13 resultados para Business enterprises -- Computer networks

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A method is proposed to offer privacy in computer communications, using symmetric product block ciphers. The security protocol involved a cipher negotiation stage, in which two communicating parties select privately a cipher from a public cipher space. The cipher negotiation process includes an on-line cipher evaluation stage, in which the cryptographic strength of the proposed cipher is estimated. The cryptographic strength of the ciphers is measured by confusion and diffusion. A method is proposed to describe quantitatively these two properties. For the calculation of confusion and diffusion a number of parameters are defined, such as the confusion and diffusion matrices and the marginal diffusion. These parameters involve computationally intensive calculations that are performed off-line, before any communication takes place. Once they are calculated, they are used to obtain estimation equations, which are used for on-line, fast evaluation of the confusion and diffusion of the negotiated cipher. A technique proposed in this thesis describes how to calculate the parameters and how to use the results for fast estimation of confusion and diffusion for any cipher instance within the defined cipher space.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This major text assumes no prior knowledge of IS or IT and builds both business and Information systems knowledge to enable the reader to choose the right systems, to develop them and to manage them effectively. The three-part structure to the book covers: Introduction to business information systems Business information systems development Business information systems management Suitable for any IS, BIS or MIS course from UG to MBA level within a Business or Computer Science Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A comprehensive introduction to the technology, development and management of business information systems. The book assumes no prior knowledge of IS or IT, so that new concepts and terms are defined as clearly as possible, with explanations in the text, and definitions at the margin. In this fast-moving area, the book covers both the crucial underpinnings of the subject as well as the most recent business and technology applications. It is written for students on any IS, BIS or MIS course from undergraduate to postgraduate and MBA level within a Business or Computer Science Department.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Congestion control is critical for the provisioning of quality of services (QoS) over dedicated short range communications (DSRC) vehicle networks for road safety applications. In this paper we propose a congestion control method for DSRC vehicle networks at road intersection, with the aims of providing high availability and low latency channels for high priority emergency safety applications while maximizing channel utilization for low priority routine safety applications. In this method a offline simulation based approach is used to find out the best possible configurations of message rate and MAC layer backoff exponent (BE) for a given number of vehicles equipped with DSRC radios. The identified best configurations are then used online by an roadside access point (AP) for system operation. Simulation results demonstrated that this adaptive method significantly outperforms the fixed control method under varying number of vehicles. The impact of estimation error on the number of vehicles in the network on system level performance is also investigated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A comprehensive introduction to the technology, development and management of business information systems. The book assumes no prior knowledge of IS or IT, so that new concepts and terms are defined as clearly as possible, with explanations in the text, and definitions at the margin. In this fast-moving area, the book covers both the crucial underpinnings of the subject as well as the most recent business and technology applications.It is written for students on any IS, BIS or MIS course from undergraduate to postgraduate and MBA level within a Business or Computer Science Department - See more at: http://catalogue.pearsoned.ca/educator/product/Business-Information-Systems-Technology-Development-and-Management-for-the-EBusiness/9780273716624.page#sthash.LgAheK57.dpuf

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Automated negotiation systems can do better than human being in many aspects, and thus are applied into many domains ranging from business to computer science. However, little work about automating negotiation of complex business contract has been done so far although it is a kind of the most important negotiation in business. In order to address this issue, in this paper we developed an automated system for this kind of negotiation. This system is based on the principled negotiation theory, which is the most effective method of negotiation in the domain of business. The system is developed as a knowledge-based one because a negotiating agent in business has to be economically intelligent and capable of making effective decisions based on business experiences and knowledge. Finally, the validity of the developed system is shown in a real negotiation scenario where on behalf of human users, the system successfully performed a negotiation of a complex business contract between a wholesaler and a retailer. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Fibre Distributed Data Interface (FDDI) represents the new generation of local area networks (LANs). These high speed LANs are capable of supporting up to 500 users over a 100 km distance. User traffic is expected to be as diverse as file transfers, packet voice and video. As the proliferation of FDDI LANs continues, the need to interconnect these LANs arises. FDDI LAN interconnection can be achieved in a variety of different ways. Some of the most commonly used today are public data networks, dial up lines and private circuits. For applications that can potentially generate large quantities of traffic, such as an FDDI LAN, it is cost effective to use a private circuit leased from the public carrier. In order to send traffic from one LAN to another across the leased line, a routing algorithm is required. Much research has been done on the Bellman-Ford algorithm and many implementations of it exist in computer networks. However, due to its instability and problems with routing table loops it is an unsatisfactory algorithm for interconnected FDDI LANs. A new algorithm, termed ISIS which is being standardized by the ISO provides a far better solution. ISIS will be implemented in many manufacturers routing devices. In order to make the work as practical as possible, this algorithm will be used as the basis for all the new algorithms presented. The ISIS algorithm can be improved by exploiting information that is dropped by that algorithm during the calculation process. A new algorithm, called Down Stream Path Splits (DSPS), uses this information and requires only minor modification to some of the ISIS routing procedures. DSPS provides a higher network performance, with very little additional processing and storage requirements. A second algorithm, also based on the ISIS algorithm, generates a massive increase in network performance. This is achieved by selecting alternative paths through the network in times of heavy congestion. This algorithm may select the alternative path at either the originating node, or any node along the path. It requires more processing and memory storage than DSPS, but generates a higher network power. The final algorithm combines the DSPS algorithm with the alternative path algorithm. This is the most flexible and powerful of the algorithms developed. However, it is somewhat complex and requires a fairly large storage area at each node. The performance of the new routing algorithms is tested in a comprehensive model of interconnected LANs. This model incorporates the transport through physical layers and generates random topologies for routing algorithm performance comparisons. Using this model it is possible to determine which algorithm provides the best performance without introducing significant complexity and storage requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Collaborative working with the aid of computers is increasing rapidly due to the widespread use of computer networks, geographic mobility of people, and small powerful personal computers. For the past ten years research has been conducted into this use of computing technology from a wide variety of perspectives and for a wide range of uses. This thesis adds to that previous work by examining the area of collaborative writing amongst groups of people. The research brings together a number of disciplines, namely sociology for examining group dynamics, psychology for understanding individual writing and learning processes, and computer science for database, networking, and programming theory. The project initially looks at groups and how they form, communicate, and work together, progressing on to look at writing and the cognitive processes it entails for both composition and retrieval. The thesis then details a set of issues which need to be addressed in a collaborative writing system. These issues are then followed by developing a model for collaborative writing, detailing an iterative process of co-ordination, writing and annotation, consolidation, and negotiation, based on a structured but extensible document model. Implementation issues for a collaborative application are then described, along with various methods of overcoming them. Finally the design and implementation of a collaborative writing system, named Collaborwriter, is described in detail, which concludes with some preliminary results from initial user trials and testing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With recent expansions in technology, mobile computing continues to play a vital role in all aspects of our lives. Digital technology tools such as Web browsing, media tracking, social media, and emailing have made mobile technology more than just a means of communication but has widespread use in business and social networks. Developments in Technologies for Human-Centric Mobile Computing and Applications is a comprehensive collection of knowledge and practice in the development of technologies in human –centric mobile technology. This book focuses on the developmental aspects of mobile technology; bringing together researchers, educators, and practitioners to encourage readers to think outside of the box.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Business networks have been described as cooperative arrangements between independent business organisations that vary from contractual joint ventures to informal exchanges of information. This collaboration has become recognised as an innovative and efficient tool for organising interdependent activities, with benefits accruing to both firms and the local economy. For a number of years, resources have been devoted to supporting Irish networking policies. One recent example of such support is the Irish government's target of €20 million per annum for five years to support the creation of enterprise-led networks. It is imperative that a clear rationale for such interventions is established, as the opportunity cost of public funds is high. This article, therefore, develops an evaluation framework for such networking interventions. This framework will facilitate effective programme planning, implementation and evaluation. It will potentially show how a chain of cause-and-effect at both micro and macro-levels for networking interventions can be established.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Despite the considerable potential of advanced manufacturing technologies (AMT) for improving the economic performance of many firms, a growing body of literature highlights many instances where realising this potential has proven to be a more difficult task than initially envisaged. Focussing upon the implementation of new manufacturing technologies in several smaller to medium sized enterprises (SME), the research examines the proposition that many of these problems can be attributed in part to inadequate consideration of the integrated nature of such technologies, where the effects of their implementation are not localised, but are felt throughout a business. The criteria for the economic evaluation of such technologies are seen as needing to reflect this, and the research develops an innovative methodology employing micro-computer based spreadsheets, to demonstrate how a series of financial models can be used to quantify the effects of new investments upon overall company performance. Case studies include: the development of a prototype machine based absorption costing system to assist in the evaluation of CNC machine tool purchases in a press making company; the economics and strategy of introducing a flexible manufacturing system for the production of ballscrews; and analysing the progressive introduction of computer based printing presses in a packaging and general print company. Complementary insights are also provided from discussion with the management of several other companies which have experienced technological change. The research was conducted as a collaborative CASE project in the Interdisciplinary Higher Degrees Scheme and was jointly funded by the SERC and Gaydon Technology Limited and later assisted by PE-Inbucon. The findings of the research shows that the introduction of new manufacturing technologies usually requires a fundamental rethink of the existing practices of a business. In particular, its implementation is seen as ideally needing to take place as part of a longer term business and manufacturing strategy, but that short term commercial pressures and limited resources often mean that firms experience difficulty in realising this. The use of a spreadsheet based methodology is shown to be of considerable assistance in evaluating new investments, and is seen as being the limit of sophistication that a smaller business is willing to employ. Several points for effective modelling practice are also given, together with an outline of the context in which a modelling approach is most applicable.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In response to the increasing international competitiveness, many manufacturing businesses are rethinking their management strategies and philosophies towards achieving a computer integrated environment. The explosive growth in Advanced Manufacturing Technology (AMI) has resulted in the formation of functional "Islands of Automation" such as Computer Aided Design (CAD), Computer Aided Manufacturing (CAM), Computer Aided Process Planning (CAPP) and Manufacturing Resources Planning (MRPII). This has resulted in an environment which has focussed areas of excellence and poor overall efficiency, co-ordination and control. The main role of Computer Integrated Manufacturing (CIM) is to integrate these islands of automation and develop a totally integrated and controlled environment. However, the various perceptions of CIM, although developing, remain focussed on a very narrow integration scope and have consequently resulted in mere linked islands of automation with little improvement in overall co-ordination and control. This thesis, that is the research described within, develops and examines a more holistic view of CIM, which is based on the integration of various business elements. One particular business element, namely control, has been shown to have a multi-facetted and underpinning relationship with the CIM philosophy. This relationship impacts various CIM system design aspects including the CIM business analysis and modelling technique, the specification of systems integration requirements, the CIM system architectural form and the degree of business redesign. The research findings show that fundamental changes to CIM system design are required; these are incorporated in a generic CIM design methodology. The affect and influence of this holistic view of CIM on a manufacturing business has been evaluated through various industrial case study applications. Based on the evidence obtained, it has been concluded that this holistic, control based approach to CIM can provide a greatly improved means of achieving a totally integrated and controlled business environment. This generic CIM methodology will therefore make a significant contribution to the planning, modelling, design and development of future CIM systems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The undisputed link of the agricultural sector with regional economies, along with the increased competition, fosters agri-business companies to rethink their business philosophy and to transform from isolated firms to members of more extended business formations. The paper examines a particular type of business network, the cluster. It focuses on the concept of clusters and on cluster-based strategies in the context of agriculture. In particular, the paper explores the value of clusters by taking into consideration the particularities of the agricultural sector. Potential benefits and constraints of agri-business cluster development are also presented.