953 resultados para Control framework
Resumo:
Ez a műhelytanulmány a 2009-es versenyképesség kutatás során 317 vállalatra kiterjedő kérdőíves felmérés konkrét adataiból emeli ki az ellenőrzéssel, kontrollal összefüggő tényezőket és ezek eredményeit hasonlítja össze a hazai és nemzetközi szakirodalom ide vonatkozó elméleteivel. A kutatási kérdések arra irányulnak, hogy milyen részekből, feladatokból, tevékenységekből tevődnek össze a vezetők ellenőrzési feladatai, azok mikre terjednek ki, és mennyiben tekinthetők fejlettnek a versenyképes vállalatoknál. A műhelytanulmányban konkrétan a kontrolling eszköztár, a belső ill. pénzügyi ellenőrzés és kockázatkezelés, valamint a minőségirányítási sztenderdek, szabványok által megkövetelt ellenőrzési mechanizmusok vizsgálata történik a hazai, 50 főt meghaladó vállalkozások esetében. A műhelytanulmány a klasszikus kutatási jelentések sémájában készült, elméleti felvezetéssel és szakirodalmi áttekintéssel indít, majd második részében a konkrét versenyképesség adatbázis adatainak bemutatása történik a témában, végül összegzés, segítő szószedet és irodalomjegyzék zárja azt. _______ This workpaper is a report of controlmechanisms used by Hungarian companies. The latest stage of the Competitivness Research project started in 2009 during which data were collected from 317 Hungarian companies. Themes of this workpaper are controlmechanism, or controll-framework of the companies and connection between controlmechanism and competitiveness. Main elements of the research are: controlling aspects, internal and financial audits completed by managment including critical risks, audits according to ISO 9001:2008 standards or other standards, and the way these elements support or influence the competitiveness of the companies. The structure of this workpaper follows the common parts of other research reports. It begins with details of the theoretical background and presents main publications of the topic, than goes through several direct analisys and tests regarding the Hungarian competitiveness database of 2009. At the end the of the workpapaper a basic summary can be found with a glossary of explanations, and a bibliography of cited papers and publications.
Resumo:
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. ^ In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. ^ In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications. ^
Resumo:
Access control (AC) limits access to the resources of a system only to authorized entities. Given that information systems today are increasingly interconnected, AC is extremely important. The implementation of an AC service is a complicated task. Yet the requirements to an AC service vary a lot. Accordingly, the design of an AC service should be flexible and extensible in order to save development effort and time. Unfortunately, with conventional object-oriented techniques, when an extension has not been anticipated at the design time, the modification incurred by the extension is often invasive. Invasive changes destroy design modularity, further deteriorate design extensibility, and even worse, they reduce product reliability. ^ A concern is crosscutting if it spans multiple object-oriented classes. It was identified that invasive changes were due to the crosscutting nature of most unplanned extensions. To overcome this problem, an aspect-oriented design approach for AC services was proposed, as aspect-oriented techniques could effectively encapsulate crosscutting concerns. The proposed approach was applied to develop an AC framework that supported role-based access control model. In the framework, the core role-based access control mechanism is given in an object-oriented design, while each extension is captured as an aspect. The resulting framework is well-modularized, flexible, and most importantly, supports noninvasive adaptation. ^ In addition, a process to formalize the aspect-oriented design was described. The purpose is to provide high assurance for AC services. Object-Z was used to specify the static structure and Predicate/Transition net was used to model the dynamic behavior. Object-Z was extended to facilitate specification in an aspect-oriented style. The process of formal modeling helps designers to enhance their understanding of the design, hence to detect problems. Furthermore, the specification can be mathematically verified. This provides confidence that the design is correct. It was illustrated through an example that the model was ready for formal analysis. ^
Resumo:
With the recent explosion in the complexity and amount of digital multimedia data, there has been a huge impact on the operations of various organizations in distinct areas, such as government services, education, medical care, business, entertainment, etc. To satisfy the growing demand of multimedia data management systems, an integrated framework called DIMUSE is proposed and deployed for distributed multimedia applications to offer a full scope of multimedia related tools and provide appealing experiences for the users. This research mainly focuses on video database modeling and retrieval by addressing a set of core challenges. First, a comprehensive multimedia database modeling mechanism called Hierarchical Markov Model Mediator (HMMM) is proposed to model high dimensional media data including video objects, low-level visual/audio features, as well as historical access patterns and frequencies. The associated retrieval and ranking algorithms are designed to support not only the general queries, but also the complicated temporal event pattern queries. Second, system training and learning methodologies are incorporated such that user interests are mined efficiently to improve the retrieval performance. Third, video clustering techniques are proposed to continuously increase the searching speed and accuracy by architecting a more efficient multimedia database structure. A distributed video management and retrieval system is designed and implemented to demonstrate the overall performance. The proposed approach is further customized for a mobile-based video retrieval system to solve the perception subjectivity issue by considering individual user's profile. Moreover, to deal with security and privacy issues and concerns in distributed multimedia applications, DIMUSE also incorporates a practical framework called SMARXO, which supports multilevel multimedia security control. SMARXO efficiently combines role-based access control (RBAC), XML and object-relational database management system (ORDBMS) to achieve the target of proficient security control. A distributed multimedia management system named DMMManager (Distributed MultiMedia Manager) is developed with the proposed framework DEMUR; to support multimedia capturing, analysis, retrieval, authoring and presentation in one single framework.
Resumo:
The trend of green consumerism and increased standardization of environmental regulations has driven multinational corporations (MNCs) to seek standardization of environmental practices or at least seek to be associated with such behavior. In fact, many firms are seeking to free ride on this global green movement, without having the actual ecological footprint to substantiate their environmental claims. While scholars have articulated the benefits from such optimization of uniform global green operations, the challenges for MNCs to control and implement such operations are understudied. For firms to translate environmental commitment to actual performance, the obstacles are substantial, particularly for the MNC. This is attributed to headquarters' (HQ) control challenges (1) in managing core elements of the corporate environmental management (CEM) process and specifically matching verbal commitment and policy with ecological performance and by (2) the fact that the MNC operates in multiple markets and the HQ is required to implement policy across complex subsidiary networks consisting of diverse and distant units. Drawing from the literature on HQ challenges of MNC management and control, this study examines (1) how core components of the CEM process impact optimization of global environmental performance (GEP) and then uses network theory to examine how (2) a subsidiary network's dimensions can present challenges to the implementation of green management policies. It presents a framework for CEM which includes (1) MNCs' Verbal environmental commitment, (2) green policy Management which guides standards for operations, (3) actual environmental Performance reflected in a firm's ecological footprint and (4) corporate environmental Reputation (VMPR). Then it explains how an MNC's key subsidiary network dimensions (density, diversity, and dispersion) create challenges that hinder the relationship between green policy management and actual environmental performance. It combines content analysis, multiple regression, and post-hoc hierarchal cluster analysis to study US manufacturing MNCs. The findings support a positive significant effect of verbal environmental commitment and green policy management on actual global environmental performance and environmental reputation, as well as a direct impact of verbal environmental commitment on green policy management. Unexpectedly, network dimensions were not found to moderate the relationship between green management policy and GEP.
Resumo:
A number of factors influence the information processing needs of organizations, particularly with respect to the coordination and control mechanisms within a hotel. The authors use a theoretical framework to illustrate alternative mechanisms that can be used to coordinate and control hotel operations.
Resumo:
Adaptation is an important requirement for mobile applications due to the varying levels of resource availability that characterizes mobile environments. However without proper control, multiple applications can each adapt independently in response to a range of different adaptive stimuli, causing conflicts or sub optimal performance. In this thesis we presented a framework, which enables multiple adaptation mechanisms to coexist on one platform. The key component of this framework was the 'Policy Server', which has all the system policies and governs the rules for adaptation. We also simulated our framework and subjected it to various adaptation scenarios to demonstrate the working of the system as a whole. With the help of the simulation it was shown that our framework enables seamless adaptation of multiple applications.
Resumo:
Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications.
Resumo:
The effective control of production activities in dynamic job shop with predetermined resource allocation for all the jobs entering the system is a unique manufacturing environment, which exists in the manufacturing industry. In this thesis a framework for an Internet based real time shop floor control system for such a dynamic job shop environment is introduced. The system aims to maintain the schedule feasibility of all the jobs entering the manufacturing system under any circumstance. The system is capable of deciding how often the manufacturing activities should be monitored to check for control decisions that need to be taken on the shop floor. The system will provide the decision maker real time notification to enable him to generate feasible alternate solutions in case a disturbance occurs on the shop floor. The control system is also capable of providing the customer with real time access to the status of the jobs on the shop floor. The communication between the controller, the user and the customer is through web based user friendly GUI. The proposed control system architecture and the interface for the communication system have been designed, developed and implemented.
Resumo:
Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.
Resumo:
Aerospace manufacturers typically use monolithic steel fixtures to control the form of assemblies. This tooling is very expensive, has long lead times and has little ability to accommodate product variation and design changes. Since the tool setting and recertification process is manual and time consuming, monolithic structures are required in order to maintain the tooling tolerances for multiple years without recertification. This paper introduces the Metrology Enhanced Tooling for Aerospace (META) Framework which interfaces multiple metrology technologies with the tooling, components, workers and automation. This will allow rapid or even real-time fixture re-certification with improved product verification leading to a reduced risk of product non-conformance and increased fixture utilization while facilitating flexible fixtures.
Resumo:
Climate change and continuous urbanization contribute to an increased urban vulnerability towards flooding. Only relying on traditional flood control measures is recognized as inadequate, since the damage can be catastrophic if flood controls fail. The idea of a flood-resilient city – one which can withstand or adapt to a flood event without being harmed in its functionality – seems promising. But what does resilience actually mean when it is applied to urban environments exposed to flood risk, and how can resilience be achieved? This paper presents a heuristic framework for assessing the flood resilience of cities, for scientists and policy-makers alike. It enriches the current literature on flood resilience by clarifying the meaning of its three key characteristics – robustness, adaptability and transformability – and identifying important components to implement resilience strategies. The resilience discussion moves a step forward, from predominantly defining resilience to generating insight into “doing” resilience in practice. The framework is illustrated with two case studies from Hamburg, showing that resilience, and particularly the underlying notions of adaptability and transformability, first and foremost require further capacity-building among public as well as private stakeholders. The case studies suggest that flood resilience is currently not enough motivation to move from traditional to more resilient flood protection schemes in practice; rather, it needs to be integrated into a bigger urban agenda.
Resumo:
The construction industry requires quality control and regulation of its contingent,unpredictable environment. However, taking too much control from workers candisempower and demotivate. In the 1970s Deci and Ryan developed selfdeterminationtheory which states that in order to be intrinsically motivated, threecomponents are necessary - competence, autonomy and relatedness. This study aimsto examine the way in which the three ‘nutriments’ for intrinsic motivation may beundermined by heavy-handed quality control. A critical literature review analysesconstruction, psychological and management research regarding the control andmotivation of workers, using self-determination theory as a framework. Initialfindings show that quality management systems do not always work as designed.Workers perceive that unnecessary, wasteful and tedious counter checking of theirwork implies that they are not fully trusted by management to work without oversight.Control of workers and pressure for continual improvement may lead to resistanceand deception. Controlling mechanisms can break the link between performance andsatisfaction, reducing motivation and paradoxically reducing the likelihood of thequality they intend to promote. This study will lead to a greater understanding ofcontrol and motivation, facilitating further research into improvements in theapplication of quality control to maintain employee motivation.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
The purpose of this paper is to use the framework of Lie algebroids to study optimal control problems for affine connection control systems (ACCSs) on Lie groups. In this context, the equations for critical trajectories of the problem are geometrically characterized as a Hamiltonian vector field.