999 resultados para SERVICES
Resumo:
RFID, in its different forms, but especially following EPCglobal standards, has become a key enabling technology for many applications. An essential component to develop track and trace applications in a complex multi-vendor scenario are the Discovery Services. Although they are already envisaged as part of the EPCglobal network architecture, the functional definition and standardization of the Discovery Service is still at a very early stage. Within the scope of the BRIDGE project, a specification for the interfaces of Discovery Services has been developed, together with a prototype to validate the design and different models to enhance supply-chain control through track and trace applications. © 2008 IEEE.
Resumo:
There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.
Resumo:
The objective of the study was to assess the economic value of ecosystem services in the Bay of Bengal.The manin aim was to support the development of a Strategic Action Plan (SAP). Findings included: economic consequences of ecosystem change; potential economic instruments to strengthen sustainable management; and recommendations on next steps in using economic valuation.
Resumo:
Product/service-systems (PSS) are in effect an approach to designing integrated products and services with a focus on both customer and product life cycle activities. A range of service-oriented design strategies can be found in current literature, from product-oriented DfX approaches to more customer-oriented approaches, such as integrated solutions. In this article, design strategies related to different types of services are mapped. Case studies from two industrial companies are used to confront the existing literature in order to improve the understanding of how manufacturing companies may align their product and service development activities with their business strategies. © 2010.
Resumo:
Services based around complex engineering equipment and systems provide substantial challenges in both the long-term management of the equipment and the need for guaranteed delivery of the related service. One of the challenges for an organisation providing these services is the management of the information that is required to design, deliver and subsequently assess the success of the service. To assist in this process this paper develops a model for capturing, organising and assessing information requirements for these Complex Engineering Services in which information required to support key decisions in the life cycle of the service is identified. The model – referred to as The 12-Box Model for Service Information Requirements – is embedded in a three-phase procedure for providing an assessment of information requirements of a service contract which also provides insight into the capabilities of available information systems in supporting the contract. An illustrative example examining service information in an aircraft availability contract is used to demonstrate the use of the 12-Box Model and associated assessment procedure.
Resumo:
Background: There is an increasing recognition that modelling and simulation can assist in the process of designing health care policies, strategies and operations. However, the current use is limited and answers to questions such as what methods to use and when remain somewhat underdeveloped. Aim. The aim of this study is to provide a mechanism for decision makers in health services planning and management to compare a broad range of modelling and simulation methods so that they can better select and use them or better commission relevant modelling and simulation work. Methods. This paper proposes a modelling and simulation method comparison and selection tool developed from a comprehensive literature review, the research team's extensive expertise and inputs from potential users. Twenty-eight different methods were identified, characterised by their relevance to different application areas, project life cycle stages, types of output and levels of insight, and four input resources required (time, money, knowledge and data). Results: The characterisation is presented in matrix forms to allow quick comparison and selection. This paper also highlights significant knowledge gaps in the existing literature when assessing the applicability of particular approaches to health services management, where modelling and simulation skills are scarce let alone money and time. Conclusions: A modelling and simulation method comparison and selection tool is developed to assist with the selection of methods appropriate to supporting specific decision making processes. In particular it addresses the issue of which method is most appropriate to which specific health services management problem, what the user might expect to be obtained from the method, and what is required to use the method. In summary, we believe the tool adds value to the scarce existing literature on methods comparison and selection. © 2011 Jun et al.
Resumo:
RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.