22,558 research outputs found
Bridging the gap between design and implementation of components libraries
Object-oriented design is usually driven by three main reusability principles:
step-by-step design, design for reuse and design with reuse. However, these
principles are just partially
applied to the subsequent object-oriented implementation, often due to efficienc
y
constraints, yielding to a gap between design and implementation. In this paper
we provide a solution for bridging this gap for a concrete framework, the one of
designing and implementing container-like component libraries, such as STL, Booc
h
Components, etc. Our approach is based on a new design pattern together with its
corresponding implementation. The proposal enhances the same principles that
drive the design process: step-by--step implementation (adding just what is
needed in every step), implementation with reuse (component implementations are
reused while library implementation
progresses and component hierarchies grow) and implementation for reuse
(intermediate component implementations can be reused in many different points o
f
the hierarchy). We use our approach in two different manners: for building a
brand-new container-like
component library, and for reengineering an existing one, Booch Components in
Ada95.Postprint (published version
Recommended from our members
Knowledge management: Using a knowledge requirements framework to enhance UK health sector supply chains
The gaps of mismatch both knowledge and understanding of beneficiaries and solution providers at the
initial stage of developing projects have led to the failures of many projects including supply chains
(SC) and related information technology systems (ITS) projects (Lyytinen and Hirschheim, 1987) . The
aims of this paper are first, to address theoretical framework by bridging the gaps of different types of
knowledge. Second, to establishing business requirements and the flow of information in supply chains
between beneficiaries and solution providers in the long and complicated supply chains of the UKâs
Health Sector. On the basis of brief introduction to knowledge, knowledge management and supply
chain, the paper presents a practical framework that has been developed through critical and relevant
literatures in the above three subject areas. Techniques and Tools stem from both management science
and information systems were used to provide a possible solution for the problem in bridging the gaps
of mismatch knowledge and understanding at the initial stage of identifying requirements in projects
through knowledge sharing and transfer
Research versus practice in quality improvement? Understanding how we can bridge the gap
The gap between implementers and researchers of quality improvement (QI) has hampered the degree and speed of change needed to reduce avoidable suffering and harm in health care. Underlying causes of this gap include differences in goals and incentives, preferred methodologies, level and types of evidence prioritized and targeted audiences. The Salzburg Global Seminar on 'Better Health Care: How do we learn about improvement?' brought together researchers, policy makers, funders, implementers, evaluators from low-, middle- and high-income countries to explore how to increase the impact of QI. In this paper, we describe some of the reasons for this gap and offer suggestions to better bridge the chasm between researchers and implementers. Effectively bridging this gap can increase the generalizability of QI interventions, accelerate the spread of effective approaches while also strengthening the local work of implementers. Increasing the effectiveness of research and work in the field will support the knowledge translation needed to achieve quality Universal Health Coverage and the Sustainable Development Goals.Fil: Hirschhorn, Lisa R.. Northwestern University; Estados UnidosFil: Ramaswamy, Rohit. University of North Carolina; Estados UnidosFil: Devnani, Mahesh. Post Graduate Institute of Medical Education & Research; IndiaFil: Wandersman, Abraham. University Of South Carolina; Estados UnidosFil: Simpson, Lisa A.. Academy Health; Estados UnidosFil: Garcia Elorrio, Ezequiel. Consejo Nacional de Investigaciones CientĂficas y TĂ©cnicas; Argentina. Instituto de Efectividad ClĂnica y Sanitaria; Argentin
Maintenance Knowledge Management with Fusion of CMMS and CM
Abstract- Maintenance can be considered as an information, knowledge processing and management system. The management of knowledge resources in maintenance is a relatively new issue compared to Computerized Maintenance Management Systems (CMMS) and Condition Monitoring (CM) approaches and systems. Information Communication technologies (ICT) systems including CMMS, CM and enterprise administrative systems amongst others are effective in supplying data and in some cases information. In order to be effective the availability of high-quality knowledge, skills and expertise are needed for effective analysis and decision-making based on the supplied information and data. Information and data are not by themselves enough, knowledge, experience and skills are the key factors when maximizing the usability of the collected data and information. Thus, effective knowledge management (KM) is growing in importance, especially in advanced processes and management of advanced and expensive assets. Therefore efforts to successfully integrate maintenance knowledge management processes with accurate information from CMMSs and CM systems will be vital due to the increasing complexities of the overall systems.
Low maintenance effectiveness costs money and resources since normal and stable production cannot be upheld and maintained over time, lowered maintenance effectiveness can have a substantial impact on the organizations ability to obtain stable flows of income and control costs in the overall process. Ineffective maintenance is often dependent on faulty decisions, mistakes due to lack of experience and lack of functional systems for effective information exchange [10]. Thus, access to knowledge, experience and skills resources in combination with functional collaboration structures can be regarded as vital components for a high maintenance effectiveness solution.
Maintenance effectiveness depends in part on the quality, timeliness, accuracy and completeness of information related to machine degradation state, based on which decisions are made. Maintenance effectiveness, to a large extent, also depends on the quality of the knowledge of the managers and maintenance operators and the effectiveness of the internal & external collaborative environments. With emergence of intelligent sensors to measure and monitor the health state of the component and gradual implementation of ICT) in organizations, the conceptualization and implementation of E-Maintenance is turning into a reality. Unfortunately, even though knowledge management aspects are important in maintenance, the integration of KM aspects has still to find its place in E-Maintenance and in the overall information flows of larger-scale maintenance solutions. Nowadays, two main systems are implemented in most maintenance departments: Firstly, Computer Maintenance Management Systems (CMMS), the core of traditional maintenance record-keeping practices that often facilitate the usage of textual descriptions of faults and actions performed on an asset. Secondly, condition monitoring systems (CMS). Recently developed (CMS) are capable of directly monitoring asset components parameters; however, attempts to link observed CMMS events to CM sensor measurements have been limited in their approach and scalability. In this article we present one approach for addressing this challenge. We argue that understanding the requirements and constraints in conjunction - from maintenance, knowledge management and ICT perspectives - is necessary. We identify the issues that need be addressed for achieving successful integration of such disparate data types and processes (also integrating knowledge management into the âdata typesâ and processes)
Recommended from our members
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU states, and they all fall short in precision and usability. As the physical memory of a VM always exists in all these applications, in this article, we present OS-Sommelier+, a multi-aspect, memory exclusive approach for precise and robust guest OS fingerprinting in the cloud. It works as follows: given a physical memory dump of a guest OS, OS-Sommelier+ first uses a code hash based approach from kernel code aspect to determine the guest OS version. If code hash approach fails, OS-Sommelier+ then uses a kernel data signature based approach from kernel data aspect to determine the version. We have implemented a prototype system, and tested it with a number of Linux kernels. Our evaluation results show that the code hash approach is faster but can only fingerprint the known kernels, and data signature approach complements the code signature approach and can fingerprint even unknown kernels
Costs and benefits of multiple levels of models in MDA development
In Model-Driven Architecture (MDA) development, models of a distributed application are carefully defined so as to remain stable in face of changes in technology platforms. As we have argued previously in [1, 3], models in MDA can be organized into different levels of platformindependence. In this paper, we analyze the costs and benefits of maintaining separate levels of models with transformations between these levels. We argue that the number of levels of models and the degree of automation of transformations between these levels depend on a number of design goals to be balanced, including those of maximizing the efficiency of the design process and maximizing the reusability of models and transformations
Costs, Benefits and Value Distribution â Ingredients for Successful Cross-Organizational ES Business Cases
This paper introduces my PhD research project on developing guidelines for creating successful business cases for Enterprise System implementations in network settings. Three important aspects that were found to be important in such business cases are: the costs, benefits and the value distribution within a network. Each of the three aspects is addressed in this paper and the relationships between them are pointed out. A research model is presented showing how all three aspects contribute to the main goal of defining successful business case guidelines
Blogging to express self and social identities, any one?
Blogging has fast emerged as an unparalleled social computing phenomenon not to be ignored. This paper begins by reviewing the motivation factors for blogging identified in the extant literature. These factors can be broadly classified as either activities-based or behavioral-based. We then propose that a root motivation factor based on the theoretical underpinnings of self identity and social identity can better explain blogging motivation compared to the existing factors. Specifically, we posit that individuals could be receptive toward a migration of their real world self and social identities to the online virtual blog environment and thereby cumulates in the formation of blogger virtual identities. Blogger virtual identities is conceptualized as a second order formative construct formulated through two first-order reflective subconstructs, namely the virtual self identities and virtual social identities. Drawing on the theory of planned behavior, we propose a virtual identities model of blogging intention to investigate how the blogger virtual identities can lead to blogging intention and actual blogging behaviour. A two-stage research methodology consisting of a qualitative content analysis and followed by a survey is also proposed. We conclude with a brief discussion on the potential theoretical and practical contributions of this paper
- âŠ