412 resultados para Suites
Resumo:
With the large diffusion of Business Process Managemen (BPM) automation suites, the possibility of managing process-related risks arises. This paper introduces an innovative framework for process-related risk management and describes a working implementation realized by extending the YAWL system. The framework covers three aspects of risk management: risk monitoring, risk prevention, and risk mitigation. Risk monitoring functionality is provided using a sensor-based architecture, where sensors are defined at design time and used at run-time for monitoring purposes. Risk prevention functionality is provided in the form of suggestions about what should be executed, by who, and how, through the use of decision trees. Finally, risk mitigation functionality is provided as a sequence of remedial actions (e.g. reallocating, skipping, rolling back of a work item) that should be executed to restore the process to a normal situation.
Resumo:
Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.
Resumo:
Between the crimes in the suites and the crimes in the streets lies the mostly unexplored terrain within which we find crimes of ‘everyday life’. Not all of these are formally illegal, but all are generally seen as morally dubious. Most of the crimes of everyday life are committed in the contemporary marketplace, and by those who think of themselves (and are mostly considered by others) as respectable citizens. We contextualize normative orientations that are conducive to such types of behaviour using a framework that links E. P. Thompson’s (1963) concept of the ‘moral economy’ with Institutional Anomie Theory (Messner and Rosenfeld 1994, 2007). Findings from a comparative survey study in three economic change regions (England and Wales, Western and Eastern Germany) show that a syndrome of market anomie comprising distrust, fear and cynical attitudes toward law increases the willingness of respectable citizens to engage in illegal and unfair practices in the marketplace.
Resumo:
Many ecosystems worldwide are dominated by introduced plant species, leading to loss of biodiversity and ecosystem function. A common but rarely tested assumption is that these plants are more abundant in introduced vs. native communities, because ecological or evolutionary-based shifts in populations underlie invasion success. Here, data for 26 herbaceous species at 39 sites, within eight countries, revealed that species abundances were similar at native (home) and introduced (away) sites – grass species were generally abundant home and away, while forbs were low in abundance, but more abundant at home. Sites with six or more of these species had similar community abundance hierarchies, suggesting that suites of introduced species are assembling similarly on different continents. Overall, we found that substantial changes to populations are not necessarily a pre-condition for invasion success and that increases in species abundance are unusual. Instead, abundance at home predicts abundance away, a potentially useful additional criterion for biosecurity programmes.
Resumo:
The rapid growth of services available on the Internet and exploited through ever globalizing business networks poses new challenges for service interoperability. New services, from consumer “apps”, enterprise suites, platform and infrastructure resources, are vying for demand with quickly evolving and overlapping capabilities, and shorter cycles of extending service access from user interfaces to software interfaces. Services, drawn from a wider global setting, are subject to greater change and heterogeneity, demanding new requirements for structural and behavioral interface adaptation. In this paper, we analyze service interoperability scenarios in global business networks, and propose new patterns for service interactions, above those proposed over the last 10 years through the development of Web service standards and process choreography languages. By contrast, we reduce assumptions of design-time knowledge required to adapt services, giving way to run-time mismatch resolutions, extend the focus from bilateral to multilateral messaging interactions, and propose declarative ways in which services and interactions take part in long-running conversations via the explicit use of state.
Resumo:
The pioneering work of Runge and Kutta a hundred years ago has ultimately led to suites of sophisticated numerical methods suitable for solving complex systems of deterministic ordinary differential equations. However, in many modelling situations, the appropriate representation is a stochastic differential equation and here numerical methods are much less sophisticated. In this paper a very general class of stochastic Runge-Kutta methods is presented and much more efficient classes of explicit methods than previous extant methods are constructed. In particular, a method of strong order 2 with a deterministic component based on the classical Runge-Kutta method is constructed and some numerical results are presented to demonstrate the efficacy of this approach.
Resumo:
In many modeling situations in which parameter values can only be estimated or are subject to noise, the appropriate mathematical representation is a stochastic ordinary differential equation (SODE). However, unlike the deterministic case in which there are suites of sophisticated numerical methods, numerical methods for SODEs are much less sophisticated. Until a recent paper by K. Burrage and P.M. Burrage (1996), the highest strong order of a stochastic Runge-Kutta method was one. But K. Burrage and P.M. Burrage (1996) showed that by including additional random variable terms representing approximations to the higher order Stratonovich (or Ito) integrals, higher order methods could be constructed. However, this analysis applied only to the one Wiener process case. In this paper, it will be shown that in the multiple Wiener process case all known stochastic Runge-Kutta methods can suffer a severe order reduction if there is non-commutativity between the functions associated with the Wiener processes. Importantly, however, it is also suggested how this order can be repaired if certain commutator operators are included in the Runge-Kutta formulation. (C) 1998 Elsevier Science B.V. and IMACS. All rights reserved.
Resumo:
Confusion exists as to the age of the Abor Volcanics of NE India. Some consider the unit to have been emplaced in the Early Permian, others the Early Eocene, a difference of ∼230 million years. The divergence in opinion is significant because fundamentally different models explaining the geotectonic evolution of India depend on the age designation of the unit. Paleomagnetic data reported here from several exposures in the type locality of the formation in the lower Siang Valley indicate that steep dipping primary magnetizations (mean = 72.7 ± 6.2°, equating to a paleo-latitude of 58.1°) are recorded in the formation. These are only consistent with the unit being of Permian age, possibly Artinskian based on a magnetostratigraphic argument. Plate tectonic models for this time consistently show the NE corner of the sub-continent >50°S; in the Early Eocene it was just north of the equator, which would have resulted in the unit recording shallow directions. The mean declination is counter-clockwise rotated by ∼94°, around half of which can be related to the motion of the Indian block; the remainder is likely due local Himalayan-age thrusting in the Eastern Syntaxis. Several workers have correlated the Abor Volcanics with broadly coeval mafic volcanic suites in Oman, NE Pakistan–NW India and southern Tibet–Nepal, which developed in response to the Cimmerian block peeling-off eastern Gondwana in the Early-Middle Permian, but we believe there are problems with this model. Instead, we suggest that the Abor basalts relate to India–Antarctica/India–Australia extension that was happening at about the same time. Such an explanation best accommodates the relevant stratigraphical and structural data (present-day position within the Himalayan thrust stack), as well as the plate tectonic model for Permian eastern Gondwana.
Resumo:
High heat-producing granites (HHPGs) are reservoir rocks for enhanced geothermal systems (EGS), yet the origins of their anomalous chemistry remain poorly understood. To gain a better understanding of the characteristic distribution of elemental depletions and enrichments (focussing on U, Th & K) within granite suites of different heritage and tectonic setting, and the processes that lead to these enrichments, we are undertaking a systematic accessory-mineral chronochemical study of two suites of S- and I-type granites in northern Queensland, as well as two archetypal HHPGs in Cornwall, England (S-type) and Soultz-sous- Forêts, France (I-type). Novel zircon LA-ICP-MS chronochemical methods will later be underpinned by a systematic petrographic, scanning electron microscope (SEM), and electron microprobe (EPMA) study of all the REE-Y-Th-U-rich accessory minerals to fully characterise how the composition, textural distributions and associations change with rock chemistry between and among the suites. Preliminary results indicate that zircons with inherited ages do not have anomalously high U (>1000 ppm) & Th (>400 ppm) values (Ahrens, 1965). Instead, enrichment in these HPE is seen in zircons dated to around the time of magmatic emplacement. These results indicate that enrichment arose primarily through fractional crystallisation of the granitic magmas. Our results support the suggestion that a source pre-enriched in the HPEs does not appear to be fundamental for the formation of all HHPGs. Instead fractional crystallisation processes, and the accessory minerals formed in magmas of differing initial compositions, are the key controls on the levels of enrichment observed (e.g. Champion & Chappell, 1992; Chappell & Hine, 2006). One implication is that the most fractionated granites may not be the most enriched in the HPEs and therefore prospective to future EGS development.
Resumo:
The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.
Resumo:
We present new evidence for sector collapses of the South Soufrière Hills (SSH) edifice, Montserrat during the mid-Pleistocene. High-resolution geophysical data provide evidence for sector collapse, producing an approximately 1 km3 submarine collapse deposit to the south of SSH. Sedimentological and geochemical analyses of submarine deposits sampled by sediment cores suggest that they were formed by large multi-stage flank failures of the subaerial SSH edifice into the sea. This work identifies two distinct geochemical suites within the SSH succession on the basis of trace-element and Pb-isotope compositions. Volcaniclastic turbidites in the cores preserve these chemically heterogeneous rock suites. However, the subaerial chemostratigraphy is reversed within the submarine sediment cores. Sedimentological analysis suggests that the edifice failures produced high-concentration turbidites and that the collapses occurred in multiple stages, with an interval of at least 2 ka between the first and second failure. Detailed field and petrographical observations, coupled with SEM image analysis, shows that the SSH volcanic products preserve a complex record of magmatic activity. This activity consisted of episodic explosive eruptions of andesitic pumice, probably triggered by mafic magmatic pulses and followed by eruptions of poorly vesiculated basaltic scoria, and basaltic lava flows.
Resumo:
Dual-active bridges (DABs) can be used to deliver isolated and bidirectional power to electric vehicles (EVs) or to the grid in vehicle-to-grid (V2G) applications. However, such a system essentially requires a two-stage power conversion process, which significantly increases the power losses. Furthermore, the poor power factor associated with DAB converters further reduces the efficiency of such systems. This paper proposes a novel matrix converter based resonant DAB converter that requires only a single-stage power conversion process to facilitate isolated bi-directional power transfer between EVs and the grid. The proposed converter comprises a matrix converter based front end linked with an EV side full-bridge converter through a high frequency isolation transformer and a tuned LCL network. A mathematical model, which predicts the behavior of the proposed system, is presented to show that both the magnitude and direction of the power flow can be controlled through either relative phase angle or magnitude modulation of voltages produced by converters. Viability of the proposed concept is verified through simulations. The proposed matrix converter based DAB, with a single power conversion stage, is low in cost, and suites charging and discharging in single or multiple EVs or V2G applications.
Resumo:
Hospitals invest considerable resources organizing operating suites and having surgeons and theatre staff available on an agreed schedule. A common impediment to efficiency is perioperative delay,including delays getting to the operating room or during the operation. Perioperative delays entail significant costs for hospitals,wasting staff time and operating theatre resources. They may also affect patient outcomes; prolonged surgery is a predictor for unanticipated admission following elective ambulatory surgery...
Resumo:
The Archean Hollandaire volcanogenic massive sulfide deposit is a felsic–siliciclastic VMS deposit located in the Murchison Domain of the Youanmi Terrane, Yilgarn Craton, Western Australia. It is hosted in a succession of turbidites, mudstones and coherent rhyodacite sills and has been metamorphosed to upper greenschist/lower amphibolite facies and includes a pervasive S1 deformational fabric. The coherent rhyodacitic sills are interpreted as syndepositional based on geochemical similarities with well-known VMS-associated felsic rocks and similar foliations to the metasediments. We offer several explanations for the absence of textural evidence (e.g. breccias) for syn-depositional origins: 1) the subaqueous sediments were dehydrated by long-lived magmatism such that no pore-water remained to drive quench fragmentation; 2) pore-space occlusion by burial and/or, 3) alteration overprinting and obscuring of primary breccias at contact margins. Mineralisation occurs by sub-seafloor replacement of original host rocks in two ore bodies, Hollandaire Main (~125 x >500 m and ~8 m thick) and Hollandaire West (~100 x 470 m and ~5 m thick), and occurs in three main textural styles, massive sulfides, which are exclusively hosted in turbidites and mudstones, and stringer and disseminated sulfides, which are also hosted in coherent rhyodacite. Most sulfides have textures consistent with remobilisation and recrystallisation. Hydrothermal metamorphism has altered the hangingwall and footwall to similar degrees, with significant gains in Mg, Mn and K and losses in Na, Ca and Sr. Garnet and staurolite porphyryoblasts also exhibit a footprint around mineralisation, extending up to 30 m both above and below the ore zone. High precision thermal ionisation mass spectrometry of zircons extracted from the coherent rhyodacite yield an age of 2759.5 ± 0.9 Ma, which along with geochemical comparisons, places the succession within the 2760–2735 Ma Greensleeves Formation of the Polelle Group of the Murchison Supergroup. Geochemical and geochronological evidence link the coherent rhyodacite sills to the Peter Well Granodiorite pluton ~2 km to the W, which acted as the heat engine driving hydrothermal circulation during VMS mineralisation. This study highlights the importance of both: detailed physical volcanological studies from which an accurate assessment of timing relationships, particularly the possibility of intrusions dismembering ore horizons, can be made; and identifying synvolcanic plutons and other similar suites, for VMS exploration targets in the Youanmi Terrane and worldwide.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.