20 resultados para deployment

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid deployment of intelligent transport systems in practice requires serious evaluation of new construction projects. Traditional transportation evaluation methods are insufficient to capture the new features of intelligent transport systems, particularly the applications of recently developed information technologies. This research aims to develop a new conceptual framework to evaluate the social, economic and environmental impacts of intelligent transport systems deployment, with explicit consideration of impacts of information technologies on variant travel behaviours. The research would provide a systematic evaluation methodology to enable decision makers and publics better evaluating and understanding the social, economic and environmental benefits of implementation of intelligent transport systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dynamic deployment of Web services is a term used frequently when describing the selection and deployment of a service to a grid host. Although current grid systems (such as Globus) provide dynamic deployment, the requirements of the service being deployed are not considered. Therefore truly dynamic deployment cannot be achieved as the services deployed are restricted to the grid system used. We present a dynamic deployment mechanism as part of self configuration in a service oriented grid environment. The dynamic deployment mechanism takes the requirements of the service into consideration, including parameters such as the operating system required to execute the service, the required software libraries, any additional required software packages, price and Quality of Service (QoS) parameters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification (RFlD) technology is increasingly being explored for deployment in hospitals to improve their existing processes. In recent years, RPID pilots has lead to full scale implementation in hospitals, especially for tracking of expensive equipment as well as movable assets that are critical in surgeries. However, academic research is yet to emerge with a generic process model that can be adapted contextually for deployment of RPID in particular hospital settings. In this paper, we propose an action research framework for a pilot implementation of RPID in a large Indian hospital, the experiences of which will contribute to and result, in the development of such a process model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Measurements of total, filterable and DGT-labile concentrations of nine metals (Al, Cd, Cr, Cu, Fe, Pb, Mn, Ni and Zn) have been made at five sites up to 4.2km from a deep sea tailings outfall operated by Lihir Gold Ltd. at Lihir Island, Papua New Guinea. At each site, pairs of DGT units (one containing a 0.4mm and the other a 0.8mm diffusive gel layer) were deployed at three depths (50–70; 105–130; 135–155m) for 4–7 days. Comparison of predicted water column DGT-labile metal concentrations in field deployments showed the 0.8mm DGT units were relatively enriched in metals, with the effect being greatest closer to the outfall for Pb and Mn and least for Fe, Cr, Ni and Zn. The most likely explanation for this is that in addition to simple ion diffusion, kinetic factors associated with ageing or desorption processes govern release of metals from iron and aluminium oxyhydroxide colloids which diffuse through the gels. The thicker gels have a longer residence time over which metals can be released for adsorption. This model explains why enrichment is most pronounced near the outfall; more distant sites have lower colloid concentrations because of the longer time for coagulation to increase particle sizes to the extent they cannot enter the gels. Total and filterable metal (FM) concentrations were frequently below the limits of detection (LOD) achievable by conventional ICP-AES (1–52gL−1) and this limited their usefulness for assessing environmental risk and for metal speciation determination. Because of its pre-concentration step DGT gave metal concentrations above their LODs and these decreased exponentially with distance from the outfall. Concentrations of DGT–labile metal fell below Australian water quality guidelines for protection of 99% of marine organisms within 0.13km of the outfall for Cd, Cr and Ni and below that for protection of 95% of marine organisms within 0.4, 0.7 and 3.6km for lead, zinc and copper, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hyper visor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user, because a registered user is linked with a CSP by a data owner through Trust Ticket.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Every year, Australian firefighters protect our nation from the devastation of bushfire. Understanding the impact of consecutive long shifts in hot, smoky conditions is essential for making decisions during campaign fires. At present, the evidence-base for such decisions is limited to laboratory studies with little relevance to bushfire suppression or field research where the impact of environmental and workload stressors cannot be measured. To counter these limitations, we have developed a three-day simulation that mimics the work and environment of campaign bushfire suppression. Construction of the simulation involved three stages; 1) data collection and analysis; 2) design and development; and 3) trial and refinement. The frequency, intensity, duration and type of physical work performed on the fireground is well documented and a modified applied cognitive task analysis, using experienced firefighters was used as a framework to describe in detail the non-physical aspects of the work. The design and development of the simulation incorporated the physical and non-physical aspects of the work into simulated tasks. Finally, experienced firefighters participated in trials of the simulation and reviewed digital recordings to ensure that the simulation accurately represented campaign bushfire suppression work. The outcome of this project is a valid, realistic, and reliable simulation of the physiological, physical and cognitive aspects of a volunteer firefighter on a three-day bushfire deployment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rationale 

Human and animal studies over the last two decades report that nicotine can improve cognitive performance. Prospective memory (PM), the retrieval and implementation of a previously encoded intention, is also improved by pre-administration of nicotine. As with other nicotine effects, however, predicting precisely how and when nicotine improves the processes engaged by PM has proved less straightforward.

Objective
We present two studies that explore the source of nicotine’s enhancement of PM. Experiment 1 tests for effects of nicotine on preparatory attention (PA) for PM target detection. Experiment 2 asks whether nicotine enhances processing of the perceptual attributes of the PM targets.

Materials and methods
Young adult non-smokers matched on baseline performance measures received either 1 mg nicotine or matched placebo via nasal spray. Volunteers completed novel PM tasks at 15 min post-administration.

Results
Experiment 1 confirmed that pre-administration of nicotine to non-smokers improved detection rate for prospective memory targets presented during an attention demanding ongoing task. There was no relationship between PM performance and measures of preparatory attention. In experiment 2, salient targets were more likely to be detected than non-salient targets, but nicotine did not confer any additional advantage to salient targets.

Conclusion

The present study suggests that nicotinic stimulation does not work to enhance perceptual salience of target stimuli (experiment 2), nor does it work through better deployment of preparatory working attention (experiment 1). An alternative explanation that nicotine promotes PM detection by facilitating disengagement from the ongoing task is suggested as a future line of investigation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Due to the nature of wireless transmission, communication in wireless mesh networks (WMNs) is vulnerable to many adversarial activities including eavesdropping. Pairwise key establishment is one of the fundamental issues in securing WMNs. This paper presents a new matrix-based pairwise key establishment scheme for mesh clients. Our design is motivated by the fact that in WMNs, mesh routers are more powerful than mesh clients, both in computation and communication. By exploiting this heterogeneity, expensive operations can be delegated to mesh routers, which help alleviate the overhead of mesh clients during key establishment. The new scheme possesses two desirable features: (1) Neighbor mesh clients can directly establish pairwise keys; and (2) Communication and storage costs at mesh clients are significantly reduced.