239 research outputs found

    Digital Conservation and Access: Saving Humanity's History in the Petabyte Age

    Full text link
    [ES] We are at a unique point in history, the cusp of a Digital Dark Age, where cultural heritage professionals must work to care for the physical past while assuring that there will be a digital Rosetta Stone for future generations. This contribution describes the state-of-the-field in digital preservation and access, and is a call to action for individuals and institutions alike to work beyond our comfort zones and competitive boundaries in order to help define a sustainable digital future. Defined as an “hourglass of participation”, I describe a method where knowledge producers, curators and consumers interact and actively work to make content born-archival and long-term viable, semantically managed and ready for reuse and public disseminationAshley, M. (2010). Digital Conservation and Access: Saving Humanity's History in the Petabyte Age. Virtual Archaeology Review. 1(1):9-12. https://doi.org/10.4995/var.2010.4748OJS91211ANDERSON, C, 2008. The End of Theory: The Data Deluge Makes the Scientific Method Obsolete. Wired Magazine, [Online]. (Updated 6/23/2008), Available at: http://www.wired.com/science/discoveries/magazine/16-07/pb_theory, [accessed 8/30/2008]Archaeology Data Service, 2007. Digital Preservation FAQ. [Online]. (Updated 4/29/2008), Available at: http://ads.ahds.ac.uk/project/faq.html, [accessed 6/30/2008]BAILEY, C, 2008. Institutional Repositories, Tout de Suite. [Online]., Available at: http://www.digital-scholarship.com/ts/irtoutsuite.pdf, [accessed 8/28/2008]BARKSDALE, J, 2007. Saving Our Digital Heritage. Washington Post, [Online]. (Updated 5/16/2007), Available at: http://www.washingtonpost.com/wp-dyn/content/article/2007/05/15/AR2007051501873.html, [accessed 8/6/2008]BRAND, S, 2003. Escaping the Digital Dark Age. Library Journal, [Online]., Available at: http://www.rense.com/general38/escap.htm, [accessed 8/1/2008]CNN, 2007. Third undersea Internet cable cut in Mideast. [Online]. (Updated 2/1/2008), Available at: http://www.cnn.com/2008/WORLD/meast/02/01/internet.outage/?iref=hpmostpop, [accessed 8.1.2008]GOMEZ, M et al. San Jose police: Sabotage caused phone outage in Santa Clara, Santa Cruz counties. San Jose Mercury News, [Online]. (Updated 4/9/2009), Available at ttp://www.mercurynews.com/topstories/ci_12106300?nclick_check=1, [accessed 4/9/2009]GORMAN, Siobhan. Electricity Grid in U.S. Penetrated By Spies. [Online]. (Updated 4/9/2009), Available at http://online.wsj.com/article/SB123914805204099085.html, [accessed 4/9/2009]MULVENNEY, N, 2008. IOC admits Internet censorship deal with China. Reuters. [Online]. (Updated 7/30/2008), Available at: http://yro.slashdot.org/article.pl?sid=08/07/30/1551211&from=rss, [accessed 8/27/2008]The Long Now Foundation, 2008. About. [Online]. Available at: http://www.longnow.org/about, [accessed 6/30/2008]WITTMAN, N, 2008. About Open Knowledge and the Public Interest (OKAPI). [Online]. Available at: http://okapi.wordpress.com/, [accessed 8/28/2008

    Architecting system of systems: artificial life analysis of financial market behavior

    Get PDF
    This research study focuses on developing a framework that can be utilized by system architects to understand the emergent behavior of system architectures. The objective is to design a framework that is modular and flexible in providing different ways of modeling sub-systems of System of Systems. At the same time, the framework should capture the adaptive behavior of the system since evolution is one of the key characteristics of System of Systems. Another objective is to design the framework so that humans can be incorporated into the analysis. The framework should help system architects understand the behavior as well as promoters or inhibitors of change in human systems. Computational intelligence tools have been successfully used in analysis of Complex Adaptive Systems. Since a System of Systems is a collection of Complex Adaptive Systems, a framework utilizing combination of these tools can be developed. Financial markets are selected to demonstrate the various architectures developed from the analysis framework --Introduction, page 3

    Taming the Business Cycles in Commercial Aviation: Trade-space analysis of strategic alternatives using simulation modeling

    Get PDF
    We investigate the effectiveness of strategic alternatives that are designed to dampen the cyclicality manifest in the commercial aviation related industries. The constituent enterprises of the commercial aviation system exhibit managerial and operational independence and have diverse value functions that often viewed the enterprises to view their competition as a zero-sum game. We argue that this need not always be the case; in the commercial aviation system both airline and airframe manufacturers constituents would benefit from a steadier influx of aircraft that counters the current situation that is characterized by relatively stable demand growth rate for air travel while airline profitability and aircraft ordering fluctuate intensely. In order to identify and evaluate the symbiotic potential, we use a system dynamics model of commercial aviation. After testing several individual strategic alternatives, we find that capacity management is key to cycle moderation for non-collusive strategies. Comparing faster aircraft deliveries to semi-fixed production schedules among other alternatives shows only the latter alternative to be Pareto efficient

    System level risk analysis of electromagnetic environmental effects and lightning effects in aircraft -- steady state and transient

    Get PDF
    2017 Summer.Includes bibliographical references.This dissertation is an investigation of the system level risk of electromagnetic and lightning effects in aircraft. It begins with an analysis to define a system, and a discussion of emergence as a characteristic of a system. Against this backdrop, risk is defined as an undesirable emergent property of a system. A procedure to translate the system level non-functional attributes to lower level functional requirements is developed. With this foundation, a model for risk analysis, resolution and management is developed by employing the standard risk model. The developed risk model is applied to evaluation of electromagnetic environmental effects and lightning effects in aircraft. Examples are shown to demonstrate the validity of the model. Object Process Methodology and systems thinking principles are used extensively throughout this work. The dissertation concludes with a summary and suggestions for additional work

    Smart agriculture for optimizing photosynthesis using internet of things and fuzzy logic

    Get PDF
    Photosynthesis is a process that plants need. Plant growth requires sunlight to carry out photosynthesis. At night photosynthesis cannot be carried out by plants. This research proposes an internet of things (IoT) model that can work intelligently to maximize photosynthesis and plant growth using fuzzy logic. The plants used in this research are mustard plants because mustard plants are plants that have broad leaves and require more photosynthesis. The outputs of this proposed model are the activation of light emitting diodes (LED) lights and automatic watering based on input sensors such as soil moisture, temperature, and light intensity which are processed with fuzzy logic. The results show that the use of the IoT model that has been proposed can provide faster and better growth of mustard plants compared with mustard plants without an IoT system and fuzzy logic. This result is also strengthened by comparing the t-test between the two groups, with a significant 95% confidence level. The proposed model in this research is also compared with similar research models carried out previously. This research resulted in a plant height difference of 30.43% higher than the previous research. So, it can conclude that the proposed model can accelerate the growth of mustard plants

    Report of the Stanford Linked Data Workshop

    No full text
    The Stanford University Libraries and Academic Information Resources (SULAIR) with the Council on Library and Information Resources (CLIR) conducted at week-long workshop on the prospects for a large scale, multi-national, multi-institutional prototype of a Linked Data environment for discovery of and navigation among the rapidly, chaotically expanding array of academic information resources. As preparation for the workshop, CLIR sponsored a survey by Jerry Persons, Chief Information Architect emeritus of SULAIR that was published originally for workshop participants as background to the workshop and is now publicly available. The original intention of the workshop was to devise a plan for such a prototype. However, such was the diversity of knowledge, experience, and views of the potential of Linked Data approaches that the workshop participants turned to two more fundamental goals: building common understanding and enthusiasm on the one hand and identifying opportunities and challenges to be confronted in the preparation of the intended prototype and its operation on the other. In pursuit of those objectives, the workshop participants produced:1. a value statement addressing the question of why a Linked Data approach is worth prototyping;2. a manifesto for Linked Libraries (and Museums and Archives and …);3. an outline of the phases in a life cycle of Linked Data approaches;4. a prioritized list of known issues in generating, harvesting & using Linked Data;5. a workflow with notes for converting library bibliographic records and other academic metadata to URIs;6. examples of potential “killer apps” using Linked Data: and7. a list of next steps and potential projects.This report includes a summary of the workshop agenda, a chart showing the use of Linked Data in cultural heritage venues, and short biographies and statements from each of the participants
    • …
    corecore