910 resultados para key scheduling algorithm
Resumo:
Sustainability, safety and smartness are three key elements of a modern transportation system. This study illustrates various policy directions and initiatives of Singapore to address how its transportation system is progressing in light of these three components. Sustainability targets economical efficiency, environmental justice and social equity by including policies for integrating land use and transport planning, ensuring adequate transport supply measures, managing travel demand efficiently, and incorporating environment-friendly strategies. Safety initiatives of its transportation system aim to minimize injuries and incidents of all users including motorists, public transport commuters, pedestrians, and bicyclists. Smartness incorporates qualities like real time sensing, fast processing and decision making, and automated action-taking into its control, monitoring, information management and revenue collection systems. Various policy implications and technology applications along these three directions reveal that smart technologies facilitate implementation of policies promoting sustainability and safety. The Singapore experience could serve as a good reference for other cities in promoting a transportation system that is sustainable, safe and smart.
Resumo:
Purpose – Integrated supplier management (ISM), new product development (NPD) and knowledge sharing (KS) practices are three primary business activities utilised to enhance manufacturers' business performance (BP). The purpose of this paper is to empirically investigate the relationships between these three business activities (i.e. ISM, NPD, KS) and BP in a Taiwanese electronics manufacturing context. Design/methodology/approach – A questionnaire survey is first administered to a sample of electronic manufacturing companies operating in Taiwan to elicit the opinions of technical and managerial professionals regarding business activities and BP within their companies. A total of 170 respondents from 83 companies respond to the survey. Factor, correlation and path analysis are undertaken on this quantitative data set to derive the key factors which leverage business outcomes in these companies. Following empirical analysis, six semi-structured interviews are undertaken with manufacturing executives to provide qualitative insights into the underlying reasons why certain business activity factors are the strongest predictors of BP. Findings – The investigation shows that the ISM, NPD and KS constructs all play an important role in the success of company operations and creating business outcomes. Specifically, the key factors within these constructs which influenced BP are: supplier evaluation and selection; design simplification and modular design; information technology infrastructure and systems and open communication. Accordingly, sufficient financial and human resources should be allocated to these important activities to derive accelerated rates of improved BP. These findings are supported by the qualitative interviews with manufacturing executives. Originality/value – The paper depicts the pathways to improved manufacturing BP, through targeting efforts into the above-mentioned factors within the ISM, NPD and KS constructs. Based on the empirical path model, and the specific insights derived from the explanatory interviews with manufacturing executives, the paper also provides a number of practical implications for manufacturing companies seeking to enhance their BP through improved operational activities.
Resumo:
In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.
Resumo:
Purpose: Within the context of high global competitiveness, knowledge management (KM) has proven to be one of the major factors contributing to enhanced business outcomes. Furthermore, knowledge sharing (KS) is one of the most critical of all KM activities. From a manufacturing industry perspective, supply chain management (SCM) and product development process (PDP) activities, require a high proportion of company resources such as budget and manpower. Therefore, manufacturing companies are striving to strengthen SCM, PDP and KS activities in order to accelerate rates of manufacturing process improvement, ultimately resulting in higher levels of business performance (BP). A theoretical framework along with a number of hypotheses are proposed and empirically tested through correlation, factor and path analyses. Design/methodology/approach: A questionnaire survey was administered to a sample of electronic manufacturing companies operating in Taiwan to facilitate testing the proposed relationships. More than 170 respondents from 83 organisations responded to the survey. The study identified top management commitment and employee empowerment, supplier evaluation and selection, and design simplification and modular design as the key business activities that are strongly associated with the business performance. Findings: The empirical study supports that key manufacturing business activities (i.e., SCM, PDP, and KS) are positively associated with BP. The findings also evealed that some specific business activities such as SCMF1,PDPF2, and KSF1 have the strongest influencing power on particular business outcomes (i.e., BPF1 and BPF2) within the context of electronic manufacturing companies operating in Taiwan. Practical implications: The finding regarding the relationship between SCM and BP identified the essential role of supplier evaluation and selection in improving business competitiveness and long term performance. The process of forming knowledge in companies, such as creation, storage/retrieval, and transfer do not necessarily lead to enhanced business performance; only through effectively applying knowledge to the right person at the right time does. Originality/value: Based on this finding it is recommended that companies should involve suppliers in partnerships to continuously improve operations and enhance product design efforts, which would ultimately enhance business performance. Business performance depends more on an employee’s ability to turn knowledge into effective action.
Resumo:
Construction practitioners often experience unexpected results of their scheduling-related decisions. This is mainly due to lack of understanding of the dynamic nature of construction system. However, very little attention has been given to its significant importance and few empirical studies have been undertaken on this issue. This paper, therefore, analyzes the effect of aggressive scheduling, overtime, resource adding, and schedule slippage on construction performance, focusing on workers’ reactions to those scheduling decisions. Survey data from 102 construction practitioners in 38 construction sites are used for the analysis. The results indicate that efforts to increase work rate by working overtime, resource adding, and aggressive scheduling can be offset due to losses in productivity and quality. Based on the research findings, practical guidelines are then discussed to help site managers to effectively deal with the dynamics of scheduling and improve construction performance.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
An algorithm for computing dense correspondences between images of a stereo pair or image sequence is presented. The algorithm can make use of both standard matching metrics and the rank and census filters, two filters based on order statistics which have been applied to the image matching problem. Their advantages include robustness to radiometric distortion and amenability to hardware implementation. Results obtained using both real stereo pairs and a synthetic stereo pair with ground truth were compared. The rank and census filters were shown to significantly improve performance in the case of radiometric distortion. In all cases, the results obtained were comparable to, if not better than, those obtained using standard matching metrics. Furthermore, the rank and census have the additional advantage that their computational overhead is less than these metrics. For all techniques tested, the difference between the results obtained for the synthetic stereo pair, and the ground truth results was small.
Resumo:
This paper presents an adaptive metering algorithm for enhancing the electronic screening (e-screening) operation at truck weight stations. This algorithm uses a feedback control mechanism to control the level of truck vehicles entering the weight station. The basic operation of the algorithm allows more trucks to be inspected when the weight station is underutilized by adjusting the weight threshold lower. Alternatively, the algorithm restricts the number of trucks to inspect when the station is overutilized to prevent queue spillover. The proposed control concept is demonstrated and evaluated in a simulation environment. The simulation results demonstrate the considerable benefits of the proposed algorithm in improving overweight enforcement with minimal negative impacts on nonoverweighed trucks. The test results also reveal that the effectiveness of the algorithm improves with higher truck participation rates in the e-screening program.
Resumo:
Long traffic queues on off-ramps significantly compromise the safety and throughput of motorways. Obtaining accurate queue information is crucial for countermeasure strategies. However, it is challenging to estimate traffic queues with locally installed inductive loop detectors. This paper deals with the problem of queue estimation with the interpretation of queuing dynamics and the corresponding time-occupancy distribution over motorway off-ramps. A novel algorithm for real-time queue estimation with two detectors is presented and discussed. Results derived from microscopic traffic simulation validated the effectiveness of the algorithm and revealed some of its useful features: (a) long and intermediate traffic queues could be accurately measured, (b) relatively simple detector input (i.e., time occupancy) was required, and (c) the estimation philosophy was independent with signal timing changes and provided the potential to cooperate with advanced strategies for signal control. Some issues concerning field implementation are also discussed.
Resumo:
The primary objective of this study is to develop a robust queue estimation algorithm for motorway on-ramps. Real-time queue information is the most vital input for a dynamic queue management that can treat long queues on metered on-ramps more sophistically. The proposed algorithm is developed based on the Kalman filter framework. The fundamental conservation model is used to estimate the system state (queue size) with the flow-in and flow-out measurements. This projection results are updated with the measurement equation using the time occupancies from mid-link and link-entrance loop detectors. This study also proposes a novel single point correction method. This method resets the estimated system state to eliminate the counting errors that accumulate over time. In the performance evaluation, the proposed algorithm demonstrated accurate and reliable performances and consistently outperformed the benchmarked Single Occupancy Kalman filter (SOKF) method. The improvements over SOKF are 62% and 63% in average in terms of the estimation accuracy (MAE) and reliability (RMSE), respectively. The benefit of the innovative concepts of the algorithm is well justified by the improved estimation performance in the congested ramp traffic conditions where long queues may significantly compromise the benchmark algorithm’s performance.
Resumo:
Australian and international evidence suggests that, in the work-related driving context, road crashes account for a substantial number of occupational incidents. In the attempt to reduce injury and improve safety, organisations may implement an array of strategies and interventions ranging from policy development and implementation, vehicle selection and incident monitoring through to education and awareness-raising. This conceptual paper discusses aspects relating to the latter collection of interventions and, in particular, the role, and some key considerations with respect to the content and dissemination, of advertising campaigns and educational awareness workshops. In relation to advertising campaigns, this paper discusses how some of the overarching principles associated with advertising in the broader general community road safety strategy also apply within the work-related road safety context. Specifically, advertising campaigns/materials should be viewed as a key component within a dedicated organisational approach to road (driver) safety. This dedicated approach would need to comprise of a number, and varied array, of strategies. In addition, the content of, and medium/s (e.g., posters) by which to deliver such advertising campaigns, cannot be addressed by a one-size-fits all approach but, rather, requires careful consideration of the needs as well as characteristics of specific organisations and their driver fleet. The paper provides a summary of some key considerations when devising an advertising campaign, including the nature of campaign/message content as well as the processes by which to devise and refine such content. In relation to driver education awareness workshops, this paper outlines the key considerations for delivering a series of workshops specifically aimed at occupational driving within the organisational context. A case study approach will be utilised to demonstrate the manner in which educational awareness workshops can compliment successful advertising campaigns promoting safer work related driving through better risk management practice. Research underpinning the development of driver behaviour modification tools incorporated within the workshops will also be discussed along with the mechanisms utilised to encourage improvements in driver monitoring and behaviour. In an effort to assist organisations with their continual search for cost-effective approaches which may, ultimately, contribute to improvements in driver behaviour and safety, the current paper offers some clear and practical suggestions in relation to the development and dissemination of two types of interventions, advertising campaigns and education awareness workshops.
Resumo:
Several approaches have been introduced in literature for active noise control (ANC) systems. Since FxLMS algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of FxLMS algorithm. In many ANC applications an online secondary path modelling method using a white noise as a training signal is required to ensure convergence of the system. This paper also proposes a new approach for online secondary path modelling in feedfoward ANC systems. The proposed algorithm stops injection of the white noise at the optimum point and reactivate the injection during the operation, if needed, to maintain performance of the system. Benefiting new version of FxLMS algorithm and not continually injection of white noise makes the system more desirable and improves the noise attenuation performance. Comparative simulation results indicate effectiveness of the proposed approach.
Resumo:
Mesenchymal stem cells (MSCs) are multi-potent cells that can differentiate into various cell types and have been used widely in tissue engineering application. In tissue engineering, a scaffold, MSCs and growth factors are used as essential components and their interactions have been regarded to be important for regeneration of tissues. A critical problem for MSCs in tissue engineering is their low survival ability and functionality. Most MSCs are going to be apoptotic after transplantation. Therefore, increasing MSC survival ability and functionalities is the key for potential applications of MSCs. Several approaches have been studied to increase MSC tissue forming capacity including application of growth factors, overexpression of stem cell regulatory genes and improvement of biomaterials for scaffolds. The effects of these approaches on MSCs have been associated with the activation of the PI3K/Akt signaling pathway. The pathway plays central regulatory roles in MSC survival, proliferation, migration, angiogenesis, cytokine production and differentiation. In this review, we summarize and discuss the literatures related to the roles of the PI3K/Akt pathway in the functionalities of MSCs and the involvement of the pathway in biomaterials-increased MSC functinalities. Biomaterials have been modified in their properties, surface structure and loaded with growth factors to increase MSC functionalities. Several studies demonstrated that the biomaterials-increased MSC functionalities are mediated by the activation of the PI3K/Akt pathway.