13 resultados para Glide path systems.

em Deakin Research Online - Australia


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this theoretical paper, we introduce and describe a model, and demonstrate its origins from the disciplines of Enterprise Architecture, cybernetics and systems theory. We use cybernetic thinking to develop a ‘Co-evolution Path Model’ that describes how enterprises as complex systems co-evolve with their complex environments. The model re-interprets Stafford Beer’s Viable System Model, and also uses the theorem of the ‘good regulator’ of Conant and Ashby, exemplifying how various complexity management theories could be synthesised into a cybernetic theory of Enterprise Architecture, using concepts from the generalisation of EA frameworks.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Meta-analyses confirm that depression is accompanied by signs of inflammation including increased levels of acute phase proteins, e.g., C-reactive protein, and pro-inflammatory cytokines, e.g., interleukin-6. Supporting the translational significance of this, a meta-analysis showed that anti-inflammatory drugs may have antidepressant effects. Here, we argue that inflammation and depression research needs to get onto a new track. Firstly, the choice of inflammatory biomarkers in depression research was often too selective and did not consider the broader pathways. Secondly, although mild inflammatory responses are present in depression, other immune-related pathways cannot be disregarded as new drug targets, e.g., activation of cell-mediated immunity, oxidative and nitrosative stress (O&NS) pathways, autoimmune responses, bacterial translocation, and activation of the toll-like receptor and neuroprogressive pathways. Thirdly, anti-inflammatory treatments are sometimes used without full understanding of their effects on the broader pathways underpinning depression. Since many of the activated immune-inflammatory pathways in depression actually confer protection against an overzealous inflammatory response, targeting these pathways may result in unpredictable and unwanted results. Furthermore, this paper discusses the required improvements in research strategy, i.e., path and drug discovery processes, omics-based techniques, and systems biomedicine methodologies. Firstly, novel methods should be employed to examine the intracellular networks that control and modulate the immune, O&NS and neuroprogressive pathways using omics-based assays, including genomics, transcriptomics, proteomics, metabolomics, epigenomics, immunoproteomics and metagenomics. Secondly, systems biomedicine analyses are essential to unravel the complex interactions between these cellular networks, pathways, and the multifactorial trigger factors and to delineate new drug targets in the cellular networks or pathways. Drug discovery processes should delineate new drugs targeting the intracellular networks and immune-related pathways.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time  embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop endto- end communication path with either replayed packets or injected spurious packets. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we consider wireless sensor networks designed to collect and store data. In a path-based attack, both sensor nodes and the database containing collected data can be compromised. We propose a recovery method using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes along with the database.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Invoking the resource-based view (RBV), this study investigates relationships between management control systems (MCSs) use, including information use from performance measurement systems (PMSs), and organisational capabilities in the context of academic units of Australian universities. Increased competition and attention to distinctive capabilities amongst universities, particularly at their strategic operating unit level of Schools 1, provides the setting for application of this theoretic perspective. The objective of this study is to model various relationships between diagnostic and interactive use of MCSs, attention given to centrally-imposed and discretionary types of PMS information, the strength of capabilities of the academic unit and, in turn, performance of the academic units. This objective is investigated using a field survey in which a mail survey instrument is administered to a census of all Heads of Schools in all 39 universities in Australia. Valid responses were received from 166 Heads. Principal components factor analysis finds that Heads conceived capabilities of their unit in functional dimensions, not in generic dimensions as found in prior literature; Heads also considered performance measures in terms of their importance (critical or discretionary) rather than type (financial versus non-financial). Partial least-squares analysis is then used for path modelling, and several significant results are obtained. Highlights are that diagnostic MCS use and centrally-imposed performance measures, i.e., key performance indicators, but not interactive MCS use or discretionary performance measures, significantly relate to some or all of the strength of capabilities in the fields of teaching, research and networking, and in turn indirectly relate to performance of the academic units. The findings have practical implications for styles of control systems use; focus on selected key performance measures; and development of organisational capabilities for achievement of superior performance by academic schools in universities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Giddens’ structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to directly theorize the Information Systems (IS) domain. IS researchers have long been interested in it as a way of deepening understanding; a common application is the analysis of empirical situations using Giddens’ ‘dimensions of the duality of structure’ model. Other writers, most notably Orlikowski, have used it help theorize the field. Often the mode of research employed has been the interpretative case study. However, direct attempts to influence practice (an important component of working in an applied field), perhaps through the vehicle of action research, have yet to be undertaken. There are at least three serious problems with attempting this. The first is the inaccessibility of the theory to IS researchers and practitioners. The second is the absence of specific theories of technology. The third is Giddens’ own disinterest in practical uses of his work – which leaves no obvious path to follow. This paper explores that path, in the context of information system development (ISD). Some frameworks for practice are suggested which are translated into forms of discourse that are more accessible to the IS community. In particular, we include an empirical illustration to demonstrate the potential of ISD tools based on structuration theory.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Optimisation techniques have become more and more important as the possibility of simulating complex mechanical structures has become a reality. A common tool in the layout design of structural parts is the topology optimisation method, which finds an optimum material distribution within a given geometrical design space to best meet loading conditions and constraints. Another important method is shape optimisation, which optimises weight given parametric geometric constraints. In the case of complex shaped parts or elaborate assemblies, for example automobile body structures, shape optimisation is still hard to do; mainly due to the difficulty in translating shape design parameters into meaningful analysis models. Tools like the parametric geometry package SFE CONCEPT are designed to mitigate these issues. Nevertheless, shape methods usually cannot suggest new load path configurations, while topology methods are often confined to single parts. To overcome these limitations the authors have developed a method that combines both approaches into an Integral Shape/Topology Method (IST) that is capable of finding new optimal solutions. This is achieved by an automated optimisation loop and can be applied for both thin walled structures as well as solid 3D geometries. When optimising structures by applying IST, global optimum solutions can be determined that may not be obtained with isolated shape- or topology-optimisation methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Multimedia content adaptation allows the ever increasing variety of handheld devices such as Smartphones to access distributed rich media resources available on the Internet today. Path planning and determination is a fundamental problem in enhancing performance of distributed multimedia content adaptation systems. Most of the existing path determination mechanisms use static path determination criteria based solely on associating a path with a single behavior aggregate score. However, some criteria such as availability are best represented using different functionality rather than being accumulated into the aggregate score. Moreover, since selection criteria have different behavior towards the score, this principle need to be considered. In this paper, we propose a dynamic multi-criteria path determination policy that selects an optimal path to the content adaptation services that best meet the user preferences and QoS requirements. The performance of the proposed approach is studied in terms of score’s fairness and reliability under different variations. The results indicate that the proposed policy performs substantially better than the baseline policy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is anemerging technology for automating object identification. TheNetworked RFID System (NRS) is a component of a distributedobject identification network which facilitates automated supplychain management. It also makes the Internet of Things (IoT)concept a reality. To increase the business feasibility of NRSimplementation, the system should be able to ensure the visibilityand traceability of the object throughout the chain using achecker protocol. By doing so, the protocol will check thegenuineness of the object and the genuineness of the object’sprevious travel path on-site. While doing so, the protocol needs toensure the security requirement of the system. To this end, wepropose a secure checker protocol for NRS which will use a PUF(Physically Unclonable Function) and simple cryptographicprimitives. The protocol provides security (protect privacy of thepartners, injection of fake objects, non-repudiation, andunclonability), visibility and traceability for NRS. It is alsosuitable for passive tags.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Networked systems have adapted Radio Frequency identification technology (RFID) to automate their business process. The Networked RFID Systems (NRS) has some unique characteristics which raise new privacy and security concerns for organizations and their NRS systems. The businesses are always having new realization of business needs using NRS. One of the most recent business realization of NRS implementation on large scale distributed systems (such as Internet of Things (IoT), supply chain) is to ensure visibility and traceability of the object throughout the chain. However, this requires assurance of security and privacy to ensure lawful business operation. In this paper, we are proposing a secure tracker protocol that will ensure not only visibility and traceability of the object but also genuineness of the object and its travel path on-site. The proposed protocol is using Physically Unclonable Function (PUF), Diffie-Hellman algorithm and simple cryptographic primitives to protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability. The tag only performs a simple mathematical computation (such as combination, PUF and division) that makes the proposed protocol suitable to passive tags. To verify our security claims, we performed experiment on Security Protocol Description Language (SPDL) model of the proposed protocol using automated claim verification tool Scyther. Our experiment not only verified our claims but also helped us to eliminate possible attacks identified by Scyther.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Growing evidence shows that in obtaining high performance, a well-managed time-constrained workflow scheduling is needed. Efficient workflow scheduling is critical for achieving high performance especially in heterogeneous computing system. However, it is a great challenge to improve performance and to optimize several objectives simultaneously. We propose a workflow scheduling algorithm that minimizes the makespan of the workflow application modeled by a Directed Acyclic Graph (DAG). The new proposed scheduling algorithm is named Multi Dependency Joint (MDJ) Algorithm. The performance of MDJ is compared with existing algorithms such as, Highest Level First with Estimated Time (HLFET), Modified Critical Path (MCP) and Earliest Time First (ETF). As a result, the experiments show that our proposed MDJ algorithm outperforms HLEFT, MCP, and EFT with a 7% lower overall completion time.