732 resultados para mutual knowledge

em Queensland University of Technology - ePrints Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Maximisation of Knowledge-Based Development (KBD) benefits requires effective dissemination and utilisation mechanisms to accompany the initial knowledge creation process. This work highlights the potential for interactions between Supply Chains (SCs) and Small and Medium sized Enterprise Clusters (SMECs), (including via ‘junction’ firms which are members of both networks), to facilitate such effective dissemination and utilisation of knowledge. In both these network types there are firms that readily utilise their relationships and ties for ongoing business success through innovation. The following chapter highlights the potential for such beneficial interactions between SCs and SMECs in key elements of KBD, particularly knowledge management, innovation and technology transfer. Because there has been little focus on the interactions between SCs and SMECs, particularly when firms simultaneously belong to both, this chapter examines the conduits through which information and knowledge can be transferred and utilised. It shows that each network type has its own distinct advantages in the types of information searched for and transferred amongst network member firms. Comparing and contrasting these advantages shows opportunities for both networks to leverage the knowledge sharing strengths of each other, through these ‘junctions’ to address their own weaknesses, allowing implications to be drawn concerning new ways of utilising relationships for mutual network gains.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

One of the claims made for valuing the voices of marginalised students is that an insider perspective can be revealed on student issues and the ways in which education policies and systems impact on them. This chapter examines the ways in which participants in an Australian ‘students-as-researchers’ (SaR) project were able to raise knowledge of and address, to some extent, long-standing issues of racism in their schools. The SaR project has operated in more than thirty schools for periods of one to five years. Based on a participatory action research model, groups of secondary school students from schools serving socio-economically disadvantaged communities have worked with nominated teachers and university researchers to identify and research local issues relating to low academic outcomes and to develop and enact responses to the identified concerns. The voices of marginalised students quoted in this chapter illustrate that important insider knowledge can be revealed through the SaR process. Where student views have been acknowledged and acted on by the schools, significant change to student-teacher relationships and school culture has been achieved; the participants have been personally empowered and academic improvements across the schools have been noted. For such change to occur, however, a culture of mutual respect must be created in which teachers and school administrators value students’ views and are open to the possibility of unfavourable criticism.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This discussion has outlined a theoretical and pragmatic framework to demonstrate that future research involving the analysis of human performance in surgical should encourage the use of phenomenology to enhance the knowledge base of this area of study. Merging experiential (first-person) and experimental (third-person) methods may possibly help improve research designs and analyses in the investigation of robotics in surgical performance. By relying solely on third-person techniques, the current methodology and interpretation used to analyze human performance in surgical robotics is limited. Recent advances in cognitive science and psychology have also recognized this limitation and have now begun to shift to neurophenomenology. Finally, discussion on recent robotics research presented here demonstrates the potential phenomenology holds for augmenting the methodological and analysis techniques currently used by researchers of human performance in surgical robotics.

Relevância:

20.00% 20.00%

Publicador: