scholarly journals Evaluation of Target Value Delivery and Opportunity Management as Complementary Practices

2021 ◽  
Vol 13 (14) ◽  
pp. 7997
Author(s):  
Tobias Onshuus Malvik ◽  
Agnar Johansen ◽  
Olav Torp ◽  
Nils O. E. Olsson

Opportunity management and Target Value Delivery (TVD) have both been studied extensively but separately. The two approaches have been presented as solutions for increasing value in a project for the owner and users. However, it seems there has not been much research that addresses the link between the two approaches. The purpose of this study is to increase knowledge of how TVD can facilitate opportunity management. The results from a literature review are compared with the practice in two cases: TVD in a large infrastructure project and opportunity management in a large building project. The results from the building project showed a lack of inherent motivation for change and innovation in the project organization. The identified opportunities were aimed mainly at maximizing the project’s operational value and keeping costs within the approved budget. TVD seems to handle this with extensive attention to maintain value for the end-users. Besides, the target cost element of TVD seems to complement opportunity management by creating incentives to be flexible about change and innovation. This paper’s originality is to combine two well-established approaches that have many similarities but have yet to be explored in relation to each other.

Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


2008 ◽  
pp. 611-622
Author(s):  
Tharitpong Fuangvut ◽  
Helen Hasan

A major objective of this article is to propose a framework for development of a campus portal accommodating the end-users’ online activities, especially students who are normally considered as a major group of users for the campus portal. By summarising between the literature review in the domain of traditional information systems development methodology and Web-based information systems development methodology and the findings of the research, an appropriate model can finally be concluded and recommended, and is presented in this article. Although this article can be considered as a standalone article, it is recommended that the reader read the article entitled “The Need for a Comprehensive Methodology for Campus Portal Development.” Additionally, the complete version of this research can also be obtained from the digital thesis section of the University of Wollongong Library (http://www. library.uow.edu.au).


2009 ◽  
pp. 2019-2026 ◽  
Author(s):  
Dean Mohamedally ◽  
Panayiotis Zaphiris ◽  
Helen Petrie

Mobile computing and wireless communications continue to change the way in which we perceive our lifestyles and habits. Through an extensive literature review of state-of-the-art human-computer interaction issues in mobile computing (Mobile HCI), we examine recent pertinent case studies that attempt to provide practical mobile capabilities to users. We thus contribute to the reader a primer to the philosophy of developing mobile systems for user centred design. User centred design elicits the needs and requirements of end users. Its purpose in mobile systems is to enable useful computing and communicating experiences for diverse types of users, anywhere at anytime and on demand. We shall therefore illustrate to the reader some of the key constraints of mobile devices such as limited visuals, contextual awareness and mobility itself, and more importantly how they can be overcome through innovative design and development.


2019 ◽  
Vol 10 (4) ◽  
pp. 85 ◽  
Author(s):  
Julian Huber ◽  
Elisabeth Schaule ◽  
Dominik Jung ◽  
Christof Weinhardt

Uncontrolled charging of plug-in Battery Electric Vehicles (BEV) represents a challenge for the energy system. As a solution, recent studies propose smart charging to avoid grid congestion and to integrate renewable energy. While financial benefits for smart charging schemes are currently quite low, there are other objectives for smart charging. However, it is unclear for which objectives smart charging can be used most effectively and which arguments are most likely to convince end users of BEVs to use smart charging schemes. To fill this gap, we conducted a literature review of the premises and the objectives of smart charging and how they fit the end-user’s motivation to use such smart charging systems. To evaluate the results, we present findings of 16 domain experts who evaluated various statements on smart charging according to their technical correctness and their persuasiveness towards end users. The results show that experts consider those smart charging objectives as most persuasive towards end users which they consider technically correct. Moreover, cost savings and integration of renewable energies are rated highest on both scales. On the contrary, experts do not expect a positive impact of smart charging systems on battery life and rate it as not very convincing.


2019 ◽  
Vol 50 (2) ◽  
pp. 128-143 ◽  
Author(s):  
Daniel M. Hall ◽  
W. Richard Scott

Integrated project delivery (IPD), an emerging form of project organization for North American construction projects, offers a compelling case study to understand how new innovative infrastructure project delivery models can emerge and institutionalize. This article frames the early stages of IPD through the actions of an institutional entrepreneur—Sutter Health—working to construct a new arrangement for the delivery of its large healthcare projects. The resulting account uses Suchman’s (1995) multistage model of institutionalization to understand the early-stage actors, processes, conditions, and actions present for creation of an innovative delivery model within a fragmented, project-based industry context.


2020 ◽  
Vol 171 ◽  
pp. 107101 ◽  
Author(s):  
Miguel M. Martín-Lopo ◽  
Jaime Boal ◽  
Álvaro Sánchez-Miralles
Keyword(s):  

2021 ◽  
Vol 1 (1) ◽  
pp. 12-20
Author(s):  
S. Mutahir Hussain Shah ◽  
Muhammad Nawaz ◽  
Aimen Batool

Construction industry suffers numerous issues and complicated factors like price, period, quality and safety. It is said that Construction projects are versatile because they associate with contractors, architects, advisers, designers, the project owners, etc. Keeping in view of above factors, objective of this research is to highlight those factors which have impact on labor productivity in house building project. Through literature review as well as discussion with different consultants, several factors of productivity were identified. Out of which 20 factors were selected, which were later categorized into two sets, for analyzing in the current study. A comprehensive questionnaire was prepared and sent to project manager, engineers, designers, and builders. It was found, that total expense of construction comes to much higher as it was originally calculated. It is suggested that human resource should be developed through an effective and well planned training program, so that construction project do not suffer due to low performance. The mentioned factors are supposed to help in completed the construction projects effectively.  


Biometrics ◽  
2017 ◽  
pp. 1483-1505
Author(s):  
V. Santhi ◽  
D. P. Acharjya

Advances in technologies facilitate the end users to carry out unauthorized manipulation and duplication of multimedia data with less effort. Because of these advancements, the two most commonly encountered problems are (1) copyright protection and (2) unauthorized manipulation of multimedia data. Thus a scheme is required to protect multimedia data from those two above said problems. Digital Watermarking is considered as one of the security mechanisms to protect copyrights of multimedia data. The literature review reveals that the calculation of scaling and embedding parameters are not completely automated. In order to automate the procedure of calculating scaling and embedding parameters the computational intelligence need to be incorporated in the watermarking algorithm. Moreover the quality of the watermarked images could also be preserved by combining computational intelligence concepts. Thus watermarking schemes utilizing computational intelligence concepts could be called as intelligence based watermarking schemes and it is presented in this chapter in detail.


1957 ◽  
Vol 3 ◽  
pp. 273-288 ◽  

John William Trevan was born on 23 July 1887. His father was John William Stoneman Trevan of Plymouth and his grandfather was another John William Trevan. His father was originally a carpenter, but he was a very intelligent man and in these days he would perhaps have won a state scholarship. As it was he became clerk of works to a large building project and eventually went into business on his own account as a contractor in Plymouth. His wife Bessie Babbage was a simple country woman, but her son always treasured the theory, unsubstantiated by any proof, that he was descended from Charles Babbage, F.R.S., the inventor of calculating machines and one of the founders of the British Association. The subject of this memoir was born in Bodmin, Cornwall, where his father was helping to construct the railway from Bodmin to Bodmin Road. He was the eldest of three children and had a brother, Jim, now in Canada, and a sister Winifred who has been dead many years. His parents belonged to the Plymouth Brethren and he was brought up in the rigid practice of their faith. He was not allowed to read anything but religious books on Sundays or to play card games, and he was expected to believe that every word in the Bible was literally true. He was always religious, but in later life he was also broadminded and tolerant.


Author(s):  
Roland Robert Schreiber ◽  
Matthäus Paul Zylka

Software development in project teams has become more and more complex, with increasing demands for information and decision making. Software development in projects also hugely depends on effective interaction between people, and human factors have been identified as key to successful software projects. Especially in this context, managing and analyzing social networks is highly important. The instrument of social network analysis (SNA) provides fine-grained methods for analyzing social networks in project teams, going beyond the traditional tools and techniques of project management. This paper examines the importance of the application of SNA in software development projects. We conducted a systematic literature review (SLR) of research on software development projects and social network data published between 1980 and 2019. We identified and analyzed 86 relevant studies, finding that research on software development projects spans the topics of project organization, communication management, knowledge management, version and configuration management, requirement management, and risk management. Further, we show that most studies focus on project organization and that the most common method used to gather social data relies on automated extraction from various software development repositories in the SNA context. Our paper contributes to the software development literature by providing a broad overview of published studies on the use of social networks in helping software development projects. Finally, we identify research opportunities and make suggestions for addressing existing research gaps.


Sign in / Sign up

Export Citation Format

Share Document