Search results1 – 10 of over 98000
New Zealand building code may be serving its purpose to an extent, there is still a need to develop a framework to improve the use and application of building code for…
New Zealand building code may be serving its purpose to an extent, there is still a need to develop a framework to improve the use and application of building code for better building performance and services. This study aims to validate the identified parameters in the developed framework to improve building code practice in New Zealand.
Subject matter experts interview was conducted with key stakeholders that use building code, standards and other associated compliance documents.
The findings from this study establish the importance of improving the building code, and the efficacy of validated framework helps to identify the areas with the most pressing needs within the building regulatory system. All the subject matter experts unanimously agreed on educating and training the building code users. Besides, the validated framework will enable the policy decision-makers in the building regulatory system to promote the use of building code and the utilisation of its potentials in reducing disaster while increasing the built environment resilience. The study concludes that the designed framework will create more robust strategy implementations to enhance innovative solutions embedded in performance-based building code.
This study originality centres on the practical application of an evidence-based framework for performance-based building code, standards and other related compliance documents.
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE…
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
- Software development
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- Software support activity
- Permissioned blockchain
- Time-limited authorization for developer action
- Code signing
- Trusted software guard
- Trusted eXecution technology
- Trusted platform module
- Controlled access blockchain
- Role-based access control
Netizens refer to citizens of the internet, and code-switching refers to the use of more than one language, style or form of expression to communicate. This study explores…
Netizens refer to citizens of the internet, and code-switching refers to the use of more than one language, style or form of expression to communicate. This study explores the advertising communication effectiveness of using netizen language code-switching in Facebook ads. Moreover, if a brand is with negative brand images, using positive brand images as a control group, this study investigates not only the advertising communication effectiveness of netizen language code-switching but also its effectiveness of remedying the negative brand images.
Online experiments were conducted, and data were analyzed using independent sample t-test, MANOVA and ANOVA.
The results indicate that netizen language code-switching can enhance advertising communication effectiveness in Facebook ads. Furthermore, under a negative brand image, netizen language code-switching has significant effects on improving Facebook advertising communication effectiveness.
This study takes netizens as the research subjects to explore the advertising communication effectiveness of netizen language code-switching in Facebook ads. This study provides further insight into the effect of netizens' culture on Facebook advertising and enriches the existing literature on social media advertising, as well as expanding the application of code-switching. The results of this study provide enterprises a new perspective on the copywriting content design of Facebook ads.
This research presents the applicable international fire code requirements for educational facilities, in a comprehensive manner, and the findings of a case study to…
This research presents the applicable international fire code requirements for educational facilities, in a comprehensive manner, and the findings of a case study to assess the level of compliance with these requirements.
A review of literature, fire codes and standards was conducted to identify the various sources of fire hazards in educational facilities and the required prevention measures. Accordingly, a code-compliance worksheet for assessing the fire prevention measures was developed. The worksheet included 34 prevention measures. It was implemented in a pharmacy college building, as a case study, to assess the compliance level with the code requirements. Recommendations were developed to improve the level of fire prevention in the case study facility.
The implemented worksheet facilitated identifying all the shortcomings in the prevention measures, in a methodological manner. These shortcomings included exceeded travel distance, absence of assembly point, inactive record keeping of fire inspection and maintenance works, deterioration of some extension cords and switches, alteration of some emergency doors, storage of combustibles in some electrical rooms and obstructions of the fire apparatus access road.
The research provides an assessment tool for fire prevention in educational facilities, which can be used by professionals for a code-compliant inspection. The findings of the case study as an example serve to expand the inspectors' observational significance while reducing subjectivity.
This research contributes to the educational facilities' context of health and safety domain in the literature. The research classifies the required fire prevention measures for an educational facility, according to the international applicable codes and standards. The case study demonstrates an applicable methodology for assessing the fire prevention measures and requirements.
The purpose of this study is to better understand distinct solution strategy types for common commissioning and startup problems (Hot Spots) in the construction of…
The purpose of this study is to better understand distinct solution strategy types for common commissioning and startup problems (Hot Spots) in the construction of industrial facilities. The authors also sought to better understand which solution strategy types offer the best value for the effort required.
The authors used a method of qualitative coding of text-based data to identify themes, patterns and trends from a collection of 178 commissioning and startup (CSU) solution strategies for the CSU Hot Spots. Coding categories emerged after multiple iterations. The authors also mapped high-value, low-effort solution strategies across the categories. Chi-squared testing and analysis of proportion statistics help quantitatively justify this qualitative research.
The authors identified 12 distinct coding categories and showed that they follow a non-uniform distribution via statistical testing. Those strategy types which provide particularly good value for the effort required are identified (such as quality assurance and control strategies), as well as those strategy types that do not.
Research is limited to CSU for the construction of industrial facilities. The findings are also limited to a subset of the most commonly problematic CSU activities. Many findings may be beneficial for heavy civil and commercial CSU as well.
Coding categories, definitions and descriptions provide a good overview of all 178 solution strategies for CSU project professionals. Implementing certain types of solutions or solution programs may allow CSU managers to prevent multiple Hot Spots from becoming problematic or to keep problems already occurring from becoming worse. Managers will also benefit from knowledge about which strategy types are more likely to give a higher value for lower effort.
Qualitative coding and analysis of solution strategies for common CSU problems have never been conducted so rigorously in any other CSU study. This method has yielded results distinct from other CSU studies which have used quantitative methods. Insights from findings have advanced the body of knowledge surrounding problem-solving in the commissioning and startup sub-discipline.
Business ethics is an area growing in importance for business managers. Research in the USA suggests that three‐quarters of major corporations have specific codes of ethics, and in the UK some 40 per cent (and increasing) of major organisations have codes of ethics. This article explains a survey on corporate ethics undertaken in the UK and points to some reasons why firms choose to have codes of ethics, and why some firms do not. It concludes by suggesting that further research is needed, especially on the perceived benefits of a corporate code of ethics to organisations.
Focuses on the status of ethics in the larger and more significant Australian business corporations, using a survey instrument. The findings cover the origins of…
Focuses on the status of ethics in the larger and more significant Australian business corporations, using a survey instrument. The findings cover the origins of Australian enterprise codes, their implementation, the use of comprehensive strategies to support them, the sanctions imposed for their breach and the level of ongoing review and reporting. Uses these as criteria of “mainstreaming” ‐ the establishment of a company’s ethics function as a major and central focus of management activities, systems and procedures. Suggests that the extent of “proprietary interest” afforded addressees of codes is an element of code effectiveness and ethics mainstreaming.
Growing needs for identification of small items for tracking and traceability purposes have led to the development of encoding structures known as matrix codes, capable of…
Growing needs for identification of small items for tracking and traceability purposes have led to the development of encoding structures known as matrix codes, capable of containing machine‐readable data. Describes practical applications for two particular types of high‐density code, the Data Matrix code and the DMT code. The applications relate to needs within the electronics industry, the automotive industry, and the aerospace industry. Through these examples an approach is presented for selecting appropriate codes and marking methods for given applications. The two codes considered, although both high‐density structures, exhibit different features. These are examined as a basis for considering their suitability for the various applications. Later in the paper the codes are discussed, along with the methods of printing and/or realising them in direct‐marking form.
The purpose of this paper is to explore methods of producing Quick Response (QR) Code, its customization, artistic look and applications and elaborate the technique of generating QR Code for library bibliographic records.
Through literature review, the study explored methods of generating QR Code and its applications in academic libraries. Based on research work and implementation experience, an efficient procedure for generating QR Code for bibliographic records was developed.
The study identified methods of generating QR Code, its customization and applications, and established the technique of generating QR Code for library bibliographic records.
The study is expected to facilitate the growth of QR Code’s visibility and success, and its mainstream adoption. The technique of generating QR Code for library bibliographic records in the study should be instructive for similar projects.
FOR CATALOGUERS, and librarians generally, 1967 will prove to be a vintage year, the annus mirabilis for the cataloguer, with the publication in January of the American text of the new Anglo‐American Code. The British text is expected to be published in November. The availability in this country of the American text gives some little time for a preview of the British version. The profession has had ample warning; the new code has had a long gestation period. For the Americans, especially, it is the culmination of many years of effort, from their preliminary second edition of the 1908 code in 1941, through the second edition of 1949, the Library of Congress Rules for Descriptive Cataloging of the same year, the Lubetzky Report of 1953, the Draft Code of 1960, to the Paris Principles of 1961. The present code owes very much to its predecessors, particularly the Paris Principles, which were in effect a set of guidelines agreed on internationally to ensure broad international consistency between any future national codes without spelling out the detailed rules. Except for one or two instances the new code follows the Paris Principles closely.