896 resultados para resource-based view


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The article focuses on the evidence-based information practice (EBIP) applied at the Auraria Library in Denver, Colorado during the reorganization of its technical services division. Collaboration processes were established for the technical services division through the reorganization and redefinition of workflows. There are several factors that form part of the redefinition of roles including personal interests, department needs, and library needs. A collaborative EBIP environment was created in the division by addressing issues of workplace hierarchies, by the distribution of problem solving, and by the encouragement of reflective dialogue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Evidence based practice (EBP) focuses on solving ‘tame’ problems, where literature supports question construction toward determining a solution. What happens when there is no existing evidence, or when the need for agility precludes a full EBP implementation? How might we build a more agile and innovative practice that facilitates the design of solutions to complex and wicked problems, particularly in cases where there is no existing literature? As problem solving and innovation methods, EBP and design thinking overlap considerably. The literature indicates the potential benefits to be gained for evidence based practice from adopting a human-centred rather than literature-focused foundation. The design thinking process is social and collaborative by nature, which enables it to be more agile and produce more innovative results than evidence based practice. This paper recommends a hybrid approach to maximise the strengths and benefits of the two methods for designing solutions to wicked problems. Incorporating design thinking principles and tools into EBP has the potential to move its applicability beyond tame problems and continuous improvement, and toward wicked problem solving and innovation. The potential of this hybrid approach in practice is yet to be explored.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we use the algorithm SeqSLAM to address the question, how little and what quality of visual information is needed to localize along a familiar route? We conduct a comprehensive investigation of place recognition performance on seven datasets while varying image resolution (primarily 1 to 512 pixel images), pixel bit depth, field of view, motion blur, image compression and matching sequence length. Results confirm that place recognition using single images or short image sequences is poor, but improves to match or exceed current benchmarks as the matching sequence length increases. We then present place recognition results from two experiments where low-quality imagery is directly caused by sensor limitations; in one, place recognition is achieved along an unlit mountain road by using noisy, long-exposure blurred images, and in the other, two single pixel light sensors are used to localize in an indoor environment. We also show failure modes caused by pose variance and sequence aliasing, and discuss ways in which they may be overcome. By showing how place recognition along a route is feasible even with severely degraded image sequences, we hope to provoke a re-examination of how we develop and test future localization and mapping systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Matrix metalloproteinases (MMPs) are proteolytic enzymes important to wound healing. In non-healing wounds, it has been suggested that MMP levels become dysfunctional, hence it is of great interest to develop sensors to detect MMP biomarkers. This study presents the development of a label-free optical MMP biosensor based on a functionalised porous silicon (pSi) thin film. The biosensor is fabricated by immobilising a peptidomimetic MMP inhibitor in the porous layer using hydrosilylation followed by amide coupling. The binding of MMP to the immobilised inhibitor translates into a change of effective optical thickness (EOT) over the time. We investigate the effect of surface functionalisation on the stability of pSi surface and evaluate the sensing performance. We successfully demonstrate MMP detection in buffer solution and human wound fluid at physiologically relevant concentrations. This biosensor may find application as a point-of-care device that is prognostic of the healing trajectory of chronic wounds.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ln 2004 Prahalad made managers aware of the great economic opportunity that the population at the BoP (Base of the Pyramid) could represent for business in the tom of new potential consumers. However, MNCs (Multi-National Corporations) have continued to fail in penetrating low income markets, arguably because applied strategies are often the same adopted at the top of the pyramid. Even in those few cases where products get re-envisioned, theie introduction in contexts of extreme poverty only induces new needs and develops new dependencies. At best the rearrangement of business models by MNCs has meant the realization of CSR (Corporate Social Responsibly) schemes that have validity from a marketing perspective, but still lack the crucial element of social embeddedness (London & Hart, 2004). Today the challenge is lo reach the lowest population tier with reinvented business models based on principles of value co-creation. Starting from a view of the potential consumer at the BoP as a ring of continuity in the value chain process – a resource that can itself produce value - this paper concludes proposing an alternative innovative approach to operate in developing markets that overturns the roles of MNCs and the BoP. The proposed perspective of ‘reversed' source of innovation and primary target market builds on two fundamental tenets: traditional knowledge is rich and greatly unexploded, and markets at the lop of the pyramid are saturated with unnecessary products / practices that have lost contact with the natural environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ln 2004 Prahalad made managers aware of the great economic opportunity that the population at the BoP (Base of the Pyramid) could represent for business in the tom of new potential consumers. However, MNCs (Multi-National Corporations) have continued to fail in penetrating low income markets, arguably because applied strategies are often the same adopted at the top of the pyramid. Even in those few cases where products get re-envisioned, theie introduction in contexts of extreme poverty only induces new needs and develops new dependencies. At best the rearrangement of business models by MNCs has meant the realization of CSR (Corporate Social Responsibly) schemes that have validity from a marketing perspective, but still lack the crucial element of social embeddedness (London & Hart, 2004). Today the challenge is lo reach the lowest population tier with reinvented business models based on principles of value co-creation. Starting from a view of the potential consumer at the BoP as a ring of continuity in the value chain process – a resource that can itself produce value - this paper concludes proposing an alternative innovative approach to operate in developing markets that overturns the roles of MNCs and the BoP. The proposed perspective of ‘reversed' source of innovation and primary target market builds on two fundamental tenets: traditional knowledge is rich and greatly unexploded, and markets at the lop of the pyramid are saturated with unnecessary products / practices that have lost contact with the natural environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Evidence suggests that both nascent and young firms (henceforth: “new firms”)—despite typically being small and resource-constrained—are sometimes able to innovate effectively. Such firms are seldom able to invest in lengthy and expensive development processes, which suggests that they may frequently rely instead on other pathways to generate innovativeness within the firm. In this paper, we develop and test arguments that “bricolage,” defined as making do by applying combinations of the resources at hand to new problems and opportunities, provides an important pathway to achieve innovation for new resource-constrained firms. Through bricolage, resource-constrained firms engage in the processes of “recombination” that are core to creating innovative outcomes. Based on a large longitudinal dataset, our results suggest that variations in the degree to which firms engage in bricolage behaviors can provide a broadly applicable explanation of innovativeness under resource constraints by new firms. We find no general support for our competing hypothesis that the positive effects may level off or even turn negative at high levels of bricolage..

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cloud computing is an emerging computing paradigm in which IT resources are provided over the Internet as a service to users. One such service offered through the Cloud is Software as a Service or SaaS. SaaS can be delivered in a composite form, consisting of a set of application and data components that work together to deliver higher-level functional software. SaaS is receiving substantial attention today from both software providers and users. It is also predicted to has positive future markets by analyst firms. This raises new challenges for SaaS providers managing SaaS, especially in large-scale data centres like Cloud. One of the challenges is providing management of Cloud resources for SaaS which guarantees maintaining SaaS performance while optimising resources use. Extensive research on the resource optimisation of Cloud service has not yet addressed the challenges of managing resources for composite SaaS. This research addresses this gap by focusing on three new problems of composite SaaS: placement, clustering and scalability. The overall aim is to develop efficient and scalable mechanisms that facilitate the delivery of high performance composite SaaS for users while optimising the resources used. All three problems are characterised as highly constrained, large-scaled and complex combinatorial optimisation problems. Therefore, evolutionary algorithms are adopted as the main technique in solving these problems. The first research problem refers to how a composite SaaS is placed onto Cloud servers to optimise its performance while satisfying the SaaS resource and response time constraints. Existing research on this problem often ignores the dependencies between components and considers placement of a homogenous type of component only. A precise problem formulation of composite SaaS placement problem is presented. A classical genetic algorithm and two versions of cooperative co-evolutionary algorithms are designed to now manage the placement of heterogeneous types of SaaS components together with their dependencies, requirements and constraints. Experimental results demonstrate the efficiency and scalability of these new algorithms. In the second problem, SaaS components are assumed to be already running on Cloud virtual machines (VMs). However, due to the environment of a Cloud, the current placement may need to be modified. Existing techniques focused mostly at the infrastructure level instead of the application level. This research addressed the problem at the application level by clustering suitable components to VMs to optimise the resource used and to maintain the SaaS performance. Two versions of grouping genetic algorithms (GGAs) are designed to cater for the structural group of a composite SaaS. The first GGA used a repair-based method while the second used a penalty-based method to handle the problem constraints. The experimental results confirmed that the GGAs always produced a better reconfiguration placement plan compared with a common heuristic for clustering problems. The third research problem deals with the replication or deletion of SaaS instances in coping with the SaaS workload. To determine a scaling plan that can minimise the resource used and maintain the SaaS performance is a critical task. Additionally, the problem consists of constraints and interdependency between components, making solutions even more difficult to find. A hybrid genetic algorithm (HGA) was developed to solve this problem by exploring the problem search space through its genetic operators and fitness function to determine the SaaS scaling plan. The HGA also uses the problem's domain knowledge to ensure that the solutions meet the problem's constraints and achieve its objectives. The experimental results demonstrated that the HGA constantly outperform a heuristic algorithm by achieving a low-cost scaling and placement plan. This research has identified three significant new problems for composite SaaS in Cloud. Various types of evolutionary algorithms have also been developed in addressing the problems where these contribute to the evolutionary computation field. The algorithms provide solutions for efficient resource management of composite SaaS in Cloud that resulted to a low total cost of ownership for users while guaranteeing the SaaS performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper conceptualizes knowledge governance (KG) in project-based organizations (PBOs) and its methodological approaches for empirical investigation. Three key contributions towards a multi-faceted view of KG and an understanding of KG in PBOs are advanced. These contributions include a definition of KG in PBOs, a conceptual framework to investigate KG and a methodological framework for empirical inquiry into KG in PBO settings. Our definition highlights the contingent nature of KG processes in relation to their organizational context. The conceptual framework addresses macro- and micro-level elements of KG and their interaction. The methodological framework proposes five different research approaches, structured by differentiation and integration of various ontological and epistemological stances. Together these contributions provide a novel platform for understanding KG in PBOs and developing new insights into the design and execution of research on KG within PBOs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis addresses the process simulation and validation in Business Process Management. It proposes that the hybrid Multi Agent System (MAS) / 3D Virtual World approach is a valid method for better simulating the behaviour of human resources in business processes, supporting a wide range of rich visualization applications that can facilitate communication between business analysts and stakeholders. It is expected that the findings of this thesis may be fruitfully extended from BPM to other application domains, such as social simulation in video games and computer-based training animations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis presents an analysis of the resource allocation problem in Orthogonal Frequency Division Multiplexing based multi-hop wireless communications systems. The study analyzed the tractable nature of the problem and designed several heuristic and fairness-aware resource allocation algorithms. These algorithms are fast and efficient and therefore can improve power management in wireless systems significantly.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lean strategies have been developed to eliminate or reduce waste and thus improve operational efficiency in a manufacturing environment. However, in practice, manufacturers encounter difficulties to select appropriate lean strategies within their resource constraints and to quantitatively evaluate the perceived value of manufacturing waste reduction. This paper presents a methodology developed to quantitatively evaluate the contribution of lean strategies selected to reduce manufacturing wastes within the manufacturers’ resource (time) constraints. A mathematical model has been developed for evaluating the perceived value of lean strategies to manufacturing waste reduction and a step-by-step methodology is provided for selecting appropriate lean strategies to improve the manufacturing performance within their resource constraints. A computer program is developed in MATLAB for finding the optimum solution. With the help of a case study, the proposed methodology and developed model has been validated. A ‘lean strategy-wastes’ correlation matrix has been proposed to establish the relationship between the manufacturing wastes and lean strategies. Using the correlation matrix and applying the proposed methodology and developed mathematical model, authors came out with optimised perceived value of reduction of a manufacturer's wastes by implementing appropriate lean strategies within a manufacturer's resources constraints. Results also demonstrate that the perceived value of reduction of manufacturing wastes can significantly be changed based on policies and product strategy taken by a manufacturer. The proposed methodology can also be used in dynamic situations by changing the input in the programme developed in MATLAB. By identifying appropriate lean strategies for specific manufacturing wastes, a manufacturer can better prioritise implementation efforts and resources to maximise the success of implementing lean strategies in their organisation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We evaluated the effectiveness of a woman-held pregnancy record ('The Pregnancy Pocketbook') on improving health behaviors important for maternal and infant health. The Pregnancy Pocketbook was developed as a woman-focused preventive approach to pregnancy health based on antenatal management guidelines, behavior-change evidence, and formative research with the target population and health service providers. The Pregnancy Pocketbook was evaluated using a quasi-experimental, two-group design; one clinic cohort received the Pregnancy Pocketbook (n = 163); the other received Usual Care (n = 141). Smoking, fruit and vegetable intake, and physical activity were assessed at baseline (service-entry) and 12-weeks. Approximately two-thirds of women in the Pregnancy Pocketbook clinic recalled receiving the resource. A small, but significantly greater proportion of women at the Pregnancy Pocketbook site (7.6%) than the UC site (2.1%) quit smoking. No significant effect was observed of the Pregnancy Pocketbook on fruit and vegetable intake or physical activity. Few women completed sections that required health professional assistance. The Pregnancy Pocketbook produced small, but significant effects on smoking cessation, despite findings that indicate minimal interaction about the resource between health staff and the women in their care. A refocus of antenatal care toward primary prevention is required to provide essential health information and behavior change tools more consistently for improved maternal and infant health outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Significant investments in developing technological innovations have been made in the Australian beef industry but with low adoption rates. By modelling the key variables and their interactions in the innovation adoption process, this research seeks to demonstrate the complexity and dynamics of the process. This research uses causal loop modelling and develops a holistic model of the current innovation adoption system in the Australian beef industry to show the complexity of dynamic interactions among multiple variables. It is suggested that innovation adoption is such an extremely complex issue, and we need to shift our views on this issue from a paradigm of linear thinking to systems thinking. Innovation adoption is more likely to be enhanced based on a full understanding of the complexity and dynamics of the system as a whole. The paper demonstrates to practitioners and developers of innovation the multiple variables and interactions impacting innovation adoption.