95 resultados para INFORMATION SCIENCE


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Seismic data gathered from the Hydrocarbon Exploration and Discovery Operation is essential to identify possible hydrocarbon existence in a geologically surveyed area. However, the discovery operation takes a long time to be completed and computational processing of the acquired data is often delayed. Hydrocarbon exploration may end up needlessly covering an area without any hydrocarbon traces due to lack of immediate feedback from geophysical experts. This feedback can only be given when the acquired seismic data is computationally processed, analysed and interpreted. In response, we propose a comprehensive model to facilitate Hydrocarbon Exploration and Discovery Operation using encryption, decryption, satellite transmission and clouds. The model details the logical design of Seismic Data Processing (SDP) that exploits clouds and the ability for geophysical experts to provide on-line decisions on how to progress the hydrocarbon exploration operation at a remote location. Initial feasibility assessment was carried out to support our model. The SDP, data encryption and encryption for the assessment were carried out on a private cloud. The assessment shows that the overall process of hydrocarbon exploration from data acquisition, satellite data transmission through to SDP could be executed in a short time and at low costs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book focuses on network management and traffic engineering for Internet and distributed computing technologies, as well as present emerging technology trends and advanced platform

Relevância:

60.00% 60.00%

Publicador:

Resumo:

It is paramount to provide seamless and ubiquitous access to rich contents available online to interested users via a wide range of devices with varied characteristics. Recently, a service-oriented content adaptation scheme has emerged to address this content-device mismatch problem. In this scheme, content adaptation functions are provided as services by third-party providers. Clients pay for the consumed services and thus demand service quality. As such, negotiating for the QoS offers, assuring negotiated QoS levels and accuracy of adapted content version are essential. Any non-compliance should be handled and reported in real time. These issues elevate the management of service level agreement (SLA) as an important problem. This chapter presents prior work, important challenges, and a framework for managing SLA for service-oriented content adaptation platform.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

&pound;-negotiation handles negotiation over the Internet without human supervision and has shown effectiveness in concluding verifiable and more favorable agreements in a reasonably short time. In this chapter, the authors discuss the negotiation 5ystem and its components with particular emphasis on negotiation strategies. A negotiation strategy defines strategic tactics, which advise on the proper action to select from a set of possible actions that optimizes negotiation outcomes. A strategy should integrate negotiation goals and reactive attitudes. Usually, a fixed strategy is implemented during the course of negotiation regardless ofsignificant decision-makingfactors including market status, opponent :S profile, or eagerness for a negotiated goods/service. The chapter presents the main negotiation strategies and outlines the different decision-makingfactors that should be considered. A strategy uses a utility function to evaluate the offer of an opponent and advises on the generation of a counter offer or the best interaction. The authors finally discuss different utility functions presented in the literature.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter will focus upon the impact of Generation F - the Facebook Generation - and their attitudes to security. The chapter is based around discussing the loss of data, the prevention approaches and enforcement policies that are currently being investigated, and the implications that this has upon the modern, working environment. The changing landscape of work presents the issue of the Need to Know against the modern, working practises of Need to Share, a conflict that needs to be resolved as a matter of urgency. Many hold the view that it would be wrong to return to the Cold War scenario, however the modern position of Need to Share leads to a steadily rising fear of Information Insecurity. Accepting this situation means that working practises within large organisations need to be reviewed without ignoring the benefits of the new and emerging technologies and yet still be vigilant with regards to Information security.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Remote technologies are changing our way of life. The radio frequency identification (RFJD) system is a new technology which uses the open air to transmit information. This information transmission needs to be protected to provide user safety and privacy. Business will look for a 5ystem that hasfraud resilience to prevent the misuse of information to take dishonest advantage. The business and the user need to be assured that the transmitted information has no content which is capable of undertaking malicious activities. Public awareness of RFID security will help users and organizations to understand the need for security protection. Publishing a security guideline from the regulating body and monitoring implementation of that guideline in RFID 5ystems will ensure that businesses and users are protected. This chapter explains the importance of security in a RFID system and will outline the protective measures. It also points out the research direction of RFID 5ystems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter examines the impact of eLearning and Web 2.0 social media in a socially conservative environment in Indonesia that has nevertheless proven surprisingly adroit at change management. Web 2.0 social media has proven enormously popular in Indonesia but traditional Islamic schools (which are known in Java as pesantren but elsewhere in the Muslim world as madrasah) the focus of this study is often unable to access Web 2.0 or the Internet in general. Progressive non-national government organizations (NGOs) seek to remedy this situation by providing satellite broadband links to remote schools and this chapter examines one particular project. Despite the impoverished and conservative nature of their community, the leaders of this school have led their students in a surprisingly enthusiastic reception of eLearning technology, recognizing its great capacity to produce and enhance social networks and provide new opportunities for learning. Particular attention in this case study is given to factors relating to social capital, attitudes, and patterns of behavior in leadership and change management. A case study approach was chosen to enable a richer and more finely-grained analysis of the issues. The case study is based on semi-structured interviews and observations conducted over several years. This research shows that whilst the adoption and uptake of eLearning with emerging technologies is strongly shaped by cultural and social factors, it plays out in very different ways than might first have been expected.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Organizational memory, the knowledge gained from organizational experience, has significant potential for competitive advantage. Many authors in the knowledge management and human resource management literatures consider mentoring to be a particularly effective method of transferring organizational memory. In addition, older workers are often considered ideal mentors in organizations because of their experience and alleged willingness to pass on their knowledge to less experienced employees. There is an associated assumption that these workers also anticipate and experience positive outcomes when mentoring others. This chapter considers whether these assumptions hold up in the workplaces of the 21st century, particularly within Western countries. Individualistic cultural norms and some discriminatory practices towards older workers, along with a changing career contract that no longer guarantees employment in one organization for life, may discourage knowledge sharing in organizations. This chapter discusses the constraints and motivations that may operate when older experienced workers consider mentoring others. It considers relevant global and organizational cultural characteristics that may influence mentoring to transfer knowledge, and accordingly suggests strategies for those eager to capitalise on the knowledge experienced employees possess.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Expectations of, and by, students and staff in the classroom have been well researched. Yet, still there is a gap between the expectations of students and what they experience in their studies. The classroom itself is changing with the introduction of Web 2.0 technologies into the mix. Further changes are being driven by the changing profile of a tertiary student in the twenty first century. Education will not fulfill its goal if the gap in expectations is not addressed. The discrepancy in expectations is explored from the perspective of students and staff and strategies for bridging the gap and enhancing eLearning in the Web 2.0 environment are offered. The chapter begins with a scenario that demonstrates the issues and concludes with suggestions to avoid them in the future. In doing so, the key drivers of change in the learning landscape in Australia are identified and the impact these may have on staff and student expectations is explored.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

<span id="cphContent_cphMainContent_lblAbstract">This chapter explores the engagement of tertiary students in interviewing &ldquo;green&rdquo; experts. Using Engestr&ouml;m&rsquo;s expansive activity model, the study finds that integrating podcasting into a course with strong links to other activities and resources helped students assimilate and develop the concepts of the course. The project promotes functionalist values of independent, experimental learning and deep engagement with learning material, it invokes authentic field experience, accommodates different learning styles and it provides considerable motivation. <br /><br />The study suggests that mobile learning embodies the means to change relationships between learner and expert and that such connecting is a key attribute of contemporary subjective association and recontextualization. The chapter provides a brief review of the literature on podcasting in education, followed by the teaching and learning context and the application of Engestr&ouml;m&rsquo;s &ldquo;expansive activity model&rdquo; (1994, 2001, 2002, 2004, 2008, 2010). I describe the student group undertaking the exercises in a Level 5 Sociology course, and the project (which subsequently extended into a later course: &ldquo;The Sustainable Business Environment&rdquo;, because many of the podcast students had pre-enrolled in that course). <br /><br />The paper discusses the methodological approach that was used, offering two strands of analysis: students&rsquo; use of the podcasts and how the latter were placed in their learning about sustainable development. The discussion section elaborates the model and offers suggestions for advancing the educational use of podcasts. Last, I offer some thoughts on how Engestr&ouml;m&rsquo;s model might be extended in education to develop not just new objects, but also the new use of objects.</span>