Search results

1 – 10 of over 10000
Content available
Article
Publication date: 1 June 2021

Albert Vasso, Richard Cobb, John Colombi, Bryan Little and David Meyer

The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors…

Abstract

Purpose

The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an expeditious and low-cost improvement. However, the large tradespace and unexplored system of systems performance requirements pose a challenge to successful capitalization. This paper aims to better define and assess the utility of augmentation via a multi-disiplinary study.

Design/methodology/approach

Hypothetical telescope architectures are modeled and simulated on two separate days, then evaluated against performance measures and constraints using multi-objective optimization in a heuristic algorithm. Decision analysis and Pareto optimality identifies a set of high-performing architectures while preserving decision-maker design flexibility.

Findings

Capacity, coverage and maximum time unobserved are recommended as key performance measures. A total of 187 out of 1017 architectures were identified as top performers. A total of 29% of the sensors considered are found in over 80% of the top architectures. Additional considerations further reduce the tradespace to 19 best choices which collect an average of 49–51 observations per space object with a 595–630 min average maximum time unobserved, providing redundant coverage of the Geosynchronous Orbit belt. This represents a three-fold increase in capacity and coverage and a 2 h (16%) decrease in the maximum time unobserved compared to the baseline government-only architecture as-modeled.

Originality/value

This study validates the utility of an augmented network concept using a physics-based model and modern analytical techniques. It objectively responds to policy mandating cataloging improvements without relying solely on expert-derived point solutions.

Details

Journal of Defense Analytics and Logistics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2399-6439

Keywords

To view the access options for this content please click here
Expert briefing
Publication date: 11 May 2020

Space as a domain of warfare.

To view the access options for this content please click here
Article
Publication date: 1 January 2005

Humberto Maturana Romesín

To reflect on the matter of self‐consciousness.

Abstract

Purpose

To reflect on the matter of self‐consciousness.

Design/methodology/approach

The purpose is achieved through the process of answering four questions presented to me by Heinz von Foerster in the course of our many conversations.

Findings

It is not possible to understand the nature of self‐consciousness without understanding the operation of human beings as living systems that exist as emotional languaging living systems: self‐consciousness is a manner of living.

Practical implications

We human beings can become more aware of our responsibility in the design of robots that imitate us.

Originality/value

Reflects on what makes us humans special, on subjective experience, and on the world we bring forth.

Details

Kybernetes, vol. 34 no. 1/2
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article
Publication date: 6 April 2010

Evi Syukur and Seng Wai Loke

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system…

Abstract

Purpose

Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.

Design/methodology/approach

The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.

Findings

The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.

Originality/value

The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.

Details

International Journal of Pervasive Computing and Communications, vol. 6 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 21 September 2015

Anika Meyer and Ina Fourie

The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate…

Abstract

Purpose

The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and productive collaborative information seeking (CIS) systems and environments, specifically with regard to three main CIS pillars (control, communication and awareness).

Design/methodology/approach

A qualitative research approach, based on a selective corpus of CIS literature, was utilised to perform a content analysis to note if terms and concepts normally associated with engineering, cognitive and social ergonomics can be used to eliminate terms reflecting issues related to three CIS pillars (control, communication and awareness) that can benefit from a holistic ergonomic approach.

Findings

The content analysis revealed that a fairly extensive amount of holistic ergonomic terminology is prominent within the CIS literature, therefore establishing a connection between the two disciplines: CIS and ergonomics. This suggests that CIS system issues could benefit from the insights of a holistic ergonomic approach.

Research limitations/implications

Since this is an exploratory study the scope of CIS literature utilised in the content analysis was limited to a selection considered most important by the authors; this should be supplemented by further research.

Practical implications

Intended to instigate interest in further exploration of the beneficial and productive implications and practical application of holistic ergonomics in designing CIS systems and environments.

Originality/value

This is the first research paper in the Library and Information Science literature that explores the potential of utilising holistic ergonomics to cultivate CIS systems and environments.

Details

Library Hi Tech, vol. 33 no. 3
Type: Research Article
ISSN: 0737-8831

Keywords

To view the access options for this content please click here
Article
Publication date: 10 July 2017

Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security…

Abstract

Purpose

The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.

Design/methodology/approach

General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.

Findings

This paper identifies the most important variables in cultivating a cyber security culture.

Research implications

The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.

Practical implications

Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.

Originality/value

Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.

Details

Information & Computer Security, vol. 25 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Book part
Publication date: 2 December 2019

Frank Fitzpatrick

Abstract

Details

Understanding Intercultural Interaction: An Analysis of Key Concepts
Type: Book
ISBN: 978-1-83867-397-0

To view the access options for this content please click here
Article
Publication date: 1 May 2002

David Snowden

We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it…

Abstract

We are reaching the end of the second generation of knowledge management, with its focus on tacit‐explicit knowledge conversion. Triggered by the SECI model of Nonaka, it replaced a first generation focus on timely information provision for decision support and in support of BPR initiatives. Like BPR it has substantially failed to deliver on its promised benefits. The third generation requires the clear separation of context, narrative and content management and challenges the orthodoxy of scientific management. Complex adaptive systems theory is used to create a sense‐making model that utilises self‐organising capabilities of the informal communities and identifies a natural flow model of knowledge creation, disruption and utilisation. However, the argument from nature of many complexity thinkers is rejected given the human capability to create order and predictability through collective and individual acts of freewill. Knowledge is seen paradoxically, as both a thing and a flow requiring diverse management approaches.

Details

Journal of Knowledge Management, vol. 6 no. 2
Type: Research Article
ISSN: 1367-3270

Keywords

To view the access options for this content please click here
Article
Publication date: 22 June 2012

Penghe Chen, Shubhabrata Sen, Hung Keng Pung, Wenwei Xue and Wai Choong Wong

The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management…

Abstract

Purpose

The rapid proliferation of mobile context aware applications has resulted in an increased research interest towards developing specialized context data management strategies for mobile entities. The purpose of this paper is to aim to develop a new way to model mobile entities and manage their contexts accordingly.

Design/methodology/approach

This paper proposes the concept of “Mobile Space” to model mobile entities and presents strategies to manage the various contexts associated therein. To handle availability related issues, two system services are designed: the “Availability Updating Service” which is an identifier based mechanism and is designed to keep track of mobile objects and handle availability related issues, and the “Application Callback Service” which is a publish/subscribe based mechanism to handle application disruptions and interruptions arising due to mobility.

Findings

The paper presents a detailed study of the proposed framework and a description of the underlying services and the components therein to validate the framework. Experimental results carried out in WiFi and 3G environments indicate that the proposed techniques can support mobile applications and minimize application disruptions with minimal overhead.

Originality/value

The proposed context management framework is generic in nature and is not designed for a specific class of applications. Any mobile context aware application can leverage on the framework and utilize the provided functionalities to manage application disruptions. Also, the decoupling of mobile application layer and the underlying context data management layer renders context data management layer transparent to the application design.

Details

International Journal of Pervasive Computing and Communications, vol. 8 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2005

Andreas Zimmermann and Andreas Lorenz

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio…

Abstract

The paper deals with the design and creation of an intelligent user interface augmenting the user experience in everyday environments, by providing an immersive audio environment. We highlight the potential of augmenting the visual real environment in a personalized way, thanks to context modeling techniques. The LISTEN project, a system for an immersive audio augmented environment applied in the art exhibition domain, provides an example of modeling and personalization methods affecting the audio interface in terms of content and organization. In addition, the different evolution steps of the system and the outcomes of the accompanying user tests are here reported.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 10000