首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
The idea that so-called ‘best’ business practices can be transferred to organizations when they purchase enterprise resource planning (ERP) software packages is a major selling point of these packages. Yet recent research has illustrated a gap between the espoused theory of a best practice solution and the theory-in-use experienced by those who install software with such a design. As researchers begin to examine the difficult process by which organizations recast the best practices model handed down to them by consultancies and software vendors in an effort to make the software ‘work for them’ in practice, it is equally important that we begin to understand the reasons that such a gap exists. To this end, we analyze the strategic partnership between a multinational software vendor and a university who together designed a ‘best practice’ ERP package for the higher education industry. Through the theoretical lens of ‘epistemic cultures’ we argue that in organizational contexts made up of more than one epistemic culture, the use of a best practice model will be problematic because, by definition, the model mandates one epistemological position through the software design. This is counter to a university's loosely coupled organizational form.  相似文献   

2.
The general mixed μ problem has been shown to be NP hard, so that the exact solution of the general problem is computationally intractable, except for small problems. In this paper we consider not the general problem, but a particular special case of this problem, the rank one mixed μ problem. We show that for this case the mixed μ problem is equivalent to its upper bound (which is convex), and it can in fact be computed easily (and exactly). This special case is shown to be equivalent to the so-called ‘affine parameter variation’ problem (for a polynomial with perturbed coefficients) which has been examined in detail in the literature, and for which several celebrated ‘Kharitonov-type’ results have been proven.  相似文献   

3.
The ‘design for all’ philosophy promotes the development of products that meet the requirements of a broader section of the population, including those who are older or disabled, to minimise the need for bespoke designs and individual customisations. Such an approach begins to meet the needs of a population containing an ever increasing proportion of these excluded groups, whilst providing opportunities to manufacturers to maximise the available market for any given product.Most design activity embodies some form of task analysis that involves identifying users and the tasks they perform. Computer based human modelling systems are becoming increasingly important in this task analysis role combined with the established ergonomics technique of fitting trials, in which a product or environment is evaluated through trials using a carefully selected user group.This research addresses the lack of existing data necessary for the accurate representation of human form and capability in the older and disabled populations for use in these modelling systems. A small-scale survey is being undertaken to collect this important information. In addition, existing modelling systems in this area rely on expert ergonomics knowledge in performing task based analysis, which in addition can be a time consuming and repetitive task. Methods are being developed to streamline this process and to place the emphasis on good design and ergonomics principles as opposed to ‘driving’ the system. These methods involve the development of a simplified process for computer based task analysis and a means of determining the percentage accommodated by any given design.Further research will eventually focus on extending the data collection, refining the task model and look at a means of suggesting design solutions in response to the analysis results.  相似文献   

4.
As biometric systems are deployed within security systems, or as part of identification programs, implementation issues relating to security and privacy need to be considered. The role of a biometric system is to recognize (or not) an individual through specific physiological or behavioral traits. The use of the word ‘recognize’ is significant — defined in the Oxford Dictionary as “identify as already known”. In other words, a biometric system does not establish the identity of an individual in any way, it merely recognizes that they are who they say they are (in a verification or a ‘positive identification’ system), or that they were not previously known to the system (in a ‘negative identification’ system, for example, to avoid double enrollment in a welfare system). This tie between the actual identity of an individual and the use of biometrics is subtle and provokes much debate, particularly relating to privacy and other societal issues. This paper seeks to clarify come of these issues by providing a framework, and by distinguishing between technology and societal issues.  相似文献   

5.
This paper presents a version of the well-known Sontag’s ‘input-to-state-stability’ property for stochastic systems. This concept is used to derive sufficient conditions for global stabilization for certain class of stochastic nonlinear systems by means of static and dynamic output feedback.  相似文献   

6.
This study aims at highlighting the collaborative activity of two high school students (age 14) in the cases of modeling the complex biological process of plant growth with two different tools: the ‘paper & pencil’ concept mapping technique and the computer-supported educational environment ‘ModelsCreator’. Students’ shared activity in both cases is carried out in the presence of a facilitator providing technical as well as cognitive support when necessary. The objective of the study is to highlight the ways in which the collaborating students are engaged in the plant growth modeling activity in the two cases and also identify the activity’s similar and different aspects in each one. Our analysis is carried out on two complementary axes, the first of which concerns the process of collaboratively creating a plant growth model with each different tool, while the second has to do with the students’ conceptualizations of the biological aspect of the modeling task in each case. A two-level analytic tool for the modeling process has been derived within the theoretical framework of ‘activity theory’ on the basis of the OCAF scheme for basic modeling operations and the scheme of Stratford et al. [Stratford, S. J., Krajcik, J., & Soloway, E. (1998). Secondary students’ dynamic modeling processes: analyzing, reasoning about, synthesizing, and testing models of stream ecosystems. Journal of Science Education and Technology, 7(3), 215–234.] for higher-order modeling actions. According to our results, four major modeling actions (analysis, synthesis, testing-interpreting, technical and cognitive support) performed through a plethora of modeling operations define the steps of the modeling process in both cases, while specific qualitative differences can be actually identified. Finally, the students’ conceptualizations of the biological aspect of the modeling task in the two-case activity is analyzed in regard with their capability of shifting reasoning between macro- and micro-levels, while educational implications are also discussed.  相似文献   

7.
A particular ‘hot’ issue is outlined and the general state of wireless security is scrutinised. It appears that we still have some way to go before this topic is exhausted. Starting with a history of some of the more defining wireless surveys in the UK, Europe and the U.S. we then explore the major twists and turns of the wireless evolution bringing us right up to date with a peak at the current trends and future dangers of wireless technology.  相似文献   

8.
Communication and Information Systems (CIS) now form the primary information store, exchange and data analysis for all modern military and are crucial to command and control. The ubiquitousness of CIS within the military not only means that there is a complete reliance on CIS, but also presents new avenues of attack by malicious insiders. Military sources say that the insider threat is their number one security concern. This paper presents a case study of the technical counter measures and processes used to deter, detect and mitigate malicious insider threats that the author has researched, using non-classified anonymous interview and the analysis of anonymised qualitative field data, within a specific military organisation. It is not the intention of the author that this paper be viewed as an analysis of the “current state of play” of threats and countermeasures that generically exist across all military and defence organisations – rather it presents the technological and organisational processes utilised and challenges encountered at one organisation. A short discussion of the Computer Security Incident Response Team (CSIRT) structure adopted to successfully manage insider and other CIS security threats is presented, followed by a more detailed overview of existing and emerging technical efforts to deter, detect and mitigate such malicious insider threats within the military environment under study. Emphasis will be on the emerging technologies such as anomaly detection using real-time e-discovery, enterprise forensics and profiling users “cyber” behaviour and how these integrate into CSIRT technologies and processes. The technical advantages and challenges that such technologies present within a military alliance will be discussed. The success of such technologies in combating current malicious insider threat environment will be briefly compared with those put forward as challenges in the “Research on mitigating the insider threat to information systems #2” workgroup which took place in 2000 (Anderson et al., 2000.). In closing the author introduce the concept of Stateful Object Use Consequence Analysis as a way of managing the insider threat.  相似文献   

9.
Annotation can be a valuable exercise when trying to understand new information. The technique can be used to create a ‘condensed’ version of the original information for later review and to add additional information into the existing document. The growth in web-based learning materials and information sources has created requirement for systems that allow annotations to be attached to these new sources and, potentially, shared with other learners. This paper discusses annotation in an educational context and introduces some of the web annotation systems currently available. It also provides an overview of the development of a new system, eLAWS, by the authors, based upon the Web Service architecture. Finally, the paper provides suggestions for the future development of e-Learning Annotation tools.  相似文献   

10.
This paper deals with the global stabilization problem for nonlinear system using state detection. Sufficient algebraic conditions for stabilization and detectability concerning particular classes of systems are included. These conditions are based to a version of a Lyapunov-like condition proposed by Sontag, which guarantees ‘input to state stability’.  相似文献   

11.
We show that the Lyapunov function used in backstepping feedback designs for uncertain nonlinear systems leads to unnecessarily ‘hard’ control laws having undesirable high-gain properties. We present a new Lyapunov function and use it to design ‘softer’ control laws which exhibit the high-gain properties to a much lesser extent. We show that the ‘soft’ designs eliminate the chattering exhibited by the ‘hard’ designs and achieve the same or better performance with less control effort.  相似文献   

12.
The purpose of this paper is an amelioration of the ‘product form of the inverse’ related to the revised simplex method. We give an algorithm to compute the inverse of the current basic matrix. This calculation requires approximately m2 operations by using a tensor product and matrix addition. We apply this idea to the Gauss and Gauss–Jordan algorithms.  相似文献   

13.
A programming system for synchronous parallel processors, like the DPP-84 working in synchronous mode, is proposed. In EPS a program consists of a collection of well-defined and separate units, described in a conventional procedure-oriented language like PASCAL or MODULA-2. The connection between the ‘elementary’ program units is laid in a supervisory ‘configuration’ program, which defines both the spatial and time relations between the units. The concept of ‘virtual’ parallel processing is introduced, which enables the construction of logical parallel programs, independent of the number of processing elements actually available.  相似文献   

14.
In order to perform business modelling as apart of information systems development, there is a need for frameworks and methods. The paper proposes a framework for business interaction based on a language/action perspective. The framework is an architecture of five generic layers. The first layer concept is ‘business act’, which functions as the basic unit of analysis. The following four layer concepts are ‘action pair’, ‘exchange’, ‘business transaction’, and ‘transaction group’. The framework is inspired by a similar framework constructed by Weigand et al. The paper makes a critical examination of this framework as a basis for the proposed framework.  相似文献   

15.
We outline an alternative model of the interface in HCI, the ‘intraface’, in response to design issues arising from navigational and learning problems in hypertext domains. Ours is a model of general application to computer systems. It is composed of four key elements, identifiable within a dynamic interconnected context. These are the user; his/her interests; the tools employed and the ‘ensemble’ of representations brought to bear. In this paper we sketch the present shortcomings of HCI design before outlining the background for the model which draws upon two themes in contemporary psychology, conversational analysis and ‘affordance’ realist theories in perception. This framework allows for the development of principles of cooperation, user engagement and learning in HCI environments.  相似文献   

16.
Recently Organon installed automated screening and plate preparation systems for its research facilities in Oss (The Netherlands) and Newhouse (UK). These robotic systems have been developed in close collaboration between Organon and Scitec Laboratory Automation (Lausanne, Switzerland), now part of the Zymark corporation.Each of the systems consists of three linear track robots, one of which performs the screening process using standard peripherals. The other two robots take care of the plate preparation and ‘cherry-picking’ procedures. To this end, copies of our total mother plate collection are stored under controlled conditions in Scitec plate stackers (AutoStack) that can be addressed by one of the two robots. The system is designed in such a way that the loading and refreshment of the on-line storage, screening-plate preparation, and ‘cherry-picking’ can be executed automatically in 24 hours operation.  相似文献   

17.
The article will present some possible explanations of the difficulty to bridge research and practice in the domain of risk management. A first block of reasons has to do with the very content of the analyses themselves. Of great importance is also the time chosen for them to be carried out. The second argument will bring to the foreground the difficulty for a lot of fruitful research to permeate into management spheres. One way to reconcile experts, scholars and decision makers may come from new attention devoted to organisational design and formal structures. This calls for the study of normal operations as opposed to relying too exclusively on accident cases and crisis situations. We believe that this perspective can help us improve our level of understanding of complex organisations, because it focuses on the duality of organisational life: the dark side and the bright side, always tightly coupled.  相似文献   

18.
Advances in the field of automation have meant hitherto complex manual cell-based assays can now be automated. These improvements have brought significant enhancements in throughput, data fidelity and consistency, and allowed a reallocation of constrained resources.Building upon these improvements, we have linked our automated cell-based screening system, Assay Platform™, to Activity Base (IDBS), a software package designed to automate the analysis of HTS data. Customisation of this package has resulted in software that can identify ‘active’ compounds and re-pick them ‘on the fly’ from the original compound plates for triplicate re-testing without operator intervention.Based on an operator initially defining ‘normal’ parameters for assay activity in Activity Base, combined with an automated quality control software module that checks data fidelity, wells containing ‘active’ compounds can be re-picked and re-tested at the end of an automated screening run. Automating cell-based assays has significantly improved productivity, and, with the synergism of Activity Base, has given us greater power to complete each screening run and report ‘active’ compounds to Chemistry more rapidly. This article presents our approach to the automation of cell-based Fluorescent Imaging Plate Reader (FLIPR) screening together with automated active re-test confirmation using Activity Base.  相似文献   

19.
This paper unpacks the black box of the IS development process and, thereby, helps business and IT managers understand better its complexity. The Critical Success Factors (CSF) concept was employed for this purpose in an in-depth study of four diverse systems development projects in a large telecommunications company. Unlike previous applications of the CSF method, the approach adopted in this study facilitated the identification of both ‘generic’ and ‘collective’ CSFs in order to map the network of interrelationships between them. Thus the findings shed new light on the process by which information systems are developed by illustrating empirically its complex multidimensional nature and by providing fresh insights into the challenges facing both developers and users in their task of developing organisational IS.  相似文献   

20.
There are large and surprising gaps between the diffusion of Geographical Information Systems (GIS) in European countries. Whereas in some countries, notably in the United Kingdom and the Netherlands, GIS technology has already become standard practice in cartography, local land management, and planning, other countries have been extremely slow in adopting the new technology. This paper discusses why this is so. The hypothesis is that national land information traditions determine the institutional environment and procedures into which the new technology needs to be integrated, and that this restricts the transfer of ‘universal’ GIS software developed in different national settings. The paper ends by drawing some conclusions out of this for a European GIS research agenda.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号