44 resultados para model complexity


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The complexity of the forging process ensures that there is inherent variability in the geometric shape of a forged part. While knowledge of shape error, comparing the desired versus the measured shape, is significant in measuring part quality the question of more interest is what can this error suggest about the forging process set-up? The first contribution of this paper is to develop a shape error metric which identifies geometric shape differences that occur from a desired forged part. This metric is based on the point distribution deformable model developed in pattern recognition research. The second contribution of this paper is to propose an inverse model that identifies changes in process set-up parameter values by analysing the proposed shape error metric. The metric and inverse models are developed using two sets of simulated hot-forged parts created using two different die pairs (simple and 'M'-shaped die pairs). A neural network is used to classify the shape data into three arbitrarily chosen levels for each parameter and it is accurate to at least 77 per cent in the worst case for the simple die pair data and has an average accuracy of approximately 80 per cent when classifying the more complex 'M'-shaped die pair data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes a theoretical process model and the associated detailed information structure which reflects the complexity of information, stakeholder interaction and intellectual property concerns which are currently seen in the construction industry. This is being developed and tested against a field study renovation project. The field study project identifies information flows and interactions between stakeholders such as designers, project managers, clients, contractors, subcontractors and suppliers. The process model which is being established shows very high levels of complexity in dependencies and interdependencies between implicit and explicit information within the project design and construction teams. Without an understanding of these detailed and complex process interactions, proposals for the application of ICT to the construction industry will not reflect the requirements of those for whom they are being developed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research is focused on developing a highly detailed understanding of current organisational interactions and information flows leading to a definition of the process model for the environment into which information and communication technology (ICT) applications will be placed. The authors of this paper propose a theoretical process model and the associated detailed information structure which reflects the complexity of information, stakeholder interaction and intellectual property concerns which are currently seen in the construction industry. This is being developed and tested against a field study renovation project. The field study project identifies information flows and interactions between stakeholders such as designers, project managers, clients, contractors, subcontractors and suppliers. The process model which is being established shows very high levels of complexity in dependencies and interdependencies between implicit and explicit information within the project design and construction teams. Without an understanding of these detailed and complex process interactions, proposals for the application of ICT to the construction industry will not reflect the requirements of those for whom they are being developed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

IT security outsourcing is the establishment of a contractual relationship with an outside vendor to assume responsibility for one or more security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems in is placed in the hands of an external provider. This is the second paper discussing the improvement of the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integrates security benefits, costs and their respective performance measures. In this paper the methodology used to develop the model and its validation are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

IT security outsourcing is the establishment of a contractual relationship between an organization with an outside vendor which assumes responsibility for the organisation’s security functions. Outsourcing in IS has had a variable history of success and the complexity of the decision making process leads to a substantial degree of uncertainty. This is especially so in the realm of IS security since the protection of both hardware and software systems is placed in the hands of an external provider. This paper is a fuller and more comprehensive paper of a previous paper outlining the effectiveness of the decision making process by means of a conceptual model using Soft System Methodology techniques that integratessecurity benefits, costs and their respective performance measures. In this paper the methodology used to develop the model is discussed in detail.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

There is an increasing complexity and interplay between all of the issues associated with property portfolio decisions. This paper explores the relationships between financial, environmental and social parameters associated with building adaptive reuse by way of a case study. A new model predicting adaptive reuse potential is applied to a heritage building in Hong Kong known as Lui Seng Chun. Such application can assist in the transformation of the building and property industry towards more sustainable practices, strategies and outcomes, by providing a means by which the industry can identify and rank existing buildings that have high potential for adaptive reuse. In Hong Kong's case it provides an ability for sustainable, responsive energy and natural resource management by allowing issues regarding excessive and inappropriate resource use to be identified and assessed, and appropriate management strategies to be implemented. Given the building's current age and condition, Lui Seng Chun has at least 25 years of physical life remaining. The further application of a multi-criteria sustainability evaluation tool supports the conclusion that an adaptive reuse strategy for this building will make a demonstrable contribution to the economic, social and environmental amenity of Hong Kong. The application of these techniques to other buildings with significant "embedded physical life" is highly recommended.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, aiming at describing interrelationships and communication mechanisms among agents based on a multi-agent framework of Railway Intelligent Transportation System (RITS), we construct the model about stations and trains in the system, which is called Agent-Oriented G-Net Train Group Operation Model (AGNTOM). The framework degrades the complexity of computation and makes the distribution of simulation system easy in design. The simulated experiments prove that the model provides an effective approach for dealing with communication problems in the system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper addresses the problem of performance modeling for large-scale heterogeneous distributed systems with emphases on multi-cluster computing systems. Since the overall performance of distributed systems is often depends on the effectiveness of its communication network, the study of the interconnection networks for these systems is very important. Performance modeling is required to avoid poorly chosen components and architectures as well as discovering a serious shortfall during system testing just prior to deployment time. However, the multiplicity of components and associated complexity make performance analysis of distributed computing systems a challenging task. To this end, we present an analytical performance model for the interconnection networks of heterogeneous multi-cluster systems. The analysis is based on a parametric family of fat-trees, the m-port n-tree, and a deterministic routing algorithm, which is proposed in this paper. The model is validated through comprehensive simulation, which demonstrated that the proposed model exhibits a good degree of accuracy for various system organizations and under different working conditions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports on the design and testing of a model, which evaluates the relationship components of a Web-based EServices Acceptance Model (E-SAM). The paper proposes that user experience, user motivation, perceived usefulness, perceived ease of use that may determine user acceptance of web-based eServices. The model is tested in a university environment where students and staff use services that have moved from an old paper-based to Web-based eService system. The results of data analysis highlight that user experience is strongly related to perceived ease of use; and perceived usefulness to user motivation in user acceptance of Web-based eServices. The strength of these relationships and the lack of strong relationships between other components suggest that the model's application to eServices is able to highlight the complexity of the eService process and the need for researchers to seek additional components in studying technology acceptance on the World Wide Web.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Providing residential aged care is challenging because of the complexity of residents' health status, difficulties recruiting and retaining skilled staff, and financial and regulatory constraints. This paper discusses some of these challenges and describes an innovative model of care, termed 'The Tri-focal model of care'. This model was developed based on the concepts of 'partnership-centred care', 'positive work environment' and the need for evidence-based practice to underpin all aspects of care. It is envisaged that the implementation of this model will provide a rich learning environment that advances the teaching-nursing home concept and the quality of residential aged care.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Numerous empirical studies on knowledge management have examined the relative effectiveness of various enablers, such as organizational structure, technology, culture, managerial system and strategy for knowledge creation and sharing in organizations. While these studies play a critical role in helping us to appreciate the importance of organizational enablers in knowledge management, they have neglected to examine the possible effects of task complexity on the nature and efficacy of knowledge sharing. This study investigates how task complexity influences the mode and effectiveness of knowledge sharing among professional accountants in Malaysia. In particular, it highlights the relationships between different task dimensions and modes of knowledge sharing, and the impact of knowledge sharing on professional competency. This study adopts a process oriented approach based on Nonaka’s (1994) knowledge sharing model. This study reveals that task complexity is significantly related to knowledge sharing. Tasks carried out by professional accountants vary from repetitive or clearly-defined procedural tasks to unstructured tasks that required professional judgment and expertise for successful task performance. While professional accountants are generally keen to gain access to knowledge databases to source for possible task solutions, they are generally hesitant to share their tacit knowledge by transforming the knowledge into explicit form. The finding suggests that there may be cultural-related factors that inhibit sharing of one’s tacit  knowledge totally and completely. This study also shows the existence of a  significant relationship between knowledge sharing and professional  competency, suggesting that the importance of the internalization mode of  knowledge sharing in sustaining the competitive edge of professional  accountants.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The current work used discrete event simulation techniques to model the economics of quality within an actual automotive stamping plant. Automotive stamping is a complex, capital intensive process requiring part-specific tooling and specialised machinery. Quality control and quality improvement is difficult in the stamping environment due to the general lack of process understanding and the large number to interacting variables. These factors have prevented the widespread use of statistical process control. In this work, a model of the quality control techniques used at the Ford Geelong Stamping plant is developed and indirectly validated against results from production. To date, most discrete event models are of systems where the quality control process is clearly defined by the rules of statistical process control. However, the quality control technique used within the stamping plant is for the operator to perform a 100% visual inspection while unloading the finished panels. In the developed model, control is enacted after a cumulative count of defective items is observed, thereby approximating the operator who allows a number of defective panels to accumulate before resetting the line. Analysis of this model found that the cost sensitivity to inspection error is dependent upon the level of control and that the level of control determines line utilisation. Additional analysis of this model demonstrated that additional inspection processes would lead to more stable cost structures but these structures many not necessarily be lower cost. The model was subsequently applied to investigate the economics of quality improvement. The quality problem of panel blemishes, induced by slivers (small metal fragments), was chosen as a case stuffy. Errors of 20-30% were observed during direct validation of the cost model and it was concluded that the use of discrete event simulation models for applications requiring high accuracy would not be possible unless the production system was of low complexity. However, the model could be used to evaluate the sensitivity of input factors and investigating the effects of a number of potential improvement opportunities. Therefore, the research concluded that it is possible to use discrete event simulation to determine the quality economics of an actual stamping plant. However, limitations imposed by inability of the model to consider a number of external factors, such as continuous improvement, operator working conditions or wear and the lack of reliable quality data, result in low cost accuracy. Despite this, it still can be demonstrated that discrete event simulation has significant benefits over the alternate modelling methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The overarching goal of this dissertation was to evaluate the contextual components of instructional strategies for the acquisition of complex programming concepts. A meta-knowledge processing model is proposed, on the basis of the research findings, thereby facilitating the selection of media treatment for electronic courseware. When implemented, this model extends the work of Smith (1998), as a front-end methodology, for his glass-box interpreter called Bradman, for teaching novice programmers. Technology now provides the means to produce individualized instructional packages with relative ease. Multimedia and Web courseware development accentuate a highly graphical (or visual) approach to instructional formats. Typically, little consideration is given to the effectiveness of screen-based visual stimuli, and curiously, students are expected to be visually literate, despite the complexity of human-computer interaction. Visual literacy is much harder for some people to acquire than for others! (see Chapter Four: Conditions-of-the-Learner) An innovative research programme was devised to investigate the interactive effect of instructional strategies, enhanced with text-plus-textual metaphors or text-plus-graphical metaphors, and cognitive style, on the acquisition of a special category of abstract (process) programming concept. This type of concept was chosen to focus on the role of analogic knowledge involved in computer programming. The results are discussed within the context of the internal/external exchange process, drawing on Ritchey's (1980) concepts of within-item and between-item encoding elaborations. The methodology developed for the doctoral project integrates earlier research knowledge in a novel, interdisciplinary, conceptual framework, including: from instructional science in the USA, for the concept learning models; British cognitive psychology and human memory research, for defining the cognitive style construct; and Australian educational research, to provide the measurement tools for instructional outcomes. The experimental design consisted of a screening test to determine cognitive style, a pretest to determine prior domain knowledge in abstract programming knowledge elements, the instruction period, and a post-test to measure improved performance. This research design provides a three-level discovery process to articulate: 1) the fusion of strategic knowledge required by the novice learner for dealing with contexts within instructional strategies 2) acquisition of knowledge using measurable instructional outcome and learner characteristics 3) knowledge of the innate environmental factors which influence the instructional outcomes This research has successfully identified the interactive effect of instructional strategy, within an individual's cognitive style construct, in their acquisition of complex programming concepts. However, the significance of the three-level discovery process lies in the scope of the methodology to inform the design of a meta-knowledge processing model for instructional science. Firstly, the British cognitive style testing procedure, is a low cost, user friendly, computer application that effectively measures an individual's position on the two cognitive style continua (Riding & Cheema,1991). Secondly, the QUEST Interactive Test Analysis System (Izard,1995), allows for a probabilistic determination of an individual's knowledge level, relative to other participants, and relative to test-item difficulties. Test-items can be related to skill levels, and consequently, can be used by instructional scientists to measure knowledge acquisition. Finally, an Effect Size Analysis (Cohen,1977) allows for a direct comparison between treatment groups, giving a statistical measurement of how large an effect the independent variables have on the dependent outcomes. Combined with QUEST's hierarchical positioning of participants, this tool can assist in identifying preferred learning conditions for the evaluation of treatment groups. By combining these three assessment analysis tools into instructional research, a computerized learning shell, customised for individuals' cognitive constructs can be created (McKay & Garner,1999). While this approach has widespread application, individual researchers/trainers would nonetheless, need to validate with an extensive pilot study programme (McKay,1999a; McKay,1999b), the interactive effects within their specific learning domain. Furthermore, the instructional material does not need to be limited to a textual/graphical comparison, but could be applied to any two or more instructional treatments of any kind. For instance: a structured versus exploratory strategy. The possibilities and combinations are believed to be endless, provided the focus is maintained on linking of the front-end identification of cognitive style with an improved performance outcome. My in-depth analysis provides a better understanding of the interactive effects of the cognitive style construct and instructional format on the acquisition of abstract concepts, involving spatial relations and logical reasoning. In providing the basis for a meta-knowledge processing model, this research is expected to be of interest to educators, cognitive psychologists, communications engineers and computer scientists specialising in computer-human interactions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper continues the prior research undertaken by Warren and Leitch (2009), in which a series of initial research findings were presented. These findings identified that in Australia, Supply Chain Management (SCM) systems were the weak link of Australian critical infrastructure. This paper focuses upon the security and risk issues associated with SCM systems and puts forward a new SCM Security Risk Management method, continuing the research presented at the European Conference of Information Warfare in 2009.This paper proposes a new Security Risk Analysis model that deals with the complexity of protecting SCM critical infrastructure systems and also introduces a new approach that organisations can apply to protect their SCM systems. The paper describes the importance of SCM systems from a critical infrastructure protection perspective. The paper then discusses the importance of SCM systems in relation to supporting centres of populations and gives examples of the impact of failure. The paper proposes a new SCM security risk analysis method that deals with the security issues related to SCM security and the security issues associated with Information Security. The paper will also discuss a risk framework that can be used to protect against high and low level associated security risks using a new SCM security risk analysis method.