855 resultados para Large Scale Virtual Environments


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – To investigate the impact of performance measurement in strategic planning process. Design/methodology/approach – A large scale survey was conducted online with Warwick Business School alumni. The questionnaire was based on the Strategic Development Process model by Dyson. The questionnaire was designed to map the current practice of strategic planning and to determine its most influential factors on the effectiveness of the process. All questions were close ended and a seven-point Likert scale used. The independent variables were grouped into four meaningful factors by factor analysis (Varimax, coefficient of rotation 0.4). The factors produced were used to build regression models (stepwise) for the five assessments of strategic planning process. Regression models were developed for the totality of the responses, comparing SMEs and large organizations and comparing organizations operating in slowly and rapidly changing environments. Findings – The results indicate that performance measurement stands as one of the four main factors characterising the current practice of strategic planning. This research has determined that complexity coming from organizational size and rate of change in the sector creates variation in the impact of performance measurement in strategic planning. Large organizations and organizations operating in rapidly changing environments make greater use of performance measurement. Research limitations/implications – This research is based on subjective data, therefore the conclusions do not concern the impact of strategic planning process' elements on the organizational performance achievements, but on the success/effectiveness of the strategic planning process itself. Practical implications – This research raises a series of questions about the use and potential impact of performance measurement, especially in the categories of organizations that are not significantly influenced by its utilisation. It contributes to the field of performance measurement impact. Originality/value – This research fills in the gap literature concerning the lack of large scale surveys on strategic development processes and performance measurement. It also contributes in the literature of this field by providing empirical evidences on the impact of performance measurement upon the strategic planning process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Genome sequences from many organisms, including humans, have been completed, and high-throughput analyses have produced burgeoning volumes of 'omics' data. Bioinformatics is crucial for the management and analysis of such data and is increasingly used to accelerate progress in a wide variety of large-scale and object-specific functional analyses. Refined algorithms enable biotechnologists to follow 'computer-aided strategies' based on experiments driven by high-confidence predictions. In order to address compound problems, current efforts in immuno-informatics and reverse vaccinology are aimed at developing and tuning integrative approaches and user-friendly, automated bioinformatics environments. This will herald a move to 'computer-aided biotechnology': smart projects in which time-consuming and expensive large-scale experimental approaches are progressively replaced by prediction-driven investigations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The project set out with two main aims. The first aim was to determine whether large scale multispectral aerial photography could be used to successfully survey and monitor urban wildlife habitats. The second objective was to investigate whether this data source could be used to predict population numbers of selected species expected to be found in a particular habitat type. Panchromatic, colour and colour infra-red, 1:2500 scale aerial photographs, taken in 1981 and 1984, were used. For the orderly extraction of information from the imagery, an urban wildlife habitat classification was devised. This was based on classifications already in use in urban environments by the Nature Conservancy Council. Pilot tests identified that the colour infra-red imagery provided the most accurate results about urban wildlife habitats in the study area of the Blackbrook Valley, Dudley. Both the 1981 and 1984 colour infra-red photographs were analysed and information was obtained about the type, extent and distribution of habitats. In order to investigate whether large scale aerial photographs could be used to predict likely animal population numbers in urban environments, it was decided to limit the investigation to the possible prediction of bird population numbers in Saltwells Local Nature Reserve. A good deal of research has already been completed into the development of models to predict breeding bird population numbers in woodland habitats. These models were analysed to determine whether they could be used successfully with data extracted from the aerial photographs. The projects concluded that 1:2500 scale colour infra-red photographs can provide very useful and very detailed information about the wildlife habitats in an urban area. Such imagery can also provide habitat area data to be used with population predictive models of woodland breeding birds. Using the aerial photographs, further investigations into the relationship between area of habitat and the breeding of individual bird species were inconclusive and need further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis describes the geology of a Lower Palaeozoic terrain, situated west of the town of Fishguard, SW Dyfed, Wales. The area is dominated by the Fishguard Volcanic Complex (Upper Llanvirn), and sediments that range in age from the Middle Cambrian to the Lower Llandeilo. The successions represent an insight into sedimentation and volcanism for c. 100 Ma. along the south-western margin of the Lower Palaeozoic Welsh Basin. The stratigraphy of the sedimentary sequence has been completely revised and the existing volcanostratigraphy modified. The observed complexity of the stratigraphy is primarily the consequence of Caldedonide deformation which resulted in large scale repetition. Fold-thrust tectonics dominates the structural style of the area. Caledonide trending (NE-SW) cross-faults complicate preexisting structures. Middle Cambrian (?) sedimentation is documented by shallow marine clastics and red shales deposited within tidal - subtidal environments. Upper Cambrian sedimentation was dominated by shallow marine `storm' and `fair weather' sedimentation within a muddy shelf environment. Shallow marine conglomerates and heterolithic intertidal siliciclastics mark the onset of Ordovician sedimentation during the lower Arenig transgression. Mid-Arenig sediments reflect deposits influenced by storm, fair-weather and wave related processes in various shallow marine environments, including; shoreface, inner shelf, shoaling bar, and deltaic. Graptolitic marine shales were deposited from the upper mid-Arenig through to the lower Llandeilo; during which time sediments accumulated by pelagic processes and fine grained turbidites. The varied nature of sedimentation reflects both localised change within the depositional system and the influence of larger regional eustatic events. Ordovician subaqueous volcanic activity produced thick accumulations of lavas, pyroclastics, hydroclastics, and hyaloclastics. The majority of volcanism was effusive in nature, erupted below the Pressure Compensation Level. Basaltic volcanism was characterised by pillowed lavas and tube networks, whilst sheet-flow lavas, pillow breccias and minor hyaloclastites developed locally. Silicic volcanism was dominated by rhyolitic clastics of various affinities, although coherent silicic obsidian lavas, sheet-flow lavas and pyroclastics developed. Hypabyssal intrusives of variable composition and habit occur throughout the volcanic successions. Low-grade regional metamorphism has variably affected the area, conditions of the prehnite-pumpellyite and greenschist facies having been attained. Numerous secondary phases developed in response to the conditions imposed, which collectively indicate that P-T conditions were of low-pressure facies series in the range P= 1.2-2.0 kbars and T= 230-350oC, under an elevated geothermal gradient of 40-45oC km-1. Polymineralic cataclastites associated with Caledonide deformation indicate that tectonism and metamorphism were in part contemporaneous.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

When composing stock portfolios, managers frequently choose among hundreds of stocks. The stocks' risk properties are analyzed with statistical tools, and managers try to combine these to meet the investors' risk profiles. A recently developed tool for performing such optimization is called full-scale optimization (FSO). This methodology is very flexible for investor preferences, but because of computational limitations it has until now been infeasible to use when many stocks are considered. We apply the artificial intelligence technique of differential evolution to solve FSO-type stock selection problems of 97 assets. Differential evolution finds the optimal solutions by self-learning from randomly drawn candidate solutions. We show that this search technique makes large scale problem computationally feasible and that the solutions retrieved are stable. The study also gives further merit to the FSO technique, as it shows that the solutions suit investor risk profiles better than portfolios retrieved from traditional methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An alternative explanation for the modes of failure of large scale failures of open pit walls to those of classical slope stability theory is proposed that makes use of the concept of a transition zone, which is described by a modified Prandtls prism.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

To be competitive in contemporary turbulent environments, firms must be capable of processing huge amounts of information, and effectively convert it into actionable knowledge. This is particularly the case in the marketing context, where problems are also usually highly complex, unstructured and ill-defined. In recent years, the development of marketing management support systems has paralleled this evolution in informational problems faced by managers, leading to a growth in the study (and use) of artificial intelligence and soft computing methodologies. Here, we present and implement a novel intelligent system that incorporates fuzzy logic and genetic algorithms to operate in an unsupervised manner. This approach allows the discovery of interesting association rules, which can be linguistically interpreted, in large scale databases (KDD or Knowledge Discovery in Databases.) We then demonstrate its application to a distribution channel problem. It is shown how the proposed system is able to return a number of novel and potentially-interesting associations among variables. Thus, it is argued that our method has significant potential to improve the analysis of marketing and business databases in practice, especially in non-programmed decisional scenarios, as well as to assist scholarly researchers in their exploratory analysis. © 2013 Elsevier Inc.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There have been multifarious approaches in building expert knowledge in medical or engineering field through expert system, case-based reasoning, model-based reasoning and also a large-scale knowledge-based system. The intriguing factors with these approaches are mainly the choices of reasoning mechanism, ontology, knowledge representation, elicitation and modeling. In our study, we argue that the knowledge construction through hypermedia-based community channel is an effective approach in constructing expert’s knowledge. We define that the knowledge can be represented as in the simplest form such as stories to the most complex ones such as on-the-job type of experiences. The current approaches of encoding experiences require expert’s knowledge to be acquired and represented in rules, cases or causal model. We differentiate the two types of knowledge which are the content knowledge and socially-derivable knowledge. The latter is described as knowledge that is earned through social interaction. Intelligent Conversational Channel is the system that supports the building and sharing on this type of knowledge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper continues the author’s team research on development, implementation, and experimentation of a task-oriented environment for teaching and learning algorithms. This environment is a part of a large-scale environment for course teaching in different domains. The paper deals only with the UML project of the teaching team’s side of the environment.. The implementation of the project ideas is demonstrated on a WINDOWS-based environment’s prototype.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advances in the area of industrial metrology have generated new technologies that are capable of measuring components with complex geometry and large dimensions. However, no standard or best-practice guides are available for the majority of such systems. Therefore, these new systems require appropriate testing and verification in order for the users to understand their full potential prior to their deployment in a real manufacturing environment. This is a crucial stage, especially when more than one system can be used for a specific measurement task. In this paper, two relatively new large-volume measurement systems, the mobile spatial co-ordinate measuring system (MScMS) and the indoor global positioning system (iGPS), are reviewed. These two systems utilize different technologies: the MScMS is based on ultrasound and radiofrequency signal transmission and the iGPS uses laser technology. Both systems have components with small dimensions that are distributed around the measuring area to form a network of sensors allowing rapid dimensional measurements to be performed in relation to large-size objects, with typical dimensions of several decametres. The portability, reconfigurability, and ease of installation make these systems attractive for many industries that manufacture large-scale products. In this paper, the major technical aspects of the two systems are briefly described and compared. Initial results of the tests performed to establish the repeatability and reproducibility of these systems are also presented. © IMechE 2009.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hurricane is one of the most destructive and costly natural hazard to the built environment and its impact on low-rise buildings, particularity, is beyond acceptable. The major objective of this research was to perform a parametric evaluation of internal pressure (IP) for wind-resistant design of low-rise buildings and wind-driven natural ventilation applications. For this purpose, a multi-scale experimental, i.e. full-scale at Wall of Wind (WoW) and small-scale at Boundary Layer Wind Tunnel (BLWT), and a Computational Fluid Dynamics (CFD) approach was adopted. This provided new capability to assess wind pressures realistically on internal volumes ranging from small spaces formed between roof tiles and its deck to attic to room partitions. Effects of sudden breaching, existing dominant openings on building envelopes as well as compartmentalization of building interior on the IP were systematically investigated. Results of this research indicated: (i) for sudden breaching of dominant openings, the transient overshooting response was lower than the subsequent steady state peak IP and internal volume correction for low-wind-speed testing facilities was necessary. For example a building without volume correction experienced a response four times faster and exhibited 30–40% lower mean and peak IP; (ii) for existing openings, vent openings uniformly distributed along the roof alleviated, whereas one sided openings aggravated the IP; (iii) larger dominant openings exhibited a higher IP on the building envelope, and an off-center opening on the wall exhibited (30–40%) higher IP than center located openings; (iv) compartmentalization amplified the intensity of IP and; (v) significant underneath pressure was measured for field tiles, warranting its consideration during net pressure evaluations. The study aimed at wind driven natural ventilation indicated: (i) the IP due to cross ventilation was 1.5 to 2.5 times higher for Ainlet/Aoutlet>1 compared to cases where Ainlet/Aoutlet<1, this in effect reduced the mixing of air inside the building and hence the ventilation effectiveness; (ii) the presence of multi-room partitioning increased the pressure differential and consequently the air exchange rate. Overall good agreement was found between the observed large-scale, small-scale and CFD based IP responses. Comparisons with ASCE 7-10 consistently demonstrated that the code underestimated peak positive and suction IP.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Globally, small-scale fisheries (SSFs) are driven by climate, governance, and market factors of social-ecological change, presenting both challenges and opportunities. The ability of small-scale fishermen and buyers to adapt to changing conditions allows participants to survive economic or environmental disturbances and to benefit from optimal conditions. This study presented here identifies key large-scale factors that drive SSFs in California to shift focus among targets and that dictate long-term trends in landings. We use Elinor Ostrom’s Social-Ecological System (SES) framework to apply an interdisciplinary approach when identifying potential factors and when understanding the complex dynamics of these fisheries. We analyzed the interactions among Monterey Bay SSFs over the past four decades since the passage of the Magnuson Stevens Fisheries Conservation and Management Act of 1976. In this region, the Pacific sardine (Sardinops sagax), northern anchovy (Engraulis mordax), and market squid (Loligo opalescens) fisheries comprise a tightly linked system where shifting focus among fisheries is a key element to adaptive capacity and reduced social and ecological vulnerability. Using a cluster analysis of landings, we identified four modes from 1974 to 2012 that were dominated by squid, sardine, anchovy, or lacked any dominance, enabling us to identify external drivers attributed to a change in fishery dominance during seven distinct transition points. Overall, we show that market and climate factors drive the transitions among dominance modes. Governance phases most dictated long-term trends in landings and are best viewed as a response to changes in perceived biomass and thus a proxy for biomass. Our findings suggest that globally, small-scale fishery managers should consider enabling shifts in effort among fisheries and retaining existing flexibility, as adaptive capacity is a critical determinant for social and ecological resilience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research analyzed the spatial relationship between a mega-scale fracture network and the occurrence of vegetation in an arid region. High-resolution aerial photographs of Arches National Park, Utah were used for digital image processing. Four sets of large-scale joints were digitized from the rectified color photograph in order to characterize the geospatial properties of the fracture network with the aid of a Geographic Information System. An unsupervised landcover classification was carried out to identify the spatial distribution of vegetation on the fractured outcrop. Results of this study confirm that the WNW-ESE alignment of vegetation is dominantly controlled by the spatial distribution of the systematic joint set, which in turn parallels the regional fold axis. This research provides insight into the spatial heterogeneity inherent to fracture networks, as well as the effects of jointing on the distribution of surface vegetation in desert environments.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.