897 resultados para CAPABILITIES
Resumo:
Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.
Resumo:
Since the establishment of the first national strategic development plan in the early 1970s, the construction industry has played an important role in terms of the economic, social and cultural development of Indonesia. The industry’s contribution to Indonesia’s gross domestic product (GDP) increased from 3.9% in 1973 to 7.7% in 2007. Business Monitoring International (2009) forecasts that Indonesia is home to one of the fastest-growing construction industries in Asia despite the average construction growth rate being expected to remain under 10% over the period 2006 – 2010. Similarly, Howlett and Powell (2006) place Indonesia as one of the 20 largest construction markets in 2010. Although the prospects for the Indonesian construction industry are now very promising, many local construction firms still face serious difficulties, such as poor performance and low competitiveness. There are two main reasons behind this problem: the environment that they face is not favourable; the other is the lack of strategic direction to improve competitiveness and performance. Furthermore, although strategic management has now become more widely used by many large construction firms in developed countries, practical examples and empirical studies related to the Indonesian construction industry remain scarce. In addition, research endeavours related to these topics in developing countries appear to be limited. This has potentially become one of the factors hampering efforts to guide Indonesian construction enterprises. This research aims to construct a conceptual model to enable Indonesian construction enterprises to develop a sound long-term corporate strategy that generates competitive advantage and superior performance. The conceptual model seeks to address the main prescription of a dynamic capabilities framework (Teece, Pisano & Shuen, 1997; Teece, 2007) within the context of the Indonesian construction industry. It is hypothesised that in a rapidly changing and varied environment, competitive success arises from the continuous development and reconfiguration of firm’s specific assets achieving competitive advantage is not only dependent on the exploitation of specific assets/capabilities, but on the exploitation of all of the assets and capabilities combinations in the dynamic capabilities framework. Thus, the model is refined through sequential statistical regression analyses of survey results with a sample size of 120 valid responses. The results of this study provide empirical evidence in support of the notion that a competitive advantage is achieved via the implementation of a dynamic capability framework as an important way for a construction enterprise to improve its organisational performance. The characteristics of asset-capability combinations were found to be significant determinants of the competitive advantage of the Indonesian construction enterprises, and that such advantage sequentially contributes to organisational performance. If a dynamic capabilities framework can work in the context of Indonesia, it suggests that the framework has potential applicability in other emerging and developing countries. This study also demonstrates the importance of the multi-stage nature of the model which provides a rich understanding of the dynamic process by which asset-capability should be exploited in combination by the construction firms operating in varying levels of hostility. Such findings are believed to be useful to both academics and practitioners, however, as this research represents a dynamic capabilities framework at the enterprise level, future studies should continue to explore and examine the framework in other levels of strategic management in construction as well as in other countries where different cultures or similar conditions prevails.
Resumo:
Undergraduates working in teams can be a problematic endeavour, sometimes exacerbated for the student by poor prior experiences, a predisposition to an individual orientation of assessment, and simply the busyness that now typifies the life of a student. But effort in pedagogical design is worthwhile where team work is often a prerequisite in terms of graduate capabilities, robust learning, increased motivation, and indeed in terms of equipping individuals for emergent knowledge-age work practice, often epitomised by collaborative effort in both blended and virtual contexts. Through an iterative approach, based extensively on the established literature, we have developed a successful scaffold which is workable with a large cohort group (n >800), such that it affords students the lived experience of being a part of a learning network. Individuals within teams work together, to develop individual components that are subsequently aggregated and reified to an overall team knowledge artefact. We describe our case and propose a pedagogical model of scaffolding based on three perspectives: conceptual, rule-based and community-driven. This model provides designers with guidelines for producing and refining assessment tasks for team-based learning.
Resumo:
The ability to differentiate from competitors through the selection of unique offerings is an important cornerstone of competitive performance. Developing unique products and services to offer in the marketplace is not only important for established firms, but also an important strategic choice for young firms (Baum and Haveman, 1997). Unlike large and established firms, young firms tend to have less access to adequate resources, well-developed sources of information, contact networks, and considerable experience and management know-how. That is, these firms differ significantly in their attributes and performance from larger and well-established firms (c.f. Miller and Chen, 1994). Although young firms are disadvantaged by the paucity of resources in putting together its unique product offering(s), they develop different pathways in advancing their assortment of capabilities that enables them to stay ahead of competitors.
Resumo:
Infrastructure capacity management is the process of ensuring optimal provision of infrastructure assets to support business operations. Effectiveness in this process will enable infrastructure asset owners and its stakeholders to receive full value on their investment. Management research has shown that an organisation can only achieve business value when it has the right capabilities. This paradigm can also be applied to infrastructure capacity management. With competing needs for limited organisation resources, the challenge for infrastructure organisations is to identify and invest their limited resources to develop the right capabilities in the management of their infrastructure capacity. Using a multiple case study approach, the challenges faced in the management of infrastructure asset capacity and the approaches that can be adopted to overcome these challenges were explored. Conceptualising the approaches adopted by the case participants, the findings suggest that infrastructure organisations must strengthen their stakeholder connectivity capability in order to effectively manage the capacity of their infrastructure assets.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
Since the mid-1990s, government policies in the USA, Canada, England, and Australia have promoted the need to produce an ICT skilled workforce in order to ensure national competitiveness in globalised economic conditions. In this article, we examine the ways in which these policy intentions in 1 state in Australia were translated into a techno-determinist and technocentric plan which focused primarily on getting wired up and connected. We summarise the findings from 2 projects: an investigation of a state-wide principals' professional development programme and an action research study investigating literacy, educational disadvantage, and information technologies. We found significant differences in the distribution of the physical and human capabilities between schools which made the task of engaging with ICT harder for some than others. Nevertheless, we suggest that some school leaders did develop innovative practice. We suggest that policy deficits made it difficult for school leaders to grapple with the dimensions of and debates about the kinds of educational changes that schools and school systems should be making. © 2006 Taylor & Francis.
Resumo:
Business transformations are large-scale organizational change programs that, evidence suggests, are often unsuccessful. Our interest is in identifying the management capabilities required for the successful execution of these projects. We advance a service-oriented view of the enterprise, which suggests that different management services need to be identified and integrated in order to execute business transformation. In order to identify those management services that require integration, we conducted an exploratory empirical study of the demand for management services in US and Asia, and we show that two archetypes of management services exist in business transformation initiatives: transactional and transformational management services. We identify the relevant set of transactional and transformational services and discuss what the demand for these services implies for the execution of business transformations.
Resumo:
Recently I asked a first year student how he was coping with the transition from high school to university. The young fellow looked at me and said, “Man, everything is so different!” I smiled and said “like what?” with which he seriously replied, “Well for one thing, no one tells you that you have to wear a hat at lunch time.” I have to admit I was a little amused and surprised by this student’s response, as so often the focus, is placed on getting first year students to engage academically, when it is obvious at times, that even the mere transition in to university life and the culture itself, can be a hurdle. While teaching, within a large first year unit for over 10 years, it has become apparent that students want more connection with not only the peers that they study with, but also with the University as a whole. Dr Krause pointed out in her keynote paper, On Being Strategic about the First Year (2006), that this “sense of belonging is conducive to enhancing engagement, satisfaction with learning and commitment to study”. It has also become evident, that the way in which students want to be able to communicate has changed, with the advent of capabilities such as Instant Messaging via a network and Short Message Service SMS texting via their hand held mobile phones. To be able to chat and feel connected on social networking sites such as Bebo, Facebook and Twitter is not only a way of the future, it is here now and it is here to stay.
Resumo:
This paper demonstrates the capabilities of wavelet transform (WT) for analyzing important features related to bottleneck activations and traffic oscillations in congested traffic in a systematic manner. In particular, the analysis of loop detector data from a freeway shows that the use of wavelet-based energy can effectively identify the location of an active bottleneck, the arrival time of the resulting queue at each upstream sensor location, and the start and end of a transition during the onset of a queue. Vehicle trajectories were also analyzed using WT and our analysis shows that the wavelet-based energies of individual vehicles can effectively detect the origins of deceleration waves and shed light on possible triggers (e.g., lane-changing). The spatiotemporal propagations of oscillations identified by tracing wavelet-based energy peaks from vehicle to vehicle enable analysis of oscillation amplitude, duration and intensity.
Resumo:
Real-world business processes rely on the availability of scarce, shared resources, both human and non-human. Current workflow management systems support allocation of individual human resources to tasks but lack support for the full range of resource types used in practice, and the inevitable constraints on their availability and applicability. Based on past experience with resource-intensive workflow applications, we derive generic requirements for a workflow system which can use its knowledge of resource capabilities and availability to help create feasible task schedules. We then define the necessary architecture for implementing such a system and demonstrate its practicality through a proof-of-concept implementation. This work is presented in the context of a real-life surgical care process observed in a number of German hospitals.
Supply chain sustainability : a relationship management approach moderated by culture and commitment
Resumo:
This research explores the nature of relationship management on construction projects in Australia and examines the effects of culture, by means of Schwarz’s value survey, on relationships under different contract strategies. The research was based on the view that the development of a sustainable supply chain depends on the transfer of knowledge and capabilities from the larger players in the supply chain through collaboration brought about by relationship management. The research adopted a triangulated approach in which quantitative data were collected by questionnaire, interviews were conducted to explore and enrich the quantitative data and case studies were undertaken in order to illustrate and validate the findings. The aim was to investigate how values and attitudes enhance or reduce the incorporation of the supply chain into the project. From the research it was found that the degree of match and mismatch between values and contract strategy impacts commitment and the engagement and empowerment of the supply chain.
Resumo:
This protocol represents an attempt to assist in the instruction of teamwork assessment for first-year students across QUT. We anticipate that teaching staff will view this protocol as a generic resource in teamwork instruction, processes and evaluation. Teamwork has been acknowledged as a problematic practice at QUT while existing predominantly in importance amongst graduate capabilities for all students at this institution. This protocol is not an extensive document on the complexities and dynamics of teamwork processes, but instead presents itself as a set of best practice guidelines and recommendations to assist in team design, development, management, support and assessment. It is recommended that this protocol be progressively implemented across QUT, not only to attain teamwork teaching consistency, but to address and deal with the misconceptions and conflict around the importance of the teamwork experience. The authors acknowledge the extensive input and contributions from a Teamwork Steering Committee selected from academic staff and administrative members across the institution. As well, we welcome feedback and suggestions to both fine tune and make inclusive those strategies that staff believe add to optimal teamwork outcomes.
Resumo:
Business Process Management is accepted globally as an organisational approach that can be used to enhance productivity and drive cost efficiencies. Whilst there are numerous research articles that discuss this management approach, none clearly articulate the preferred BPM capabilities sought across geographic regions. This study aims to address this through a structured content analysis of leading on-line recruitment websites, supported by essential BPM capabilities - identified through leading academic BPM capability frameworks. Whilst the skills of process modelling, documentation and improvement were commonly sought, Enterprise level factors such as strategic alignment and process governance were less frequently mentioned. In addition, there are geographical differences in the BPM skill set requirements with an emphasis on process governance and organisational culture in European countries. This analysis can be used by prospective and current BPM professionals to understand organisational requirements globally, and academics to structure BPM education to suit these differing geographic demands.
Resumo:
Business Process Management (BPM) is a top priority in organisations and is rapidly proliferating as an emerging discipline in practice. However, the current studies show lack of appropriate BPM skilled professionals in the field and a dearth of opportunities to develop BPM expertise. This paper analyses the gap between available BPM-related education in Australia and required BPM capabilities. BPM courses offered by Australian universities and training institutions have been critically analysed and mapped against leading BPM capability frameworks to determine how well current BPM education and training offerings in Australia actually address the core capabilities required for BPM professionals. The outcomes reported here can be used by Australian universities and training institutions to better align and position their training materials to the BPM required capabilities. It could also be beneficial to individuals looking for a systematic and in-depth understanding of BPM capabilities and trainings.