design features, notably its resistance to denial-of-service (DoS) attacks. Using Meadows’ cost-based framework, we identify a new DoS vulnerability in JFK. The JFK protocol is claimed secure in the Canetti-Krawczyk model under the Decisional Diffie-Hellman (DDH) assumption. We show that security of the JFK protocol, when reusing ephemeral Diffie-Hellman keys, appears to require the Gap Diffie-Hellman (GDH) assumption in the random oracle model. We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we examine the usability of tablets for students in middle school in the context of mobile environmental education. Our study focuses on the expressive qualities of three input methods – text, audio and drawing – and the extent to which these methods support on-task behaviour. In our study 28 small groups of children were given iPads and asked to record ecological observations from around their schoolyard. The effectiveness of the devices and their core utility for expressive, on-task data capture is assessed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the most common ways to share project knowledge is to capture the positive and negative aspects of projects in the form of lessons learned (LL). If effectively used, this process can assist project managers in reusing project knowledge and preventing future projects from repeating mistakes. Nevertheless, the process of capturing, storing, reviewing and reusing LL often remains suboptimal. Despite the potential for rich knowledge capture, lessons are often documented as simple, line-item statements devoid of context. Findings from an empirical investigation across four cases revealed a range of reasons related to the perceived quality, process and visibility of LL that lead to their limited use and application. Drawn from the cross-case analysis, this paper investigates an integrated approach to LL involving the use of a collaborative Web-based tool, which is easily accessible, intelligible and user-friendly, allowing more effective sharing of project knowledge and overcoming existing problems with LL.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge Management (KM) is vital factor to successfully undertake projects. The temporary nature of projects necessitates employing useful KM practices to reduce any issues such as knowledge leakiness and rework. The Project Management Office (PMO) is a unit within organisations to facilitate and oversee organisational projects. Project Management Maturity Models (PMMM) show the development of PMOs from immature to mature levels. The existing PMMMs have focused on discussing Project Management (PM) practices, however, the management of project knowledge is yet to be addressed, at various levels of maturity. A research project was undertaken to investigate the mentioned gap for addressing KM practices at the existing PMMMs. Due to the exploratory and inductive nature of this research, qualitative methods using case studies were chosen as the research methodology to investigate the problem in the real world. In total, three cases selected from different industries: research; mining and government organisations, to provide broad categories for research and research questions were examined using the developed framework. This paper presents the findings from the investigation of the research organisation with the lowest level of maturity. From KM process point of view, knowledge creation and capturing are the most important processes, while knowledge transferring and reusing received less attention. In addition, it was revealed that provision of “knowledge about client” and “project management knowledge” are the most important types of knowledge that are required at this level of maturity. The results also revealed that PMOs with higher maturity level have better knowledge management, however, some improvement is needed. In addition, the importance of KM processes varies at different levels of maturity. In conclusion, the outcomes of this paper could provide powerful guidance to PMOs at lowest level of maturity from KM point of view.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge Management (KM) is vital factor to successfully undertake projects. The temporary nature of projects necessitates employing useful KM practices for tackling issues such as knowledge leakiness and rework. The Project Management Office (PMO) is a unit within organizations to facilitate and oversee organizational projects. Project Management Maturity Models (PMMM) shows the development of PMOs from immature to mature levels. The existing PMMMs have focused on discussing Project Management (PM) practices, however, the management of project knowledge is yet to be addressed, at various levels of maturity. This research project was undertaken to investigate the mentioned gap for addressing KM practices at the existing PMMMs. Due to the exploratory and inductive nature of this research, qualitative methods were chosen as the research methodology. In total, three cases selected from different industries: research; mining and government organizations, to provide broad categories for research and research questions were examined using the developed framework. This paper presents the partial findings of undertaken investigation of the research organisation with the lowest level of maturity. The result shows that knowledge creation and capturing are the most important processes, while knowledge transferring and reusing are not as important as the other two processes. In addition, it was revealed that provision of “knowledge about client” and “project management knowledge” are the most important types of knowledge that are required at this level of maturity. In conclusion, the outcomes of this paper shall provide powerful guidance to PMOs at lowest level of maturity from KM point of view.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"We live in times in which unlearning has become as important as learning. Dan Pink has called these times the Conceptual Age,i to distinguish them from the Knowledge/Information Age in which many of us were born and educated. Before the current Conceptual Age, the core business of learning was the routine accessing of information to solve routine problems, so there was real value in retaining and reusing the templates taught to us at schools and universities. What is different about the Conceptual Age is that it is characterised by new cultural forms and modes of consumption that require us to unlearn our Knowledge/Information Age habits to live well in our less predictable social world. The ‘correct’ way to write, for example, is no longer ‘correct’ if communicating by hypertext rather than by essay or letter. And who would bother with an essay or a letter or indeed a pen these days? Whether or not we agree that the Conceptual Age, amounts to the first real generation gap since rock and roll, as Ken Robinson claims,ii it certainly makes unique demands of educators, just as it makes unique demands of the systems, strategies and sustainability of organisations. Foremost among these demands, according to innovation analyst Charlie Leadbeater,iii is to unlearn the idea that we are becoming a more knowledgeable society with each new generation. If knowing means being intimately familiar with the knowledge embedded in the technologies we use in our daily lives, then, Leadbeater says, we have never been more ignorant.iv He reminds us that our great grandparents had an intimate knowledge of the technologies around them, and had no problem with getting the butter churn to work or preventing the lamp from smoking. Few of us would know what to do if our mobile phones stopped functioning, just as few of us know what is ‘underneath’ or ‘behind’ the keys of our laptops. Nor, indeed, do many of us want to know. But this means that we are all very quickly reduced to the quill and the lamp if we lose our power sources or if our machines cease to function. This makes us much more vulnerable – as well as much more ignorant in relative terms – than our predecessors."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The first User-Focused Service Engineering, Consumption and Aggregation workshop (USECA) in 2011 was held in conjunction with the WISE 2011 conference in Sydney, Australia. Web services and related technology are a widely accepted standard architectural paradigm for application development. The idea of reusing existing software components to build new applications has been well documented and supported for the world of enterprise computing and professional developers. However, this powerful idea has not been transferred to end-users who have limited or no computing knowledge. The current methodologies, models, languages and tools developed for Web service composition are suited to IT professionals and people with years of training in computing technologies. It is still hard to imagine any of these technologies being used by business professionals, as opposed to computing professionals. © 2013 Springer-Verlag.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Open educational resources (OERs), a disruptive technology, made their appearance in early 2002 as a promising tool for enhancing the quality of and access to education generally and higher education in particular. OERs were also perceived to have the potential to reduce costs by reusing learning materials. This brief draws on a study that reviewed the uptake of OERs and related activities in six institutions in Hong Kong, China; India; Malaysia; Pakistan; and Thailand.