862 resultados para Process capability analysis


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation investigates the nature of power in university-industry linkages and how such power affects the process of knowledge production in engaged scholarship. The most critical finding of this dissertation is that the theory of engaged scholarship fails to account for the socialised beliefs regarding the superior value of academic knowledge, which governs the behaviour and perceptions of academics and industry partners within university-industry linkages. The dissertation is supported by data sourced from interviews with 48 academic and industry partners’ project leaders from 24 large scale research projects and thematic analysis guided by Steven Lukes’ (1974) radical framework of power.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years face recognition systems have been applied in various useful applications, such as surveillance, access control, criminal investigations, law enforcement, and others. However face biometric systems can be highly vulnerable to spoofing attacks where an impostor tries to bypass the face recognition system using a photo or video sequence. In this paper a novel liveness detection method, based on the 3D structure of the face, is proposed. Processing the 3D curvature of the acquired data, the proposed approach allows a biometric system to distinguish a real face from a photo, increasing the overall performance of the system and reducing its vulnerability. In order to test the real capability of the methodology a 3D face database has been collected simulating spoofing attacks, therefore using photographs instead of real faces. The experimental results show the effectiveness of the proposed approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modelling business processes for analysis or redesign usually requires the collaboration of many stakeholders. These stakeholders may be spread across locations or even companies, making co-located collaboration costly and difficult to organize. Modern process modelling technologies support remote collaboration but lack support for visual cues used in co-located collaboration. Previously we presented a prototype 3D virtual world process modelling tool that supports a number of visual cues to facilitate remote collaborative process model creation and validation. However, the added complexity of having to navigate a virtual environment and using an avatar for communication made the tool difficult to use for novice users. We now present an evolved version of the technology that addresses these issues by providing natural user interfaces for non-verbal communication, navigation and model manipulation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The representation of business process models has been a continuing research topic for many years now. However, many process model representations have not developed beyond minimally interactive 2D icon-based representations of directed graphs and networks, with little or no annotation for information overlays. In addition, very few of these representations have undergone a thorough analysis or design process with reference to psychological theories on data and process visualization. This dearth of visualization research, we believe, has led to problems with BPM uptake in some organizations, as the representations can be difficult for stakeholders to understand, and thus remains an open research question for the BPM community. In addition, business analysts and process modeling experts themselves need visual representations that are able to assist with key BPM life cycle tasks in the process of generating optimal solutions. With the rise of desktop computers and commodity mobile devices capable of supporting rich interactive 3D environments, we believe that much of the research performed in computer human interaction, virtual reality, games and interactive entertainment have much potential in areas of BPM; to engage, provide insight, and to promote collaboration amongst analysts and stakeholders alike. We believe this is a timely topic, with research emerging in a number of places around the globe, relevant to this workshop. This is the second TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of last year's successful workshop by further developing this important topic, identifying the key research topics of interest to the BPM visualization community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In late 2007, newly elected Prime Minister Kevin Rudd placed education reform on centre stage as a key policy in the Labor Party's agenda for social reform in Australia. A major policy strategy within this 'Education Revolution' was the development of a national curriculum, the Australian Curriculum Within this political context, this study is an investigation into how social justice and equity have been used in political speeches to justify the need for, and the nature of, Australia's first official national curriculum. The aim is to provide understandings into what is said or not said; who is included or excluded, represented or misrepresented; for what purpose; and for whose benefit. The study investigates political speeches made by Education Ministers between 2008 and 201 0; that is, from the inception of the Australian Curriculum to the release of the Phase 1 F - 10 draft curriculum documents in English, mathematics, science and history. Curriculum development is defined here as an ongoing process of complex conversations. To contextualise the process of curriculum development within Australia, the thesis commences with an initial review of curriculum development in this nation over the past three decades. It then frames this review within contemporary curriculum theory; in particular it calls upon the work of William Pinar and the key notions of currere and reconceptualised curriculum. This contextualisation work is then used as a foundation to examine how social justice and equity have been represented in political speeches delivered by the respective Education Ministers Julia Gillard and Peter Garrett at key junctures of Australian Curriculum document releases. A critical thematic policy analysis is the approach used to examine selected official speech transcripts released by the ministerial media centre through the DEEWR website. This approach provides a way to enable insights and understandings of representations of social justice and equity issues in the policy agenda. Broader social implications are also discussed. The project develops an analytic framework that enables an investigation into the framing of social justice and equity issues such as inclusion, equality, quality education, sharing of resources and access to learning opportunities in political speeches aligned with the development of the Australian Curriculum Through this analysis, the study adopts a focus on constructions of educationally disadvantaged students and how the solutions of 'fixing' teachers and providing the 'right' curriculum are presented as resolutions to the perceived problem. In this way, it aims to work towards offering insights into political justifications for a national curriculum in Australia from a social justice perspective.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While Conceptual fashion design practices have been a pervasive influence in fashion since the early 1980s, there is little academic analysis that might explain how they are distinct from conventional fashion design practices. In addition, fashion practitioners have not historically contributed to fashion research. As a result, contemporary fashion practitioners have difficulty setting critical contexts and expanding their creative work as there is little relevant literature available from practitioner perspectives. This project uses practice-led research to develop a discourse for understanding Conceptual fashion design process and how it relates to more conventional fashion design practices. In this exegesis I use Conceptual art as a lens to expand understandings of Conceptual fashion and my own creative practice. This analysis demonstrates that there are valuable connections to be drawn between Conceptual art and Conceptual fashion practice. In particular, these connections reveal the differences between the way Conceptual and more conventional fashion designers relate to the conceptual and the visual in their design process. This exploration demonstrates that while fashion is a visual field, Conceptual fashion designers produce a more ‘intellectual’ type of fashion that uses the visual to communicate ideas that question the nature of fashion. I explore the relevance of these ideas through application and experimentation in my creative practice projects by drawing from systems and rules identified in the work of early Conceptual artists and contemporary Conceptual fashion designers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background The delivery of quality patient care in the emergency department (ED) is emerging as one of the most important service indicators to be measured in health services today. The emergency nurse practitioner role was implemented as a service innovation in a Emergency & Trauma Centre (ETC), Melbourne, Australia, in July 2004 .The primary aim of the role was intended to enhance healthcare services, improve the efficiency and timely delivery of high quality care to patients. Aim To conduct a retrospective study of patient presentations at the ETC to obtain a profile of the characteristics of patients managed by emergency nurse practitioners. Specifically the objectives of the study were to: 1) examine the demographics of the patient population 2) evaluate data on emergency department service indicators for this patient cohort Method All patients presenting to the ETC from January 01 2011 to December 31 2011 and managed by emergency nurse practitioners were included in the review. Data collection included baseline demographics, waiting times to be seen, length of stay, emergency department discharge diagnoses and referral patterns. Data were extracted and imported directly from the emergency department Patient Information System (Cerner log), for the specified time frame. Results A total of 5212 patients were reviewed in the study period. The median age of patients was 35 years and 61% of patients were male. The most common discharge diagnosis was open wounds to hand/wrist. Waiting times to be seen by the emergency nurse practitioner were 14 minutes and length of stay for patients with a discharge disposition of home were 122 minutes. Conclusions This study has provided information on patient baseline characteristics and performance on important service indicators for this patient sample that will inform further research to evaluate specific outcomes of the emergency nurse practitioner service.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aerosol mass spectrometers (AMS) are powerful tools in the analysis of the chemical composition of airborne particles, particularly organic aerosols which are gaining increasing attention. However, the advantages of AMS in providing on-line data can be outweighed by the difficulties involved in its use in field measurements at multiple sites. In contrast to the on-line measurement by AMS, a method which involves sample collection on filters followed by subsequent analysis by AMS could significantly broaden the scope of AMS application. We report the application of such an approach to field studies at multiple sites. An AMS was deployed at 5 urban schools to determine the sources of the organic aerosols at the schools directly. PM1 aerosols were also collected on filters at these and 20 other urban schools. The filters were extracted with water and the extract run through a nebulizer to generate the aerosols, which were analysed by an AMS. The mass spectra from the samples collected on filters at the 5 schools were found to have excellent correlations with those obtained directly by AMS, with r2 ranging from 0.89 to 0.98. Filter recoveries varied between the schools from 40 -115%, possibly indicating that this method provides qualitative rather than quantitative information. The stability of the organic aerosols on Teflon filters was demonstrated by analysing samples stored for up to two years. Application of the procedure to the remaining 20 schools showed that secondary organic aerosols were the main source of aerosols at the majority of the schools. Overall, this procedure provides accurate representation of the mass spectra of ambient organic aerosols and could facilitate rapid data acquisition at multiple sites where AMS could not be deployed for logistical reasons.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Organisations are constantly seeking efficiency gains for their business processes in terms of time and cost. Management accounting enables detailed cost reporting of business operations for decision making purposes, although significant effort is required to gather accurate operational data. Process mining, on the other hand, may provide valuable insight into processes through analysis of events recorded in logs by IT systems, but its primary focus is not on cost implications. In this paper, a framework is proposed which aims to exploit the strengths of both fields in order to better support management decisions on cost control. This is achieved by automatically merging cost data with historical data from event logs for the purposes of monitoring, predicting, and reporting process-related costs. The on-demand generation of accurate, relevant and timely cost reports, in a style akin to reports in the area of management accounting, will also be illustrated. This is achieved through extending the open-source process mining framework ProM.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The affordances concept describes the possibilities for goal-oriented action that technical objects offer to specified users. This notion has received growing attention from IS researchers. However, few studies have gone beyond contextualizing parts of the concept to a specific setting – the tip of the iceberg. In this research-in-progress paper, we report on our efforts to further develop the IS discipline’s understanding of affordances from informational objects. Specifically, we seek to extend extant theory on the origin and actualization of affordances. We develop a model that describes the process by which affordances are perceived and actualized and their dependence on information and actualization effort. We illustrate our emergent theory in the context of conceptual process models used by analysts for purposes of information systems analysis and design. We offer suggestions for operationalizing and testing this model empirically, and provide details about our design of a mixed-methods study currently in progress.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Industrialised building (IB) is considered by many to have an important role to play in China's residential construction industry due to its potential for improved quality, productivity, efficiency, safety and sustainability. It is surprising, therefore, that although a large number of construction programmes have been completed in the country in recent years, very few have been built in this manner. Quite why this situation exists is unknown. The well-known problems with IB, such as the constraints placed on designer freedom, may be the cause. It is equally possible that, as is typical with developing countries such as China, cost or government issues dominate. On the other hand, in comparison with other countries, the construction industry in China has been widely criticised for its lack of modernity. Either way, there is an urgent need to assess and understand the hindrances to the adoption of IB in residential construction in order to identify what corrective measures, if any, need to be taken. Towards this end, we first identify a set of critical factors (CFs) for assessing the hindrances to IB adoption in China. This involves the analysis of research data collected by a questionnaire survey of experienced housing developers and professionals working in China's construction industry sector. Fuzzy set theory is used in the selection of the CFs. These CFs comprise, in rank order: higher initial cost; lack of skilled labour in IB; manufacturing capability and involvement issues and product quality problems; lack of supply chain; lack of codes and standards; and lack of government incentives, directives and promotion. The establishment of the CFs provides a basis for local construction sectors to better equip themselves for future implementation of IB. The findings also indicate a current need for formulating improved policies and strategies to encourage the further development of IB in China at present.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently we reported the presence of bacteria within follicular fluid. Previous studies have reported that DNA fragmentation in human spermatozoa after in vivo or in vitro incubation with bacteria results in early embryo demise and a reduced rate of ongoing pregnancy, but the effect of bacteria on oocytes is unknown. This study examined the DNA within mouse oocytes after 12 hours’ incubation within human follicular fluids (n = 5), which were collected from women undergoing in vitro fertilization (IVF) treatment. Each follicular fluid sample was cultured to detect the presence of bacteria. Terminal deoxynucleotidyl transferase mediated dUTP nick-end labeling (TUNEL) was used to label DNA fragmentation in ovulated, non-fertilized mouse oocytes following in vitro incubation in human follicular fluid. The bacteria Streptococcus anginosus and Peptoniphilus spp., Lactobacillus gasseri (low-dose), L. gasseri (high-dose), Enterococcus faecalis, or Propionibacterium acnes were detected within the follicular fluids. The most severe DNA fragmentation was observed in oocytes incubated in the follicular fluids containing P. acnes or L. gasseri (high-dose). No DNA fragmentation was observed in the mouse oocytes incubated in the follicular fluid containing low-dose L. gasseri or E. faecalis. Low human oocyte fertilization rates (<29%) were associated with extensive fragmentation in mouse oocytes (80–100%). Bacteria colonizing human follicular fluid in vivo may cause DNA fragmentation in mouse oocytes following 12 h of in vitro incubation. Follicular fluid bacteria may result in poor quality oocytes and/or embryos, leading to poor IVF outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The incidence of Squamous Cell Carcinoma (SCG) is growing in certain populations to the extent that it is now the most common skin lesion in young men and women in high ultraviolet exposure regions such as Queensland. In terms of incidence up to 40% of the Australian population over 40 years of age is thought to possess the precancerous Solar Keratosis (SK) lesion and with a small, but significant, chance of progression into SCC, understanding the genetic events that play a role in this process is essential. The major aims of this study were to analyse whole blood derived samples for DNA aberrations in genes associated with tumour development and cellular maintenance, with the ultimate aim of identifying genes associated with non-melanoma skin cancer development. More specifically the first aim of this project was to analyse the SDHD and MMP12 genes via Dual-Labelled Probe Real-Time PCR for copy number aberrations in an affected Solar Keratosis and control cohort. It was found that 12 samples had identifiable copy-number aberrations in either the SDHD or MMP12 gene (this means that a genetic section of either of these two genes is aberrantly amplified or deleted), with five of the samples exhibiting aberrations in both genes. The significance of this study is the contribution to the knowledge of the genetic pathways that are malformed in the progression and development of the pre-cancerous skin lesion Solar Keratosis. © 2008 Springer Science+Business Media, LLC.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents the first narrative analysis of the areas of research that have developed within the destination marketing field since its commencement in 1973. Given the broad extent of the field, and the absence of any previous reviews in four decades, a key challenge is in providing a focus for such a disparate body of knowledge. The review is structured around one principal question: ‘To what extent is the Destination Marketing Organisation (DMO) responsible for the competitiveness of the destination’? In pursuit of this underlying question, we address a number of themes including nomenclature and the DMO, the evolution of the destination marketing literature, competitiveness as the DMO reason d’être, and DMO effectiveness including issues of branding and positioning, and future research themes in the field.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.