162 resultados para Leveraged buyout
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
The digital era is proving to be one of disruption, where new technologies matched with innovative business models can be harnessed to attack even the most established of companies. For businesses with the relative certainty of captive customer bases, such as airports, the ability to digitally diversify offers the opportunity to venture into new modes of operation. For an airport, this opportunity can also be leveraged to sustain superior customer support regardless of a customer’s location in the world. This research paper presents a case study of the development of an Australian Airport Corporation’s mobile application as part of a greater digital strategy initiative using a design-led approach to innovate. An action research method provides the platform for an intensive embedded practice and study of design-led innovation within the major Australian Airport Corporation. The findings reveal design-led innovation to be a crucial in-house idea generation and concept development capability enabling the bridging of distinct corporate domains associated with commercialisation, operations and customer experience. A Digital Innovation Checklist is presented as an output of this research which structures an organizational approach toward digital channel innovation. The practitioner’s checklist is designed to aid in the future development of digital channels within the broader spectrum of strategy by addressing business assumptions.
Resumo:
Abstract Objective. Healthcare-associated infection (HAI) surveillance programs are critical for infection prevention. Australia does not have a comprehensive national HAI surveillance program. The purpose of this paper is to provide an overview of established international and Australian statewide HAI surveillance programs and recommend a pathway for the development of a national HAI surveillance program in Australia. Methods. This study examined existing HAI surveillance programs through a literature review, a review of HAI surveillance program documentation, such as websites, surveillance manuals and data reports and direct contact with program representatives. Results. Evidence from international programs demonstrates national HAI surveillance reduces the incidence of HAIs. However, the current status of HAI surveillance activity in Australian states is disparate, variation between programs is not well understood, and the quality of data currently used to compose national HAI rates is uncertain. Conclusions. There is a need to develop a well-structured, evidence-based national HAI program in Australia to meet the increasing demand for validated reliable national HAI data. Such a program could be leveraged off the work of existing Australian and international programs.
Resumo:
Today’s information systems log vast amounts of data. These collections of data (implicitly) describe events (e.g. placing an order or taking a blood test) and, hence, provide information on the actual execution of business processes. The analysis of such data provides an excellent starting point for business process improvement. This is the realm of process mining, an area which has provided a repertoire of many analysis techniques. Despite the impressive capabilities of existing process mining algorithms, dealing with the abundance of data recorded by contemporary systems and devices remains a challenge. Of particular importance is the capability to guide the meaningful interpretation of “oceans of data” by process analysts. To this end, insights from the field of visual analytics can be leveraged. This article proposes an approach where process states are reconstructed from event logs and visualised in succession, leading to an animated history of a process. This approach is customisable in how a process state, partially defined through a collection of activity instances, is visualised: one can select a map and specify a projection of events on this map based on the properties of the events. This paper describes a comprehensive implementation of the proposal. It was realised using the open-source process mining framework ProM. Moreover, this paper also reports on an evaluation of the approach conducted with Suncorp, one of Australia’s largest insurance companies.
Resumo:
The Internet has been shown to positively enhance internationalisation for SMEs, but scant empirical testing limits our understanding of the explicit impact of the Internet on firm internationalisation. This paper highlights key areas where the integration of the Internet can be leveraged through Internet-related capabilities within the internationalisation of the firm. Specifically, this study investigates how Internet marketing capabilities play a role in altering international information availability, international strategic orientation, and international business network relationships. This study provides evidence, indicating that these key relationships may vary between countries. To examine these key relationships this study utilises draws from data small and medium sized enterprises (SMEs) in three export intensive markets; Australia (215 international SMEs), Chile (204 international SMEs) and Taiwan (130 international SMEs); and tests a conceptual model through structural equation modelling. Results from the data show the impact of Internet marketing capabilities in positively impacting traditional internationalisation elements, which varies between countries. That is, our findings highlight the international business network relationships in Australia and Taiwan are directly impacted by Internet marketing capabilities, but not in Chile. We offer some insight into why we see variance across comparative exporting countries in how they leverage new technological capabilities for internationalisation and firm performance.
Resumo:
The purpose of this article is to assess the viability of blanket sustainability policies, such as Building Rating Systems in achieving energy efficiency in university campus buildings. We analyzed the energy consumption trends of 10 LEED-certified buildings and 14 non-LEED certified buildings at a major university in the US. Energy Use Intensity (EUI) of the LEED buildings was significantly higher (EUILEED= 331.20 kBtu/sf/yr) than non-LEED buildings (EUInon-LEED=222.70 kBtu/sf/yr); however, the median EUI values were comparable (EUILEED= 172.64 and EUInon-LEED= 178.16). Because the distributions of EUI values were non-symmetrical in this dataset, both measures can be used for energy comparisons—this was also evident when EUI computations exclude outliers, EUILEED=171.82 and EUInon-LEED=195.41. Additional analyses were conducted to further explore the impact of LEED certification on university campus buildings energy performance. No statistically significant differences were observed between certified and non-certified buildings through a range of robust comparison criteria. These findings were then leveraged to devise strategies to achieve sustainable energy policies for university campus buildings and to identify potential issues with portfolio level building energy performance comparisons.
Resumo:
The growth of APIs and Web services on the Internet, especially through larger enterprise systems increasingly being leveraged for Cloud and software-as-a-service opportunities, poses challenges for improving the efficiency of integration with these services. Interfaces of enterprise systems are typically larger, more complex and overloaded, with single operations having multiple data entities and parameter sets, supporting varying requests, and reflecting versioning across different system releases, compared to fine-grained operations of contemporary interfaces. We propose a technique to support the refactoring of service interfaces by deriving business entities and their relationships. In this paper, we focus on the behavioural aspects of service interfaces, aiming to discover the sequential dependencies of operations (otherwise known as protocol extraction) based on the entities and relationships derived. Specifically, we propose heuristics according to these relationships, and in turn, deriving permissible orders in which operations are invoked. As a result of this, service operations can be refactored on business entity CRUD lines, with explicit behavioural protocols as part of an interface definition. This supports flexible service discovery, composition and integration. A prototypical implementation and analysis of existing Web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms proposed through the paper.
Resumo:
Industry-school partnerships (ISPs) are increasingly being recognised as a new way of providing vocational education opportunities. However, there is limited research investigating their impact on systemic (organisational and structural) and human resource (teachers and education managers) capacity to support school to work transitions. This paper reports on a government led ISP, established by the Queensland state government. ISPs across three industry sectors: minerals and energy; building and construction; and aviation are included in this study. This research adopted a qualitative case study methodology and draws upon boundary crossing theory to understand the dynamics of how each industry sector responded to systemic and human resource issues that emerged in each ISP. The main finding being that the systematic application of boundary crossing mechanisms by all partners pro-duced mutually beneficial outcomes. ISPs from the three sectors adopted different models, leveraged different boundary crossing objects but all maintained the joint vision and mutually agreed outcomes. All three ISPs genuinely crossed boundaries, albeit in different ways, and assisted teachers to co-pro-duce industry-based curriculums, share sector specific knowledge and skills that help enhance the school to work transition for school graduates.
Resumo:
Cost estimating has been acknowledged as a crucial component of construction projects. Depending on available information and project requirements, cost estimates evolve in tandem with project lifecycle stages; conceptualisation, design development, execution and facility management. The premium placed on the accuracy of cost estimates is crucial to producing project tenders and eventually in budget management. Notwithstanding the initial slow pace of its adoption, Building Information Modelling (BIM) has successfully addressed a number of challenges previously characteristic of traditional approaches in the AEC, including poor communication, the prevalence of islands of information and frequent reworks. Therefore, it is conceivable that BIM can be leveraged to address specific shortcomings of cost estimation. The impetus for leveraging BIM models for accurate cost estimation is to align budgeted and actual cost. This paper hypothesises that the accuracy of BIM-based estimation, as more efficient, process-mirrors of traditional cost estimation methods, can be enhanced by simulating traditional cost estimation factors variables. Through literature reviews and preliminary expert interviews, this paper explores the factors that could potentially lead to more accurate cost estimates for construction projects. The findings show numerous factors that affect the cost estimates ranging from project information and its characteristic, project team, clients, contractual matters, and other external influences. This paper will make a particular contribution to the early phase of BIM-based project estimation.
Resumo:
The growth of APIs and Web services on the Internet, especially through larger enterprise systems increasingly being leveraged for Cloud and software-as-a-service opportuni- ties, poses challenges to improving the efficiency of integration with these services. Interfaces of enterprise systems are typically larger, more complex and overloaded, with single operation having multiple data entities and parameter sets, supporting varying requests, and reflecting versioning across different system releases, compared to fine-grained operations of contemporary interfaces. We propose a technique to support the refactoring of service interfaces by deriving business entities and their relationships. In this paper, we focus on the behavioural aspects of service interfaces, aiming to discover the sequential dependencies of operations (otherwise known as protocol extraction) based on the entities and relationships derived. Specifically, we propose heuristics according to these relationships, and in turn, deriving permissible orders in which operations are invoked. As a result of this, service operations can be refactored on business entity CRUD lines, with explicit behavioural protocols as part of an interface definition. This supports flexible service discovery, composition and integration. A prototypical implementation and analysis of existing Web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms proposed through the paper.
Resumo:
The project intends to establish a cross DEEDI industry-leveraged project for tropical fruit convenience products.
Resumo:
Sensor networks represent an attractive tool to observe the physical world. Networks of tiny sensors can be used to detect a fire in a forest, to monitor the level of pollution in a river, or to check on the structural integrity of a bridge. Application-specific deployments of static-sensor networks have been widely investigated. Commonly, these networks involve a centralized data-collection point and no sharing of data outside the organization that owns it. Although this approach can accommodate many application scenarios, it significantly deviates from the pervasive computing vision of ubiquitous sensing where user applications seamlessly access anytime, anywhere data produced by sensors embedded in the surroundings. With the ubiquity and ever-increasing capabilities of mobile devices, urban environments can help give substance to the ubiquitous sensing vision through Urbanets, spontaneously created urban networks. Urbanets consist of mobile multi-sensor devices, such as smart phones and vehicular systems, public sensor networks deployed by municipalities, and individual sensors incorporated in buildings, roads, or daily artifacts. My thesis is that "multi-sensor mobile devices can be successfully programmed to become the underpinning elements of an open, infrastructure-less, distributed sensing platform that can bring sensor data out of their traditional close-loop networks into everyday urban applications". Urbanets can support a variety of services ranging from emergency and surveillance to tourist guidance and entertainment. For instance, cars can be used to provide traffic information services to alert drivers to upcoming traffic jams, and phones to provide shopping recommender services to inform users of special offers at the mall. Urbanets cannot be programmed using traditional distributed computing models, which assume underlying networks with functionally homogeneous nodes, stable configurations, and known delays. Conversely, Urbanets have functionally heterogeneous nodes, volatile configurations, and unknown delays. Instead, solutions developed for sensor networks and mobile ad hoc networks can be leveraged to provide novel architectures that address Urbanet-specific requirements, while providing useful abstractions that hide the network complexity from the programmer. This dissertation presents two middleware architectures that can support mobile sensing applications in Urbanets. Contory offers a declarative programming model that views Urbanets as a distributed sensor database and exposes an SQL-like interface to developers. Context-aware Migratory Services provides a client-server paradigm, where services are capable of migrating to different nodes in the network in order to maintain a continuous and semantically correct interaction with clients. Compared to previous approaches to supporting mobile sensing urban applications, our architectures are entirely distributed and do not assume constant availability of Internet connectivity. In addition, they allow on-demand collection of sensor data with the accuracy and at the frequency required by every application. These architectures have been implemented in Java and tested on smart phones. They have proved successful in supporting several prototype applications and experimental results obtained in ad hoc networks of phones have demonstrated their feasibility with reasonable performance in terms of latency, memory, and energy consumption.
Resumo:
This paper presents two simple simulation and modelling tools designed to aid in the safety assessment required for unmanned aircraft operations within unsegregated airspace. First, a fast pair-wise encounter generator is derived to simulate the See and Avoid environment. The utility of the encounter generator is demonstrated through the development of a hybrid database and a statistical performance evaluation of an autonomous See and Avoid decision and control strategy. Second, an unmanned aircraft mission generator is derived to help visualise the impact of multiple persistent unmanned operations on existing air traffic. The utility of the mission generator is demonstrated through an example analysis of a mixed airspace environment using real traffic data in Australia. These simulation and modelling approaches constitute a useful and extensible set of analysis tools, that can be leveraged to help explore some of the more fundamental and challenging problems facing civilian unmanned aircraft system integration.
Resumo:
Using van-der-Waals-corrected density functional theory calculations, we explore the possibility of engineering the local structure and morphology of high-surface-area graphene-derived materials to improve the uptake of methane and carbon dioxide for gas storage and sensing. We test the sensitivity of the gas adsorption energy to the introduction of native point defects, curvature, and the application of strain. The binding energy at topological point defect sites is inversely correlated with the number of missing carbon atoms, causing Stone-Wales defects to show the largest enhancement with respect to pristine graphene (similar to 20%). Improvements of similar magnitude are observed at concavely curved surfaces in buckled graphene sheets under compressive strain, whereas tensile strain tends to weaken gas binding. Trends for CO2 and CH4 are, similar, although CO2 binding is generally stronger by similar to 4 to 5 kJ mol(-1). However, the differential between the adsorption of CO2 and CH4 is much higher on folded graphene sheets and at concave curvatures; this could possibly be leveraged for CH4/CO2 flow separation and gasselective sensors.
Resumo:
Tuberculosis (TB) is a life threatening disease caused due to infection from Mycobacterium tuberculosis (Mtb). That most of the TB strains have become resistant to various existing drugs, development of effective novel drug candidates to combat this disease is a need of the day. In spite of intensive research world-wide, the success rate of discovering a new anti-TB drug is very poor. Therefore, novel drug discovery methods have to be tried. We have used a rule based computational method that utilizes a vertex index, named `distance exponent index (D-x)' (taken x = -4 here) for predicting anti-TB activity of a series of acid alkyl ester derivatives. The method is meant to identify activity related substructures from a series a compounds and predict activity of a compound on that basis. The high degree of successful prediction in the present study suggests that the said method may be useful in discovering effective anti-TB compound. It is also apparent that substructural approaches may be leveraged for wide purposes in computer-aided drug design.