131 resultados para diffractive methodology,


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of
fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-criteria decisions usually require measurement or evaluation of performance in different units and their mix by application of weighting factors. This approach leads to potential manipulation of the results as a direct consequence of the applied weightings. In this paper a mechanism has been proposed to overcome this problem. It is known as the : Interlink Decision Making Index (IDMI) and has all the desired features: simple, interlink (all criteria) and automatically and quantified influence of critical criteria (i.e. no human weighting needed). The IDMI is capable of reflecting the total merits of a particular option once the normal decision making criteria and (up to two) critical criteria (CC) have been chosen. Then, without arbitrarily weighting criteria, comparison and selection of the best possible option can be made. Simple software has been developed to do this numerical transfer and graphic presentation. Two hypothetical examples are presented in the paper to demonstrate the application of the IDMI concept and its advantages over the traditional "tabular and weighting method" in the decision making process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The tale of research methodology in information systems is told through the fantasy of Tolkien’s Lord of the Rings. The tale is intended to be at once a piece of light hearted fun in its placement of the struggles of research methodology as an epic story but, in the tradition of the court jester, attempts to provide a new perspective on Information Systems (IS) research methodology and our struggles with positivism in particular. Our tale is one of developing a greater maturity and confidence in IS methodology and introduces postmodern methodologies to Information Systems. Our tale, our pastiche, is itself postmodern.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on further research undertaken regarding systems modelling as applied to critical infrastructure systems and networks and builds upon the initial modelling research of Pye and Warren (2006a). We discuss system characteristics, inter-relationships, dynamics and modelling of similar systems and why modelling of a critical infrastructure is important. In overview we compare four modelling methods and techniques previously
used to model similar systems and discuss their potential transference to model critical infrastructure systems, before selecting the most promising and suitable for modelling critical infrastructure systems for further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the methodology used for a review conducted at the University of Melbourne to determine the impact on teaching, learning and student study habits of multimedia and educational technology. Of particular methodological interest among the multiple components of the review was a quasi-controlled study of student attitudes towards and experiences of using educational technology. These were gathered using a targeted student sample comprising students known to have studied units in which well-established and highly peer rated IT products are deployed and a random student sample stratified to be representative of the typical student experience of the university. The paper reports the outcomes and effectiveness of this methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter reflects upon techniques that might facilitate improved strategic decision making in a supply chain management (SCM) environment. In particular, it presents the integration of a selection of techniques adapted from an approach to systems-based problem solving that has emerged primarily in the UK over the last 20-30 years—the soft systems methodology (SSM). The results reported indicate that SSM techniques can complement existing SCM decision-making tools. In particular, this chapter outlines a framework for integrating some SSM techniques with approaches based upon the supply-chain operations reference-model (SCOR) .

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a conveyor-based methodology to model complex vehicle flows common to factory and distribution warehouse facilities. The AGV and human path modelling techniques available in many commercial discrete event simulation packages require extensive knowledge and time to implement even the simplest flow control rules for multiple vehicle interaction. Although discrete event simulation is accepted as an effective tool to model vehicle delivery movements, human paths and delivery schedules for modern assembly lines, the time to generate accurate models is a significant limitation of existing simulation-based optimisation methodologies. The flow control method has been successfully implemented using two commercial simulation packages. It provides a realistic visual representation, as well as accurate statistical results, and reduces the model development process cost.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The findings of three case studies resulting from the application of the Australian Small to Medium Enterprise E-business Security Methodology (ASME-EBSM) to each of the SME sectors comprising micro, small and medium businesses are examined. First a comparison of the findings relating to the SME sectors is discussed. The similarities and differences including the challenges experienced by the three sectors concerning the application of e-business security management within their respective e-business operational environments are presented. Second the process of applying the ASME-EBSM is reviewed with reflections upon the development and constituents of the methodology. The paper describes how a number of case studies were undertaken to validate the ASME-EBSM approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We hereby develop an effective and efficient testing methodology for correctness testing for file recovery tools across different file systems. We assume that the tool tester is familiar with the formats of common file types and has the ability to use the tools correctly. Our methodology first derives a testing plan to minimize the number of runs required to identify the differences in tools with respect to correctness. We also present a case study on correctness testing for file carving tools, which allows us to confirm that the number of necessary testing runs is bounded and our results are statistically sound.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The springback of simple geometries can be predicted through theoretical analysis, however problems arise when transferring this analysis to the manufacturing environment. To determine why this is the case, a study
of small curvature free bending through theoreticalanalysis, manufacturing data and Finite Element (FE)simulation was completed.The theoretical analysis provided an understanding of the behavior of springback and gave accurate predictions in a controlled environment. The manufacturing and Finite Element data verified the trends predicted by theory, but lacked in accuracy. The paper concludes by proposing a prediction method based solely on the geometry that is well defined in both environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid deployment of intelligent transport systems in practice requires serious evaluation of new construction projects. Traditional transportation evaluation methods are insufficient to capture the new features of intelligent transport systems, particularly the applications of recently developed information technologies. This research aims to develop a new conceptual framework to evaluate the social, economic and environmental impacts of intelligent transport systems deployment, with explicit consideration of impacts of information technologies on variant travel behaviours. The research would provide a systematic evaluation methodology to enable decision makers and publics better evaluating and understanding the social, economic and environmental benefits of implementation of intelligent transport systems.