7 resultados para Information theory in biology

em WestminsterResearch - UK


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims to present a state-of-the-art review of the scope and practical implications of the Building Information Modelling (BIM) platform in the UK construction practice. Theoretical developments suggest that BIM is an integration of both product and process innovation, not just a disparate set of software tools. BIM provides effective collaboration, visual representation and data management, which enable the smooth flow of information throughout the project’s lifecycle. The most frequently reported benefits are related to Capital Cost (capex) and Operational costs (opex) and time savings. Key challenges, however, focus on the interoperability of software, capital installation costs, in-house experience, client preference and cultural issues within design teams and within the organisation. The paper concludes with a critical commentary on the changing roles and a process required to implement BIM in UK construction projects, and suggests areas for further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thee rise of computing and the internet have brought about an ethical eld of studies that some term information ethics, computer ethics, digital media ethics, or internet ethics e aim of this contribution is to discuss information ethics’ foundations in the context of the internet’s political economy e chapter rst looks to ground the analysis in a comparison of two information ethics approaches, namely those outlined by Rafael Capurro and Luciano Floridi It then develops, based on these foundations, analyses of the information ethical dimensions of two important areas of social media: one concerns the framing of social media by a surveillance-industrial complex in the context of Edward Snowden’s revelations and the other deals with issues of digital labour processes and issues of class that arises in this context e contribution asks ethical questions about these two phenomena that bring up issues of power, exploitation, and control in the information age It asks if, and if so, how, the approaches of Capurro and Floridi can help us to understand ethico-political aspects of the surveillance-industrial complex and digital labour

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes a method for analysing the operational complexity in supply chains by using an entropic measure based on information theory. The proposed approach estimates the operational complexity at each stage of the supply chain and analyses the changes between stages. In this paper a stage is identified by the exchange of data and/or material. Through analysis the method identifies the stages where the operational complexity is both generated and propagated (exported, imported, generated or absorbed). Central to the method is the identification of a reference point within the supply chain. This is where the operational complexity is at a local minimum along the data transfer stages. Such a point can be thought of as a ‘sink’ for turbulence generated in the supply chain. Where it exists, it has the merit of stabilising the supply chain by attenuating uncertainty. However, the location of the reference point is also a matter of choice. If the preferred location is other than the current one, this is a trigger for management action. The analysis can help decide appropriate remedial action. More generally, the approach can assist logistics management by highlighting problem areas. An industrial application is presented to demonstrate the applicability of the method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Physical location of data in cloud storage is an increasingly urgent problem. In a short time, it has evolved from the concern of a few regulated businesses to an important consideration for many cloud storage users. One of the characteristics of cloud storage is fluid transfer of data both within and among the data centres of a cloud provider. However, this has weakened the guarantees with respect to control over data replicas, protection of data in transit and physical location of data. This paper addresses the lack of reliable solutions for data placement control in cloud storage systems. We analyse the currently available solutions and identify their shortcomings. Furthermore, we describe a high-level architecture for a trusted, geolocation-based mechanism for data placement control in distributed cloud storage systems, which are the basis of an on-going work to define the detailed protocol and a prototype of such a solution. This mechanism aims to provide granular control over the capabilities of tenants to access data placed on geographically dispersed storage units comprising the cloud storage.