796 resultados para Georgian architecture
Resumo:
This artcle describes work done with enterprise architecture of the National Digital Library. The National Digital Library is an initiative of the Finnish Ministry of Education and Culture. Its purpose is to promote the availability of the digital information resources of archives, libraries and museums, and to develope the long-term preservation of digital cultural heritage materials. Enterprise architectures are a tool for strategic management and planning. An enterprise architecture also functions as an aid at a more practical level. It shows, for example, what kind of changes and improvements may be made in one system without overlap or conflict with other systems.
Resumo:
Parameters such as tolerance, scale and agility utilized in data sampling for using in Precision Agriculture required an expressive number of researches and development of techniques and instruments for automation. It is highlighted the employment of methodologies in remote sensing used in coupled to a Geographic Information System (GIS), adapted or developed for agricultural use. Aiming this, the application of Agricultural Mobile Robots is a strong tendency, mainly in the European Union, the USA and Japan. In Brazil, researches are necessary for the development of robotics platforms, serving as a basis for semi-autonomous and autonomous navigation systems. The aim of this work is to describe the project of an experimental platform for data acquisition in field for the study of the spatial variability and development of agricultural robotics technologies to operate in agricultural environments. The proposal is based on a systematization of scientific work to choose the design parameters utilized for the construction of the model. The kinematic study of the mechanical structure was made by the virtual prototyping process, based on modeling and simulating of the tension applied in frame, using the.
Resumo:
Kirjallisuusarvostelu
Resumo:
Vuonna 2008 käyty Venäjän ja Georgian välinen sota sisälsi eri puolustushaaroja yhdistäviä joint-operaatioita. Suoritetut lähitulitukitehtävät olivat perinteisiä taktisen tason iskuja, jotka toteutettiin pääosin Su-25-rynnäkköhävittäjillä. Lähitulitukitehtävien tarkoituksena oli tukea maajoukkojen operaatiota. Lähitulitukitehtävät onnistuivat vaihtelevalla menestyksellä. Georgian ilmatorjuntakykyä aliarvioitiin, mikä johti venäläisten ilma-alusten pudotuksiin. Myös vanhentunut lentokalusto huonoine tiedonsiirtoyhteyksineen heikensi eri puolustushaarojen yhteistyötä, lähitulituen suorituskykyä ja ohjaajan tilannetietoisuutta. Vanhanaikaiset organisaatiorakenteet hidastivat tiedonkulkua ja käskynantoa, jolloin taistelukentällä muodostunutta lähitulitukitarvetta ei pystytty toteuttamaan nopeasti. Lähitulitukitehtäviä suoritettiin seek and destroy -periaatteella. Rynnäkköhävittäjät etsivät taistelukentältä maaleja ja löytäessään hyökkäsivät näitä kohti. Osa iskuista onnistui heikentäen georgialaisten joukkojen suorituskykyä ja taistelumoraalia. Tutkimuksen tarkoitus on tutkia sodassa suoritettuja lähitulitukitehtäviä ja löytää niistä yhteisiä piirteitä sekä taktisia trendejä. Tutkimuskysymys on: Miten Venäjän ilmavoimat suoritti lähitulitukitehtäviä? Alakysymykset ovat: Miten lähitulitukitehtävät liittyivät muuhun operaatioon? Miten lähitulitukitehtävät onnistuivat? Tutkimuksen pyrkimyksenä on muodostaa vastaus pääkysymykseen ja muodostaa perusteltu näkemys kahteen alakysymykseen. Tutkimus on laadullinen tutkimus, joka on toteutettu tapaustutkimuksen menetelmin. Laajasta tietomäärästä on löydettävissä yleisiä piirteitä, jotka luovat perustan tutkimuksen johtopäätöksille. Tutkimus koostuu tutkimusta kuvaavista luvuista ja varsinaisista tutkivista luvuista.
Resumo:
Abstract—Concept development and experimentation (CD&E) plays an important role in driving strategic transformation in the military community. Defence architecture frameworks, such as the NATO architecture framework, are considered excellent means to support CD&E. There is not much empirical evidence, however, to indicate how enterprise architectures (EA) are applied in the military community or particularly in military CD&E. Consequently, this paper describes and discusses empirical application of the EA approach in CD&E. The research method in the paper is a case study. Situational method engineering (SiME) is used as a framework to adapt the EA approach to the case project of the paper. The findings of the paper suggest that the EA is applicable to CD&E work, although all aspects of the original concept could not be expressed in the EA model of the case project. The results also show that the SiME method can support in applying the EA framework to the CD&E in the case project.
Resumo:
The aim of this dissertation is to bridge and synthesize the different streams of literature addressing ecosystem architecture through a multiple‐lens perspective. In addition, the structural properties of and processes to design and manage the architecture will be examined. With this approach, the oft‐neglected actor‐structure duality is addressed and both the position and structure, and action and process are under scrutiny. Further, the developed framework and empirical evidence offer valuable insights on how firms collectively create value and individually appropriate value. The dissertation is divided into two parts. The first part comprises a literature review, as well as the conclusions of the whole study, and the second part includes six research publications. The dissertation is based on three different reasoning logics: abduction, induction and deduction; related qualitative and quantitative methodologies are utilized in the empirical examination of the phenomenon in the information and communication technology industry. The results suggest firstly that there are endogenous and exogenous structural properties of the ecosystem architecture. Out of these, the former ones can be more easily influenced by a particular actor whereas the latter ones are taken more or less for granted. Secondly, the exogenous ecosystem design properties influence the value creation potential of the ecosystem whereas the endogenous ecosystem design properties influence the value appropriation potential of a particular actor in the ecosystem. Thirdly, the study suggests that there is a relationship between endogenous and exogenous structural properties in that the endogenous properties can be leveraged to create and reconfigure the exogenous properties whereas the exogenous properties prose opportunities and restrictions on the use of endogenous properties. In addition, the study suggests that there are different emergent and engineered processes to design and manage ecosystem architecture and to influence both the endogenous and exogenous structural properties of ecosystem architecture. This study makes three main contributions. First, on the conceptual level, it brings coherence and direction to the fast growing body of literature on novel inter‐organizational arrangements, such as ecosystems. It does this by bridging and synthetizing three different streams of literature, namely the boundary, design and orchestration conception. Secondly, it sets out a framework that enhances our understanding of the structural properties of ecosystem architecture; of the processes to design and manage ecosystem architecture; and of their influence on the value creation potential of the ecosystem and the value capture potential of a particular firm. Thirdly, it offers empirical evidence of the structural properties and processes.
Resumo:
Georgian sota elokuussa 2008 oli Venäjän ja Georgian välinen sotatoimi, jossa Venäjän joukot kukistivat Georgian armeijan nopealla hyökkäyksellä ja tulenkäytöllä. Strateginen isku, suomalainen uhkamalli, on yllätykseen pyrkivä, vahvennetuilla normaaliolojen joukoilla toteutettava sotatoimi, jolla pyritään pakottamaan valtakunnan johto haluttuihin ratkaisuihin. Tutkimuksen tavoitteena oli suomalaisen uhkamallin analysointi Georgian sodan ja siitä saatujen oppien perusteella. Tutkimus toteutettiin tapaustutkimuksena. Tapauksena käsiteltiin Georgian sotaa ja tutkimuksen kohteina taistelutilassa esiintyviä ilmiöitä. Ilmiöitä ja niiden toteutumista tutkittiin strategisen iskun toteutuksen ja torjunnan näkökulmasta. Venäjän operaatiolla ja suomalaisen strategisen iskun uhkamallin teorialla on paljon yhtäläisyyksiä. Kuvaavampi nimi Venäjän asevoimien operaatiolle uhkamallina olisi ”välittömästi alkava ajallisesti synkronoitu operaatio”. Operaatio aloitettaisiin korkean valmiuden joukoilla ilman vaatimusten esittämistä kohdemaalle. Tällä saavutettaisiin yllätysmomentti ja maksimoitaisiin iskun strateginen vaikutus. Georgian sodan oppien perusteella hyökkäysoperaation menestystekijöitä ovat joukkojen koulutustason ja valmiuden kehittäminen, tilannekuvan muodostaminen ja kohteiden maalittaminen, kyberulottuvuuden hyödyntäminen operaation kaikissa vaiheissa, ajallinen ja alueellinen ilmanherruus, kahden operaatiosuunnan hyökkäys, voiman nopea kasvattaminen taistelutilassa sekä operaatiotempo, jolla kyetään hyökkäämään puolustajan suunnitelmia vastaan. Puolustussuunnittelun tulee perustua realistisille uhka-arvioille. Suunnittelussa on varauduttava myös suunnitellusta poikkeavaan tilannekehitykseen. Epäedullisessa tilanteessa vastustaja on vallannut alueita Suomen valtakunnanrajan sisältä jo siinä vaiheessa, kun joukkoja aletaan ryhmittää puolustukseen. Hyökkäyksen torjunnan menestystekijöitä ovat ennakkovaroitus tulevasta hyökkäyksestä, realistinen arvio siihen käytettävästä voimasta, joukkojen perustaminen ja koulutus, puolustusvalmistelut keskeisillä alueilla, hyökkääjän pysäyttäminen ja kuluttaminen, reservien operatiivinen liikkuvuus ja oikea-aikainen käyttö, merenherruuden ja ilmanherruuden kiistäminen sekä kyky turvata oma toiminta ja vaikuttaa vastustajan toimintaan myös kyberulottuvuudessa. Merkittäviksi tekijöiksi voidaan nostaa myös vihollisen ja omien suorituskykyjen tunteminen, ylimmän sotilaallisen ja poliittisen johdon harjoittelu sekä suurien joukkokokonaisuuksien johtamisen harjoittelu. Tämä tutkimus on hyödynnettävissä sotataidon opetuksessa käsiteltäessä nykyaikaisen sodan ja taistelun kuvaa, taistelutilan ilmiöitä sekä puolustussuunnittelussa käytettäviä uhkamalleja. Johtopäätöksiä hyödynnettäessä on huomioitava, että tutkimuksessa laadittu tarkastelu perustuu erilaisissa olosuhteissa toimeenpantuun operaatioon.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
The evolution of digital circuit technology, leadind to higher speeds and more reliability allowed the development of machine controllers adapted to new production systems (e.g., Flexible Manufacturing Systems - FMS). Most of the controllers are developed in agreement with the CNC technology of the correspondent machine tool manufacturer. Any alterations or adaptation of their components are not easy to be implemented. The machine designers face up hardware and software restrictions such as lack of interaction among system's elements and impossibility of adding new function. This is due to hardware incompatibility and to software not allowing alterations in the source program. The introduction of open architecture philosophy propitiated the evolution of a new generation of numeric controllers. This brought the conventional CNC technology to the standard IBM - PC microcomputer. As a consequence, the characteristics of the CNC (positioning) and the microcomputer (easy of programming, system configuration, network communication etc) are combined. Some researchers have addressed a flexible structure of software and hardware allowing changes in the hardware basic configuration and all control software levels. In this work, the development of open architecture controllers in the OSACA, OMAC, HOAM-CNC and OSEC architectures is described.
Resumo:
The capabilities and thus, design complexity of VLSI-based embedded systems have increased tremendously in recent years, riding the wave of Moore’s law. The time-to-market requirements are also shrinking, imposing challenges to the designers, which in turn, seek to adopt new design methods to increase their productivity. As an answer to these new pressures, modern day systems have moved towards on-chip multiprocessing technologies. New architectures have emerged in on-chip multiprocessing in order to utilize the tremendous advances of fabrication technology. Platform-based design is a possible solution in addressing these challenges. The principle behind the approach is to separate the functionality of an application from the organization and communication architecture of hardware platform at several levels of abstraction. The existing design methodologies pertaining to platform-based design approach don’t provide full automation at every level of the design processes, and sometimes, the co-design of platform-based systems lead to sub-optimal systems. In addition, the design productivity gap in multiprocessor systems remain a key challenge due to existing design methodologies. This thesis addresses the aforementioned challenges and discusses the creation of a development framework for a platform-based system design, in the context of the SegBus platform - a distributed communication architecture. This research aims to provide automated procedures for platform design and application mapping. Structural verification support is also featured thus ensuring correct-by-design platforms. The solution is based on a model-based process. Both the platform and the application are modeled using the Unified Modeling Language. This thesis develops a Domain Specific Language to support platform modeling based on a corresponding UML profile. Object Constraint Language constraints are used to support structurally correct platform construction. An emulator is thus introduced to allow as much as possible accurate performance estimation of the solution, at high abstraction levels. VHDL code is automatically generated, in the form of “snippets” to be employed in the arbiter modules of the platform, as required by the application. The resulting framework is applied in building an actual design solution for an MP3 stereo audio decoder application.