1000 resultados para CMMS vs. SCADA


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In durable goods markets, many brand name manufacturers, including IBM, HP, Epson, and Lenovo, have adopted dual-channel supply chains to market their products. There is scant literature, however, addressing the product durability and its impact on players’ optimal strategies in a dual-channel supply chain. To fill this void, we consider a two-period dual-channel model in which a manufacturer sells a durable product directly through both a manufacturer-owned e-channel and an independent dealer who adopts a mix of selling and leasing to consumers. Our results show that the manufacturer begins encroaching into the market in Period 1, but the dealer starts withdrawing from the retail channel in Period 2. Moreover, as the direct selling cost decreases, the equilibrium quantities and wholesale prices become quite angular and often nonmonotonic. Among other results, we find that both the dealer and the supply chain may benefit from the manufacturer’s encroachment. Our results also indicate that both the market structure and the nature of competition have an important impact on the player’s (dealer’s) optimal choice of leasing and selling.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Different economic valuation methodologies can be used to value the non-market benefits of an agri-environmental scheme. In particular, the non-market value can be examined by assessing the public's willingness to pay for the policy outputs as a whole or by modelling the preferences of society for the component attributes of the rural landscape that result from the implementation of the policy. In this article we examine whether the welfare values estimated for an agri-environmental policy are significantly different between an holistic valuation methodology (using contingent valuation) and an attribute-based valuation methodology (choice experiment). It is argued that the valuation methodology chosen should be based on whether or not the overall objective is the valuation of the agri-environment policy package in its entirety or the valuation of each of the policy's distinct environmental outputs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to compare the prostate-specific antigen (PSA) response to either neoadjuvant bicalutamide (BC) monotherapy or neoadjuvant luteinizing hormone-releasing hormone agonist (LHRHa) monotherapy and the subsequent effect on biochemical failure-free survival (BFFS) in men receiving radical radiotherapy (RT) for localized prostate cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study examines proximal and distal factors associated with the use and non-use of illegal substances within a sample of 860 teenagers in North Wales. Arguing that there is predictive utility in expanding the traditional 'users vs non-users' design dichotomy, four groups are identified-resistant and vulnerable non-users and experimental and repeated users. 'Person' variables (life satisfaction, deviance, hopelessness and drug-related attributions) appeared to primarily differentiate the vulnerable group from their resistant counterparts and identify this, as yet non-using group, with user samples. It is suggested that these variables might represent 'risk' factors for illicit substance use and that the group design employed suggests they precede, rather than follow as a consequence of, illicit drug use. Like their resistant counterparts however, the vulnerable group are differentiated from user samples on some lifestyle and context indices. It is argued that these represent 'protective' influences in an otherwise at-risk group of non-users. Variables associated with an escalation of illicit drug use are discussed in considering the differences between the experimental and repeated user groups. Apart from the more proximal factor of drug-related attributions, 'person' variables appeared less involved here. Repeated users did however, tend to use a greater number of drugs, have a greater proportion of friends who also used illegal substances and significantly fewer had a Welsh cultural identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To determine whether the use of an online or blended learning paradigm has the potential to enhance the teaching of clinical skills in undergraduate nursing.

Background: The need to adequately support and develop students in clinical skills is now arguably more important than previously considered due to reductions in practice opportunities. Online and blended teaching methods are being developed to try and meet this requirement, but knowledge about their effectiveness in teaching clinical skills is limited.

Design: Mixed methods systematic review, which follows the Joanna Briggs Institute User guide version 5.

Data Sources: Computerized searches of five databases were undertaken for the period 1995-August 2013.

Review Methods: Critical appraisal and data extraction were undertaken using Joanna Briggs Institute tools for experimental/observational studies and interpretative and critical research. A narrative synthesis was used to report results.

Results: Nineteen published papers were identified. Seventeen papers reported on online approaches and only two papers reported on a blended approach. The synthesis of findings focused on the following four areas: performance/clinical skill, knowledge, self-efficacy/clinical confidence and user experience/satisfaction. The e-learning interventions used varied throughout all the studies.

Conclusion: The available evidence suggests that online learning for teaching clinical skills is no less effective than traditional means. Highlighted by this review is the lack of available evidence on the implementation of a blended learning approach to teaching clinical skills in undergraduate nurse education. Further research is required to assess the effectiveness of this teaching methodology.