To see the other types of publications on this topic, follow the link: Security Service integrated logistical support system.

Journal articles on the topic 'Security Service integrated logistical support system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Service integrated logistical support system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Loginov, Il'ya Valentinovich, and Vladimir Gennad'evich Sosunov. "Formation of the approach towards development of lifecycle model for the integrated security systems." Вопросы безопасности, no. 4 (April 2021): 50–60. http://dx.doi.org/10.25136/2409-7543.2021.4.37121.

Full text
Abstract:
The subject of this research is the integrated security systems and the processes of their continuous improvement during the lifecycle. The goal lies in examination of the problem of systematization of lifecycle processes of the integrated security systems and formalization of their lifecycle model, taking into consideration the available practices of building security systems. The effectiveness of complex system support processes is first and foremost determined by the accurate identification of management goals and objectives, which requires an the lifecycle model adequate to the controlled object. Since the integrated security system has the characteristics of both, capital construction (engineering networks) and technical system (integration platform), the question of improvement of the lifecycle model is relevant. The main research results are as follows: substantiation of the problem of systematization of lifecycle models of the integrated security systems; analysis of the approaches towards their standardization, and substantiation of lifecycle model of the integrated security systems based on the system accounting of conducted operations. The novelty of the proposed model lies in the improvement of reference models of the integrated security systems by taking into account the entirety of reconfiguration and modernization operations. Description is given to the problem of systematization of lifecycle processes of the integrated security systems, which occurs due to the possibility of their classification as different groups of the complex systems. The offered lifecycle model of the integrated security systems through systematization of regulatory requirements is an attempt to acquire a non-contradictory list of measures in creation and operation of the integrated security systems. The results of this research can be used in practical activity of the employees of onsite security service in the context of development of the integrated security system. The implementation of the offered lifecycle model of the integrated security system in the processes of their development would allow systematizing the structure of processes, arranging the functions and activity of the departments on the continuous logistic support of the integrated security systems, and ensuring their consistent improvement.
APA, Harvard, Vancouver, ISO, and other styles
2

Denysenko, Mykola P. "MANAGEMENT TECHNOLOGIES FOR ENHANCING INTEGRATED PROCESSES IN THE CUSTOMS AND LOGISTICS SERVICES SECTOR." Bulletin of the Kyiv National University of Technologies and Design. Series: Economic sciences 147, no. 3 (December 29, 2020): 57–66. http://dx.doi.org/10.30857/2413-0117.2020.3.5.

Full text
Abstract:
The article discusses the issues of modern electronic technologies implementation in managing integrated processes in the customs and logistics services sector in Ukraine. It is argued that collection and processing of large amounts of information are hardly possible without the use of latest information technology advancements. It has been verified that to operate effectively, the "Electronic Customs" should involve close interaction between all its subsystems, such as electronic declaration; electronic document management; risk analysis and risk management; transit control delivery; single interdepartmental automated system for collecting, storing and processing information; implementation of fully automated government control; unified database of regulatory and reference documentation used for customs purposes; information support for audit and law enforcement activities. The research findings have revealed a number of benefits of using the electronic declaration pattern, in particular, it contributes to boosting trade, reducing the time period for customs control, eliminating of subjective factors while handling customs procedures through the use of online prior notification and preliminary electronic customs declaration in the frameworks of customs clearance of goods and customs documents and goods delivery. Ultimately, building a multifunctional integrated system of "Electronic Customs" is focused towards better facilitating and enhancing the customs units performances by speeding up customs control and customs clearance procedures, improving the public service quality in the area government customs regulation, mitigating the risk of any illegal actions and corruption along with ensuring and enhancing the customs services security in Ukraine, contributing to further development, adaptation and successful harmonization of information systems of the State Customs Service of Ukraine to the European Union standards and good practice.
APA, Harvard, Vancouver, ISO, and other styles
3

Golubetskaya, N. P., and A. V. Kurlov. "Infrastructure Support for the Innovative Transformation of Business Structures in the Digital Economy." Economics and Management 26, no. 11 (January 16, 2021): 1210–16. http://dx.doi.org/10.35854/1998-1627-2020-11-1210-1216.

Full text
Abstract:
Aim. The presented study aims to develop conceptual approaches to the formation of infrastructure for the innovative transformation of entrepreneurship in the digital economy, which would make it possible to optimize the management system of regional economic entities aimed at creating a favorable climate for the generation, development, and implementation of innovations in the Russian socioeconomic system.Tasks. The authors analyze conceptual approaches to the formation of a system of infrastructural support for the innovative transformation of business structures based on a comprehensive analysis of the parameters of its subsystems; substantiate priority directions for the development of regional infrastructure with a view to ensuring sustainable operation of economic entities; propose scenarios for the formation of regional infrastructure based on digital technologies for the transformation of innovation activities of companies.Methods. This study is based on the classical corporate life cycle theory, which includes mechanisms and organizational structures that facilitate the sustainable development of business structures in the digital economy. Theoretical and practical recommendations for innovation management and system analysis of the formation of competitive advantages of regional economic entities are used with allowance for current trends in the world economy and geopolitical risks.Results. Infrastructure support for the innovative transformation of business structures in the digital economy should allow for the reloading of the logistical, technological, financial, economic, informational, personnel, and communication units of the company’s integrated functioning system. Digital technologies transform system-wide, strategic, marketing, information, and communication methods of development and implementation of management decisions within regional socio-economic systems.Conclusions. Infrastructure support for the innovative transformation of business structures largely depends on the use of digital methods that allow for the implementation of information and communication platforms making it possible to optimize the organizational management structures of companies. The effectiveness of innovative transformation can be increased by accelerating and simplifying business processes; increasing the level of transparency and reliability of procedures performed on the web and implemented in business applications; structural transformations of forms of interaction with customers based on modern interfaces and access to complete information about consumer preferences; ensuring the availability of services provided on a cloud platform; achieving a high level of security of the knowledge base. Digital technologies have made the effectiveness of company management more dependent on the parameters of economic security and indicators of the quality of the information and communication infrastructure used at all stages of the functioning of the regional socio-economic system. Business communications in the global market of goods and services are accelerating and simplifying.
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Nan, Erlin Tian, Fattaneh Daneshmand Malayeri, and Alireza Balali. "A new model for investigating the impact of urban knowledge, urban intelligent transportation systems and IT infrastructures on the success of SCM systems in the distributed organizations." Kybernetes 49, no. 11 (January 2, 2020): 2799–818. http://dx.doi.org/10.1108/k-04-2019-0288.

Full text
Abstract:
Purpose A fundamental concept of the smart city is to get the right information at the right place to make city-related decisions easier and quicker. The main goal of supply chain management (SCM) systems is to enhance the supply chain process for delivering the identified products to customers correctly in distributed organizations. In addition, new IT infrastructure such as cloud-based systems and internet of things (IoT) have changed many organizations and firms. Hence, this study aims to assess the factors that contribute to the success of SCM systems. Design/methodology/approach In this paper, the usage of urban knowledge, urban intelligent transportation systems and IT infrastructure was considered as a key factor for the success of SCM systems. For assessing the features of the model, a comprehensive questionnaire was designed. The survey questionnaires were sent to critical informers who are practical heads associated with SCM and urbanism. Of these, 315 usable responses were received, resulting in a response rate of 82.03%. The data were examined using Smart-PLS version 3.2 and IBM SPSS version 25. Findings The obtained results showed the high strength of the proposed model. This study found that the impact of urban ITS (safety, accessibility, information management and flexibility) is important to the success of supply chain management systems. Another important finding is that the cloud-based system (cloud security, resource virtualization, on-demand self-service and scalability) has a very important role in the success of supply chain management systems. The finding showed that the effect of IoT service variable (commercialization, mobility features, infrastructure capabilities and security and privacy) on the success of supply chain management systems is significant and positive. The findings also showed that urban knowledge (usage skills, awareness, experience and knowledge sharing) is viewed as a significant factor in the success of supply chain management systems. Research limitations/implications The inductive nature of research methodology has introduced limitations on the generalizability of results. Therefore, it is recommended to examine the validity of this research model in other supply chains. Practical implications The statistical results support the crucial role of urban knowledge, urban intelligent transportation systems, IoT services and cloud-based systems. Therefore, aspects relating to these factors must be the focus of attention of any distributed organization in their endeavor to develop supply chain management systems. Implementing cloud based IoT through accurate and timely availability of information, can predict forecasting and planning processes, resources, logistics and support, service management and spare parts and many sub-processes in the supply chain. These technologies allow organizations to invest in manufacturing and operating processes rather than paying for the software section, which will generate more cash flow. Originality/value One of the most crucial and fundamental parts of an organization’s management is the supply chain management. The department is responsible for coordinating all units from the initial stages, such as supplying materials to the final stages, such as delivery and after-sales service. Comprehensive and credible information platforms are essential for managing a supply chain. Therefore, it is important to use integrated information systems such as IoT, cloud computing, intelligent transportation systems and more in this part of the organization management. Covering this information in a timely and accurate manner will facilitate the process and make the process more transparent. For this purpose, a model is needed to determine the relationship between technologies and supply chain management, which this study has provided a comprehensive model.
APA, Harvard, Vancouver, ISO, and other styles
5

MASHKANTSEVA, Svetlana. "TRANSPORT AND LOGISTICS SYSTEM OF THE REGION: THE STATE AND FUNCTIONS OF FUNCTIONING." Ukrainian Journal of Applied Economics 4, no. 3 (August 30, 2019): 324–29. http://dx.doi.org/10.36887/2415-8453-2019-3-36.

Full text
Abstract:
Introduction. The article considers the state and prospects of development of transport and logistics systems in the region, which will help to accelerate cargo delivery, increase the competitiveness of transportation, improve the investment climate of the transport industry in the region, as well as expand the activities of companies providing comprehensive logistics services. The purpose of this article is a study of experience of using mechanisms of state regulation of development of regional structural transformations in agribusiness. Results. The basic principles of functioning of the transport and logistics system of the region, which integrate the transport industry into the transport and logistics systems of the country by ensuring their effective interaction, are highlighted; satisfy the needs of consumers of transport and logistics services by harmonizing their interests with the interests of all participants in the logistics process. The functions of the transport and logistics system that influence the efficiency of its activity at the regional level are revealed. Conclusions. The functioning of an advanced transport and logistics system, provided with adequate transport infrastructure in all regions of the country, will contribute to the development of many sectors of the economy and will serve as the basis for economic development of the country. In order to effectively develop the transport and logistics system of the regions, it is advisable to intensify the following areas: state regulation of logistics processes, including their legal support; creation and operation of transport infrastructure by type of activity; stimulating the development of logistics projects by region. The formation of high-quality transport and logistics systems in the region provides a full range of transport services, including multimodal transportation, the development of logistics schemes for freight, insurance, transportation security. Development of transport and logistics systems in the region can be ensured by updating the logistics base of transport; increased informatization; quality improvement and development of transport and logistics infrastructure of the region; expansion of the internal market of transport and logistics services; improving the efficiency of transportation; improvement of customs tariff and investment policy; the interaction of all participants in the supply chain; development and implementation of joint programs for the development of transport and logistics systems in the region. Key words: transport and logistics system; transport industry; region; logistic approach; transport; integration.
APA, Harvard, Vancouver, ISO, and other styles
6

Fadeev, Aleksey. "Production Support in the Arctic: a Strategic Approach." Strategizing: Theory and Practice 2021, no. 1 (June 25, 2021): 15–27. http://dx.doi.org/10.21603/2782-2435-2021-1-1-15-27.

Full text
Abstract:
The Arctic reserves of hydrocarbons play an important geostrategic and economic role for many states, whose energy security will rely on this region in the nearest decades. The development of hydrocarbon deposits in extreme conditions requires unique scientific and industrial solutions, as well as new sourcing strategies for attracting vehicles that can operate at low temperatures. Mineral production in the Polar regions is a complex technological, transport, and logistical task. As a result, each industrial production project needs a highly efficient and complex system of supporting projects, which involve naval aviation, marine fleet, integrated support bases, etc. In addition to solving technical problems, this production support system should comply with the highest standards of environmental and industrial safety, generating no adverse impact on the sensitive ecosystem of the Russian Arctic and adjacent marine territories.
APA, Harvard, Vancouver, ISO, and other styles
7

Badawy, Sherif M., and Ana Radovic. "Digital Approaches to Remote Pediatric Health Care Delivery During the COVID-19 Pandemic: Existing Evidence and a Call for Further Research." JMIR Pediatrics and Parenting 3, no. 1 (June 25, 2020): e20049. http://dx.doi.org/10.2196/20049.

Full text
Abstract:
The global spread of the coronavirus disease (COVID-19) outbreak poses a public health threat and has affected people worldwide in various unprecedented ways, both personally and professionally. There is no question that the current global COVID-19 crisis, now more than ever, is underscoring the importance of leveraging digital approaches to optimize pediatric health care delivery in the era of this pandemic. In this perspective piece, we highlight some of the available digital approaches that have been and can continue to be used to streamline remote pediatric patient care in the era of the COVID-19 pandemic, including but not limited to telemedicine. JMIR Pediatrics and Parenting is currently publishing a COVID-19 special theme issue in which investigators can share their interim and final research data related to digital approaches to remote pediatric health care delivery in different settings. The COVID-19 pandemic has rapidly transformed health care systems worldwide, with significant variations and innovations in adaptation. There has been rapid expansion of the leveraging and optimization of digital approaches to health care delivery, particularly integrated telemedicine and virtual health. Digital approaches have played and will play major roles as invaluable and reliable resources to overcome restrictions and challenges imposed during the COVID-19 pandemic and to increase access to effective, accessible, and consumer-friendly care for more patients and families. However, a number of challenges remain to be addressed, and further research is needed. Optimizing digital approaches to health care delivery and integrating them into the public health response will be an ongoing process during the current COVID-19 outbreak and during other possible future pandemics. Regulatory changes are essential to support the safe and wide adoption of these approaches. Involving all relevant stakeholders in addressing current and future challenges as well as logistical, technological, and financial barriers will be key for success. Future studies should consider evaluating the following research areas related to telemedicine and other digital approaches: cost-effectiveness and return on investment; impact on quality of care; balance in use and number of visits needed for the management of both acute illness and chronic health conditions; system readiness for further adoption in other settings, such as inpatient services, subspecialist consultations, and rural areas; ongoing user-centered evaluations, with feedback from patients, families, and health care providers; strategies to optimize health equity and address disparities in access to care related to race and ethnicity, socioeconomic status, immigration status, and rural communities; privacy and security concerns for protected health information with Health Insurance Portability and Accountability Act (HIPAA)–secured programs; confidentiality issues for some specific populations, especially adolescents and those in need of mental health services; early detection of exposure to violence and child neglect; and integration of training into undergraduate and graduate medical education and subspecialty fellowships. Addressing these research areas is essential to understanding the benefits, sustainability, safety, and optimization strategies of telemedicine and other digital approaches as key parts of modern health care delivery. These efforts will inform long-term adoption of these approaches with expanded dissemination and implementation efforts.
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao, Liang, Srinandan Dasmahapatra, Paul Lewis, Bo Hu, Andrew Peet, Alex Gibb, David Dupplaw, et al. "The design and implementation of a novel security model for HealthAgents." Knowledge Engineering Review 26, no. 3 (July 28, 2011): 261–82. http://dx.doi.org/10.1017/s0269888911000117.

Full text
Abstract:
AbstractIn this paper, we analyze the special security requirements for software support in health care and the HealthAgents system in particular. Our security solution consists of a link-anonymized data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure health-care infrastructure for HealthAgents and can be easily adapted for other health-care applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Et al., Artem Bratko. "Some Aspects of Capability-based Planning in the Field of National Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2219–25. http://dx.doi.org/10.17762/turcomat.v12i6.4827.

Full text
Abstract:
The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the state of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security.
APA, Harvard, Vancouver, ISO, and other styles
10

Bratko, Artem, Dmytro Oleshko, Anton Datskov, Valerii Vychavka, Oleksandr Olytskyi, and Ihor Balytskyi. "Use of the SWOT Analysis in the Field of National Security Planning." Emerging Science Journal 5, no. 3 (June 1, 2021): 330–37. http://dx.doi.org/10.28991/esj-2021-01280.

Full text
Abstract:
The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security. The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. Doi: 10.28991/esj-2021-01280 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Wei Mei, Chao Yang Zhu, and Zhen Yu. "Development and Research of an Integrated Platform System for Management and Control." Applied Mechanics and Materials 719-720 (January 2015): 732–36. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.732.

Full text
Abstract:
This paper describes the current status of power communication systems, problems and solutions, proposed to build an integrated platform system for communications management and control.The integrated platform system is divided into four parts: Comprehensive Monitoring Subsystem, Resource Management Subsystem, Operation and Maintenance Management Subsystem, Security Management and Control Subsystem, which can monitor the resource, operation and maintenance, and security controls etc.This system can implement communication professional management, process management, user management, daily operation, maintenance work management standardization, process and automation; promote systematic and integrated for communication network, improve service management level and efficiency of operation and maintenance; and provide better support and protection for developing the grid and the smart grid.
APA, Harvard, Vancouver, ISO, and other styles
12

Канатов, Алмас, Almas Kanatov, Максим Баранов, and Maksim Baranov. "INTERACTION OF LAW ENFORCEMENT AGENCIES WITH THE POPULATION AS A FACTOR OF NATIONAL SECURITY." Journal of Foreign Legislation and Comparative Law 2, no. 1 (March 16, 2016): 0. http://dx.doi.org/10.12737/18182.

Full text
Abstract:
Various forms of cooperation between law enforcement authorities and the public (civil society) in the fight against offenses in order to strengthen national security are detailed in the article. Among the law enforcement agencies the following authorities are highlighted: the prosecuting authorities, internal affairs bodies, state fire service, anti-corruption service and the service of economic investigations, which are operating in accordance with the legislative acts of the Republic of Kazakhstan. Certain aspects are researched, the principles for such interaction are proposed. Within counteract threats to national security the author fragmentarily emphasized in particular, social security, military security, political security, economic security, informational security and environmental safety. The role of inter-ministerial committees for prevention of offenses under the Government of the Republic of Kazakhstan and the public councils under law enforcement bodies was distinguished. The authors note that the participation of public organizations in law enforcement activities of the state is provided by the Plan of measures on realization of the State Program of further modernization of the judicial system of the Republic of Kazakhstan for 2014—2020. The mandatory learning of the basics of personal and public safety by citizens, involved in law enforcement activity and the need of methodological and logistical support is provided.
APA, Harvard, Vancouver, ISO, and other styles
13

Bilous, M. V., O. A. Ryzhov, O. P. Shmatenko, and О. V. Galan. "The medical support of the army in an integrated information network of the logistical support of the armed forces of Ukraine." Farmatsevtychnyi zhurnal, no. 6 (December 21, 2019): 6–13. http://dx.doi.org/10.32352/10.32352/0367-3057.6.19.01.

Full text
Abstract:
The Armed Forces (AF) health care system of Ukraine today requires further improvement and development in the direction of unification and interoperability with the medical services ofNATO member countries. One of the important tasks facing the medical service of the Armed Forces ofUkraine, according to the Main Provisions of Logistics Provision of the Armed Forces ofUkraine, is the creation of a single effective system of resource management. The effectiveness of such a system is determined by the quality and reliability of the information used to control the flow processes. The aim of the work–а study of the singularities of the medical support of the troops in the integrated information network of logistic support of the Armed Forces of Ukraine. To achieve the purpose of the research, the analysis of the domestic and foreign scientific literature, the current regulatory framework of Ukraine was conducted. Research methods are: information search, contrast, arrangement and modeling. While conducting a study of the existing integrated information network of logistics support for military units and units of the Armed Forces of Ukraine it was found that this is one of the largest and most complex nodes. It was found that each node of the logistic information network is connected to other nodes of the transverse and longitudinal canals. The transverse canals connect the nodes inside the echelon, and the longitudinal canals connect the nodes between the echelons. Thus, the information network is a hierarchical network. It has been determined that the set of logistic support nodes is divided into three groups according to the research of foreign military scientists can be called: executives, operators and consumers. It is established that according to the current legislation in the information network of logistic support of the Armed Forces of Ukraine, the Main Military Medical Directorate, as a body managing the medical service of the Armed Forces of Ukraine, is on par with the Main Logistics Department of the General Staff of the Armed Forces of Ukraine. A study was conducted to study the peculiarities of the medical provision of troops in the integrated information network of logistical support of the Armed Forces of Ukraine. On the basis of theoretical generalization of data of scientific literature and normative-legal acts, the model of the current information network of logistical support of military units and units of the Armed Forces of Ukraine was constructed. The necessity to develop national decision support software in military logistics for the needs of the Armed Forces of Ukraine is identified.
APA, Harvard, Vancouver, ISO, and other styles
14

Shen, Yubin, Minrui Fei, and Dajun Du. "Cyber security study for power systems under denial of service attacks." Transactions of the Institute of Measurement and Control 41, no. 6 (June 1, 2017): 1600–1614. http://dx.doi.org/10.1177/0142331217709528.

Full text
Abstract:
An open communication infrastructure is used to support data transmission in a modern deregulated power system, it makes communication channels vulnerable to cyber-attacks and the reliability of the power system is affected. This paper studies the load frequency control of a one area power system under denial-of-service attacks. First, the state model of the closed-loop power system for one area is formulated, where the time delay of the communication channels is taken into account. Secondly, an event-triggering control mechanism is integrated with the load frequency control scheme of the power system; it can effectively improve the utilization of communication channels for an area control error transmission. Then, by utilizing the average dwell time design approach, the exponential stability criteria and the good stability effect can be obtained for a one area power system with an event-triggered load frequency control scheme under denial-of-service attacks, if an appropriate rate is chosen for the allowable denial-of-service attacks duration when the entire system running, and if the time delay margin can be acquired for these criteria. Finally, an example shows that the dynamics of a one area power system are compared with different denial-of-service attacks scenarios.
APA, Harvard, Vancouver, ISO, and other styles
15

Sidaner, Emilie, Daniel Balaban, and Luciene Burlandy. "The Brazilian school feeding programme: an example of an integrated programme in support of food and nutrition security." Public Health Nutrition 16, no. 6 (December 6, 2012): 989–94. http://dx.doi.org/10.1017/s1368980012005101.

Full text
Abstract:
AbstractObjectiveThe present paper analyses the advances and challenges of the school feeding programme in Brazil (PNAE), as part of the Brazilian experience building up an integrated food and nutrition security national system. It explores the role of policy and regulatory frameworks in constructing quality service delivery and intersectoral integration.DesignReview of PNAE and federal government technical documents and studies, legislation, minutes of meetings and official documents of the National Council of Food and Nutrition Security from 2003 to 2011.SettingFood insecurity has decreased significantly in Brazil in the last decade, indicating that appropriate choices were made in terms of public policies and institutional arrangements, which other countries can learn from.SubjectsBrazil food and nutrition security system; school feeding; school food.ResultsBrazil's integrated food and nutrition security policy approach promoted intersectorality in the food system, articulating actions to guarantee access to healthy food and to strengthen family farming. The quality of school meals has progressively improved; in particular, the availability of fruits and vegetables increased. However, national standards regarding menu composition have not yet been met. Regulations were an important factor, along with the policy approach linking food production, nutrition, health and education. Challenges are related to conflict of interests and to farmers’ insufficient capacity to meet supply requirements and comply with technical procedures.ConclusionsLocal food production, school meals and nutrition education can be linked through integrated programmes and policies, improving access to healthier foods. Government leadership, strong legislation, civil society participation and intersectoral decision making are determinant.
APA, Harvard, Vancouver, ISO, and other styles
16

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner. On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural and man-made systems governed by the laws of physics). The IoT and CPS are not isolated technologies. Rather it can be said that IoT is the base or enabling technology for CPS and CPS is considered as the grownup development of IoT, completing the IoT notion and vision. Both are merged into closed-loop, providing mechanisms for conceptualizing, and realizing all aspects of the networked composed systems that are monitored and controlled by computing algorithms and are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined, and they typically function on different time and location-based scales. In fact, the linking between the cyber and the physical world is enabled by IoT (through sensors and actuators). CPS that includes traditional embedded and control systems are supposed to be transformed by the evolving and innovative methodologies and engineering of IoT. Several applications areas of IoT and CPS are smart building, smart transport, automated vehicles, smart cities, smart grid, smart manufacturing, smart agriculture, smart healthcare, smart supply chain and logistics, etc. Though CPS and IoT have significant overlaps, they differ in terms of engineering aspects. Engineering IoT systems revolves around the uniquely identifiable and internet-connected devices and embedded systems; whereas engineering CPS requires a strong emphasis on the relationship between computation aspects (complex software) and the physical entities (hardware). Engineering CPS is challenging because there is no defined and fixed boundary and relationship between the cyber and physical worlds. In CPS, diverse constituent parts are composed and collaborated together to create unified systems with global behaviour. These systems need to be ensured in terms of dependability, safety, security, efficiency, and adherence to real‐time constraints. Hence, designing CPS requires knowledge of multidisciplinary areas such as sensing technologies, distributed systems, pervasive and ubiquitous computing, real-time computing, computer networking, control theory, signal processing, embedded systems, etc. CPS, along with the continuous evolving IoT, has posed several challenges. For example, the enormous amount of data collected from the physical things makes it difficult for Big Data management and analytics that includes data normalization, data aggregation, data mining, pattern extraction and information visualization. Similarly, the future IoT and CPS need standardized abstraction and architecture that will allow modular designing and engineering of IoT and CPS in global and synergetic applications. Another challenging concern of IoT and CPS is the security and reliability of the components and systems. Although IoT and CPS have attracted the attention of the research communities and several ideas and solutions are proposed, there are still huge possibilities for innovative propositions to make IoT and CPS vision successful. The major challenges and research scopes include system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. It is our great privilege to present Volume 21, Issue 3 of Scalable Computing: Practice and Experience. We had received 30 research papers and out of which 14 papers are selected for publication. The objective of this special issue is to explore and report recent advances and disseminate state-of-the-art research related to IoT, CPS and the enabling and associated technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to IoT and CPS. Vivek Kumar Prasad and Madhuri D Bhavsar in the paper titled "Monitoring and Prediction of SLA for IoT based Cloud described the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. Kasture et al. in the paper titled "Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition" compared the performance of features which are used in state of art speaker recognition models and analyse variants of Mel frequency cepstrum coefficients (MFCC) predominantly used in feature extraction which can be further incorporated and used in various smart devices. Mahesh Kumar Singh and Om Prakash Rishi in the paper titled "Event Driven Recommendation System for E-Commerce using Knowledge based Collaborative Filtering Technique" proposed a novel system that uses a knowledge base generated from knowledge graph to identify the domain knowledge of users, items, and relationships among these, knowledge graph is a labelled multidimensional directed graph that represents the relationship among the users and the items. The proposed approach uses about 100 percent of users' participation in the form of activities during navigation of the web site. Thus, the system expects under the users' interest that is beneficial for both seller and buyer. The proposed system is compared with baseline methods in area of recommendation system using three parameters: precision, recall and NDGA through online and offline evaluation studies with user data and it is observed that proposed system is better as compared to other baseline systems. Benbrahim et al. in the paper titled "Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer" proposed a novel classification model to classify skin tumours in images using Deep Learning methodology and the proposed system was tested on HAM10000 dataset comprising of 10,015 dermatoscopic images and the results observed that the proposed system is accurate in order of 94.06\% in validation set and 93.93\% in the test set. Devi B et al. in the paper titled "Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems" proposed a new class of techniques that do not perform stringent testing before allocating the resources but still ensure that the system is deadlock-free and the overhead is also minimal. The proposed technique suggests reserving a portion of the resources to ensure no deadlock would occur. The correctness of the technique is proved in the form of theorems. The average turnaround time is approximately 18\% lower for the proposed technique over Banker's algorithm and also an optimal overhead of O(m). Deep et al. in the paper titled "Access Management of User and Cyber-Physical Device in DBAAS According to Indian IT Laws Using Blockchain" proposed a novel blockchain solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. The proposed work assists cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices. Sumit Kumar and Jaspreet Singh in paper titled "Internet of Vehicles (IoV) over VANETS: Smart and Secure Communication using IoT" highlighted a detailed description of Internet of Vehicles (IoV) with current applications, architectures, communication technologies, routing protocols and different issues. The researchers also elaborated research challenges and trade-off between security and privacy in area of IoV. Deore et al. in the paper titled "A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars" proposed a new approach to supplement the technology used in self-driving cards for perception. The proposed approach uses Augmented Reality to create and augment artificial objects of navigational signs and traffic signals based on vehicles location to reality. This approach help navigate the vehicle even if the road infrastructure does not have very good sign indications and marking. The approach was tested locally by creating a local navigational system and a smartphone based augmented reality app. The approach performed better than the conventional method as the objects were clearer in the frame which made it each for the object detection to detect them. Bhardwaj et al. in the paper titled "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions" performed literature on IoV and Trust and proposed a Hybrid Trust model that seperates the malicious and trusted nodes to secure the interaction of vehicle in IoV. To test the model, simulation was conducted on varied threshold values. And results observed that PDR of trusted node is 0.63 which is higher as compared to PDR of malicious node which is 0.15. And on the basis of PDR, number of available hops and Trust Dynamics the malicious nodes are identified and discarded. Saniya Zahoor and Roohie Naaz Mir in the paper titled "A Parallelization Based Data Management Framework for Pervasive IoT Applications" highlighted the recent studies and related information in data management for pervasive IoT applications having limited resources. The paper also proposes a parallelization-based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach. Patel et al. in the paper titled "Performance Analysis of Video ON-Demand and Live Video Streaming Using Cloud Based Services" presented a review of video analysis over the LVS \& VoDS video application. The researchers compared different messaging brokers which helps to deliver each frame in a distributed pipeline to analyze the impact on two message brokers for video analysis to achieve LVS & VoS using AWS elemental services. In addition, the researchers also analysed the Kafka configuration parameter for reliability on full-service-mode. Saniya Zahoor and Roohie Naaz Mir in the paper titled "Design and Modeling of Resource-Constrained IoT Based Body Area Networks" presented the design and modeling of a resource-constrained BAN System and also discussed the various scenarios of BAN in context of resource constraints. The Researchers also proposed an Advanced Edge Clustering (AEC) approach to manage the resources such as energy, storage, and processing of BAN devices while performing real-time data capture of critical health parameters and detection of abnormal patterns. The comparison of the AEC approach is done with the Stable Election Protocol (SEP) through simulations and empirical data analysis. The results show an improvement in energy, processing time and storage requirements for the processing of data on BAN devices in AEC as compared to SEP. Neelam Saleem Khan and Mohammad Ahsan Chishti in the paper titled "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review" outlined major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore, this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. In addition, the researchers discussed the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. The researchers also proposed Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area. Bhadwal et al. in the paper titled "A Machine Translation System from Hindi to Sanskrit Language Using Rule Based Approach" proposed a rule-based machine translation system to bridge the language barrier between Hindi and Sanskrit Language by converting any test in Hindi to Sanskrit. The results are produced in the form of two confusion matrices wherein a total of 50 random sentences and 100 tokens (Hindi words or phrases) were taken for system evaluation. The semantic evaluation of 100 tokens produce an accuracy of 94\% while the pragmatic analysis of 50 sentences produce an accuracy of around 86\%. Hence, the proposed system can be used to understand the whole translation process and can further be employed as a tool for learning as well as teaching. Further, this application can be embedded in local communication based assisting Internet of Things (IoT) devices like Alexa or Google Assistant. Anshu Kumar Dwivedi and A.K. Sharma in the paper titled "NEEF: A Novel Energy Efficient Fuzzy Logic Based Clustering Protocol for Wireless Sensor Network" proposed a a deterministic novel energy efficient fuzzy logic-based clustering protocol (NEEF) which considers primary and secondary factors in fuzzy logic system while selecting cluster heads. After selection of cluster heads, non-cluster head nodes use fuzzy logic for prudent selection of their cluster head for cluster formation. NEEF is simulated and compared with two recent state of the art protocols, namely SCHFTL and DFCR under two scenarios. Simulation results unveil better performance by balancing the load and improvement in terms of stability period, packets forwarded to the base station, improved average energy and extended lifetime.
APA, Harvard, Vancouver, ISO, and other styles
17

Veretekhina Svetlana, V. "Mathematical Modeling of Knowledge-Intensive Products Export Energy Costs." WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (January 5, 2022): 1–8. http://dx.doi.org/10.37394/232016.2022.17.1.

Full text
Abstract:
This article presents the mathematical modeling of export energy costs. The knowledge-intensive products export energy costs are a set of financial, material, labor costs and resources consumption. Export costs are a multilevel system of indicators. The author sets out the order of mathematical modeling. At the first stage, the main trends in reducing export energy costs are identified. A set of integrated logistics support measures is modeled. The modeling of knowledge-intensive products export energy costs is a system of technical and economic indices and a cost value dependance: Maintenance and Repair, Material and Technical Maintenance, Business Model of After-Sales Service, Formation of the Cost of Insurance and Investment Management Strategy. Formulas, practical calculation examples and graphs are presented. The Ishikawa systematic analysis method is used to visualize data and dependence relations. The author's mathematical modeling of knowledge-intensive products export costs includes the calculation of integrated logistic support costs. Exporting countries require a high level of technical products efficiency. It has been established that "the more complex a knowledge-intensive products is, the higher the reliability of systems is". Reliability indices are basic. The author's scientific study confirms a hypothesis of the knowledge-intensive products export feasibility only with high reliability and efficiency factors. The author developed a set of integrated logistical support measures for knowledge-intensive products.
APA, Harvard, Vancouver, ISO, and other styles
18

Stanojević, Petar, and Goran Mandić. "Organizational and managerial aspects of the logistical response to the crisis caused by the COVID-19 pandemic in Serbia." Bezbednost, Beograd 63, no. 3 (2021): 77–96. http://dx.doi.org/10.5937/bezbednost2103077s.

Full text
Abstract:
Successful management before, during, as well as in the period of recovery from the crisis, is extremely important for reducing the consequences. Like any other type of management, crisis management involves planning, organizing, assigning tasks (command), coordination and control. These activities must be carried out in accordance with regulations, competences and procedures, especially in amorphous, fragmented and large systems such as national logistics. In this paper, the emphasis is placed on the analysis of 63 current regulations and procedures related to the logistical aspect of the response to the COVID-19 pandemic. The considered documents represent the regulatory basis for the management of the security system and its logistics. The analysis of the existing regulations governing crisis management, and especially the planning process, led to conclusions that indicate a lack of clear division of responsibilities, integrated or coordinated planning, but also the possibility of effective or appropriate preparation and management of necessary resources, which does not contribute much to the system resistance. It was also noticed that modelling and simulations, as modern methods, are not a part of the forecasting process. The current economic situation influences Serbia's strategic orientation to increase reserves and stocks as the main source of supply in crisis situations. The existence of logistical resources and sufficient capacities also influences the choice of an adequate strategy, which was clearly shown in the Serbian case during the epidemic. The paper highlights the positive aspects and makes recommendations that could improve the organization and management of logistical support to crisis situations in Serbia, especially in terms of resilience, but also flexibility.
APA, Harvard, Vancouver, ISO, and other styles
19

Sarjito, Aris. "PT Pelindo Marine Service: An Alternative Strategy for Maintenance of the Indonesian Navy’s Warships." Mediterranean Journal of Social Sciences 11, no. 4 (July 10, 2020): 27. http://dx.doi.org/10.36941/mjss-2020-0038.

Full text
Abstract:
The sea defense strategy, and concepts related to maritime strategy, relating to the overall strategy for achieving victory at sea. In securing the sea, the navy is very dependent on the main weapons system, especially warships. The Indonesian Navy in carrying out its duties rests on the strength of the IFWS (Integrated Fleet Weapons System): Warship, Aircraft, Marines, and Base. The four components of the IFWS are always maintained in combat readiness. One of the ship maintenance facilities in Surabaya that has the potential to be able to carry out maintenance of Navy ships is PT Pelindo Marine Service in Surabaya. This research uses descriptive qualitative approach. Logistics management theory and SWOT analysis are used by researchers as an analysis tool. The results of this study are the logistics management of PT PMS has ability to maintain Navy ships to support sea defense. Constraints faced by PT PMS include: (1) High sedimentation; (2) Inlet flow is crowded, narrow and shallow; and (4) Small dock capacity. The strategies developed by PT PMS to overcome obstacles in the maintenance of the navy’s ships: (1) Implement efficiency in HR, methods, budgets, and infrastructure to maximize profits; (2) Cooperation with similar companies; (3) Investing: dredging, increasing the capacity of the dockyard, and firefighting equipment, and damage control (controlling losses) so it does not get worse than expected.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Jing Jing. "The Research and Design of SOA-Based Systems." Advanced Materials Research 756-759 (September 2013): 2008–13. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2008.

Full text
Abstract:
According to the traditional IT system to integrated the parts and brings much repetition and high cost is insufficient, service oriented architecture is put forward solutions. Further introduces the service oriented architecture theory knowledge, transverse relative to the traditional development advantages, fully demonstrates the main trend of the service oriented architecture that drive. Discusses in detail the service oriented architecture (SOA), the core concept and design principles, and security measures to IBM led the company put forward using the service oriented architecture modeling, and to service the abstract concept to carry on the analysis. The core of service oriented is the component architecture and service data object, combining components and data on the part of the object oriented service principle. And Web services and SOA are compared to further understanding the connotation of SOA, and can support is given based on SOA application system of the specific technology, finally, the paper discusses the SOA further research direction.
APA, Harvard, Vancouver, ISO, and other styles
21

Delazari, Luciene Stamato, Leonardo Ercolin Filho, and Ana Luiza Stamato Delazari Skroch. "UFPR CampusMap: a laboratory for a Smart City developments." Abstracts of the ICA 1 (July 15, 2019): 1–2. http://dx.doi.org/10.5194/ica-abs-1-57-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> A Smart City is based on intelligent exchanges of information that flow between its many different subsystems. This flow of information is analyzed and translated into citizen and commercial services. The city will act on this information flow to make its wider ecosystem more resource-efficient and sustainable. The information exchange is based on a smart governance operating framework designed to make cities sustainable.</p><p>The public administration needs updated and reliable geospatial data which depicts the urban environment. These data can be obtained through smart devices (smartphones, e.g.), human agents (collaborative mapping) and remote sensing technologies, such as UAV (Unnamed Aerial Vehicles). According to some authors, there are four dimensions in a Smart City. The first dimension concerns the application of a wide range of electronic and digital technologies to create a cyber, digital, wired, informational or knowledge-based city; the second is the use of information technology to transform life and work; the third is to embed ICT (Information and Communication Technology) in the city infrastructure; the fourth is to bring ICT and people together to enhance innovation, learning, and knowledge. Analyzing these dimensions, it is possible to say that in all of them the geospatial information is crucial, otherwise, none of them are possible. Considering these aspects, this research intends to use the Smart City concept as a methodological approach using the UFPR (Federal University of Parana) as a target to develop a case study.</p><p>The UFPR has 26 campus in different cities of the Paraná State, south of Brazil. Its structure has 14 institutes. It comprises 11 million square meters of area, 500,000 square meters of constructed area and 316 buildings. There are more than 6,300 employees (staff and administration), 50,000 undergraduate students and 10,000 graduate students. Besides these figures, there are external people who need access to the UFPR facilities, such as deliveries, service providers and the community in general.</p><p>The lack of knowledge about the space and its characteristics has a direct impact on issues such as resources management (human and material), campi infrastructure (outside and inside of the buildings), security and other activities which can be supported using an updated geospatial database. In 2014, the UFPR CampusMap project was started with the indoor mapping as the main goal. However, the base map of the campus was needed in order to support the indoor mapping, the available one was produced in 2000. Thereafter, the campus Centro Politécnico (located in the city of Curitiba) is being used as a case study to develop methodologies to create a geospatial database which will allows to different users the knowledge and management of the space.</p><p>According to Gruen (2013), a Smart City must have spatial intelligence. Moreover, it is necessary the establishment of a database, in particular, a geospatial database. The knowledge of the space where the events happen is a key element in this context. This author also states that to achieve this objective are necessary the following items:</p> <ul><li>Automatic or semi-automated Digital Surface Models (DSM) generation from satellite, aerial and terrestrialimages and/or LiDAR data;</li><li>Further development of the semi-automated techniques onto a higher level of automation; </li><li>Integrated automated and semi-automated processing of LiDAR point clouds and images, both from aerial andterrestrial platforms; </li><li>Streamlining the processing pipeline for UAV image data projects; </li><li>Set-up of GIS with 3D/4D capabilities; </li><li>Change detection and databases updating; </li><li>Handling of dynamic and semantic aspects of city modeling and simulation. This leads to 4D city models; </li><li>LBS (Location Based Services) system investigations (PDAs, mobiles); and </li><li>Establishment of a powerful visualization and interaction platform.</li></ul><p>Some of these aspects are being addressed in this research. The first one is the integration of indoor/outdoor data to helps the space management and provides a tool for navigation between the spaces. The base map was updated through a stereo mapping compilation from images collected using a UAV Phantom 4 from DJI (https://www.dji.com/phantom-4). The use of this technology for data acquisition is not only faster but also cheaper compared to the traditional photogrammetric method. Besides the quality of the images (in this case a GSD – Ground Sample Distance – of 2,5 cm), it can be use in urban areas as a rapid response in emergency situations.</p><p> To georreferencing the image block, it was used 50 control points collected by GNSS (Global Navigation Satellite System) and the software Agisoft Photoscan (http://www.agisoft.com/) to perform the bundle block adjustment with self-calibration. After the processing, the exterior orientation parameters of image block and the tridimensional coordinates of each tie point were calculated simultaneously with the determination of the interior orientation parameters: focal length (f), principal point coordinates (x0, y0), radial symmetric (k1, k2, k3) and decentering distortion coefficients (p1, p2).</p><p> In the mapping production step, the features were extracted through stereo mapping compilation accordingly the standards defined by the Brazilian Mapping Agency. The several layers were edited in GIS software (QGIS) and then the topology was built. Afterward, it was created a spatial database using Postgre/PostGIS. Also, the dense point cloud was generated using SfM (Structure from Motion) algorithms to allow to generate the digital surface model and orthomosaics.</p><p> Meanwhile, a website using HTML5+CSS3&amp;reg; and JavaScript&amp;reg; technologies was developed to publish the results and the first applications. (www.campusmap.ufpr.br). The architecture of this application uses JavaScript&amp;reg;, LeafLet, PgRouting library (to calculate the routes between interest points), files in GeoJson format and custom applications. The indoor database comprises the data about the interior of the buildings and provides to the user some functionalities such as: search for rooms, laboratories, and buildings; routes between points (inside and outside the buildings), floor change. Also, some web applications were developed in order to demonstrate the capabilities of the use of geospatial information in an environment very similar to a city and its problems, e.g. parking management, security, logistics, resources inventory, among others. It was developed a mobile application to provide the indoor user positioning through Wi-Fi (Wireless Fidelity) networks. This, combined with the indoor mapping, will allow the users to navigate in real time inside the buildings. Using the data from the point cloud and the CityGML standard it was developed a 3D model of some buildings. An application to inform crime occurrences (such as robbery, assaults) was also developed so these occurrences can be mapped, and the administration can increase the security of the campus.</p><ol type="a"> <li>Design an interface with functionalities to integrate all applications which are being presented in individual Webpages;</li><li>Develop a visualization tool for 3D models using CityGML;</li><li>Evaluate the potential of UAV images for different applications in urban scenarios;</li><li>Develop an interface for collaborative database update.</li><li>Expand the database to other campus of UFPR and develop new functionalities to different users;</li></ol><p> The “smart city” concept allows to develop an optimized system that use geospatial data to understand the complexity of the urban environments. The use of the geospatial data can improve efficiency and security to manage urban aspects like infrastructure, building and public spaces, natural environment, urban services, health and education. Also, this concept can give a support to the city management agents during the design, realization and evaluation of the urban projects.</p><p>In the present project, we believe these are the first steps to build a connected environment and apply the “smart city” concept into the university administration to make the sustainable use of resources and could suit as an example to some existing problems in public administrations.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Berkson, Jonathan M., Arthur A. Allen, Donald L. Murphy, and Kenneth J. Boda. "Integrated Ocean Observing System (IOOS®) Supports Marine Operations: A Look from the U.S. Coast Guard." Marine Technology Society Journal 44, no. 6 (November 1, 2010): 156–65. http://dx.doi.org/10.4031/mtsj.44.6.22.

Full text
Abstract:
AbstractThe U.S. Coast Guard (USCG) is primarily a user of ocean observations but is also a provider of observations—especially in high-latitude regions. USCG has a long history of making ocean observations for mission activities and in support of other federal agencies. USCG uses the Integrated Ocean Observing System (IOOS®) to understand maritime conditions while conducting the Coast Guard’s roles of Maritime Safety, Maritime Security, and Maritime Stewardship. IOOS data are critical in planning search and rescue operations, ensuring safe navigation at high latitudes, responding to oil and hazardous spills, providing vessel traffic services, and maintaining maritime domain awareness (MDA). The International Ice Patrol makes and uses ocean observations to estimate drift and deterioration of icebergs. The North American Ice Service products are needed in polar and domestic ice operations. The National Oceanic Atmospheric Administration and the USCG are developing a way to disseminate the Physical Oceanographic Real-Time System data via the USCG Automatic Identification System. The Coast Guard provides personnel and vessel support for the National Data Buoy Center observational program, a component of the IOOS. Many key oceanographic, biologic, and geologic discoveries in the Arctic and Antarctic have been made from Coast Guard cutters. As oceanographic data acquisition moves from vessel observations to satellite remote sensing and unmanned in situ data acquisition systems, the USCG will continue to support this effort.
APA, Harvard, Vancouver, ISO, and other styles
23

Tinto, E. M., and K. G. Banda. "The Integrated National Electrification Programme and political democracy." Journal of Energy in Southern Africa 16, no. 4 (November 1, 2005): 26–33. http://dx.doi.org/10.17159/2413-3051/2005/v16i4a3077.

Full text
Abstract:
Since the coming of democracy in South Africa, the last decade has been marked by extraordinary, yet positive changes in policy development. Democratic organisation, both as a system of government and as a value system commanding the support of ordinary people, is of key importance in these developments and the implications for South Africa are still being analysed. Noticeable are the fundamental changes in the energy sector where there has been a shift from energy self-reliance and energy security to a more sustainable policy approach driven by economic efficiency, social equity and environment protection. Institutes of Democracy like IDEA (2004) concur with this trend that a strong democratic system must support poverty reduction for meaningful democratic change and, in practice; this is clearly the trend being defined. It is now a sustainable development issue, and voter’s confidence that is fast becoming the defining principle and drives for rapid policy change and service delivery in the form of an Integrated National Electrification Programme (INEP) in the energy sector. Policy makers in energy policy acknowledge this phenomenon as defining what is now seen as a ‘post-apartheid energy paradigm shift’. In this paper, it is suggested that the National Electrification Programme (NEP) has performed beyond expectation in increasing access to electricity for the poor in the country. It is also argued that, there is now an electrification and political democracy nexus exhibited in social and political development of this country. In this line of thought, the argument given is that one of the reasons why people voted for the ruling party in 1999 and 2000 was the NEP. Furthermore this identified linkage provides policy recommendations that suggest that the government should deliver other basic services in a similar manner in order to gain people’s confidence. In South Africa, because of the country’s unique social, economic and political history, a trade-off between basic social service delivery and linkage with democracy then becomes very crucial. Keywords
APA, Harvard, Vancouver, ISO, and other styles
24

Kameyama, Michitaka. "Special Issue on Intelligent Integrated Systems for Human-Oriented Information Society." Journal of Robotics and Mechatronics 12, no. 5 (October 20, 2000): 501. http://dx.doi.org/10.20965/jrm.2000.p0501.

Full text
Abstract:
Recent advance in the information technology makes our society very convenient from the viewpoint of human-to-human information communication. However, our new living style will require not only human-tohuman communication but also autonomous intelligent applications that support human beings such as an intelligent robot system, an intelligent transportation system, and a security/safe system as shown in Figure. These applications will contribute to human-oriented information society.Intelligent vehicle Home service robot Security The use of special-purpose VLSI processors capable of processing a large amount of real-world data is essential to make such applications realistic. In recent industrial trend, the special-purpose processors are called ""System LSIs"". One of the most important environmental informations in real-world applications is a vision information. The factor common to the applications is to catch an environment information moment by moment and to respond quickly with it. Therefore, it is important to make the response time from inputs to outputs very small. In this case, sensor data transfer bottleneck is not allowed as well as memory-to-PE (Processing Element) data transfer bottleneck. An image sensor signal processing VLSI together with image sensor devices is a key issue in such applications. From the above point of views, this special issue was planned to demonstrate the recent results of this area. Finally, I would like to express my appreciation to the authors for their efforts and contributions to this special issue and also the members of the Editorial Board for their cooperation.
APA, Harvard, Vancouver, ISO, and other styles
25

Kristiyana, Samuel, Diky Siswanto, and Prastyono Eko Pambudi. "Sistem Komunikasi Radio Terpadu Masyarakat Mitra Polhut dan Masyarakat Peduli Api di Kawasan Gunung Merapi." Jurnal Pemberdayaan Umat 1, no. 1 (February 25, 2022): 39–50. http://dx.doi.org/10.35912/jpu.v1i1.766.

Full text
Abstract:
Abstract Purpose: to find out the Integrated Radio Communication System potential volunteers from the community who are members of the MPP and MPA to increase their understanding of mastery of radio communication tools, ethics, and coded communication and to follow the frequency regulations set by the Ministry of Communications and Information Technology. Methode: The community service method uses an Integrated Radio Communication System workshop and training for people who are members of the MPP and MPA on how to set up radio communication tools, using two-meter band radio communication procedures, communication ethics, and mastery of communication languages. Result: Design and installation of radio repeater Integrated Radio Communication System Workshop resulted in an understanding of the SKRT system and improved MPP and MPA capabilities. Mastery of communication tools, ethics, communication code language, and following frequency regulations set by the government. Limitations: By planning and implementing the SKRT and preparing volunteers from the community, MPP and MPA will support the main tasks and functions of the Taman Nasional Gunung Merapi for the protection and security and handling of the Mount Merapi eruption disaster. Research Contribution: Carrying out the implementation, in this case, is the Taman Nasional Gunung Merapi to plan and implement the SKRT and prepare the potential of the community to take joint responsibility for the conservation, protection, and security, and disaster response of Mount Merapi.
APA, Harvard, Vancouver, ISO, and other styles
26

Hamzah, Norhamiza, and Siti Zubaidah Ismail. "INTEGRATING COMPREHENSIVE INDUSTRIAL RAW MATERIAL DELIVERY PLANNING AND PRODUCT-SERVICE SYSTEM INVENTORY CONTROL." Journal of Modern Manufacturing Systems and Technology 4, no. 1 (March 27, 2020): 14–22. http://dx.doi.org/10.15282/jmmst.v4i1.3820.

Full text
Abstract:
Product Service Systems (PSS) are integrated product and service offerings that provide superior customer value in industrial applications for planning, inventory control, delivery planning and a use jointly defined. Delivery planning is a particular challenge in providing personal security services. A good delivery planning is can minimize problem from great complexity subject to various constraints within a large solution space. Organizations offering PSS services or industrial services suffer from decision support to put in place robust capacity planning strategies in highly dynamic and uncertain environments. This paper presents a simulation-based approach to capacity planning. The goal of this project to identify potential routes of integration between two factors deliveries planning and PSS inventory control that could improve the delivery performance based on the raw material industry. Emphasis is placed on capacity planning for PSS inventory control and delivery planning. By using IDEFØ (Integration Definition for Function) generic modelling and Delmia Quest simulation software in this research able to achieve the time required. The advantage of IDEFØ includes: a well-tested language and a comprehensive systems modelling technique. The resulting IDEFØ models are well-defined, easy to understand, well-structured, easy to change and use, and can be extended to any depth of detail. Meanwhile, Delmia Quest software will provide real time simulation for production process and generated report for actual operational situation. After a few general considerations on robust capacity planning for the control and delivery of technical support inventory using scenario simulations, the main elements of the agent-based simulation method are presented. The most important parameters given by company A, the control parameters and the performance indicators are discussed and the scenario planning process based on the simulation is described.
APA, Harvard, Vancouver, ISO, and other styles
27

Vivek Tammineedi, Venkata Satya, and V. N. Rajavarman. "A Novel Analysis of Advanced Visual Cryptography Techniques for Providing Security Against Web Attacks Using Support Vector Machine Technique." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2097–114. http://dx.doi.org/10.1166/jctn.2020.8855.

Full text
Abstract:
In today’s internet applications such as some real time application services like core banking and other public service oriented application have been major issue in authentication of user specification. To perform online dictionary attacks, passwords have been used for security and authentication mechanism. Present days, hacking of databases on web oriented applications is unavoidable to access them easily. Data maintenance is a complex task in internet applications. To solve these type of problems in internet applications, in this paper, we proposed a novel Integrated and Dynamic CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) (I&D CAPTCHA), which is extension version of existing CAPTCHA that valuated third party human attacks in internet applications based Visual Cryptography approach to discuss about authentication problem in real time applications. There is more number of methods presented for security in advanced pictures for insurance from inventive uninvolved or dynamic assaults in system correspondence environment. Like insightful Visual Cryptographic (VC) is a cutting edge strategy, which is utilized to mystery picture safely impart furthermore keep up to privacy. To proceed with difficulties of security in advanced picture information sharing, so in this paper we break down various VC security instruments for computerized picture information offering to regard tomystery information secrecy. Our examination give effective security answers for relative mystery advanced picture information imparting to correspondence progressively environment. Security aspects are main concepts in present days because of increasing statistical data storage. In Artificial Intelligence (AI) oriented applications, it is very difficult in terms of protection to increasing new aspects in real time world. So we also plan a Novel and Advanced Security system to enable solution for basic AI problems in this paper. This framework mainly works based on Captcha as visual security passwords (CaRP); it is two way communication plan which means that, it is the combination of Captcha and visual security plan. Our approach mainly worked with image security with respect to selection of passwords based on random way. In this paper, we also propose AMODS, an adaptive system that periodically updates the detection model to detect the latest unknown attacks. We also propose an adaptive learning strategy, called SVM HYBRID, leveraged by our system to minimize manual work. Our system out performs existing web attack detectionmethods, with an F-value of 94.79% and FP rate of 0.09%. The total number of malicious queries obtained by SVM HYBRID is 2.78 times that by the popular Support Vector Machine Adaptive Learning (SVMAL) method. The malicious queries obtained can be used to update the Web Application Firewall (WAF) signature library.
APA, Harvard, Vancouver, ISO, and other styles
28

Waluyo, Ari, and Nur Fais Irfandi. "PERANCANGAN SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PEGAWAI TELADAN MENGGUNAKAN METODE SAW (SIMPLE ADDITIVE WEIGHTING) BERBASIS WEB DI DINAS PENANAMAN MODAL DAN PELAYANAN TERPADU SATU PINTU KABUPATEN KEBUMEN." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 6, 2019): 71–86. http://dx.doi.org/10.37339/e-komtek.v3i2.132.

Full text
Abstract:
The purpose of this research is to design decision support system of exemplary web-based employee using SAW (Simple Additive Weighting) method in capital investment and integrated service one door regency kebumen. Calculation method used is SAW (Simple Additive Weighting) method. Data collection techniques used is by observation, literature study and interviews that have a close relationship with the principal problems and methods of system development used is the method of waterfall system development. From the results of research conducted found the problems such as the lack of effective selection of exemplary employees who performed because it is still manual so that the selection of exemplary employees are still not efficient. The suggestions given to overcome the problem are: 1) Need to be socialized and training to the related sections, especially on the Subdivision of Personnel and general as admin, so that information systems can be utilized properly, 2) Need a better system development for data security can be more awake.
APA, Harvard, Vancouver, ISO, and other styles
29

Ilchenko, O. V. "State border as an object of administrative and legal activity of the State Customs Service." Legal horizons, no. 25 (2020): 81–85. http://dx.doi.org/10.21272/legalhorizons.2020.i25.p81.

Full text
Abstract:
Protection of the state border is one of the most important functions of the state. The state border is a feature that should be inherent in any state and without which its existence is impossible. Areas of territorial sovereignty of states are determined by the boundaries established between them. Thus, the main purpose of borders is to establish the boundaries of state territories. No state can exist without a legally defined territory. However, the geopolitical state attribute is the relevant political space, which is determined by state borders, which are enshrined in national and international law. The proper functioning of any country, the level of its social and economic development directly depends on the reliable protection, defense and stability of state borders. An integral part of the state border policy and state and legal regulation is the creation of an effective, perfect legal framework and conditions for ensuring the sovereignty, territorial integrity and inviolability of Ukraine, taking into account the current security challenges related to state regulation of border security. , protection and defense of the state border in general and administrative and legal regulation in particular. Ukraine's European integration policy, globalization processes taking place in the world, manifestations of foreign aggression affect border policy and require finding ways to increase the level of reliability of protection and protection of the state border as the main attribute of its sovereignty, territorial integrity and important national security of Ukraine. An important measure to increase Ukraine's border security is the implementation in Ukraine of the project "EU Support to Strengthening Integrated Border Management in Ukraine (EU4IBM)" funded by the European Union and implemented by the International Center for Migration Policy Development (ICMPD). The implementation of the Project will provide an opportunity to identify and eliminate shortcomings in the implementation of reforms that will help bring the national border management system closer to the standards and best practices of the European Union.
APA, Harvard, Vancouver, ISO, and other styles
30

Bilous, M. V., O. P. Shmatenko, O. A. Ryzhov, V. V. Trokhymchuk, О. V. Galan, and D. V. Drozdov. "Conceptual aspects of management of the distribution of medical supplies from the position of military pharmaceutical logistics." Farmatsevtychnyi zhurnal, no. 3 (March 18, 2019): 3–11. http://dx.doi.org/10.32352/0367-3057.3.19.01.

Full text
Abstract:
One of the main directions of logistic support of the Armed Forces of Ukraine is medical support which is aimed at life safeguard and health of military personnel, well-timed and efficient provision of medical care in the event of injuries, injuries and diseases, fast renewal of combat power and ability to work in different conditions of its handling and at different period of time. The readiness of medical service of the Armed Forces of Ukraine to the medical support of the troops depends on the well-timed organization of medical supplies and the refilling of medical supplies full and complete. The qualitative and efficient allocation of medical equipment and medical supplies is a determining factor in this process. The aim of the work – reasoning of the irregularity of distribution logistics in the unified logistic system of the Armed Forces of Ukraine and the study of the main aspects of management of the distribution of medical supplies from the position of military pharmaceutical logistics. To get the purpose of the research, the analysis of domestic scientific sources and the current normative and legal base of Ukraine have been carried out. Research methods are: information search, comparison, systemization, semantic analysis, synthesis and modeling. In the conditions of logistic support of the Armed Forces of Ukraine and other components of the security and defense forces of Ukraine, the logistic function of the distribution of logistical equipment, inventory, military equipment and services (food, bath and laundry services, etc.) should ensure the activity of troops (forces) in peacetime and war time. It is the guarantee of the ability to ensure the defense of the state and appropriate response to military threats to the national security of Ukraine, efficiently using available potential and resources. Distribution logistics from the position of military pharmaceutical logistics is the management of all functional subsystems of the medical supplies and health services of the Ministry of Defense of Ukraine in order to optimize the distribution of the material flow (purchased medical supplies) from the supplier to the final consumer (according to the applications of the Military Medical Clinical Centers of the Regions). Same, distributive logistics in the structure of a unified logistic support system of the Armed Forces of Ukraine does not carry a commercial component, and its functions consist in planning, organization of distribution, control and regulation of the logistic process of distribution of material and technical means (including medical equipment and supplies), inventory, military equipment, services (catering, bath and laundry service, etc.). According to the authors, the term «marketing logistics» is not possible to use as a single system of logistic support of the Armed Forces of Ukraine, and in its subsystems. To sum it up, it was suggested to use the term «distributive logistics». On the basis of theoretical generalization of the data of scientific literature and normative legal acts, the main aspects of management of the distribution of medical equipment and supplies from the standpoint of military pharmaceutical logistics are studied. The functions of distributive logistics are defined, the model of the current logistic chain of distribution of medical equipment and supplies in the medical service of the Armed Forces of Ukraine is constructed. It is noted that in order to ensure the qualitative and efficient distribution of medical equipment and supplies, a regulatory and legal framework which regulates the division of powers between institutions and units of medical supplies and defines the responsibility for their implementation in the current conditions of the reformation of the Armed Forces of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
31

Nagy, Judit, Judit Oláh, Edina Erdei, Domicián Máté, and József Popp. "The Role and Impact of Industry 4.0 and the Internet of Things on the Business Strategy of the Value Chain—The Case of Hungary." Sustainability 10, no. 10 (September 29, 2018): 3491. http://dx.doi.org/10.3390/su10103491.

Full text
Abstract:
In the era of industrial digitalization, companies are increasingly investing in tools and solutions that allow their processes, machines, employees, and even the products themselves, to be integrated into a single integrated network for data collection, data analysis, the evaluation of company development, and performance improvement. To study the impact of Industry 4.0 on the company we used Porter’s (1985) value chain model, which is particularly useful when paying particular attention to corporate areas which have a primary role in customer value creation. Since the primary impact of Industry 4.0 is perceived in value-creating processes, and has so far had the greatest transformative effect in this area, the model can be considered to be appropriate. The objective of our research is to discover how companies operating in Hungary interpret the phenomenon of Industry 4.0, what Internet of Things (IoT) tools they use to support their processes, and what critical issues they face during adaptation. We applied a dual methodology in our investigation: We sent an online questionnaire to manufacturing and logistical service companies to investigate the IoT tools they use, and the problems they face, and received 43 answers we could evaluate. We also conducted four expert interviews with manufacturing firms to get deeper insights into the application, critical issues and development phases of IoT tools. During our research, we found that the spread of real-time data across companies—given the availability of appropriate analytical tools and methods—can have a significant impact on the entire company. In the case of CPS (Cyber Physical System), CPPS and Big Data Technologies, companies using them have been evaluated as having a higher level of logistic service, more efficient processes with their partners, improved cooperation between certain logistic functions, and higher market and financial performance and competitiveness. Applying more efficient production processes, and achieving better productivity and economies of scale, might also result in increased economic sustainability. Furthermore, we have found that companies have started on the path to digital evolution, and investments of this type have already begun.
APA, Harvard, Vancouver, ISO, and other styles
32

McDarby, Geraldine, Lindy Reynolds, Zandile Zibwowa, Shams Syed, Ed Kelley, and Sohel Saikat. "The global pool of simulation exercise materials in health emergency preparedness and response: a scoping review with a health system perspective." BMJ Global Health 4, no. 4 (July 2019): e001687. http://dx.doi.org/10.1136/bmjgh-2019-001687.

Full text
Abstract:
Simulation Exercises (SimEx) are an established tool in defence and allied security sectors, applied extensively in health security initiatives under national or international legislative requirements, particularly the International Health Regulations (2005). There is, however, a paucity of information on SimEx application to test the functionality of health systems alongside emergency preparedness, response and recovery. Given the important implications health services resilience has for the protection and improvement of human life, this scoping review was undertaken to determine how the publicly available body of existing global SimEx materials considers health systems, together with health security functions in the event of disruptive emergencies.The global review identified 668 articles from literature and 73 products from institutional sources. Relevant screening identified 51 materials suitable to examine from a health system lens using the six health system building blocks as per the WHO Health System Framework. Eight materials were identified for further examination of their ability to test health system functionality from a resilience perspective.SimEx are an effective approach used extensively within health security and emergency response sectors but is not yet adequately used to test health system resilience. Currently available SimEx materials lack an integrated health system perspective and have a limited focus on the quality of services delivered within the context of response to a public health emergency. The materials do not focus on the ability of systems to effectively maintain core services during response.Without adjustment of the scope and focus, currently available SimEx materials do not have the capacity to test health systems to support the development of resilient health systems. Dedicated SimEx materials are urgently needed to fill this gap and harness their potential as an operational tool to contribute to improvements in health systems. They can act as effective global goods to allow testing of different functional aspects of health systems and service delivery alongside emergency preparedness and response.The work was conducted within the scope of the Tackling Deadly Diseases in Africa Programme, funded by the UK Department for International Development, which seeks to strengthen collaboration between the health system and health security clusters to promote health security and build resilient health systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Nativi, S., G. M. R. Manzella, F. Paolucci, P. Mazzetti, L. Pecci, L. Bigagli, and F. Reseghetti. "Federated data bases for the development of an operational monitoring and forecasting system of the ocean: the THREDDS Dataset Merger." Advances in Geosciences 8 (June 6, 2006): 39–47. http://dx.doi.org/10.5194/adgeo-8-39-2006.

Full text
Abstract:
Abstract. During the last decade, operational monitoring and forecasting systems have been developed in all the European seas. The exchange of data and products and the development of services for a wide community of users pose some fundamental issues, whose solution has become a priority in integrated and GMES referring projects, such as the MERSEA European project. These projects aim to develop a European system for operational monitoring and forecasting on global and regional scales of ocean physics, bio-chemistry and ecosystems. GMES system and its operational projects need to federate resources and expertise coming from diverse organizations working on different Earth Sciences fields (e.g. satellite data processing, in situ observing systems, data management, ocean and ecosystem modeling, etc.). Therefore, it is required a Marine Information Management (MIM) system capable of facilitating the regular real-time exchange of high quality information, data and products. Moreover, MIM system must provide appropriate information for a wide range of external users both in real-time and delayed mode. In this paper an architecture based on the OPeNDAP/THREDDS technology is proposed as a solution for these operational systems. In this context, a catalog merging solution is introduced for the MIM system, which results in the design and development of the THREDDS Dataset Merger (TDM): a set of services meant to merge THREDDS Dataset Inventory Catalogs, so to achieve a unique catalog service for a whole database federation. TDM service merges distributed and autonomous THREDDS catalogs in order to work out a virtual merged catalog. The TDM service was extended in order to provide automatic catalogs synchronization. This service allows extending the pull-based TDM paradigm to support push-based applications. Some security issues are also considered.
APA, Harvard, Vancouver, ISO, and other styles
34

José G. Hernández R., María J. García G., and Gilberto J. Hernández G. "Safety and Attention of Passengers With Disabilities Who Travel by Train." International Journal of Sustainable Entrepreneurship and Corporate Social Responsibility 7, no. 1 (January 2022): 1–16. http://dx.doi.org/10.4018/ijsecsr.287867.

Full text
Abstract:
In this work, within the business world, two fields of great social interest are related. In particular, it will talk about corporate Safety & Security (S&S) and Corporate Social Responsibility (CSR). The importance of S&S in a service company will be analyzed, while some of the actions that these companies can take to increase their CSR will be studied. Specifically, the study will focus on trying to offer some recommendations, to help ensure that train travel is safer and more enjoyable for passengers who suffer from a disability. From what has been said previously, the objective of this work can be stated as: present some actions, so that the trip by train, of passengers with some disability, is safer and more pleasant. To achieve this objective and the secondary objectives that may be generated, the Integrated-Adaptable Methodology for the development of Decision Support System will be followed, which, it has been shown, is very useful in investigations similar to this.
APA, Harvard, Vancouver, ISO, and other styles
35

Sastry, Shivakumar, and S. S. Iyengar. "Real-Time Sensor-Actuator Networks." International Journal of Distributed Sensor Networks 1, no. 1 (February 2005): 17–34. http://dx.doi.org/10.1080/15501320490886314.

Full text
Abstract:
Emerging technologies offer new paradigms for computation, control, collaboration, and communication. To realize the full potential of these technologies in industry, defense, and homeland security applications, it is necessary to exploit the real-time distributed computing capabilities of sensor-actuator networks. To reliably design and develop such networks, it is necessary to develop deeper insight into the underlying model for real-time computation and the infrastructure at the node level that supports this model. In this paper, we discuss a new node-level operating system and mechanisms necessary to deploy reliable applications. The overriding issue that guides the design of this operating system is quality of service metric called predictability. A sensor-actuator network is a distributed platform for integrated computation and control in real-time environments. The nodes in such a network are distinguished by being resource constrained. The power of the network arises from the interactions between simple nodes. Such a network extends the popular distributed sensor networks in several dimensions. After identifying a real-time model, we develop a notion of predictability for a sensor-actuator network. We discuss how the node-level operating system is designed in the resource-constrained environment. An efficient multithreading mechanism and scheduling strategy are required to ensure that local tasks are executed within jitter bounds and that end-to-end delays do not violate application constraints. Mechanisms to support communication, monitoring, safety, fault tolerance, programming, diagnosability, reconfiguration, composability, interoperability, and security are discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Dunt, David R., Andrew W. Benoy, Andrea Phillipou, Laura L. Collister, Elizabeth M. Crowther, Julian Freidin, and David J. Castle. "Evaluation of an integrated housing and recovery model for people with severe and persistent mental illnesses: the Doorway program." Australian Health Review 41, no. 5 (2017): 573. http://dx.doi.org/10.1071/ah16055.

Full text
Abstract:
Objective The Doorway program is a 3-year pilot integrated housing and recovery support program aimed at people with a severe and persistent mental illness who are ‘at risk’ or actually homeless. Participants source and choose properties through the open rental market, with appropriate rental subsidy and brokerage support. This arrangement is highly innovative, differing from widely favoured arrangements internationally involving congregate and scattered-site housing owned or managed by the support program. The aim of the present study was to determine the effects of the Doorway program on participants’ health, housing, service utilisation and costs. Methods A pre-post study design was used with outcome measures consisting of a number of question inventories and their costs (where relevant). The principal inventories were the Behaviour and Symptom Identification Scale 32 (BASIS-32), a consumer-oriented, self-report measure of behavioural symptoms and distress, the Health of the Nation Outcome Scale (HoNOS), an interviewer-administered measurement tool designed to assess general health and social functioning of mentally ill people and the Outcomes Star (Homelessness) system which measures various aspects of the homelessness experience. Baseline measurements were performed routinely by staff at entry to the program and then at 6-monthly intervals across the evaluation period. Results For 55 of 59 participants, total mean BASIS-32 scores (including as well three of five subscale scores) improved significantly and with moderate effect size. Four of the 10 domain scores on the Outcome Star (Homelessness) inventory also improved significantly, with effect sizes ranging from small–medium (three domains) to large (one domain). Mean usage of bed-based mental health clinical services and general hospital admissions both significantly decreased (with overall net savings of A$3096 per participant per annum). Overall cost savings (including housing) to government ranged from A$1149 to A$19837 depending on the housing type comparator. Conclusion The Doorway program secured housing for this vulnerable group with additional benefits in client outcomes, including reduced use and cost of health services. These findings, if confirmed in larger studies, should have widespread applicability internationally. What is known about the topic? Beneficial effects of housing and recovery programs (Housing First) on people with severe and persistent mental illness and who are ‘at risk’, or actually homeless, are being demonstrated in Northern America. These effects include housing security, well being, health service utilisation and cost effects on government. However, these beneficial effects can only be regarded as settled for housing security. The highly innovative Doorway care model in which participants source and choose properties through the open rental market, with appropriate rental subsidy and brokerage support, has not been investigated previously. What does this paper add? This paper adds new data on the Doorway care models, it’s effects and costs, particularly with regard to participant behavioural distress and social functioning. What are the implications for practitioners? The beneficial effects of this innovative model, if confirmed in larger studies, should have widespread applicability internationally.
APA, Harvard, Vancouver, ISO, and other styles
37

Kang, Yunhee, Jaehyuk Cho, and Young B. Park. "An Empirical Study of a Trustworthy Cloud Common Data Model Using Decentralized Identifiers." Applied Sciences 11, no. 19 (September 27, 2021): 8984. http://dx.doi.org/10.3390/app11198984.

Full text
Abstract:
The Conventional Cloud Common Data Model (CDM) uses a centralized method of user identification and credentials. This needs to be solved in a decentralized way because there are limitations in interoperability such as closed identity management and identity leakage. In this paper, we propose a DID (Decentralized Identifier)-based cloud CDM that allows researchers to securely store medical research information by authenticating their identity and to access the CDM reliably. The proposed service model is used to provide the credential of the researcher in the process of creating and accessing CDM data in the designed secure cloud. This model is designed on a DID-based user-centric identification system to support the research of enrolled researchers in a cloud CDM environment involving multiple hospitals and laboratories. The prototype of the designed model is an extension of the encrypted CDM delivery method using DID and provides an identification system by limiting the use cases of CDM data by researchers registered in cloud CDM. Prototypes built for agent-based proof of concept (PoC) are leveraged to enhance security for researcher use of ophthalmic CDM data. For this, the CDM ID schema and ID definition are described by issuing IDs of CDM providers and CDM agents, limiting the IDs of researchers who are CDM users. The proposed method is to provide a framework for integrated and efficient data access control policy management. It provides strong security and ensures both the integrity and availability of CDM data.
APA, Harvard, Vancouver, ISO, and other styles
38

Islamova, O. O. "Perspectives of euro-atlantic integration of the system of professional training of the personnel of the State border guard service of Ukraine." ScientifiScientific Herald of Sivershchyna. Series: Education. Social and Behavioural Sciences 2021, no. 2 (November 1, 2021): 91–102. http://dx.doi.org/10.32755/sjeducation.2021.02.091.

Full text
Abstract:
The purpose of the article is the definition of prospective areas of Euro-Atlantic integration of the system of professional training of future border guard officers on the basis of the National Academy of the State Border Guard Service of Ukraine. Results. The article reveals perspectives of Euro-Atlantic integration of the system of professional training of the personnel of the State Border Guard Service of Ukraine. The considered perspective directions envisage joining the system of joint training of specialists of various subjects of border guard activity in order to increase the level of interoperability of the personnel of the State Border Guard Service of Ukraine on the basis of NATO standards. It has been determined that it is necessary to carry out wide consultations with representatives of NATO and NATO member states on the implementation of training programs for personnel training on issues within the competence of the Ukrainian Border Guard Service, ensuring the participation of National Academy in new research projects between Ukraine and NATO, obtaining grants for research support. It was found out that in the conditions of introduction of informal models of education in the Ukrainian system of training of border guards of various specialties it is necessary to introduce experience of NATO countries on development and carrying out of trainings on relevant subjects, especially on formation of foreign language professional competence of border guards according to STANAG 6001. Practical implications and value. Modernization of the technical component of the educational process of a higher military educational institution includes: creation of an internal educational network on border security and management, introduction of a platform for information exchange and communication between national and foreign educational institutions; creation of a virtual contact center to provide video conferencing; intensive use of mobile learning, introduction of electronic tools, virtual simulators and simulators for use by teachers in personnel training. Key words: the Euro-Atlantic integration, border guards, integrated training, NATO standards, interoperability.
APA, Harvard, Vancouver, ISO, and other styles
39

Zhang, H., W. Huang, and J. Yang. "DESIGN AND IMPLEMENTATION OF REAL-TIME LOG ANALYSIS SYSTEM OF MAP WORLD PLATFORM." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4 (September 19, 2018): 745–49. http://dx.doi.org/10.5194/isprs-archives-xlii-4-745-2018.

Full text
Abstract:
<p><strong>Abstract.</strong> In the big data era, real-time log data analysis is becoming the important demands for Internet enterprises, behind these data hiding big value. Map Word, the National Platform for Common GeoSpatial Information Services in China, is a one-stop website providing geospatial information services to personal users, enterprises, professional agencies and governments. After 7 years’ development of the platform, the traffic increased significantly, reaching 200 million service requests per day. But due to the lack of effective analysis and processing technology, the log data did not play its value, which lead to disconnection between the top-level design of national common geospatial information services and the actual demands of the users in a way. Now, the geospatial information service in China is trying to shift from the data production driven to the demand driven actively, and how to understand the demands of users became one imperious issue for research. In addition, the access behaviour of group users to common geospatial information services has a social nature and there is a certain group access behaviour pattern. This mode has high intensity of access aggregation and spontaneity, and determines the demand of common geospatial information services for cloud computing resources. Parts of the above demands can be analysed from the log data. Therefore, how to develop a log analysis system for unified real-time collection, real-time analysis, centralized storage, and graphical display is the key to support the demands. Flume, Kafka, Storm, Redis and HBase have been integrated to design and implement a distributed real-time log analysis system supporting online and offline log analysis. The system is composed of log collection module, asynchronous communication module, real time analysis and calculation module, data cashing and storage module, and visualization module. The system was release and integrated with Map World in June 2017 successfully, and the implementation of the system indicates that it can efficiently solve the problems of real-time log data collection, real-time analysis, real-time storage, real-time query, massive data storage, offline analysis, etc. It played an important role in map data update, policy making, product decisions, online server load prediction, resource allocation optimization, Internet security improvement and operation funs evaluation.</p>
APA, Harvard, Vancouver, ISO, and other styles
40

ZAITSEV, Sergei V., Arina B. ALIBEKOVA, Anastasiya D. KOROTENKOVA, and Sof’ya S. SHISHKINA. "Analytical methods and tools for risk diagnostics in the activities of agricultural organizations." Finance and Credit 28, no. 1 (January 31, 2022): 105–23. http://dx.doi.org/10.24891/fc.28.1.105.

Full text
Abstract:
Subject. The article addresses risk diagnostics in the activities of organizations of agro-industrial complex in the Astrakhan Oblast. Objectives. The focus is to develop practical recommendations aimed at minimizing the risks of organizations operating in the agro-industrial complex of the Astrakhan Oblast. Methods. The study rests on the analysis of data provided by the State Statistics Service, the Ministry of Agriculture and Fishing Industry of the Astrakhan Oblast and the calculation of indicators based on these data. We apply the indicative method and calculation of integrated index. Results. We analyzed the main socio-economic indicators and diagnosed risks, using a risk map. The indicative method and the calculation of integrated indicator helped specify a low (pre-crisis) level of economic security in the agro-industrial complex for three years under study. To mitigate the identified risks we proposed measures to be taken by the government, like farm business concessional loans scheme, careful selection of creditors and borrowers, support to unprofitable farms, taking into account the WTO rules. Conclusions. The findings enable to analyze the current state of agriculture in the Astrakhan Oblast and develop the areas of risk mitigation in the agro-industrial complex. It is crucial to stabilize the financial condition through stock reduction, improve the supply chain process, the system of warehouses and storage facilities.
APA, Harvard, Vancouver, ISO, and other styles
41

Chumak, V. V. "Activities of the Armed Forces of Latvia, Lithuania and Estonia: Experience for Ukraine." Bulletin of Kharkiv National University of Internal Affairs 87, no. 4 (December 22, 2019): 162–69. http://dx.doi.org/10.32631/v.2019.4.16.

Full text
Abstract:
The current state of activity of the Armed Forces of the Baltic States such as Latvia, Lithuania and Estonia has been studied. The experience of the Armed Forces of these countries in ensuring collective defense, security and peace in accordance with NATO standards has been analyzed. It is stated that the National Armed Forces of the Republic of Latvia is a group of troops intended to protect the fundamental freedoms, independence and territorial integrity of the state. It’s a part of the Ministry of Defence of Latvia. It is emphasized that the Armed Forces of the Republic of Lithuania are a state military organization whose purpose is to protect the territorial integrity and inviolability of the state. It is a structural unit of the Ministry of National Defence Republic of Lithuania. It is noted that the Armed Forces of Estonia (Defence Forces) is a military organized unit of the Executive authority, which is headed by the government of the Republic and the Ministry of Defence of Estonia. It is stated that the activities of the Armed Forces of the Baltic States are carried out on the principle of collective defence of the North Atlantic Treaty Organization, which task is to protect the member States from military threat. Based on the analyzed experience of the Baltic States’ Armed Forces, it has been concluded that the effective functioning and activities of the Armed Forces depends on a clear definition of the main priorities in the field of defenсe, chains of international community and valid logistical support. It is noted about the possible implementation of certain positive provisions regarding the transformation about the integrated leadership system of the defenсe forces and military management in the Armed Forces in accordance with NATO standards and the provision of advisory assistance.
APA, Harvard, Vancouver, ISO, and other styles
42

Awa, Hart O., and Ojiabo Ukoha Ojiabo. "A model of adoption determinants of ERP within T-O-E framework." Information Technology & People 29, no. 4 (November 7, 2016): 901–30. http://dx.doi.org/10.1108/itp-03-2015-0068.

Full text
Abstract:
Purpose The purpose of this paper is to attempts to provide further insight into IS adoption by investigating how 12 factors within the technology-organization-environment framework explain small- and medium-sized enterprises’ (SMEs) adoption of enterprise resource planning (ERP) software. Design/methodology/approach The approach for data collection was questionnaire survey involving executives of SMEs drawn from six fast service enterprises with strong operations in Port Harcourt. The mode of sampling was purposive and snow ball and analysis involves logistic regression test; the likelihood ratios, Hosmer and Lemeshow’s goodness of fit, and Nagelkerke’s R2 provided the necessary lenses. Findings The 12 hypothesized relationships were supported with each factor differing in its statistical coefficient and some bearing negative values. ICT infrastructures, technical know-how, perceived compatibility, perceived values, security, and firm’s size were found statistically significant adoption determinants. Although, scope of business operations, trading partners’ readiness, demographic composition, subjective norms, external supports, and competitive pressures were equally critical but their negative coefficients suggest they pose less of an obstacle to adopters than to non-adopters. Thus, adoption of ERP by SMEs is more driven by technological factors than by organizational and environmental factors. Research limitations/implications The study is limited by its scope of data collection and phases, therefore extended data are needed to apply the findings to other sectors/industries and to factor in the implementation and post-adoption phases in order to forge a more integrated and holistic adoption framework. Practical implications The model may be used by IS vendors to make investment decisions, to meet customers’ needs, and to craft informed marketing programs that would appeal to actual and potential adopters and cause them to progress in the customer loyalty ladder. Originality/value The paper contributes to the growing research on IS innovations’ adoption by using factors within the T-O-E framework to explains SMEs’ adoption of ERP.
APA, Harvard, Vancouver, ISO, and other styles
43

HIPPE, ROMANA. "FUNCTIONS AND CONCEPTS OF CASE MANAGEMENT IN THE WORK OF A PATIENT CARE SPECIALIST. PROTECTION FUNCTION." Chelovek.RU, no. 2021-16 (November 22, 2021): 121–32. http://dx.doi.org/10.32691/2410-0935-2021-16-121-132.

Full text
Abstract:
In line with WHO's goal of providing continuous and integrated patient care, case management focuses on the field of direct care and seeks to transcend organizational and professional boundaries on a case-by-case basis. The selection and specialization of participants in the division of labor in this area focuses on a common goal. This requires the initiation of a collaborative process in which a person or group of people takes responsibility for coordinating care over a period of time or throughout the course of care. Case management should support people who, for certain reasons (illness or disability), cannot perceive their interests and independently organize their affairs. The aim is to offer the client self-help help in order to avoid permanent addiction. At the same time, the protection function acquires a socio-political dimension: through case management, the shortcomings of the social security system become visible. This refers to those positions that are responsible for guaranteeing the provision of needs-oriented social security. The task of those holding these positions / positions is to create the best prerequisites for the implementation of targeted strategies of activity. Currently, case managers take on diverse functions, in particular the function of a navigator, supporting the client, for example, in his attempts to navigate a variety of service offerings, departmental regulations and legal norms. The lawyer function of case management plays a significant role, since patients / clients and their relatives are in a difficult and sensitive life situation and, in need of help, are not able to defend their interests.
APA, Harvard, Vancouver, ISO, and other styles
44

Little, Jeanette, Amanda Schmeltz, Mabel Cooper, Tabitha Waldrop, Jeffrey S. Yarvis, Larry Pruitt, and Katy Dondanville. "Preserving Continuity of Behavioral Health Clinical Care to Patients Using Mobile Devices." Military Medicine 186, Supplement_1 (January 1, 2021): 137–41. http://dx.doi.org/10.1093/milmed/usaa281.

Full text
Abstract:
ABSTRACT Introduction The current model for treating behavioral health patients requires that providers and patients be in the same location for appointments. However, deploying warfighters present a challenge to this current model. Recent advances in technology make telehealth or virtual visits a viable option to replace the current model. This project leveraged mobile technology to see if performing tele-behavioral health visits presented a viable option to the current in-person model for future deployed warfighters. At the time of this publication, the authors note the current pandemic lends all the more urgency to the need for enhancing our video communication platforms for remote monitoring with the Military Health System. Materials and Methods The research team assessed existing Internet protocol-based desktop teleconferencing solutions, generically known as a Web Real-Time Communications (WebRTC) system, for establishing a secure connection to a Service Members personal mobile device outside of the Department of Defense (DoD) network. Of the five existing WebRTC systems evaluated, only the backbone component to the existing Defense Information Systems Agency Global Video Services (DISA GVS) known as Vidyo, was suitable to meet DoD security requirements and still connect with both major operating systems (OS) on mobile devices. An existing DoD program of record mobile application, mCare, was integrated with Vidyo desktop technologies to form what the research team called “Mobile Connect.” Results Deployment of the Mobile Connect product yielded distinct differences and high levels or variability between the .osd.mil and the army.mil network connections over time. These network differences impacted quality of service solution where Mobile Connect could not be used to provide care between the .mil and patient’s personal mobile devices from a osd.mil domain connection. The current DoD WebRTC systems offer potential solutions but presently cannot connect with personal mobile devices in their current configurations. Additionally, any WebRTC system used by the DoD for future connections to personal mobile device must leverage commercial Single Socket Layer certificates (e.g., not DoD issued), or the communications with the mobile device will fail as a result of an authentication error. Conclusion It is technically feasible to provide desktop Video Tele-Conference capabilities from a .mil computer to a personal mobile device without compromising DoD security and information assurance requirements using future WebRTC systems. Approved ports, protocols, and system settings must be configured to accept both inbound and outbound, encrypted traffic to/from personal mobile devices to maintain consistent quality of service with all DoD networks. Of the current DoD WebRTC options, working with the DISA GVS Program Manager to expand services to support commercial mobile devices has the highest probability of future success.
APA, Harvard, Vancouver, ISO, and other styles
45

Chan, S., and A. Chan. "What Do Cancer Patients Value? A Unique Experience at Maggie's Cancer Caring Centre in Hong Kong." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 105s. http://dx.doi.org/10.1200/jgo.18.38100.

Full text
Abstract:
Background: Maggie's Cancer Caring Centre in Hong Kong (“Maggie's HK”) adopted a person-centered approach advocated by Maggie Keswick Jencks, who was the founder and a cancer patient. Witnessing first-hand that many psychosocial needs of a cancer patient could not be met through the existing medical system, Maggie created a blueprint for a purposefully-designed architecture and the services complementary to the existing system. The centre aims to empower people affected by cancer, be they cancer patients or caregivers, to live with, live through and live beyond cancer via informational and psychological consultations, psychosocial support programs and a therapeutic environment. People in need are welcome to drop-in anytime to use the centre while all services/programs are free and no referral/appointment is needed. As this patient-oriented drop-in service, integrated multidisciplinary approach and the therapeutic architecture, as one of a kind would conceptually make people feel at home, feel respected, see themselves as a person rather than a patient, and gain confidence in facing and walking through the cancer journey, how does this translate into practice in Maggie's HK? Aim: To examine the uniqueness of Maggie's HK cancer care service, especially the patient-oriented drop-in service and the purposefully-designed environment, this study investigated cancer patients' related experience at Maggie's HK and its influences on their cancer adjustment and adaptive coping in the community. Methods: A qualitative study design was adopted. Thirteen semistructured focus group interviews, each with 5-6 cancer patients/care-givers at Maggie's HK, were held from August 2016 to January 2017. Each interview lasted from 1.5 to 2.5 hours and were audio recorded then transcribed verbatim. Different themes were generated through repeated readings and content analysis with constant comparison. Results: Three main themes regarding the unique experiences of the drop-in service model under a purposefully-designed environment at Maggie's HK were emerged from the focus groups: Creating a sense of home for the centre users. Users reported the centre is like their second home giving them a sense of autonomy, security, trust and comfort. Empowering users to deal with uncertainties. Users reported the (drop-in) service helps to reduce their fear, worries and doubts. Providing a nurturing context for users' needs. Users reported the design of the physical environment has catered to their specific needs at different moments in time. Conclusion: The study reveals that the innovative model of patient-oriented drop-in service under a therapeutic physical environment at Maggie's HK contributes significantly a positive experience and impact on cancer patients in the reduction of their fear and worries, while enhancing their role as active participants in their care. There is also a developed sense of autonomy, security and confidence in the cancer journey.
APA, Harvard, Vancouver, ISO, and other styles
46

Lin, Hui, Pei Liu, Wei Li, Lian Peng Zhang, and Ya Zhou Ji. "Construction of Digital Mine and Key Technologies." Advanced Materials Research 524-527 (May 2012): 413–20. http://dx.doi.org/10.4028/www.scientific.net/amr.524-527.413.

Full text
Abstract:
In China, the mine is facing a stern challenge over its environmental protection, the limitation on its structure and function within its subsystem, optimization of its limited manpower, financial and material resources and its sustainable development. Digital mine is come up with to deal with all these problems. The Digital Mine can be liken to “a logistics supply chain”, the basic characteristic is the high-speed network, with broadband and two-way communication system, used as “path map”, which shall make sure the fast delivery of all the data within all the relevant enterprises in the country; It consists of vehicles, which refers to the techniques of Mine CAD, virtual reality, mine simulation, scientific calculation, artificial intelligence, visualization and office automation; goods, which refers to mine data and mind application model; package, which refers to 3DGM(3-Dimensional Geographical Model) and data mining; security system, which refers to the collection and renewal system of mine data; and dispatching system, which refers to MGIS(Mine Geographical Information System), the common carrier of the entire information and office decisions, controlling the use and operation of all vehicles as well as all of the goods production and the package system. The basic structure of the Digital Mine is composed of two parts: digital ground and digital mine. The digital ground is a management information system based on the EPR (Enterprise Resource Planning) and spatial information infrastructure and information system based on 3S technology and computer network. The digital mine regards the mine geology and surveying data as basic information data for spatial positioning, furthermore, inputting other relevant information if necessary, such as mining working-face, excavating working-face, underground chamber, mechanical and electronic equipments, ventilation and safety device, underground pipeline and communication and others, forming a spatial database. Thus, the entire mine’s information system of management and service and decision support system is established. The Digital Mine is a huge systematic project, involving 3S (GIS, GPS, RS), IT (Information technology), mine science, virtual reality technology and visualization technology. Based on computers and network communication, the Digital Mine realizes the digitization of storing, transporting, expressing and applying of all the relevant spatial data and attribute data, including mine construction, exploration, development, mining, environmental protection and control. In addition, it is also a huge artificial intellectual system that integrates digital construction, digital exploration, digital mining, digital environmental protection and digital forecasting based on data dictionary technology, data warehouse technology, WebGIS, virtual reality technology, multimedia technology, CASE technology and artificial intelligence technology.
APA, Harvard, Vancouver, ISO, and other styles
47

Riemann, Ute. "Benefits and Challenges for BPM in the Cloud." International Journal of Organizational and Collective Intelligence 5, no. 1 (January 2015): 32–61. http://dx.doi.org/10.4018/ijoci.2015010103.

Full text
Abstract:
Business processes are not only variable, they are dynamic as well. A key benefit of BPM is the ability to adjust processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape that allows the flexible provision and usage-based invoicing of resources, services, and applications via a network or the Internet. The generic term “X-as-a-Service” summarized the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, Microsoft delivered an application platform with managed cloud infrastructure services however more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. In order to be classified as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, it should be hosted off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential, questions that need to be answered are as follows: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as safeguards with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.
APA, Harvard, Vancouver, ISO, and other styles
48

Riemann, Ute. "Benefits and Challenges for Business Process Management in the Cloud." International Journal of Organizational and Collective Intelligence 5, no. 2 (April 2015): 80–104. http://dx.doi.org/10.4018/ijoci.2015040104.

Full text
Abstract:
Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.
APA, Harvard, Vancouver, ISO, and other styles
49

Jamil, Faisal, Hyun Kook Kahng, Suyeon Kim, and Do-Hyeun Kim. "Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms." Sensors 21, no. 5 (February 26, 2021): 1640. http://dx.doi.org/10.3390/s21051640.

Full text
Abstract:
Blockchain technology has recently inspired remarkable attention due to its unique features, such as privacy, accountability, immutability, and anonymity, to name of the few. In contrast, core functionalities of most Internet of Things (IoT) resources make them vulnerable to security threats. The IoT devices, such as smartphones and tablets, have limited capacity in terms of network, computing, and storage, which make them easier for vulnerable threats. Furthermore, a massive amount of data produced by the IoT devices, which is still an open challenge for the existing platforms to process, analyze, and unearth underlying patterns to provide convenience environment. Therefore, a new solution is required to ensure data accountability, improve data privacy and accessibility, and extract hidden patterns and useful knowledge to provide adequate services. In this paper, we present a secure fitness framework that is based on an IoT-enabled blockchain network integrated with machine learning approaches. The proposed framework consists of two modules: a blockchain-based IoT network to provide security and integrity to sensing data as well as an enhanced smart contract enabled relationship and inference engine to discover hidden insights and useful knowledge from IoT and user device network data. The enhanced smart contract aims to support users with a practical application that provides real-time monitoring, control, easy access, and immutable logs of multiple devices that are deployed in several domains. The inference engine module aims to unearth underlying patterns and useful knowledge from IoT environment data, which helps in effective decision making to provide convenient services. For experimental analysis, we implement an intelligent fitness service that is based on an enhanced smart contract enabled relationship and inference engine as a case study where several IoT fitness devices are used to securely acquire user personalized fitness data. Furthermore, a real-time inference engine investigates user personalized data to discover useful knowledge and hidden insights. Based on inference engine knowledge, a recommendation model is developed to recommend a daily and monthly diet, as well as a workout plan for better and improved body shape. The recommendation model aims to facilitate a trainer formulating effective future decisions of trainee’s health in terms of a diet and workout plan. Lastly, for performance analysis, we have used Hyperledger Caliper to access the system performance in terms of latency, throughput, resource utilization, and varying orderer and peers nodes. The analysis results imply that the design architecture is applicable for resource-constrained IoT blockchain platform and it is extensible for different IoT scenarios.
APA, Harvard, Vancouver, ISO, and other styles
50

Shupyk, Serhii. "DAIRY LIVESTOCK OF AGRICULTURAL ENTERPRISES: CURRENT STATE AND PROSPECTS OF DEVELOPMENT." Economic Analysis, no. 31(1) (2021): 252–60. http://dx.doi.org/10.35774/econa2021.01.252.

Full text
Abstract:
Introduction. Despite the important role of dairy farming in agricultural enterprises in ensuring food security of the state, it is now in critical condition. During the period of reforming the agro-industrial complex of Ukraine there was a significant structural restructuring in social production, intra-sectoral and intersectoral relations changed, new market economic approaches to the development of agricultural sectors were formed. The state in which the industry found itself led to low livestock productivity and high production costs compared to countries - leading producers of livestock products, the liquidation of specialized enterprises. The process of unbundling the property complexes of the reformed agricultural enterprises led to the physical destruction of production facilities for keeping farm animals. Goal. On the basis of generalization of data of the State Statistics Service of Ukraine to assess the current state of functioning of dairy farming of agricultural enterprises and on this basis to develop practical recommendations for measures of state and regional support of the industry. Method (methodology). The research methodology is formed on the basis of evaluation of statistical data of the State Statistics Service of Ukraine for the development of the dairy industry of the corporate sector of the agricultural economy. In the process of scientific research, comparative, structural research methods were used. Results. It is established that the main primary reason for the decrease in the number of agricultural enterprises producing milk is the decrease in the investment attractiveness of dairy farming due to the influence of such factors as long payback period, low efficiency of state support; significant variability of the milk and dairy products market. The introduced changes in the provision of state support to agricultural producers in 2019-2019 convince that the system of direct state subsidies will be beneficial primarily to integrated economic entities in the field of agribusiness, engaged in poultry and pig farming. The main benefits from state subsidies will be, first of all, large and economically stable enterprises. Measures of state and regional support of milk production in agricultural enterprises, which are aimed at increasing the number of cows, their productivity and quality, are substantiated.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography