868 resultados para Communications transatlantiques
Resumo:
The adoption of e-business by Small and Medium Enterprises (SMEs) in construction lags from other service and product businesses within the building sector. This paper develops a model to facilitate the uptake of electronic business, especially in relation to SMEs within the Australian construction sector. Ebusiness is defined here as “the undertaking of business-related transactions, communications and information exchanges utilising electronic medium and environment”, the elicited model highlights significant changes needed including skills development, social, economic and cultural issues. The model highlights barriers for SMEs to migrate towards e-transactions, e-bidding, e-tendering and ecollaboration and provides learning and skills development components. The model is derived from case study fieldwork and is to inform diffusion and awareness models for best practice. Empirical techniques included ‘focus group’ interviews and one to one ‘interviews’. Data was transcribed and analysed using cluster analyses. Preliminary results reveal that current models for e-business adoption are not effective within the construction context as they have emerged from other service and product industries - such as retail or tourism. These generic models have largely ignored the nature of the construction industry, and some modifications appears to be required. This paper proposes an alternative adoption model which is more sensitive to the nature of the industry – particularly for e-business uptake in building SME’s.
Resumo:
A curriculum for a university-level course called Business Process Modeling is presented in order to provide guidance for the increasing number of institutions who are currently developing such contents. The course caters to undergraduate and post graduate students. Its content is drawn from recent research, industry practice, and established teaching material, and teaches ways of specifying business processes for the analysis and design of process-aware information systems. The teaching approach is a blend of lectures and classroom exercises with innovative case studies, as well as reviews of research material. Students are asked to conceptualize, analyze, and articulate real life process scenarios. Tutorials and cheat sheets assist with the learning experience. Course evaluations from 40 students suggest the adequacy of the teaching approach. Specifically, evaluations show a high degree of satisfaction with course relevance, content presentation, and teaching approach.
Resumo:
Australia has no nationally accepted building products life cycle inventory (LCI) database for use in building Ecologically Sustainable Development (ESD) assessment (BEA) tools. More information about the sustainability of the supply chain is limited by industry’s lack of real capacity to deliver objective information on process and product environmental impact. Recognition of these deficits emerged during compilation of a National LCI database to inform LCADesign, a prototype 3 dimensional object oriented computer aided design (3-D CAD) commercial building design tool. Development of this Australian LCI represents 24 staff years of effort here since 1995. Further development of LCADesign extensions is proposed as being essential to support key applications demanded from a more holistic theoretical framework calling for modules of new building and construction industry tools. A proposed tool, conceptually called LCADetails, is to serve the building product industries own needs as well as that of commercial building design amongst other industries’ prospective needs. In this paper, a proposition is examined that the existing national LCI database should be further expanded to serve Australian building product industries’ needs as well as to provide details for its client-base from a web based portal containing a module of practical supply and procurement applications. Along with improved supply chain assessment services, this proposed portal is envisaged to facilitate industry environmental life cycle improvement assessment and support decision-making to provide accredited data for operational reporting capabilities, load-based reasoning as well as BEA applications. This paper provides an overview of developments to date, including a novel 3-D CAD information and communications technology (ICT) platform for more holistic integration of existing tools for true cost assessment. Further conceptualisation of future prospects, based on a new holistic life cycle assessment framework LCADevelop, considering stakeholder relationships and their need for a range of complementary tools leveraging automated function off such ICT platforms to inform dimensionally defined operations for such as automotive, civil, transport and industrial applications are also explored.
Resumo:
Channel measurements and simulations have been carried out to observe the effects of pedestrian movement on multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) channel capacity. An in-house built MIMO-OFDM packet transmission demonstrator equipped with four transmitters and four receivers has been utilized to perform channel measurements at 5.2 GHz. Variations in the channel capacity dynamic range have been analysed for 1 to 10 pedestrians and different antenna arrays (2 × 2, 3 × 3 and 4 × 4). Results show a predicted 5.5 bits/s/Hz and a measured 1.5 bits/s/Hz increment in the capacity dynamic range with the number of pedestrian and the number of antennas in the transmitter and receiver array.
Resumo:
Understanding the differences between the temporal and physical aspects of the building life cycle is an essential ingredient in the development of Building Environmental Assessment (BEA) tools. This paper illustrates a theoretical Life Cycle Assessment (LCA) framework aligning temporal decision-making with that of material flows over building development phases. It was derived during development of a prototype commercial building design tool that was based on a 3-D CAD information and communications technology (ICT) platform and LCA software. The framework aligns stakeholder BEA needs and the decision-making process against characteristics of leading green building tools. The paper explores related integration of BEA tool development applications on such ICT platforms. Key framework modules are depicted and practical examples for BEA are provided for: • Definition of investment and service goals at project initiation; • Design integrated to avoid overlaps/confusion over the project life cycle; • Detailing the supply chain considering building life cycle impacts; • Delivery of quality metrics for occupancy post-construction/handover; • Deconstruction profiling at end of life to facilitate recovery.
Resumo:
The Australian construction industry is a fragmented and profoundly competitive industry with high levels of subcontracting resulting in complex supply chain formations. Traditional methods and forms of communication are being proven as inefficient and losing their charm while participants face heavy volumes of communications that often occurs on a daily basis between trading partners in a supply chain on projects. Information Communication Technologies (ICT), due to their robustness and the ability to quickly disseminate data/information, have the capacity to address highlighted communication issues in a structured and an efficient manner. Timesavings produced by these can be directly translated in terms of productivity gain. This paper presents perceptions of subcontractors working in the construction industry in Melbourne Australia on the use of ICT obtained through an exploratory study.
Resumo:
This paper describes an approach to introducing fraction concepts using generic software tools such as Microsoft Office's PowerPoint to create "virtual" materials for mathematics teaching and learning. This approach replicates existing concrete materials and integrates virtual materials with current non-computer methods of teaching primary students about fractions. The paper reports a case study of a 12-year-old student, Frank, who had an extremely limited understanding of fractions. Frank also lacked motivation for learning mathematics in general and interacted with his peers in a negative way during mathematics lessons. In just one classroom session involving the seamless integration of off-computer and on-computer activities, Frank acquired a basic understanding of simple common equivalent fractions. Further, he was observed as the session progressed to be an enthusiastic learner who offered to share his learning with his peers. The study's "virtual replication" approach for fractions involves the manipulation of concrete materials (folding paper regions) alongside the manipulation of their virtual equivalent (shading screen regions). As researchers have pointed out, the emergence of new technologies does not mean old technologies become redundant. Learning technologies have not replaced print and oral language or basic mathematical understanding. Instead, they are modifying, reshaping, and blending the ways in which humankind speaks, reads, writes, and works mathematically. Constructivist theories of learning and teaching argue that mathematics understanding is developed from concrete to pictorial to abstract and that, ultimately, mathematics learning and teaching is about refinement and expression of ideas and concepts. Therefore, by seamlessly integrating the use of concrete materials and virtual materials generated by computer software applications, an opportunity arises to enhance the teaching and learning value of both materials.
Resumo:
There is a need to take a fresh look at the traditional application of the marketing concept to political marketing. As many businesses have learned, Integrated Marketing Communications (IMC) practices and principles will help them to build customer relationships and profitable brands. Political marketing must also change with the times and implement IMC practices toward building and nourishing brand relationships with voters and other important stakeholders. The nature of the contribution of this paper is the identification of a gap in the political marketing literature - the stagnation of political marketing at the 4P's marketing concept, and to play a role in the future development of political marketing. In recent developments, it is seen that there is a gradual movement away from this traditional marketing theory. There are a growing number of academics who have approached very closely to the IMC concept or aspects of it, but have not however embraced or have been reluctant to, the prospect of applying it to political marketing. IMC is a practical, logical and ultimately inevitable future for political marketing.
Resumo:
IT professionals work in an environment which is under continual innovation, exerts a global influence and yet is relatively young. In such a context, how can professionals be effectively supported in their ethical practice? IT professional ethics has predominantly focussed on external standards or internal reasoning. However, attention also has to be paid to professionals’ experience of ethics, which influences how they interpret standards and construct reasoning. A comprehensive experience of ethics will embrace the professional’s inner circle, their employer, their client and humanity. In order to promote such a comprehensive view, we need to re-conceptualise a) the IT discipline, focussing on information users; b) professional ethics, adopting other-centred attitudes; and c) professional development, pursuing a change in lived experience. This book is written for those interested in professional ethics (practitioners, educators, professional bodies and employers), especially in the computing field.
Resumo:
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.
Resumo:
The over represented number of novice drivers involved in crashes is alarming. Driver training is one of the interventions aimed at mitigating the number of crashes that involve young drivers. To our knowledge, Advanced Driver Assistance Systems (ADAS) have never been comprehensively used in designing an intelligent driver training system. Currently, there is a need to develop and evaluate ADAS that could assess driving competencies. The aim is to develop an unsupervised system called Intelligent Driver Training System (IDTS) that analyzes crash risks in a given driving situation. In order to design a comprehensive IDTS, data is collected from the Driver, Vehicle and Environment (DVE), synchronized and analyzed. The first implementation phase of this intelligent driver training system deals with synchronizing multiple variables acquired from DVE. RTMaps is used to collect and synchronize data like GPS, vehicle dynamics and driver head movement. After the data synchronization, maneuvers are segmented out as right turn, left turn and overtake. Each maneuver is composed of several individual tasks that are necessary to be performed in a sequential manner. This paper focuses on turn maneuvers. Some of the tasks required in the analysis of ‘turn’ maneuver are: detect the start and end of the turn, detect the indicator status change, check if the indicator was turned on within a safe distance and check the lane keeping during the turn maneuver. This paper proposes a fusion and analysis of heterogeneous data, mainly involved in driving, to determine the risk factor of particular maneuvers within the drive. It also explains the segmentation and risk analysis of the turn maneuver in a drive.
Resumo:
The intention of this paper is to further the discussion around the development of theories of public relations by introducing to the mix the concept of the Other from the field of cultural studies. The development of discipline-specific theories as part of a “scholarly body of knowledge” (Wylie, 1994, p.2) – or at least a “unique” knowledge base (Parkinson, 2001) – has been suggested as one of the defining characteristics of a true profession. In the case of public relations, this is a development that has occurred relatively recently. Since public relations first began to emerge as a distinct practice in the early part of the 20th century, there has been a tendency to appropriate theories from other areas (such as organisational and media studies) to create a relevant theory base to explore, describe and predict public relations activities. However, these theories were often rarely more than a ‘best fit’ solution, and resulting areas of discrepancy led to much confusion surrounding the form and function of public relations. It could be argued therefore that the development of dedicated public relations theory – ideas that encompass the creation, maintenance and enhancement of relationships between organisations and publics as primary motivations – only began in the latter half of the 20th century with the work of people such as Grunig and Hunt, and latterly Ledingham and Bruning among others.
Resumo:
Security-critical communications devices must be evaluated to the highest possible standards before they can be deployed. This process includes tracing potential information flow through the device's electronic circuitry, for each of the device's operating modes. Increasingly, however, security functionality is being entrusted to embedded software running on microprocessors within such devices, so new strategies are needed for integrating information flow analyses of embedded program code with hardware analyses. Here we show how standard compiler principles can augment high-integrity security evaluations to allow seamless tracing of information flow through both the hardware and software of embedded systems. This is done by unifying input/output statements in embedded program execution paths with the hardware pins they access, and by associating significant software states with corresponding operating modes of the surrounding electronic circuitry.