914 resultados para ARTIFACTS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Process modeling is a complex organizational task that requires many iterations and communication between the business analysts and the domain specialists. The challenge of process modeling is exacerbated, when the process of modeling has to be performed in a cross-organizational, distributed environment. In this paper we suggest a 3D environment for collaborative process modeling, using Virtual World technology. Design/methodology/approach We suggest a new collaborative process modeling approach based on Virtual World technology. We describe the design of an innovative prototype collaborative process modeling approach, implemented as a 3D BPMN modeling environment in Second Life. We use a case study to evaluate the suggested approach. Findings Based on our case study application, we show that our approach increases user empowerment and adds significantly to the collaboration and consensual development of process models even when the relevant stakeholders are geographically dispersed. Research limitations implications – We present design work and a case study. More research is needed to more thoroughly evaluate the presented approach in a variety of real-life process modeling settings. Practical implications Our research outcomes as design artifacts are directly available and applicable by business process management professionals and can be used by business, system and process analysts in real-world practice. Originality/value Our research is the first reported attempt to develop a process modeling approach on the basis of virtual world technology. We describe a novel and innovative 3D BPMN modeling environment in Second Life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for computers and human operators to identify individuals from these videos. To overcome this problem, super-resolution can be used in conjunction with an automated face recognition system to enhance the spatial resolution of video frames containing the subject and narrow down the number of manual verifications performed by the human operator by presenting a list of most likely candidates from the database. As the super-resolution reconstruction process is ill-posed, visual artifacts are often generated as a result. These artifacts can be visually distracting to humans and/or affect machine recognition algorithms. While it is intuitive that higher resolution should lead to improved recognition accuracy, the effects of super-resolution and such artifacts on face recognition performance have not been systematically studied. This paper aims to address this gap while illustrating that super-resolution allows more accurate identification of individuals from low-resolution surveillance footage. The proposed optical flow-based super-resolution method is benchmarked against Baker et al.’s hallucination and Schultz et al.’s super-resolution techniques on images from the Terrascope and XM2VTS databases. Ground truth and interpolated images were also tested to provide a baseline for comparison. Results show that a suitable super-resolution system can improve the discriminability of surveillance video and enhance face recognition accuracy. The experiments also show that Schultz et al.’s method fails when dealing surveillance footage due to its assumption of rigid objects in the scene. The hallucination and optical flow-based methods performed comparably, with the optical flow-based method producing less visually distracting artifacts that interfered with human recognition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Engaging Queensland primary teachers in professional associations can be a challenge, particularly for subject-specific associations. Professional associations are recognised providers of professional learning. By not being involved in professional associations primary teachers are missing potential quality professional learning opportunities that can impact the results of their students. The purpose of the research is twofold: Firstly, to provide a thorough understanding of the current context in order to assist professional associations who wish to change from their current level of primary teacher engagement; and secondly, to contribute to the literature in the area of professional learning for primary teachers within professional associations. Using a three part research design, interviews of primary teachers and focus groups of professional association participants and executives were conducted and themed to examine the current context of engagement. Force field analysis was used to provide the framework to identify the driving and restraining forces for primary teacher engagement in professional learning through professional associations. Communities of practice and professional learning communities were specifically examined as potential models for professional associations to consider. The outcome is a diagrammatic framework outlining the current context of primary teacher engagement, specifically the driving and restraining forces of primary teacher engagement with professional associations. This research also identifies considerations for professional associations wishing to change their level of primary teacher engagement. The results of this research show that there are key themes that provide maximum impact if wishing to increase engagement of primary teachers in professional associations. However the implications of this lies with professional associations and their alignment between intent and practice dedicated to this change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a thematic story telling approach which draws on ethnographic method, a grounded theory of protest movement continuity is presented. The grounded theory draws from theories and activist stories relating to the facilitative role of movement networks, social contagion theory and the cultural experience of activism. It highlights the contagious influence of protest networks in maintaining protest continuity over time and how this leads to common perceptions of development risk and opportunity within communities. It also reveals how communities use collective values and identity, social capital, emotional dynamics and symbolic artifacts to maintain protest continuity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business process modeling as a practice and research field has received great attention in recent years. However, while related artifacts such as models, tools or grammars have substantially matured, comparatively little is known about the activities that are conducted as part of the actual act of process modeling. Especially the key role of the modeling facilitator has not been researched to date. In this paper, we propose a new theory-grounded, conceptual framework describing four facets (the driving engineer, the driving artist, the catalyzing engineer, and the catalyzing artist) that can be used by a facilitator. These facets with behavioral styles have been empirically explored via in-depth interviews and additional questionnaires with experienced process analysts. We develop a proposal for an emerging theory for describing, investigating, and explaining different behaviors associated with Business Process Modeling Facilitation. This theory is an important sensitizing vehicle for examining processes and outcomes from process modeling endeavors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the use of visual artifacts to represent a complex adaptive system (CAS). The integrated master schedule (IMS) is one of those visuals widely used in complex projects for scheduling, budgeting, and project management. In this paper, we discuss how the IMS outperforms the traditional timelines and acts as a ‘multi-level and poly-temporal boundary object’ that visually represents the CAS. We report the findings of a case study project on the way the IMS mapped interactions, interdependencies, constraints and fractal patterns in a complex project. Finally, we discuss how the IMS was utilised as a complex boundary object by eliciting commitment and development of shared mental models, and facilitating negotiation through the layers of multiple interpretations from stakeholders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent studies have started to explore context-awareness as a driver in the design of adaptable business processes. The emerging challenge of identifying and considering contextual drivers in the environment of a business process are well understood, however, typical methods used in business process modeling do not yet consider this additional contextual information in their process designs. In this chapter, we describe our research towards innovative and advanced process modeling methods that include mechanisms to incorporate relevant contextual drivers and their impacts on business processes in process design models. We report on our ongoing work with an Australian insurance provider and describe the design science we employed to develop these innovative and useful artifacts as part of a context-aware method framework. We discuss the utility of these artifacts in an application in the claims handling process at the case organization.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Though the value of a process-centred view for the understanding and (re-)design of corporations has been widely accepted, our understanding of the research process in Information Systems (IS) remains superficial. A process-centred view on IS research considers the conduct of a research project as a sequence of activities involving resources, data and research artifacts. As such, it helps to reflect on more effective ways to conduct IS research, to consolidate and compare diverse practices and to complement the focus on research methodologies with research project practices. This paper takes a first step towards the discipline of ‘Research Process Management’ by exploring the features of research processes and by presenting a preliminary approach for research process design that can facilitate modelling IS research. The case study method and the design science research method are used as examples to demonstrate the potential of such reference research process models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Evolutionary biologists are often misled by convergence of morphology and this has been common in the study of bird evolution. However, the use of molecular data sets have their own problems and phylogenies based on short DNA sequences have the potential to mislead us too. The relationships among clades and timing of the evolution of modern birds (Neoaves) has not yet been well resolved. Evidence of convergence of morphology remain controversial. With six new bird mitochondrial genomes (hummingbird, swift, kagu, rail, flamingo and grebe) we test the proposed Metaves/Coronaves division within Neoaves and the parallel radiations in this primary avian clade. Results Our mitochondrial trees did not return the Metaves clade that had been proposed based on one nuclear intron sequence. We suggest that the high number of indels within the seventh intron of the β-fibrinogen gene at this phylogenetic level, which left a dataset with not a single site across the alignment shared by all taxa, resulted in artifacts during analysis. With respect to the overall avian tree, we find the flamingo and grebe are sister taxa and basal to the shorebirds (Charadriiformes). Using a novel site-stripping technique for noise-reduction we found this relationship to be stable. The hummingbird/swift clade is outside the large and very diverse group of raptors, shore and sea birds. Unexpectedly the kagu is not closely related to the rail in our analysis, but because neither the kagu nor the rail have close affinity to any taxa within this dataset of 41 birds, their placement is not yet resolved. Conclusion Our phylogenetic hypothesis based on 41 avian mitochondrial genomes (13,229 bp) rejects monophyly of seven Metaves species and we therefore conclude that the members of Metaves do not share a common evolutionary history within the Neoaves.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this study we have found that NMR detectability of 39K in rat thigh muscle may be substantially higher (up to 100% oftotal tissue potassium) than values previously reported of around 40%. The signal was found to consist of two superimposed components, one broad and one narrow, of approximately equal area. Investigations involving improvements in spectral parameters such as signal-to-noise ratio and baseline roll, together with computer simulations of spectra, show that the quality of the spectra has a major effect on the amount of signal detected, which is largely due to the loss of detectability of the broad signal component. In particular, lower-field spectrometers using conventional probes and detection methods generally have poorer signal-to-noise and worse baseline roll artifacts, which make detection of a broad component of the muscle signal difficult.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, de-regulation in the airline industry and the introduction of low-cost carriers have conspired to produce significant changes in the airport landscape. From an airport operator’s perspective, one of the most notable has been the shift of capital revenue from traditional airline sources (through exclusive use, long term lease arrangements) to passengers (by way of fees collected from ticket sales). As a result of these developments, passengers have become recognized as major stakeholders who have the power to influence airport profitability. This link between passenger satisfaction and profitability has generated industry wide interest in the “passenger experience”. In this paper, we define the factors which influence passenger experience, namely (a) artifacts, (b) services and (c) the terminal building, and explore the challenges that exist in the current approaches to terminal design. On the basis of these insights, we propose a conceptual model of passenger experience, and motivate its use as a framework for further research into improving terminal design from a passenger oriented perspective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, ‘business model’ and ‘business model innovation’ have gained substantial attention in management literature and practice. However, many firms lack the capability to develop a novel business model to capture the value from new technologies. Existing literature on business model innovation highlights the central role of ‘customer value’. Further, it suggests that firms need to experiment with different business models and engage in ‘trail-and-error’ learning when participating in business model innovation. Trial-and error processes and prototyping with tangible artifacts are a fundamental characteristic of design. This conceptual paper explores the role of design-led innovation in facilitating firms to conceive and prototype novel and meaningful business models. It provides a brief review of the conceptual discussion on business model innovation and highlights the opportunities for linking it with the research stream of design-led innovation. We propose design-led business model innovation as a future research area and highlight the role of design-led prototyping and new types of artifacts and prototypes play within it. We present six propositions in order to outline future research avenues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Camp Kilda (CK) is regarded as being a quality early childhood center, and has many features you would typically expect to see in settings across Australia. The children are busily engaged in hands-on activity, playing indoors and outdoors, in the sandpit, under the shade of a big mango tree. The learning environment is planned to offer a variety of activities, including dramatic play, climbing equipment, balls, painting, drawing, clay, books, blocks, writing materials, scissors, manipulative materials. The children are free to access all the materials, and they play either individually or in small groups. The teachers encourage and stimulate the children’s learning, through interactions and thoughtful planning. Learning and assessment at CK is embedded within the cultural and social contexts of the children and their community. Children’s learning is made visible through a rich variety of strategies, including recorded observations, work samples, photographs, and other artifacts. Parents are actively encouraged to build on these “stories” of their children. Planning is based around the teachers’ analysis of the information they gather daily as they interact with the children and their families.