3 resultados para Lean Manufacturing, MTO, Power Equipments, Kanban, Rapid Response Management

em Boston University Digital Common


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective: To identify differences between manufacturing firms in Nigeria that have undertaken HIV/AIDS prevention activities and those that have not as a step toward improving the targeting of HIV policies and interventions. Methods: A survey of a representative sample of registered manufacturing firms in Nigeria, stratified by location, workforce size, and industrial sector. The survey was administered to managers of 232 firms representing most major industrial areas and sectors in March-April 2001. Results: 45.3 percent of the firms’ managers received information about HIV/AIDS from a source outside the firm in 2000; 7.7 percent knew of an employee who was HIV-positive at the time of the survey; and 13.6 percent knew of an employee who had left the firm and/or died in service due to AIDS. Only 31.7 percent of firms took any action to prevent HIV among employees in 2000, and 23.9 percent had discussed the epidemic as a potential business concern. The best correlates of having taken action on HIV were knowledge of an HIV-positive employee or having lost an employee to AIDS (odds ratio [OR] 6.36, 95% confidence interval [CI]: 2.30, 17.57) and receiving information about the disease from an outside source (OR 7.83, 95% CI: 3.46, 17.69). Conclusions: Despite a nationwide HIV seroprevalence of 5.8 percent, as of 2001 most Nigerian manufacturing firm managers did not regard HIV/AIDS as a serious problem and had neither taken any action on it nor discussed it as a business issue. Providing managers with accurate, relevant information about the epidemic and practical prevention interventions might strengthen the business response to AIDS in countries like Nigeria.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Fuzzy ART system introduced herein incorporates computations from fuzzy set theory into ART 1. For example, the intersection (n) operator used in ART 1 learning is replaced by the MIN operator (A) of fuzzy set theory. Fuzzy ART reduces to ART 1 in response to binary input vectors, but can also learn stable categories in response to analog input vectors. In particular, the MIN operator reduces to the intersection operator in the binary case. Learning is stable because all adaptive weights can only decrease in time. A preprocessing step, called complement coding, uses on-cell and off-cell responses to prevent category proliferation. Complement coding normalizes input vectors while preserving the amplitudes of individual feature activations.