997 resultados para zeolite imidazolate framework
Resumo:
A computational framework for enhancing design in an evolutionary approach with a dynamic hierarchical structure is presented in this paper. This framework can be used as an evolutionary kernel for building computer-supported design systems. It provides computational components for generating, adapting and exploring alternative design solutions at multiple levels of abstraction with hierarchically structured design representations. In this paper, preliminary experimental results of using this framework in several design applications are presented.
Resumo:
Community development is increasingly using participatory processes that aim to be inclusive and empowering. However, researchers have found that such processes can have contradictory effects. Australian research has highlighted the significant leadership of rural women in sustainable community and economic development and in the adoption of new communication technologies such as the Internet. A focus on gender in participatory development may therefore lead to more effective programs and policies. This chapter outlines an interdisciplinary feminist framework for critically evaluating the participation and empowerment of rural women. This framework was found effective in evaluating an Australian project that aimed to enhance rural women’s access to communication technologies and to empower its participants. Its multiple theoretical and methodological approaches are outlined. The framework advocates an analysis of diversity and difference and the macro and micro contexts. Some principles and strategies for rural women’s inclusion, participation, empowerment, and for participatory feminist evaluation are outlined.
Resumo:
Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.
Resumo:
The lack of satisfactory consensus for characterizing the system intelligence and structured analytical decision models has inhibited the developers and practitioners to understand and configure optimum intelligent building systems in a fully informed manner. So far, little research has been conducted in this aspect. This research is designed to identify the key intelligent indicators, and develop analytical models for computing the system intelligence score of smart building system in the intelligent building. The integrated building management system (IBMS) was used as an illustrative example to present a framework. The models presented in this study applied the system intelligence theory, and the conceptual analytical framework. A total of 16 key intelligent indicators were first identified from a general survey. Then, two multi-criteria decision making (MCDM) approaches, the analytic hierarchy process (AHP) and analytic network process (ANP), were employed to develop the system intelligence analytical models. Top intelligence indicators of IBMS include: self-diagnostic of operation deviations; adaptive limiting control algorithm; and, year-round time schedule performance. The developed conceptual framework was then transformed to the practical model. The effectiveness of the practical model was evaluated by means of expert validation. The main contribution of this research is to promote understanding of the intelligent indicators, and to set the foundation for a systemic framework that provide developers and building stakeholders a consolidated inclusive tool for the system intelligence evaluation of the proposed components design configurations.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
Resumo:
The construction industry is dynamic in nature. The concept of project success has remained ambiguously defined in the construction industry. Project success means different things to different people. While some authors consider time, cost and quality as the predominant targets, others suggest that success is something more complex. The aim of this report is to develop a framework for measuring success of construction projects. A range of Key Performance Indicators (KPIs), measured both objectively and subjectively is developed. The identification of KPIs helps set a benchmark for measuring the performance of a construction project and provides significant insights into developing a general and comprehensive base for further research.
Resumo:
Ethnography has gained wide acceptance in the industrial design profession and curriculum as a means of understanding the user. However, there is considerable confusion about the particularities of its practice accompanied by the absence of an interoperable vocabulary. The consequent interdisciplinary effort is a power play between disciplines whereby the methodological view of ethnography marginalises its theoretical and analytical components. In doing so, it restricts the potential of ethnography suggesting the need for alternative methods of informing the design process. This article suggests that activity theory, with an emphasis on human activity as the fundamental unit of study, is an appropriate methodology for the generation of user requirements. The process is illustrated through the adaptation of an ethnographic case study, for the design of classroom furniture in India.
Resumo:
This document outlines a framework that could be used by government agencies in assessing policy interventions aimed at achieving social outcomes from government construction contracts. The framework represents a rational interpretation of the information gathered during the multi-outcomes construction policies project. The multi-outcomes project focused on the costs and benefits of using public construction contracts to promote the achievement of training and employment and public art objectives. The origin of the policy framework in a cost-benefit appraisal of current policy interventions is evidenced by its emphasis on sensitivity to policy commitment and project circumstances (especially project size and scope).The quantitative and qualitative analysis conducted in the multi-outcomes project highlighted, first, that in the absence of strong industry commitment to policy objectives, policy interventions typically result in high levels of avoidance activity, substantial administrative costs and very few benefits. Thus, for policy action on, for example, training or local employment to be successful compliance issues must be adequately addressed. Currently it appears that pre-qualification schemes (similar to the Priority Access Scheme) and schemes that rely on measuring, for example, the training investments of contractors within particular projects do not achieve high levels of compliance and involve significant administrative costs. Thus, an alternative is suggested in the policy framework developed here: a levy on each public construction project – set as a proportion of the total project costs. Although a full evaluation of this policy alternative was beyond the scope of the multi-outcomes construction policies project, it appears to offer the potential to minimize the transaction costs on contractors whilst enabling the creation of a training agency dedicated to improving the supply of skilled construction labour. A recommendation is thus made that this policy alternative be fully researched and evaluated. As noted above, the outcomes of the multi-outcomes research project also highlighted the need for sensitivity to project circumstances in the development and implementation of polices for public construction projects. Ideally a policy framework would have the flexibility to respond to circumstances where contractors share a commitment to the policy objectives and are able to identify measurable social outcomes from the particular government projects they are involved in. This would involve a project-by-project negotiation of goals and performance measures. It is likely to only be practical for large, longer term projects.
Resumo:
Australia’s civil infrastructure assets of roads, bridges, railways, buildings and other structures are worth billions of dollars. Road assets alone are valued at around A$ 140 billion. As the condition of assets deteriorate over time, close to A$10 billion is spent annually in asset maintenance on Australia's roads, or the equivalent of A$27 million per day. To effectively manage road infrastructures, firstly, road agencies need to optimise the expenditure for asset data collection, but at the same time, not jeopardise the reliability in using the optimised data to predict maintenance and rehabilitation costs. Secondly, road agencies need to accurately predict the deterioration rates of infrastructures to reflect local conditions so that the budget estimates could be accurately estimated. And finally, the prediction of budgets for maintenance and rehabilitation must provide a certain degree of reliability. A procedure for assessing investment decision for road asset management has been developed. The procedure includes: • A methodology for optimising asset data collection; • A methodology for calibrating deterioration prediction models; • A methodology for assessing risk-adjusted estimates for life-cycle cost estimates. • A decision framework in the form of risk map
Resumo:
The aim of this project is to develop a systematic investment decision-making framework for infrastructure asset management by incorporation economic justification, social and environmental consideration in the decision-making process. This project assesses the factors that are expected to provide significant impacts on the variability of expenditures. A procedure for assessing risk and reliability for project investment appraisals will be developed. The project investigates public perception, social and environmental impacts on road infrastructure investment. This research will contribute to the debate about how important social and environmental issues should be incorporated into the investment decision-making process for infrastructure asset management.