850 resultados para Network Management
Resumo:
The purpose of this paper is to investigate the Japanese answer to the 90’s depression by (i). presenting a case study of the framework developed to address the new business challenges and value creation in complex, ambiguous and uncertain environment, i.e., Development of Project and Programme Management for Enterprise Innovation (P2M) and Project Management Association Japan (PMAJ) in Japan; and (ii). Exposing what in our view are the underlying theoretical bases supporting this framework and from this drawing some theoretical lessons learnt which could be helpful to the development of sound PM standards and PM competence model. This theoretical approach is assumed to be useful to transpose the Japanese experience to other analogical contexts and situations.
Resumo:
The content and context of work significantly influences an employees’ satisfaction. While managers see work motivation as a tool to engage the employees so that they perform better, academicians value work motivation for its contribution to human behaviour. Though the relationship between employee motivation and project success has been extensively covered in the literature, more research focusing on the nature of job design on project success may have been wanting. We address this gap through this study. The present study contributes to the extant literature by suggesting an operational framework of work motivation for project—based organizations. We are also advancing the conceptual understanding of this variable by understanding how the different facets of work motivation have a differing impact of the various parameters of project performance. A survey instrument using standardized scales of work motivation and project success was used. 199 project workers from various industries completed the survey. We first ‘operationalized’ the definition of work motivation for the purpose of our study through a principal component analysis of work motivation items. We obtained a five factor structure that had items pertaining to employee development, work climate, goal clarity, and job security. We then performed a Pearson’s correlation analysis which revealed moderate to significant relationship between project outcomes ad work climate; project outcomes & employee development. In order to establish a causality between work motivation and project management success, we employed linear regression analysis. The results show that work climate is a significant predictor of client satisfaction, while it moderately influences the project quality. Further, bringing in objectivity to project work is important for a successful implementation.
Resumo:
For the further noise reduction in the future, the traffic management which controls traffic flow and physical distribution is important. To conduct the measure by the traffic management effectively, it is necessary to apply the model for predicting the traffic flow in the citywide road network. For this purpose, the existing model named AVENUE was used as a macro-traffic flow prediction model. The traffic flow model was integrated with the road vehicles' sound power model, and the new road traffic noise prediction model was established. By using this prediction model, the noise map of entire city can be made. In this study, first, the change of traffic flow on the road network after the establishment of new roads was estimated, and the change of the road traffic noise caused by the new roads was predicted. As a result, it has been found that this prediction model has the ability to estimate the change of noise map by the traffic management. In addition, the macro-traffic flow model and our conventional micro-traffic flow model were combined, and the coverage of the noise prediction model was expanded.
Resumo:
Companies face the challenges of expanding their markets, improving products, services and processes, and exploiting intellectual capital in a dynamic network. Therefore, more companies are turning to an Enterprise System (ES). Knowledge management (KM) has also received considerable attention and is continuously gaining the interest of industry, enterprises, and academia. For ES, KM can provide support across the entire lifecycle, from selection and implementation to use. In addition, it is also recognised that an ontology is an appropriate methodology to accomplish a common consensus of communication, as well as to support a diversity of KM activities, such as knowledge repository, retrieval, sharing, and dissemination. This paper examines the role of ontology-based KM for ES (OKES) and investigates the possible integration of ontology-based KM and ES. The authors develop a taxonomy as a framework for understanding OKES research. In order to achieve the objective of this study, a systematic review of existing research was conducted. Based on a theoretical framework of the ES lifecycle, KM, KM for ES, ontology, and ontology-based KM, guided by the framework of study, a taxonomy for OKES is established.
Resumo:
The skyrocketing trend for social media on the Internet greatly alters analytical Customer Relationship Management (CRM). Against this backdrop, the purpose of this paper is to advance the conceptual design of Business Intelligence (BI) systems with data identified from social networks. We develop an integrated social network data model, based on an in-depth analysis of Facebook. The data model can inform the design of data warehouses in order to offer new opportunities for CRM analyses, leading to a more consistent and richer picture of customers? characteristics, needs, wants, and demands. Four major contributions are offered. First, Social CRM and Social BI are introduced as emerging fields of research. Second, we develop a conceptual data model to identify and systematize the data available on online social networks. Third, based on the identified data, we design a multidimensional data model as an early contribution to the conceptual design of Social BI systems and demonstrate its application by developing management reports in a retail scenario. Fourth, intellectual challenges for advancing Social CRM and Social BI are discussed.
Resumo:
Chronic leg ulcers cause significant pain, cost, decreased quality of life and morbidity for a considerable segment of the older population (Graham et al., 2003a). At any given time the prevalence of patients with open leg ulcers receiving treatment is between 0.11% - 0.18% (Briggs & Closs 2003). Chronic leg ulcers occur in approximately 1 - 2% of the over 60 population in the US, UK, Europe and Australia (Baker & Stacey 1994; Johnson 1995; Lees & Lambert 1992; Margolis et al. 2002). Considerable research has been undertaken to determine the best treatment practices that will aid in the management and the healing of these ulcers, and practical and effective strategies and techniques for healing venous leg ulcers have been trialled to demonstrate their beneficial effects (Nelson et al. 2004; Cullum et al. 2001)...
Resumo:
Most social network users hold more than one social network account and utilize them in different ways depending on the digital context. For example, friendly chat on Facebook, professional discussion on LinkedIn, and health information exchange on PatientsLikeMe. Thus many web users need to manage many disparate profiles across many distributed online sources. Maintaining these profiles is cumbersome, time consuming, inefficient, and leads to lost opportunity. In this paper we propose a framework for multiple profile management of online social networks and showcase a demonstrator utilising an open source platform. The result of the research enables a user to create and manage an integrated profile and share/synchronise their profiles with their social networks. A number of use cases were created to capture the functional requirements and describe the interactions between users and the online services. An innovative application of this project is in public health informatics. We utilize the prototype to examine how the framework can benefit patients and physicians. The framework can greatly enhance health information management for patients and more importantly offer a more comprehensive personal health overview of patients to physicians.
Resumo:
This is the sixth part of a Letter from the Editor series where the results are presented of an ongoing research undertaken in order to investigate the dynamic of the evolution of the field of project management and the key trends. Dynamics of networks is a key feature in strategic diagrams analysis. The radical change in the configuration of a network between two periods, or the change at subnetwork level reflects the dynamic of science. I present here an example of subnetwork comparison over the four periods of time considered in this study. I will develop and discuss an example of subnetwork transformation in future Letter from the Editor article..
Resumo:
New substation technology, such as non-conventional instrument transformers,and a need to reduce design and construction costs, are driving the adoption of Ethernet based digital process bus networks for high voltage substations. Protection and control applications can share a process bus, making more efficient use of the network infrastructure. This paper classifies and defines performance requirements for the protocols used in a process bus on the basis of application. These include GOOSE, SNMP and IEC 61850-9-2 sampled values. A method, based on the Multiple Spanning Tree Protocol (MSTP) and virtual local area networks, is presented that separates management and monitoring traffic from the rest of the process bus. A quantitative investigation of the interaction between various protocols used in a process bus is described. These tests also validate the effectiveness of the MSTP based traffic segregation method. While this paper focusses on a substation automation network, the results are applicable to other real-time industrial networks that implement multiple protocols. High volume sampled value data and time-critical circuit breaker tripping commands do not interact on a full duplex switched Ethernet network, even under very high network load conditions. This enables an efficient digital network to replace a large number of conventional analog connections between control rooms and high voltage switchyards.
Resumo:
The development of an intelligent plug-in electric vehicle (PEV) network is an important research topic in the smart grid environment. An intelligent PEV network enables a flexible control of PEV charging and discharging activities and hence PEVs can be utilized as ancillary service providers in the power system concerned. Given this background, an intelligent PEV network architecture is first developed, and followed by detailed designs of its application layers, including the charging and discharging controlling system, mobility and roaming management, as well as communication mechanisms associated. The presented architecture leverages the philosophy in mobile communication network buildup
Resumo:
Purpose: Heart failure (HF) is the leading cause of hospitalization and significant burden to the health care system in Australia. To reduce hospitalizations, multidisciplinary approaches and enhance self-management programs have been strongly advocated for HF patients globally. HF patients who can effectively manage their symptoms and adhere to complex medicine regimes will experience fewer hospitalizations. Research indicates that information technologies (IT) have a significant role in providing support to promote patients' self-management skills. The iPad utilizes user-friendly interfaces and to date an application for HF patient education has not been developed. This project aimed to develop the HF iPad teaching application in the way that would be engaging, interactive and simple to follow and usable for patients' carers and health care workers within both the hospital and community setting. Methods: The design for the development and evaluation of the application consisted of two action research cycles. Each cycle included 3 phases of testing and feedback from three groups comprising IT team, HF experts and patients. All patient education materials of the application were derived from national and international evidence based practice guidelines and patient self-care recommendations. Results: The iPad application has animated anatomy and physiology that simply and clearly teaches the concepts of the normal heart and the heart in failure. Patient Avatars throughout the application can be changed to reflect the sex and culture of the patient. There is voice-over presenting a script developed by the heart failure expert panel. Additional engagement processes included points of interaction throughout the application with touch screen responses and the ability of the patient to enter their weight and this data is secured and transferred to the clinic nurse and/or research data set. The application has been used independently, for instance, at home or using headphones in a clinic waiting room or most commonly to aid a nurse-led HF consultation. Conclusion: This project utilized iPad as an educational tool to standardize HF education from nurses who are not always heart failure specialists. Furthermore, study is currently ongoing to evaluate of the effectiveness of this tool on patient outcomes and to develop several specifically designed cultural adaptations [Hispanic (USA), Aboriginal (Australia), and Maori (New Zealand)].
Resumo:
This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Railway bridges deteriorate with age. Factors such as environmental effects on different materials of a bridge, variation of loads, fatigue, etc will reduce the remaining life of bridges. Bridges are currently rated individually for maintenance and repair actions according to the structural conditions of their elements. Dealing with thousands of bridges and several factors that cause deterioration, makes the rating process extremely complicated. Current simplified but practical rating methods are not based on an accurate structural condition assessment system. On the other hand, the sophisticated but more accurate methods are only used for a single bridge or particular types of bridges. It is therefore necessary to develop a practical and accurate system which will be capable of rating a network of railway bridges. This paper introduces a new method for rating a network of bridges based on their current and future structural conditions. The method identifies typical bridges representing a group of railway bridges. The most crucial agents will be determined and categorized to criticality and vulnerability factors. Classification based on structural configuration, loading, and critical deterioration factors will be conducted. Finally a rating method for a network of railway bridges that takes into account the effects of damaged structural components due to variations in loading and environmental conditions on the integrity of the whole structure will be proposed. The outcome of this research is expected to significantly improve the rating methods for railway bridges by considering the unique characteristics of different factors and incorporating the correlation between them.