906 resultados para Object-Oriented Programming
Resumo:
The worldwide installed base of enterprise resource planning (ERP) systems has increased rapidly over the past 10 years now comprising tens of thousands of installations in large- and medium-sized organizations and millions of licensed users. Similar to traditional information systems (IS), ERP systems must be maintained and upgraded. It is therefore not surprising that ERP maintenance activities have become the largest budget provision in the IS departments of many ERP-using organizations. Yet, there has been limited study of ERP maintenance activities. Are they simply instances of traditional software maintenance activities to which traditional software maintenance research findings can be generalized? Or are they fundamentally different, such that new research, specific to ERP maintenance, is required to help alleviate the ERP maintenance burden? This paper reports a case study of a large organization that implemented ERP (an SAP system) more than three years ago. From the case study and data collected, we observe the following distinctions of ERP maintenance: (1) the ERP-using organization, in addition to addressing internally originated change-requests, also implements maintenance introduced by the vendor; (2) requests for user-support concerning the ERP system behavior, function and training constitute a main part of ERP maintenance activity; and (3) similar to the in-house software environment, enhancement is the major maintenance activity in the ERP environment, encompassing almost 64% of the total change-request effort. In light of these and other findings, we ultimately: (1) propose a clear and precise definition of ERP maintenance; (2) conclude that ERP maintenance cannot be sufficiently described by existing software maintenance taxonomies; and (3) propose a benefits-oriented taxonomy, that better represents ERP maintenance activities. Three salient dimensions (for characterizing requests) incorporated in the proposed ERP maintenance taxonomy are: (1) who is the maintenance source? (2) why is it important to service the request? and (3) what––whether there is any impact of implementing the request on the installed module(s)?
Resumo:
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalent implementation of AES-128-GCM. The throughput-to-area ratio is also substantially better when compared to AES-128-GCM. We have carefully examined the security of the algorithm through a range of cryptanalytic techniques and our findings indicate that ICEPOLE offers high security level.
Resumo:
Fast restoration of critical loads and non-black-start generators can significantly reduce the economic losses caused by power system blackouts. In a parallel power system restoration scenario, the sectionalization of restoration subsystems plays a very important role in determining the pickup of critical loads before synchronization. Most existing research mainly focuses on the startup of non-black-start generators. The restoration of critical loads, especially the loads with cold load characteristics, has not yet been addressed in optimizing the subsystem divisions. As a result, sectionalized restoration subsystems cannot achieve the best coordination between the pickup of loads and the ramping of generators. In order to generate sectionalizing strategies considering the pickup of critical loads in parallel power system restoration scenarios, an optimization model considering power system constraints, the characteristics of the cold load pickup and the features of generator startup is proposed in this paper. A bi-level programming approach is employed to solve the proposed sectionalizing model. In the upper level the optimal sectionalizing problem for the restoration subsystems is addressed, while in the lower level the objective is to minimize the outage durations of critical loads. The proposed sectionalizing model has been validated by the New-England 39-bus system and the IEEE 118-bus system. Further comparisons with some existing methods are carried out as well.
Resumo:
This paper presents visual detection and classification of light vehicles and personnel on a mine site.We capitalise on the rapid advances of ConvNet based object recognition but highlight that a naive black box approach results in a significant number of false positives. In particular, the lack of domain specific training data and the unique landscape in a mine site causes a high rate of errors. We exploit the abundance of background-only images to train a k-means classifier to complement the ConvNet. Furthermore, localisation of objects of interest and a reduction in computation is enabled through region proposals. Our system is tested on over 10km of real mine site data and we were able to detect both light vehicles and personnel. We show that the introduction of our background model can reduce the false positive rate by an order of magnitude.
Resumo:
This thesis articulates and examines public engagement programming in an emerging, non¬-traditional site. As a practice-led research project, the creative work proposes a site responsive, engagement centric, agile model for curatorial programming that developed out of the dynamic, new media/digital, curatorial practice at QUT's Creative Industries Precinct. The model and its accompanying exegetical framework, Curating in Uncharted Territories, offer a theoretically informed approach to programming, delivering and reporting for curatorial practices in a non¬-traditional sites of public engagement. The research provides the foundation for full development of the model and the basis for further research.
Resumo:
Object detection is a fundamental task in many computer vision applications, therefore the importance of evaluating the quality of object detection is well acknowledged in this domain. This process gives insight into the capabilities of methods in handling environmental changes. In this paper, a new method for object detection is introduced that combines the Selective Search and EdgeBoxes. We tested these three methods under environmental variations. Our experiments demonstrate the outperformance of the combination method under illumination and view point variations.
Resumo:
The environment moderates behaviour using a subtle language of ‘affordances’ and ‘behaviour-settings’. Affordances are environmental offerings. They are objects that demand action; a cliff demands a leap and binoculars demand a peek. Behaviour-settings are ‘places;’ spaces encoded with expectations and meanings. Behaviour-settings work the opposite way to affordances; they demand inhibition; an introspective demeanour in a church or when under surveillance. Most affordances and behaviour-settings are designed, and as such, designers are effectively predicting brain reactions. • Affordances are nested within, and moderated by behaviour-settings. Both trigger automatic neural responses (excitation and inhibition). These, for the best part cancel each other out. This balancing enables object recognition and allows choice about what action should be taken (if any). But when excitation exceeds inhibition, instinctive action will automatically commence. In positive circumstances this may mean laughter or a smile. In negative circumstances, fleeing, screaming or other panic responses are likely. People with poor frontal function, due to immaturity (childhood or developmental disorders) or due to hypofrontality (schizophrenia, brain damage or dementia) have a reduced capacity to balance excitatory and inhibitory impulses. For these people, environmental behavioural demands increase with the decline of frontal brain function. • The world around us is not only encoded with symbols and sensory information. Opportunities and restrictions work on a much more primal level. Person/space interactions constantly take place at a molecular scale. Every space we enter has its own special dynamic, where individualism vies for supremacy between the opposing forces of affordance-related excitation and the inhibition intrinsic to behaviour-settings. And in this context, even a small change–the installation of a CCTV camera can turn a circus to a prison. • This paper draws on cutting-edge neurological theory to understand the psychological determinates of the everyday experience of the designed environment.
Resumo:
This research identifies the commuting mode choice behaviour of 3537 adults living in different types of transit oriented development (TOD) in Brisbane by disentangling the effects of their “evil twin” transit adjacent developments (TADs), and by also controlling for residential self-selection, travel attitudes and preferences, and socio-demographic effects. A TwoStep cluster analysis was conducted to identify the natural groupings of respondents’ living environment based on six built environment indicators. The analysis resulted in five types of neighbourhoods: urban TODs, activity centre TODs, potential TODs, TADs, and traditional suburbs. HABITAT survey data were used to derive the commute mode choice behaviour of people living in these neighbourhoods. In addition, statements reflecting both respondents’ travel attitudes and living preferences were also collected as part of the survey. Factor analyses were conducted based on these statements and these derived factors were then used to control for residential self-selection. Four binary logistic regression models were estimated, one for each of the travel modes used (e.g. public transport, active transport, less sustainable transport such as the car/taxi, and other), to differentiate between the commuting behaviour of people living in the five types of neighbourhoods. The findings verify that urban TODs enhance the use of public transport and reduce car usage. No significant difference was found in the commuting behaviour between respondents living in traditional suburbs and TADs. The results confirm the hypothesis that TADs are the “evil twin” of TODs. The data indicates that TADs and the mode choices of residents in these neighbourhoods is a missed transport policy opportunity. Further policy efforts are required for a successive transition of TADs into TODs in order to realise the full benefits of these. TOD policy should also be integrated with context specific TOD design principles.
Resumo:
The context in which objects are presented influences the speed at which they are named. We employed the blocked cyclic naming paradigm and perfusion functional magnetic resonance imaging (fMRI) to investigate the mechanisms responsible for interference effects reported for thematicallyand categorically related compared to unrelated contexts. Naming objects in categorically homogeneous contexts induced a significant interference effect that accumulated from the second cycle onwards. This interference effect was associated with significant perfusion signal decreases in left middle and posterior lateral temporal cortex and the hippocampus. By contrast, thematically homogeneous contexts facilitated naming latencies significantly in the first cycle and did not differ from heterogeneous contexts thereafter, nor were they associated with any perfusion signal changes compared to heterogeneous contexts. These results are interpreted as being consistent with an account in which the interference effect both originates and has its locus at the lexical level, with an incremental learning mechanism adapting the activation levels of target lexical representations following access. We discuss the implications of these findings for accounts that assume thematic relations can be active lexical competitors or assume mandatory involvement of top-down control mechanisms in interference effects during naming.
Resumo:
Objects presented in categorically related contexts are typically named slower than objects presented in unrelated contexts, a phenomenon termed semantic interference. However, not all semantic relationships induce interference. In the present study, we investigated the influence of object part-relations in the blocked cyclic naming paradigm. In Experiment 1 we established that an object's parts do induce a semantic interference effect when named in context compared to unrelated parts (e.g., leaf, root, nut, bark; for tree). In Experiment 2) we replicated the effect during perfusion functional magnetic resonance imaging (fMRI) to identify the cerebral regions involved. The interference effect was associated with significant perfusion signal increases in the hippocampal formation and decreases in the dorsolateral prefrontal cortex. We failed to observe significant perfusion signal changes in the left lateral temporal lobe, a region that shows reliable activity for interference effects induced by categorical relations in the same paradigm and is proposed to mediate lexical-semantic processing. We interpret these results as supporting recent explanations of semantic interference in blocked cyclic naming that implicate working memory mechanisms. However, given the failure to observe significant perfusion signal changes in the left temporal lobe, the results provide only partial support for accounts that assume semantic interference in this paradigm arises solely due to lexical-level processes.
Resumo:
Experiences showed that developing business applications that base on text analysis normally requires a lot of time and expertise in the field of computer linguistics. Several approaches of integrating text analysis systems with business applications have been proposed, but so far there has been no coordinated approach which would enable building scalable and flexible applications of text analysis in enterprise scenarios. In this paper, a service-oriented architecture for text processing applications in the business domain is introduced. It comprises various groups of processing components and knowledge resources. The architecture, created as a result of our experiences with building natural language processing applications in business scenarios, allows for the reuse of text analysis and other components, and facilitates the development of business applications. We verify our approach by showing how the proposed architecture can be applied to create a text analytics enabled business application that addresses a concrete business scenario. © 2010 IEEE.
Resumo:
Long-lasting interference effects in picture naming are induced when objects are presented in categorically related contexts in both continuous and blocked cyclic paradigms. Less consistent context effects have been reported when the task is changed to semantic classification. Experiment 1 confirmed the recent finding of cumulative facilitation in the continuous paradigm with living/non-living superordinate categorization. To avoid a potential confound involving participants responding with the identical superordinate category in related contexts in the blocked cyclic paradigm, we devised a novel set of categorically related objects that also varied in terms of relative age – a core semantic type associated with the adjective word class across languages. Experiment 2 demonstrated the typical interference effect with these stimuli in basic level naming. In Experiment 3, using the identical blocked cyclic paradigm, we failed to observe semantic context effects when the same pictures were classified as younger–older. Overall, the results indicate the semantic context effects in the two paradigms do not share a common origin, with the effect in the continuous paradigm arising at the level of conceptual representations or in conceptual-to-lexical connections while the effect in the blocked cyclic paradigm most likely originates at a lexical level of representation. The implications of these findings for current accounts of long-lasting interference effects in spoken word production are discussed.