226,686 research outputs found
Introducing the transport impacts of E-business project
E-Business is expected to dramatically change the way business is conducted internationally, nationally, within states and at the local area level. Moreover, these changes are very likely to happen well within the planning time frames required for provision of transport infrastructure and services. This paper introduces a study to investigate: how will the transport task change; what will be affected; and how can the transport system respond? The work, a joint initiative of the National Transport Secretariat [NTS], and the CSIRO/QUT Built Environment Research Alliance, in collaboration with Queensland Department of Public Works, is intended to assist Australian business and government pro-actively address the transport issues arising from e-business. E-commerce is growing exponentially: worldwide e-commerce revenues are estimated to reach $US1300 billion by 2003. Growth in electronic communications within companies which, together with e-commerce between companies, B2B, or between business and consumers, B2C, make up e-business, is even more significant. The magnitude and speed of both these changes increase the urgency of planning, for their impacts provide forecasting challenges. A study approach is described to consider direct impacts from e-business on Australian transport, derived demand for travel or delivery as other businesses prosper and transport related constraints to e-business in the next five to ten years. Base line information collection: includes a review of literature and information about trends in e-business then transport and e-Business; interviews with stakeholder/experts in planning agencies, e-business companies and transport/logistics firms across Australia; appraisal of data available for on-going assessment; and contact with international experts. Trends and impact assessment: National trends will be estimated and very important impacts or very urgent impacts selected via a ranking and rating process. Transport related productivity gains will be assessed; trends in regional Australia and international trends and experience will be reported with a final assessment of opportunities and threats for Australia. Outputs: A series of working papers and final reports; a user friendly database of contacts, publications and data availability information for update; a research framework for identification of policy and planning levers to maximise benefits to Australia from national and global e-business activity
A Semantic Collaboration Method Based on Uniform Knowledge Graph
The Semantic Internet of Things is the extension of the Internet of Things and the Semantic Web, which aims to build an interoperable collaborative system to solve the heterogeneous problems in the Internet of Things. However, the Semantic Internet of Things has the characteristics of both the Internet of Things and the Semantic Web environment, and the corresponding semantic data presents many new data features. In this study, we analyze the characteristics of semantic data and propose the concept of a uniform knowledge graph, allowing us to be applied to the environment of the Semantic Internet of Things better. Here, we design a semantic collaboration method based on a uniform knowledge graph. It can take the uniform knowledge graph as the form of knowledge organization and representation, and provide a useful data basis for semantic collaboration by constructing semantic links to complete semantic relation between different data sets, to achieve the semantic collaboration in the Semantic Internet of Things. Our experiments show that the proposed method can analyze and understand the semantics of user requirements better and provide more satisfactory outcomes
Standardized connectivity and communication for constrained devices
By 2020, an estimated 50 billion devices will be connected to the Internet. This revolution will transform the traditional human-centric internet to an “Internet of Things” (IoT), thereby enabling a whole new range of intelligent services in domains such as manufacturing, health, smart homes, logistics, etc. After introducing the Internet of Things, this talk will discuss the challenges in integrating embedded devices into the Internet, as many of the widely adopted Internet technologies had not been designed for such devices, i.e. devices that have constraints in memory, processing power and energy. We will highlight the latest evolutions in this domain, starting from communication and networking, all the way up to services and semantics. To conclude, we will give a number of examples on how these evolutions have inspired some of our past and ongoing research activities
Making informed choices in social care: the importance of accessible information
The current policy trend is to encourage greater choice in the use of welfare services. To make informed choices, people need information. The process of finding and using information has costs for individuals in terms of effort, time and material resources. These costs are different for different people and impact on their use of information in different ways. Thus, the accessibility of information is important in ensuring those people who need to make choices can do so in an informed way. This paper discusses the importance of information in making informed choices about social support by drawing on the findings of a scoping review of government research and development activity on the accessibility of information about adult social care services. The scoping review was carried out in spring 2006. Details of recent, current and planned projects were obtained through discussions with staff in government departments, government agencies and other related organisations identified using a snowballing technique. Forty-two contacts were made. Eleven research and 36 development projects were identified that aimed to investigate or improve the accessibility of information about social care services. A limited literature search was undertaken on information needs in areas not already under investigation by government. Eighteen articles were identified. Information and helpline staff from six voluntary organisations gave their views on the accessibility of information about social care services. Our findings show that there is no government-related or other recent research evidence on the specific information access needs for some user groups and services, for example, people from ethnic minority groups. For other user groups, such as people with chaotic lifestyles, there is evidence on information needs but no current or planned development projects to address these needs. The implications for the costs of finding and processing information to aid informed choices are discussed
Recommended from our members
Learning the lessons from the developed world: e-banking security in Nigeria
In the past decade banks invested heavily in internet technology so as to engage in e-business and e-commerce activities. However, this development exposed banks to threats, such as online fraud. Consequently, there was a need to adopt security measures and controls to mitigate such threats. Banks in developed countries have developed a level of ‘best practice’ to reduce such online threats. The objective of this study was to explore the extent to which banks in the developing world were benefitting from the experiences of banks in the developed world in terms of how they address online security threats. Case studies of two Nigerian Banks were undertaken using interviews and short questionnaire. The findings show respondents perceived the level of threats to e-banking in Nigeria to be low. When adopting e-banking security controls, the case study banks placed more emphasis on the technical dimension than the human dimension. Senior management commitment is a significant barrier to adopting best practice, which is highlighted in limited financial resources being provided for new investment in training or customer education. The study concludes that senior managers need to change their perceptions and priorities towards IT security to reduce the vulnerability of their e-banking services
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things,
which follow ISO and EPC standards. In addition, ISO standard constitutes the
main layers of supply chain, and many RFID systems benefit from ISO standard
for different purposes. In this paper, we tried to introduce addressing systems
based on ISO standards, through which the range of things connected to the
Internet of Things will grow. Our proposed methods are addressing methods which
can be applied to both ISO and EPC standards. The proposed methods are simple,
hierarchical, and low cost implementation. In addition, the presented methods
enhance interoperability among RFIDs, and also enjoys a high scalability, since
it well covers all of EPC schemes and ISO supply chain standards. Further, by
benefiting from a new algorithm for long EPCs known as selection algorithm,
they can significantly facilitate and accelerate the operation of address
mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217
Advances in the Hierarchical Emergent Behaviors (HEB) approach to autonomous vehicles
Widespread deployment of autonomous vehicles (AVs) presents formidable challenges in terms on handling scalability and complexity, particularly regarding vehicular reaction in the face of unforeseen corner cases. Hierarchical Emergent Behaviors (HEB) is a scalable architecture based on the concepts of emergent behaviors and hierarchical decomposition. It relies on a few simple but powerful rules to govern local vehicular interactions. Rather than requiring prescriptive programming of every possible scenario, HEB’s approach relies on global behaviors induced by the application of these local, well-understood rules. Our first two papers on HEB focused on a primal set of rules applied at the first hierarchical level. On the path to systematize a solid design methodology, this paper proposes additional rules for the second level, studies through simulations the resultant richer set of emergent behaviors, and discusses the communica-tion mechanisms between the different levels.Peer ReviewedPostprint (author's final draft
- …