968 resultados para Construction set


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Process mining has developed into a popular research discipline and nowadays its associated techniques are widely applied in practice. What is currently ill-understood is how the success of a process mining project can be measured and what the antecedent factors of process mining success are. We consider an improved, grounded understanding of these aspects of value to better manage the effectiveness and efficiency of process mining projects in practice. As such, we advance a model, tailored to the characteristics of process mining projects, which identifies and relates success factors and measures. We draw inspiration from the literature from related fields for the construction of a theoretical, a priori model. That model has been validated and re-specified on the basis of a multiple case study, which involved four industrial process mining projects. The unique contribution of this paper is that it presents the first set of success factors and measures on the basis of an analysis of real process mining projects. The presented model can also serve as a basis for further extension and refinement using insights from additional analyses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of the lifelong learner—the idea that people should be active learners throughout the lifespan—has since the 1990s gained importance in public policy. Governments in relatively wealthy countries have made the argument that the economic future of nations is tied to the ongoing participation of citizens in learning opportunities that will assist them to participate fully in society and increase their chances of employment in changing workforce conditions. More recently, policy attention has focused on the other end of the lifespan, the first years of life. With the early years now recognised as crucial for later educational success, policy attention has also focused on the importance of parenting in the early years. In the UK and Australia, for example, the effects of state interventions to facilitate ‘good parenting’ and pre-school children’s ‘readiness’ for formal schooling have been felt in a range of settings including community health services, the home and the pre-school (Gillies, 2005; Nichols & Jurvansuu, 2008; Millei & Lee, 2007; Vincent, Ball & Braun, 2010). In Australia, government policy has explicitly proposed a model of parenting as a learning process, and has urged people to cultivate their identities as learners in order to carry out their responsibilities as parents. In part the policy objectives have been to support parents to ensure that all children get a healthy and successful start to life...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper will offer an examination of the Reports of the Royal Commission into the NSW Police Service (Interim Report February 1996; Interim Report: Immediate Measures November 1996; Final Report Vol I: Corruption; Final Report Vol II: Reform; Final Report Vol III: Appendices May 1997) excluding the Report on Paedophilia, August 1997. The examination will be confined essentially to one question: to what extent do the published Reports consider the part played by the judiciary, prosecutors and lawyers, in the construction of a form of criminal justice revealed by the Commission itself, to be disfigured by serious process corruption? The examination will be conducted by way of a chronological trawl through the Reports of the Commission in an attempt to identify all references to the role of the judiciary, prosecutors and lawyers. The adequacy of any such treatment will then be considered. In order to set the scene a brief and generalised overview of the Wood Commission will be offered together with the Commission's definition of process corruption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wind power is one of the world's major renewable energy sources, and its utilization provides an important contribution in helping solve the energy problems of many countries. After nearly 40 years of development, China's wind power industry now not only manufactures its own massive six MW turbines but also has the largest capacity in the world with a national output of 50 million MW•h in 2010 and set to rise by eight times of that amount by 2020. This paper investigates this development route by analyzing relevant academic literature, statistics, laws and regulations, policies and research and industry reports. The main drivers of the development in the industry are identified as technologies, turbines, wind farm construction, pricing mechanism and government support systems, each of which is also divided into different stages with distinctive features. A systematic review of these aspects provides academics and practitioners with a better understanding of the history of the wind power industry in China and reasons for its rapid development with a view to enhancing progress in wind power development both in China and the world generally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The internationalisation process of firms has attracted much research interest since the 1970s. It is noted, however, that a significant research gap exists in studies with a primary focus on the pre-internationalisation behaviour of firms. This paper proposes the incorporation of a pre-internationalisation phase into the traditional Uppsala model of firm internationalisation to address the issue of export readiness. Through extensive literature review, the concepts fundamental to the ability of an Uppsala type firm to begin internationalisation through an export entry mode are identified: exposure to stimuli factors, attitudinal commitment of decision makers towards exporting, the firm’s resource capabilities, as well as the moderating effect of lateral rigidity. The concept of export readiness is operationalised in this study through the construction of an export readiness index (ERI) using exploratory and confirmatory factor analysis. The index is then applied to some representative cases and tested using logistic regression to establish its validity as a diagnostic tool. The proposed ERI presents not only a more practical approach towards analysing firms’ export readiness but has also major public policy implications as a possible tool for government export promotion agencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Thomas Mann’s tetralogy of the 1930s and 1940s, Joseph and His Brothers, the narrator declares history is not only “that which has happened and that which goes on happening in time,” but it is also “the stratified record upon which we set our feet, the ground beneath us.” By opening up history to its spatial, geographical, and geological dimensions Mann both predicts and encapsulates the twentieth-century’s “spatial turn,” a critical shift that divested geography of its largely passive role as history’s “stage” and brought to the fore intersections between the humanities and the earth sciences. In this paper, I draw out the relationships between history, narrative, geography, and geology revealed by this spatial turn and the questions these pose for thinking about the disciplinary relationship between geography and the humanities. As Mann’s statement exemplifies, the spatial turn itself has often been captured most strikingly in fiction, and I would argue nowhere more so than in Graham Swift’s Waterland (1983) and Anne Michaels’s Fugitive Pieces (1996), both of which present space, place, and landscape as having a palpable influence on history and memory. The geographical/geological line that runs through both Waterland and Fugitive Pieces continues through Tim Robinson’s non-fictional, two-volume “topographical” history Stones of Aran. Robinson’s Stones of Aran—which is not history, not geography, and not literature, and yet is all three—constructs an imaginative geography that renders inseparable geography, geology, history, memory, and the act of writing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cinema is central to the mediation of history and the construction of imaginative geographies that offer a politicized view of the land and its people. This article investigates cinematic representations of landscape and analyses the ways in which maps and journeys in Charles Chauvel’s film Jedda (1955) and Baz Luhrmann’s Australia (2008)—both set in the far North of Australia—articulate conceptions of “Australianness” in relationship to Indigeneity and the land. We argue the exotic tropics and arid outback regions of northern Australia function metonymically as representative of the nation in these films, working to naturalize ideological values and affirm dominant narratives of history, identity, and entitlement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The construction industry has long been burdened with inherent adversarial relationships among the parties and the resulting disputes. Dispute review boards (DRBs) have emerged as alternatives to settle construction-related disputes outside courts. Although DRBs have found support in some quarters of the construction industry, the quantitative assessment of the impact of DRBs has not been adequately addressed. This paper presents the results of a research project undertaken to assess the impact of DRBs on the construction program of a large-scale highway agency. Three dimensions of DRB impact were assessed: (1) influence on project cost and schedule performance, (2) effectiveness of DRBs in preventing and resolving construction disputes, and (3) costs of DRB implementation. The analyses encompass data from approximately 3,000 projects extending over a 10-year period (2000–2009). Quantitative measures of performance were developed and analyzed for each category. Projects that used DRBs faced reduced costs and schedule growth (6.88 and 12.92%, respectively) when compared to non-DRB projects (11.53 and 28.96%). DRBs were also found to be effective in avoiding and settling disputes; the number of arbitration cases reduced consistently after DRB implementation, and DRBs have a success rate of 97% in settling disputes for which DRBs were used. Moreover, costs of DRBs were found to comprise a relatively small fraction (i.e., approximately 0.3%) of total project budgets. It was concluded that DRBs were effective dispute prevention and resolution alternatives with no significant adverse effects on project performance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complex supply chain relations of the construction industry, coupled with the substantial amount of information to be shared on a regular basis between the parties involved, make the traditional paper-based data interchange methods inefficient, error prone and expensive. The successful information technology (IT) applications that enable seamless data interchange, such as the Electronic Data Interchange (EDI) systems, have generally failed to be successfully implemented in the construction industry. An alternative emerging technology, Extensible Markup Language (XML), and its applicability to streamline business processes and to improve data interchange methods within the construction industry are analysed, as is the EDI technology to identify the strategic advantages that XML technology provides to overcome the barriers to implementation. In addition, the successful implementation of XML-based automated data interchange platforms for a large organization, and the proposed benefits thereof, are presented as a case study.