896 resultados para localizzazione, location-aware, posizionamento indoor
Resumo:
A growing body of research is looking at ways to bring the processes and benefits of online deliberation to the places they are about and in turn allow a larger, targeted proportion of the urban public to have a voice, be heard, and engage in questions of city planning and design. Seeking to take advantage of the civic opportunities of situated engagement through public screens and mobile devices, our research informed a public urban screen content application DIS that we deployed and evaluated in a wide range of real world public and urban environments. For example, it is currently running on the renowned urban screen at Federation Square in Melbourne. We analysed the data from these user studies within a conceptual framework that positions situated engagement across three key parameters: people, content, and location. We propose a way to identify the sweet spot within the nexus of these parameters to help deploy and run interactive systems to maximise the quality of the situated engagement for civic and related deliberation purposes.
Resumo:
Current conceptualizations of organizational processes consider them as internally optimized yet static systems. Still, turbulences in the contextual environment of a firm often lead to adaptation requirements that these processes are unable to fulfil. Based on a multiple case study of the core processes of two large organizations, we offer an extended conceptualisation of business processes as complex adaptive systems. This conceptualization can enable firms to optimise business processes by analysing operations in different contexts and by examining the complex interaction between external, contextual elements and internal agent schemata. From this analysis, we discuss how information technology can play a vital goal in achieving this goal by providing discovery, analysis, and automation support. We detail implications for research and practice.
Resumo:
The management of risks in business processes has been a subject of active research in the past few years. Many benefits can potentially be obtained by integrating the two traditionally-separated fields of risk management and business process management, including the ability to minimize risks in business processes (by design) and to mitigate risks at run time. In the past few years, an increasing amount of research aimed at delivering such an integrated system has been proposed. However, these research efforts vary in terms of their scope, goals, and functionality. Through systematic collection and evaluation of relevant literature, this paper compares and classifies current approaches in the area of risk-aware business process management in order to identify and explain relevant research gaps. The process through which relevant literature is collected, filtered, and evaluated is also detailed.
Resumo:
Process-aware information systems, ranging from generic workflow systems to dedicated enterprise information systems, use work-lists to offer so-called work items to users. In real scenarios, users can be confronted with a very large number of work items that stem from multiple cases of different processes. In this jungle of work items, users may find it hard to choose the right item to work on next. The system cannot autonomously decide which is the right work item, since the decision is also dependent on conditions that are somehow outside the system. For instance, what is “best” for an organisation should be mediated with what is “best” for its employees. Current work-list handlers show work items as a simple sorted list and therefore do not provide much decision support for choosing the right work item. Since the work-list handler is the dominant interface between the system and its users, it is worthwhile to provide an intuitive graphical interface that uses contextual information about work items and users to provide suggestions about prioritisation of work items. This paper uses the so-called map metaphor to visualise work items and resources (e.g., users) in a sophisticated manner. Moreover, based on distance notions, the work-list handler can suggest the next work item by considering different perspectives. For example, urgent work items of a type that suits the user may be highlighted. The underlying map and distance notions may be of a geographical nature (e.g., a map of a city or office building), but may also be based on process designs, organisational structures, social networks, due dates, calendars, etc. The framework proposed in this paper is generic and can be applied to any process-aware information system. Moreover, in order to show its practical feasibility, the paper discusses a full-fledged implementation developed in the context of the open-source workflow environment YAWL, together with two real examples stemming from two very different scenarios. The results of an initial usability evaluation of the implementation are also presented, which provide a first indication of the validity of the approach.
Resumo:
1 Diachasmimorpha krausii is a braconid parasitoid of larval tephritid fruit flies, which feed cryptically within host fruit. At the ovipositor probing stage, the wasp cannot discriminate between hosts that are physiologically suitable or unsuitable for offspring development and must use other cues to locate suitable hosts. 2 To identify the cues used by the parasitoid to find suitable hosts, we offered, to free flying wasps, different combinations of three fruit fly species (Bactrocera tryoni, Bactrocera cacuminata, Bactrocera cucumis), different life stages of those flies (adults and larvae) and different host plants (Solanum lycopersicon, Solanum mauritianum, Cucurbita pepo). In the laboratory, the wasp will readily oviposit into larvae of all three flies but successfully develops only in B. tryoni. Bactrocera tryoni commonly infests S. lycopersicon (tomato), rarely S. mauritianum (wild tobacco) but never C. pepo (zucchini). The latter two plant species are common hosts for B. cacuminata and B. cucumis, respectively. 3 The parasitoid showed little or no response to uninfested plants of any of the test species. The presence of adult B. tryoni, however, increased parasitoid residency time on uninfested tomato. 4 When the three fruit types were all infested with larvae, parasitoid response was strongest to tomato, regardless of whether the larvae were physiologically suitable or unsuitable for offspring development. By contrast, zucchini was rarely visited by the wasp, even when infested with B. tryoni larvae. 5 Wild tobacco was infrequently visited when infested with B. cacuminata larvae but was more frequently visited, with greater parasitoid residency time and probing, when adult flies (either B. cacuminata or B. tryoni) were also present. 6 We conclude that herbivore-induced, nonspecific host fruit wound volatiles were the major cue used by foraging D. krausii. Although positive orientation to infested host plants is well known from previous studies on opiine braconids, the failure of the wasp to orientate to some plants even when infested with physiologically suitable larvae, and the secondary role played by adult fruit flies in wasp host searching, are newly-identified mechanisms that may aid parasitoid host location in environments where both physiologically suitable and unsuitable hosts occur.
Resumo:
Cloud computing has emerged as a major ICT trend and has been acknowledged as a key theme of industry by prominent ICT organisations. However, one of the major challenges that face the cloud computing concept and its global acceptance is how to secure and protect the data that is the property of the user. The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to the regulations and laws that require data and operations to reside in specific geographic locations. Thus, data owners may need to ensure that their cloud providers do not compromise the SLA contract and move their data into another geographic location. This paper introduces an architecture for a new approach for geographic location assurance, which combines the proof of storage protocol (POS) and the distance-bounding protocol. This allows the client to check where their stored data is located, without relying on the word of the cloud provider. This architecture aims to achieve better security and more flexible geographic assurance within the environment of cloud computing.
Resumo:
Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.
Resumo:
Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed, and heading, which enables each vehicle to track its neighboring vehicles in real time. This work presents a context-aware adaptive beaconing scheme that dynamically adapts the beaconing repetition rate based on an estimated channel load and the danger severity of the interactions among vehicles. The safety, efficiency, and scalability of the new scheme is evaluated by simulating vehicle collisions caused by inattentive drivers under various road traffic densities. Simulation results show that the new scheme is more efficient and scalable, and is able to improve safety better than the existing non-adaptive and adaptive rate schemes.
Resumo:
The focus of this paper is on the measured particle number concentrations (PNC) as well as elemental and organic carbon in 17 primary schools. This study is part of the “Ultrafine Particles from Traffic Emissions and Children’s Health (UPTECH)”, which aims to determine the relationship between exposure to traffic related ultrafine (UF) particles and children’s health (http://www.ilaqh.qut.edu.au/Misc/UPTECH%20Home.htm). To achieve this, air quality and health data are being collected at 25 schools within Brisbane Metropolitan Area in Australia over two years. This paper presents the general aspects of UF particles data and preliminary results from the first 17 schools (S01 to S17), tested from Oct 2010 to Dec 2011.
Resumo:
Organisations are constantly seeking efficiency improvements for their business processes in terms of time and cost. Management accounting enables reporting of detailed cost of operations for decision making purpose, although significant effort is required to gather accurate operational data. Business process management is concerned with systematically documenting, managing, automating, and optimising processes. Process mining gives valuable insight into processes through analysis of events recorded by an IT system in the form of an event log with the focus on efficient utilisation of time and resources, although its primary focus is not on cost implications. In this paper, we propose a framework to support management accounting decisions on cost control by automatically incorporating cost data with historical data from event logs for monitoring, predicting and reporting process-related costs. We also illustrate how accurate, relevant and timely management accounting style cost reports can be produced on demand by extending open-source process mining framework ProM.
Resumo:
Many Brisbane houses were affected by water inundation as a result of the flooding event which occurred in January 2011. The combination of waterlogged materials and large amounts of silt and organic debris in affected homes gave rise to a situation where exposures to airborne particles could potentially be elevated. However, swift action to remove wet materials and dry out the building structures can help to reduce moisture and humidity in flooded houses, in an effort to prevent the growth of bacteria and mould and improve indoor air quality in and around flooded areas. To test this hypothesis, field measurements were carried out during 21 March and 3 May, 2011.