40 resultados para Essential services


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Product/service-systems (PSS) are in effect an approach to designing integrated products and services with a focus on both customer and product life cycle activities. A range of service-oriented design strategies can be found in current literature, from product-oriented DfX approaches to more customer-oriented approaches, such as integrated solutions. In this article, design strategies related to different types of services are mapped. Case studies from two industrial companies are used to confront the existing literature in order to improve the understanding of how manufacturing companies may align their product and service development activities with their business strategies. © 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Services based around complex engineering equipment and systems provide substantial challenges in both the long-term management of the equipment and the need for guaranteed delivery of the related service. One of the challenges for an organisation providing these services is the management of the information that is required to design, deliver and subsequently assess the success of the service. To assist in this process this paper develops a model for capturing, organising and assessing information requirements for these Complex Engineering Services in which information required to support key decisions in the life cycle of the service is identified. The model – referred to as The 12-Box Model for Service Information Requirements – is embedded in a three-phase procedure for providing an assessment of information requirements of a service contract which also provides insight into the capabilities of available information systems in supporting the contract. An illustrative example examining service information in an aircraft availability contract is used to demonstrate the use of the 12-Box Model and associated assessment procedure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: There is an increasing recognition that modelling and simulation can assist in the process of designing health care policies, strategies and operations. However, the current use is limited and answers to questions such as what methods to use and when remain somewhat underdeveloped. Aim. The aim of this study is to provide a mechanism for decision makers in health services planning and management to compare a broad range of modelling and simulation methods so that they can better select and use them or better commission relevant modelling and simulation work. Methods. This paper proposes a modelling and simulation method comparison and selection tool developed from a comprehensive literature review, the research team's extensive expertise and inputs from potential users. Twenty-eight different methods were identified, characterised by their relevance to different application areas, project life cycle stages, types of output and levels of insight, and four input resources required (time, money, knowledge and data). Results: The characterisation is presented in matrix forms to allow quick comparison and selection. This paper also highlights significant knowledge gaps in the existing literature when assessing the applicability of particular approaches to health services management, where modelling and simulation skills are scarce let alone money and time. Conclusions: A modelling and simulation method comparison and selection tool is developed to assist with the selection of methods appropriate to supporting specific decision making processes. In particular it addresses the issue of which method is most appropriate to which specific health services management problem, what the user might expect to be obtained from the method, and what is required to use the method. In summary, we believe the tool adds value to the scarce existing literature on methods comparison and selection. © 2011 Jun et al.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations-- for instance to do with building design, planning or vehicle standards--is likely to have a more immediate effect.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyanobacteria perform photosynthesis and respiration in the thylakoid membrane, suggesting that the two processes are interlinked. However, the role of the respiratory electron transfer chain under natural environmental conditions has not been established. Through targeted gene disruption, mutants of Synechocystis sp. PCC 6803 were generated that lacked combinations of the three terminal oxidases: the thylakoid membrane-localized cytochrome c oxidase (COX) and quinol oxidase (Cyd) and the cytoplasmic membrane-localized alternative respiratory terminal oxidase. All strains demonstrated similar growth under continuous moderate or high light or 12-h moderate-light/dark square-wave cycles. However, under 12-h high-light/dark square-wave cycles, the COX/Cyd mutant displayed impaired growth and was completely photobleached after approximately 2 d. In contrast, use of sinusoidal light/dark cycles to simulate natural diurnal conditions resulted in little photobleaching, although growth was slower. Under high-light/dark square-wave cycles, the COX/Cyd mutant suffered a significant loss of photosynthetic efficiency during dark periods, a greater level of oxidative stress, and reduced glycogen degradation compared with the wild type. The mutant was susceptible to photoinhibition under pulsing but not constant light. These findings confirm a role for thylakoid-localized terminal oxidases in efficient dark respiration, reduction of oxidative stress, and accommodation of sudden light changes, demonstrating the strong selective pressure to maintain linked photosynthetic and respiratory electron chains within the thylakoid membrane. To our knowledge, this study is the first to report a phenotypic difference in growth between terminal oxidase mutants and wild-type cells and highlights the need to examine mutant phenotypes under a range of conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.