849 resultados para network theory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Airports worldwide represent key forms of critical infrastructure in addition to serving as nodes in the international aviation network. While the continued operation of airports is critical to the functioning of reliable air passenger and freight transportation, these infrastructure systems face a number of sources of disturbance that threaten their operational viability. Recent examples of high magnitude events include the eruption of Iceland’s Eyjafjallajokull volcano eruption (Folattau and Schofield 2010), the failure of multiple systems at the opening of Heathrow’s Terminal 5 (Brady and Davies 2010) and the Glasgow airport 2007 terrorist attack (Crichton 2008). While these newsworthy events do occur, a multitude of lower-level more common disturbances also have the potential to cause significant discontinuity to airport operations. Regional airports face a unique set of challenges, particularly in a nation like Australia where they serve to link otherwise remote and isolated communities to metropolitan hubs (Wheeler 2005), often without the resources and political attention received by larger capital city airports. This paper discusses conceptual relationships between Business Continuity Management (BCM) and High Reliability Theory, and proposes BCM as an appropriate risk-based management process to ensure continued airport operation in the face of uncertainty. In addition, it argues that that correctly implemented BCM can lead to highly reliable organisations. This is framed within the broader context of critical infrastructures and the need for adequate crisis management approaches suited to their unique requirements (Boin and McConnell 2007).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crowdsourcing harnesses the potential of large and open networks of people. It is a relatively new phenomenon and attracted substantial interest in practice. Related research, however, lacks a theoretical foundation. We propose a system-theoretical perspective on crowdsourcing systems to address this gap and illustrate its applicability by using it to classify crowdsourcing systems. By deriving two principal dimensions from theory, we identify four fundamental types of crowdsourcing systems that help to distinguish important features of such systems. We analyse their respective characteristics and discuss implications and requirements for various aspects related to the design of such systems. Our results demonstrate that systems theory can inform the study of crowdsourcing systems. The identified system types and the implications on their design may prove useful for researchers to frame future studies and for practitioners to identify the right crowdsourcing systems for a particular purpose.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: The Multi-purpose Service (MPS) Program was introduced to rural Australia in 1991 as a solution to poor health outcomes in rural compared with metropolitan populations, difficulty in attracting healthcare staff and a lack of viability and range of health services in rural areas. The aim of this study was to describe the main concerns of participants involved in the development of multi-purpose services in rural New South Wales (NSW). This article is abstracted from a larger study and discusses the extent to which collaboration occurred within the new multi-purpose service. Methods: A constructivist grounded theory methodology was used. Participants were from 13 multi-purpose services in rural NSW and 30 in-depth interviews were conducted with 6 community members, 11 managers and 13 staff members who had been involved in the process of developing a multi-purpose service. Results: The main concern of all participants was their anticipation of risk. This anticipation of risk manifested itself in either trust or suspicion and explained their progression through a phase of collaborating. Participants who had trust in other stakeholders were more likely to embrace an integrated health service identity. Those participants, who were suspicious that they would lose status or power, maintained that the previous hospital services provided a better health service and described a coexistence of services within the multi-purpose service. Conclusions: This study provided an insight into the perceptions of community members, staff members and managers involved in the process of developing a multi-purpose service. It revealed that the anticipation of risk was intrinsic to a process of changing from a traditional hospital service to collaborating in a new model of health care provided at a multi-purpose service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides fundamental understanding for the use of cumulative plots for travel time estimation on signalized urban networks. Analytical modeling is performed to generate cumulative plots based on the availability of data: a) Case-D, for detector data only; b) Case-DS, for detector data and signal timings; and c) Case-DSS, for detector data, signal timings and saturation flow rate. The empirical study and sensitivity analysis based on simulation experiments have observed the consistency in performance for Case-DS and Case-DSS, whereas, for Case-D the performance is inconsistent. Case-D is sensitive to detection interval and signal timings within the interval. When detection interval is integral multiple of signal cycle then it has low accuracy and low reliability. Whereas, for detection interval around 1.5 times signal cycle both accuracy and reliability are high.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter introduces different theoretical approaches to negotiation and provides an explanation of these differing frameworks. While the action of a negotiation centres on the background research undertaken and what happens at the negotiation table, there is a need to know what principles and assumptions are informing these activities. Theories offer a way of understanding the underlying structures, processes and relationships of negotiation. Further, negotiation theories also assist with focusing attention on the 'basis of the bargain' and provide a standpoint from which to judge offers and counter-offers during the negotiation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article I would like to examine the promise and possibilities of music, digital media and National Broadband Network. I will do this based on concepts that have emerged from a study undertaken by Professor Andrew Brown and I that categorise technologies into what we term representational technologies and technologies with agency

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The availability of bridges is crucial to people’s daily life and national economy. Bridge health prediction plays an important role in bridge management because maintenance optimization is implemented based on prediction results of bridge deterioration. Conventional bridge deterioration models can be categorised into two groups, namely condition states models and structural reliability models. Optimal maintenance strategy should be carried out based on both condition states and structural reliability of a bridge. However, none of existing deterioration models considers both condition states and structural reliability. This study thus proposes a Dynamic Objective Oriented Bayesian Network (DOOBN) based method to overcome the limitations of the existing methods. This methodology has the ability to act upon as a flexible unifying tool, which can integrate a variety of approaches and information for better bridge deterioration prediction. Two demonstrative case studies are conducted to preliminarily justify the feasibility of the methodology

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Overviews of research are clear that bullying occurs in every school, and that there are significant negative physical and mental health outcomes associated with it (Beaty and Alexeyev, 2008; Carter, 2011). As such, it is imperative to develop successful intervention strategies to help students cope with bullying, including the emergent form of cyberbullying. Research suggests, however, that students have a very limited repertoire of strategies for dealing with bullying generally (Owens, Shute, and Slee, 2004). In this paper the authors outline what is currently known about bullying, including cyberbullying, its impact on students, how theory can assist in developing interventions to assist and support students to cope with bullying, and some of the implications for schools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Though stadium style seating in large lecture theatres may suggest otherwise, effective teaching and learning is a not a spectator sport. A challenge in creating effective learning environments in both physical and virtual spaces is to provide optimal opportunity for student engagement in active learning. Queensland University of Technology (QUT) has developed the Open Web Lecture (OWL), a new web-based student response application, which seamlessly integrates a virtual learning environment within the physical learning space. The result is a blended learning experience; a fluid collaboration between academic and students connected to OWL via the University’s Wi-Fi using their own laptop or mobile web device. QUT is currently piloting the OWL application to encourage student engagement. OWL offers opportunities for participants to: • Post comments and questions • Reply to comments
 • "Like" comments
 • Poll students and review data • Review archived sessions. Many of these features instinctively appeal to student users of social networking media, yet avail the academic of control within the University network. Student privacy is respected through a system of preserving peer-peer anonymity, a functionality that seeks to address a traditional reluctance to speak up in large classes. The pilot is establishing OWL as an opportunity for engaging students in active learning opportunities by enabling • virtual learning in physical spaces for large group lectures, seminar groups, workshops and conferences • live collaborative technology connecting students and the academic via the wireless network using their own laptop or mobile device • an non- intimidating environment in which to ask questions • promotion of a sense of community • instant feedback • problem based learning. The student and academic response to OWL has been overwhelmingly positive, crediting OWL as an easy to use application, which creates effective learning opportunities though interactivity and immediate feedback. This poster and accompanying online presentation of the technology will demonstrate how OWL offers new possibilities for active learning in physical spaces by: • providing increased opportunity for student engagement • supporting a range of learners and learning activities • fostering blended learning experiences. The presentation will feature visual displays of the technology, its various interfaces and feedback including clips from interviews with students and academics participating in the early stages of the pilot.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Various researchers have called for an 'opening up' of Luhmann's systems theory. We take this short paper as an occasion for a critical reflection on the necessity, existence and possibilities of such an opening. We start by pointing out the inherent openness of Luhmann's theory, and, based on this, discuss three kinds of openings: the international opening, the theoretical opening and the empirical opening. With regard to the latter, we distinguish three general options of using Luhmann's theory for empirical research. Copyright © 2007 SAGE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Business transformations are large-scale organisational change projects that, evidence suggests, are often unsuccessful. This study aims to develop a conceptual model that explains how management services that are required for a business transformation are orchestrated during such a initiative. We classify management services such as (but not limited to) change management, risk management, IT management, financial management, program management and so forth as bearing transformational and/or transactional capabilities in a transformation initiative. We then draw upon three principles of musical composition, namely melody, harmony and rhythm, and illustrate how they apply to the orchestration of management services in the management of business transformations. In order to illustrate our emerging model, we examine the case of Malaysia Airlines, who have managed to successfully turnaround the near-bankrupt organisation beyond survival. We demonstrate how the notions of melody, harmony and rhythm can be used to describe their endeavour. We conclude by discussing next steps of our research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In its earliest and simplest form queer theory proposes that sexual identity is not essential, but socially constructed, and understandings of identity, gender and sexuality are constructed differently at different times and in different places. Queer theory aims to challenge normative understandings of sex, sexuality and gender, and also normative concepts of knowledge and being. Since its inception, queer theory has been taken up by a number of disciplines as an analytical framework. These include cultural geography, education studies, film studies and sociology. In the last decade queer theory has been used to consider citizenship, diasporas and post colonial experiences. A queer theoretical perspective has also been used to analyse emotions, the Death Drive, phenomenology, and disability. As queer theory enters its third decade Janet Halley and Andrew Parker ask what is after sex? ‘What has queer theory become now that it has a past?’

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Networked control systems (NCSs) offer many advantages over conventional control; however, they also demonstrate challenging problems such as network-induced delay and packet losses. This paper proposes an approach of predictive compensation for simultaneous network-induced delays and packet losses. Different from the majority of existing NCS control methods, the proposed approach addresses co-design of both network and controller. It also alleviates the requirements of precise process models and full understanding of NCS network dynamics. For a series of possible sensor-to-actuator delays, the controller computes a series of corresponding redundant control values. Then, it sends out those control values in a single packet to the actuator. Once receiving the control packet, the actuator measures the actual sensor-to-actuator delay and computes the control signals from the control packet. When packet dropout occurs, the actuator utilizes past control packets to generate an appropriate control signal. The effectiveness of the approach is demonstrated through examples.