864 resultados para Knowledge Networks
Resumo:
A hálózati megközelítés alapján a vállalatok nem izoláltan működő szervezetek. A kis- és középvállalkozások számára a hálózatok, a partnerkapcsolatok jelentős támogatást képesek biztosítani a növekedés, a tanulás és az innovációs tevékenység során. A szerző a hálózati, partneri kapcsolatok szerepét a válság idején vizsgálta, kvalitatív kutatás keretében. A tanulmány fontos megállapítása, hogy nem kizárólag a hálózatban rejlő lehetőségek, hanem a korábban biztos partneri kapcsolatok megszűnése is indukálhat innovációt a válság idején, valamint a biztonság, a tartalék-erőforrások megléte esetén lassabb a piaci reagálás, kevésbé kerül előtérbe a változás, s főként az innovációs tevékenység ______ Based on the network perspective companies are not isolated organizations. Networks and partnerships mean a significant support for SMEs in growth, learning and innovation. The author examines the role of networks and partnerships during the crisis, in a qualitative research. An important result of the paper is that not only the opportunities in networks but also the decomposition of prior secure relationships can induce innovation during the crisis. Moreover in case of safety and slack resources the reaction is slower, change and innovation come to the front less.
Resumo:
A minőségügy egyik kulcsfeladata, hogy azonosítsa az értékteremtés szempontjából kritikus tényezőket, meghatározza ezek értékét, valamint intézkedjen negatív hatásuk megelőzése és csökkentése érdekében. Az értékteremtés sok esetben folyamatokon keresztül történik, amelyek tevékenységekből, elvégzendő feladatokból állnak. Ezekhez megfelelő munkatársak kellenek, akiknek az egyik legfontosabb jellemzője az általuk birtokolt tudás. Mindezek alapján a feladat-tudás-erőforrás kapcsolatrendszer ismerete és kezelése minőségügyi feladat is. A komplex rendszerek elemzésével foglalkozó hálózatkutatás eszközt biztosíthat ehhez, ezért indokolt a minőségügyi területen történő alkalmazhatóságának vizsgálata. Az alkalmazási lehetőségek rendszerezése érdekében a szerzők kategorizálták a minőségügyi hálózatokat az élek (kapcsolatok) és a csúcsok (hálózati pontok) típusai alapján. Ezt követően definiálták a multimodális (több különböző csúcstípusból álló) tudáshálózatot, amely a feladatokból, az erőforrásokból, a tudáselemekből és a közöttük lévő kapcsolatokból épül fel. A hálózat segítségével kategóriákba sorolták a tudáselemeket, valamint a fokszámok alapján meghatározták értéküket. A multimodális hálózatból képzett tudáselem-hálózatban megadták az összefüggő csoportok jelentését, majd megfogalmaztak egy összefüggést a tudáselem-elvesztés kockázatának meghatározására. _______ The aims of quality management are to identify those factors that have significant influence on value production, qualify or quantify them, and make preventive and corrective actions in order to reduce their negative effects. The core elements of value production are processes and tasks, along with workforce having the necessary knowledge to work. For that reason the task-resource-knowledge structure is pertinent to quality management. Network science provides methods to analyze complex systems; therefore it seems reasonable to study the use of tools of network analysis in association with quality management issues. First of all the authors categorized quality networks according to the types of nodes (vertices) and links (edges or arcs). Focusing on knowledge management, they defined the multimodal knowledge network, consisting of tasks, resources, knowledge items and their interconnections. Based on their degree, network nodes can be categorized and their value can be quantified. Derived from the multimodal network knowledge-item network is to be created, where the meaning of cohesive subgroups is defined. Eventually they proposed a formula for determining the risk of knowledge loss.
Resumo:
In 1979, the Florida State Board of Education approved the teaching of global education in the state of Florida. The purpose of this study was to examine the factors that contributed to teachers' global knowledge, global mindedness, and pedagogy in global education. The Hanvey model of teaching from a global perspective was the theoretical framework for the study. ^ A total of 90 secondary teachers from Miami-Dade County Public Schools were randomly selected and placed in three groups: Globally Oriented Social Studies Program (GOSSE), Non-Globally Oriented Social Studies Program (non-GOSSE), and Teachers Who Teach Other Subjects (TWTOS). Seven teachers, two of whom team-taught a class, were selected for classroom observations and interviews. A mixed methods design that combined quantitative and qualitative data was used. ANOVA and Chi square techniques were used to determine whether the factors that contributed to teachers' global knowledge and global mindedness differ among groups. Classroom observations and interviews were conducted to determine whether the instructional strategies differ among the seven selected teachers. ^ The findings of the study show that teachers who were trained in teaching from a global perspective differed in their global knowledge and used more appropriate instructional strategies than teachers who were not trained in teaching global perspectives. There was no significant difference in the combined global knowledge of the non-GOSSE and TWTOS groups when compared with the GOSSE group. There was no significant difference in the combined global knowledge of the GOSSE and non-GOSSE groups when compared with the TWTOS group. There was no significant difference among the teachers in their global mindedness. Observation and interview data indicate that current events, role-playing, simulations, open-ended discussion, debates, and projects were the predominant instructional strategies used by globally trained teachers. Cable networks, Internet, magazines, and newspapers were found to be the dominant tools for teaching global education. ^ This study concluded that teachers who were trained in globally oriented programs had more global knowledge than teachers who were not. It is recommended that teacher education programs should incorporate a global perspective in the preparation of social studies teachers, with particular attention to developing their global attitudes. ^
Resumo:
This dissertation proposed a self-organizing medium access control protocol (MAC) for wireless sensor networks (WSNs). The proposed MAC protocol, space division multiple access (SDMA), relies on sensor node position information and provides sensor nodes access to the wireless channel based on their spatial locations. SDMA divides a geographical area into space divisions, where there is one-to-one map between the space divisions and the time slots. Therefore, the MAC protocol requirement is the sensor node information of its position and a prior knowledge of the one-to-one mapping function. The scheme is scalable, self-maintaining, and self-starting. It provides collision-free access to the wireless channel for the sensor nodes thereby, guarantees delay-bounded communication in real time for delay sensitive applications. This work was divided into two parts: the first part involved the design of the mapping function to map the space divisions to the time slots. The mapping function is based on a uniform Latin square. A Uniform Latin square of order k = m 2 is an k x k square matrix that consists of k symbols from 0 to k-1 such that no symbol appears more than once in any row, in any column, or in any m x in area of main subsquares. The uniqueness of each symbol in the main subsquares presents very attractive characteristic in applying a uniform Latin square to time slot allocation problem in WSNs. The second part of this research involved designing a GPS free positioning system for position information. The system is called time and power based localization scheme (TPLS). TPLS is based on time difference of arrival (TDoA) and received signal strength (RSS) using radio frequency and ultrasonic signals to measure and detect the range differences from a sensor node to three anchor nodes. TPLS requires low computation overhead and no time synchronization, as the location estimation algorithm involved only a simple algebraic operation.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Ensemble Stream Modeling and Data-cleaning are sensor information processing systems have different training and testing methods by which their goals are cross-validated. This research examines a mechanism, which seeks to extract novel patterns by generating ensembles from data. The main goal of label-less stream processing is to process the sensed events to eliminate the noises that are uncorrelated, and choose the most likely model without over fitting thus obtaining higher model confidence. Higher quality streams can be realized by combining many short streams into an ensemble which has the desired quality. The framework for the investigation is an existing data mining tool. First, to accommodate feature extraction such as a bush or natural forest-fire event we make an assumption of the burnt area (BA*), sensed ground truth as our target variable obtained from logs. Even though this is an obvious model choice the results are disappointing. The reasons for this are two: One, the histogram of fire activity is highly skewed. Two, the measured sensor parameters are highly correlated. Since using non descriptive features does not yield good results, we resort to temporal features. By doing so we carefully eliminate the averaging effects; the resulting histogram is more satisfactory and conceptual knowledge is learned from sensor streams. Second is the process of feature induction by cross-validating attributes with single or multi-target variables to minimize training error. We use F-measure score, which combines precision and accuracy to determine the false alarm rate of fire events. The multi-target data-cleaning trees use information purity of the target leaf-nodes to learn higher order features. A sensitive variance measure such as ƒ-test is performed during each node's split to select the best attribute. Ensemble stream model approach proved to improve when using complicated features with a simpler tree classifier. The ensemble framework for data-cleaning and the enhancements to quantify quality of fitness (30% spatial, 10% temporal, and 90% mobility reduction) of sensor led to the formation of streams for sensor-enabled applications. Which further motivates the novelty of stream quality labeling and its importance in solving vast amounts of real-time mobile streams generated today.
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
Professor Mohammed K. Farouk, Major Professor In 1979, the Florida State Board of Education approved the teaching of global education in the state of Florida. The purpose of this study was to examine the factors that contributed to teachers' global knowledge, global mindedness, and pedagogy in global education. The Hanvey model of teaching from a global perspective was the theoretical framework for the study. A total of 90 secondary teachers from Miami-Dade County Public Schools were randomly selected and placed in three groups: Globally Oriented Social Studies Program (GOSSE), Non-Globally Oriented Social Studies Program (non-GOSSE), and Teachers Who Teach Other Subjects (TWTOS). Seven teachers, two of whom team-taught a class, were selected for classroom observations and interviews. A mixed methods design that combined quantitative and qualitative data was used. ANOVA and Chi square techniques were used to determine whether the factors that contributed to teachers' global knowledge and global mindedness differ among groups. Classroom observations and interviews were conducted to determine whether the instructional strategies differ among the seven selected teachers. The findings of the study show that teachers who were trained in teaching from a global perspective differed in their global knowledge and used more appropriate instructional strategies than teachers who were not trained in teaching global perspectives. There was no significant difference in the combined global knowledge of the non-GOSSE and TWTOS groups when compared with the GOSSE group. There was no significant difference in the combined global knowledge of the GOSSE and non- GOSSE groups when compared with the TWTOS group. There was no significant difference among the teachers in their global mindedness. Observation and interview data indicate that current events, role-playing, simulations, open-ended discussion, debates, and projects were the predominant instructional strategies used by globally trained teachers. Cable networks, Internet, magazines, and newspapers were found to be the dominant tools for teaching global education. This study concluded that teachers who were trained in globally oriented programs had more global knowledge than teachers who were not. It is recommended that teacher education programs should incorporate a global perspective in the preparation of social studies teachers, with particular attention to developing their global attitudes.
Resumo:
We develop a framework for estimating the quality of transmission (QoT) of a new lightpath before it is established, as well as for calculating the expected degradation it will cause to existing lightpaths. The framework correlates the QoT metrics of established lightpaths, which are readily available from coherent optical receivers that can be extended to serve as optical performance monitors. Past similar studies used only space (routing) information and thus neglected spectrum, while they focused on oldgeneration noncoherent networks. The proposed framework accounts for correlation in both the space and spectrum domains and can be applied to both fixed-grid wavelength division multiplexing (WDM) and elastic optical networks. It is based on a graph transformation that exposes and models the interference between spectrum-neighboring channels. Our results indicate that our QoT estimates are very close to the actual performance data, that is, to having perfect knowledge of the physical layer. The proposed estimation framework is shown to provide up to 4 × 10-2 lower pre-forward error correction bit error ratio (BER) compared to theworst-case interference scenario,which overestimates the BER. The higher accuracy can be harvested when lightpaths are provisioned with low margins; our results showed up to 47% reduction in required regenerators, a substantial savings in equipment cost.
Resumo:
One commonality across the leadership and knowledge related literature is the apparent neglect of the leaders own knowledge. This thesis sought to address this issue through conducting exploratory research into the content of leader’s personal knowledge and the process of knowing it. The empirical inquiry adopted a longitudinal approach, with interviews conducted at two separate time periods with an extended time-interval between each. The findings from this research contrast with images of leadership which suggest leaders are in control of what they know, that they own their own knowledge. The picture that emerges is one of individuals struggling to keep abreast of the knowledge required to deal with the dynamics and uncertainties of organisational life. Much knowledge is tacit, provisional and perishable and the related process of knowing more organic, evolutionary and informal than any structured or orchestrated approach. The collective nature of knowing is a central feature, with these leaders embedded in networks of uncontrollable relationships. In view of the indeterminate nature of knowing, the boundary between what is known and what one needs to know is both amorphous and ephemeral, and the likelihood of knowledge-absences is escalated. A significant finding in this regard is the identification of two critical points where not-knowing is most likely (entry and exit from role) and the differing implications of each. Overtime the knowledge that is legitimised or prioritised is significantly altered as these leaders replace the dogmas that were previously held in high esteem with the lessons from their own experience. This experience brings increased self-knowledge and a deeper appreciation of the values and morals instilled in their early lives. In view of the above findings, this study makes theoretical contribution to a number of core literatures: authentic leadership, role transition and knowledge-absences. In terms of leadership development, the findings point to the necessity to prepare leaders for the challenges they will encounter at the pivotal stages of the leadership role.
Resumo:
This paper discusses the difficulties involved in managing knowledge-intensive, multinational, multiorganisational, and multifunctional project networks. The study is based on a 2-year quasi-ethnography of one such network engaged in the design and development of a complex new process control system for an existing pharmaceutical plant in Ireland. The case describes how, drawing upon the organisational heritage of the corporations involved and the logic implicit within their global partnership arrangements, the project was initially structured in an aspatial manner that underestimated the complexity of the development process and the social relations required to support it. Following dissatisfaction with initial progress, a number of critical management interventions were made, which appeared to contribute to a recasting of the network ontology that facilitated the cultivation and protection of more appropriate communicative spaces. The case emphasises the need to move away from rationalistic assumptions about communication processes within projects of this nature, towards a richer conceptualisation of such enterprises as involving collective sensemaking activities within and between situated ‘communities’ of actors. Contrary to much contemporary writing, the paper argues that space and location are of crucial importance to our understanding of network forms of organising.
Resumo:
Two concepts in rural economic development policy have been the focus of much research and policy action: the identification and support of clusters or networks of firms and the availability and adoption by rural businesses of Information and Communication Technologies (ICT). From a theoretical viewpoint these policies are based on two contrasting models, with clustering seen as a process of economic agglomeration, and ICT-mediated communication as a means of facilitating economic dispersion. The study’s conceptual framework is based on four interrelated elements: location, interaction, knowledge, and advantage, together with the concept of networks which is employed as an operationally and theoretically unifying concept. The research questions are developed in four successive categories: Policy, Theory, Networks, and Method. The questions are approached using a study of two contrasting groups of rural small businesses in West Cork, Ireland: (a) Speciality Foods, and (b) firms in Digital Products and Services. The study combines Social Network Analysis (SNA) with Qualitative Thematic Analysis, using data collected from semi-structured interviews with 58 owners or managers of these businesses. Data comprise relational network data on the firms’ connections to suppliers, customers, allies and competitors, together with linked qualitative data on how the firms established connections, and how tacit and codified knowledge was sourced and utilised. The research finds that the key characteristics identified in the cluster literature are evident in the sample of Speciality Food businesses, in relation to flows of tacit knowledge, social embedding, and the development of forms of social capital. In particular the research identified the presence of two distinct forms of collective social capital in this network, termed “community” and “reputation”. By contrast the sample of Digital Products and Services businesses does not have the form of a cluster, but matches more closely to dispersive models, or “chain” structures. Much of the economic and social structure of this set of firms is best explained in terms of “project organisation”, and by the operation of an individual rather than collective form of “reputation”. The rural setting in which these firms are located has resulted in their being service-centric, and consequently they rely on ICT-mediated communication in order to exchange tacit knowledge “at a distance”. It is this factor, rather than inputs of codified knowledge, that most strongly influences their operation and their need for availability and adoption of high quality communication technologies. Thus the findings have applicability in relation to theory in Economic Geography and to policy and practice in Rural Development. In addition the research contributes to methodological questions in SNA, and to methodological questions about the combination or mixing of quantitative and qualitative methods.
Resumo:
In this paper we propose a model for intelligent agents (sensors) on a Wireless Sensor Network to guard against energy-drain attacks in an energy-efficient and autonomous manner. This is intended to be achieved via an energy-harvested Wireless Sensor Network using a novel architecture to propagate knowledge to other sensors based on automated reasoning from an attacked sensor.
Resumo:
In today’s technology-driven marketplace, the adoption and management of corporate and customer-facing Social Networking Sites (SNs) is often viewed as a key success factor for Travel Industry (TI) organisations. Knowledge management and the sharing of expertise and experiences through communication between internal and external stakeholders via social networks is an activity which TI organisations are aiming to exploit in order to improve the open sharing, retrieval, organisation and leveraging of knowledge. Through a study of currently-available literature relating to social networking adoption within the TI and a case study analysis of corporate social networking practices at three multi-national TI organisations (British Airways, Thomas Cook and Marriott Hotels), it may be observed that correlations exist between the development of social networking and the processes TI organisations now use to manage knowledge. We explore how these companies are currently utilizing SNs to improve knowledge management practices inside and outside of their organisational boundaries. From our analysis, lessons may emerge as to how TI companies are gaining competitive advantage through the use of social networking; a proposed strategy is identified to determine how TI organisations may make best use of social networks.
Resumo:
This work focuses on the study of the circular migration between America and Europe, particularly in the discussion about knowledge transfer and the way that social networks reconfigure the form of information distribution among people, that due to labor and academic issues have left their own country. The main purpose of this work is to study the impact of social media use in migration flows between Mexico and Spain, more specifically the use by Mexican migrants who have moved for multiple years principally for educational purposes and then have returned to their respective locations in Mexico seeking to integrate themselves into the labor market. Our data collection concentrated exclusively on a group created on Facebook by Mexicans who mostly reside in Barcelona, Spain or wish to travel to the city for economic, educational or tourist reasons. The results of this research show that while social networks are spaces for exchange and integration, there is a clear tendency by this group to "narrow lines" and to look back to their homeland, slowing the process of opening socially in their new context.