798 resultados para management control systems
Resumo:
In the Light Controlled Factory part-to-part assembly and reduced weight will be enabled through the use of predictive fitting processes; low cost high accuracy reconfigurable tooling will be made possible by active compensation; improved control will allow accurate robotic machining; and quality will be improved through the use of traceable uncertainty based quality control throughout the production system. A number of challenges must be overcome before this vision will be realized; 1) controlling industrial robots for accurate machining; 2) compensation of measurements for thermal expansion; 3) Compensation of measurements for refractive index changes; 4) development of Embedded Metrology Tooling for in-tooling measurement and active tooling compensation; and 5) development of Software for the Planning and Control of Integrated Metrology Networks based on Quality Control with Uncertainty Evaluation and control systems for predictive processes. This paper describes how these challenges are being addressed, in particular the central challenge of developing large volume measurement process models within an integrated dimensional variation management (IDVM) system.
Resumo:
An integrated production–recycling system is investigated. A constant demand can be satisfied by production and recycling. The used items might be bought back and then recycled. The not recycled products are disposed off. Two types of models are analyzed. The first model examines and minimizes the EOQ related cost. The second model generalizes the first one by introducing additionally linear waste disposal, recycling, production and buyback costs. This basic model was examined by the authors in a previous paper. The main results are that a pure strategy (either production or recycling) is optimal. This paper extends the model for the case of quality consideration: it is asked for the quality of the bought back products. In the former model we have assumed that all returned items are serviceable. One can put the following question: Who should control the quality of the returned items? If the suppliers examine the quality of the reusable products, then the buyback rate is strongly smaller than one, α<1. If the user does it, then not all returned items are recyclable, i.e. the use rate is smaller than one, δ<1. Which one of the control systems are more cost advantageous in this case?
Resumo:
Optimization of adaptive traffic signal timing is one of the most complex problems in traffic control systems. This dissertation presents a new method that applies the parallel genetic algorithm (PGA) to optimize adaptive traffic signal control in the presence of transit signal priority (TSP). The method can optimize the phase plan, cycle length, and green splits at isolated intersections with consideration for the performance of both the transit and the general vehicles. Unlike the simple genetic algorithm (GA), PGA can provide better and faster solutions needed for real-time optimization of adaptive traffic signal control. ^ An important component in the proposed method involves the development of a microscopic delay estimation model that was designed specifically to optimize adaptive traffic signal with TSP. Macroscopic delay models such as the Highway Capacity Manual (HCM) delay model are unable to accurately consider the effect of phase combination and phase sequence in delay calculations. In addition, because the number of phases and the phase sequence of adaptive traffic signal may vary from cycle to cycle, the phase splits cannot be optimized when the phase sequence is also a decision variable. A "flex-phase" concept was introduced in the proposed microscopic delay estimation model to overcome these limitations. ^ The performance of PGA was first evaluated against the simple GA. The results show that PGA achieved both faster convergence and lower delay for both under- or over-saturated traffic conditions. A VISSIM simulation testbed was then developed to evaluate the performance of the proposed PGA-based adaptive traffic signal control with TSP. The simulation results show that the PGA-based optimizer for adaptive TSP outperformed the fully actuated NEMA control in all test cases. The results also show that the PGA-based optimizer was able to produce TSP timing plans that benefit the transit vehicles while minimizing the impact of TSP on the general vehicles. The VISSIM testbed developed in this research provides a powerful tool to design and evaluate different TSP strategies under both actuated and adaptive signal control. ^
Resumo:
Providing spectator food service for the Summer Olympic Games in Los Angeles was a massive and challenging undertaking. The author details the planning, recruitment, training, and sales considerations which the provider went through over a two-year period to be ready for the Games.
Resumo:
Ageing of the population is a worldwide phenomenon. Numerous ICT-based solutions have been developed for elderly care but mainly connected to the physiological and nursing aspects in services for the elderly. Social work is a profession that should pay attention to the comprehensive wellbeing and social needs of the elderly. Many people experience loneliness and depression in their old age, either as a result of living alone or due to a lack of close family ties and reduced connections with their culture of origin, which results in an inability to participate actively in community activities (Singh & Misra, 2009). Participation in society would enhance the quality of life. With the development of information technology, the use of technology in social work practice has risen dramatically. The aim of this literature review is to map out the state of the art of knowledge about the usage of ICT in elderly care and to figure out research-based knowledge about the usability of ICT for the prevention of loneliness and social isolation of elderly people. The data for the current research comes from the core collection of the Web of Science and the data searching was performed using Boolean? The searching resulted in 216 published English articles. After going through the topics and abstracts, 34 articles were selected for the data analysis that is based on a multi approach framework. The analysis of the research approach is categorized according to some aspects of using ICT by older adults from the adoption of ICT to the impact of usage, and the social services for them. This literature review focused on the function of communication by excluding the applications that mainly relate to physical nursing. The results show that the so-called ‘digital divide’ still exists, but the older adults have the willingness to learn and utilise ICT in daily life, especially for communication. The data shows that the usage of ICT can prevent the loneliness and social isolation of older adults, and they are eager for technical support in using ICT. The results of data analysis on theoretical frames and concepts show that this research field applies different theoretical frames from various scientific fields, while a social work approach is lacking. However, a synergic frame of applied theories will be suggested from the perspective of social work.
Resumo:
Which 'actor' takes the management accountant role as an extravert business partner? Does a relation between the personal trait Extraversion and fulfilling a management accountant role as a business partner exist? Open Universiteit Nederland End thesis MSc Management, Accounting & Finance Support 1: Prof. dr. A.C.N. van de Ven RA Support 2: dr. P.C.M. Claes Examinator: dr. P. Kamminga Date of approval: September 3, 2014 student: P.R. van der Wal (studentnumber 839104017 email petervanderwal2003@yahoo.com The main question of this research is: Does a relation between the personal trait Extraversion and fulfilling a management accountant role as a business partner exist? This research is based on the dataset obtained by the controller survey 2013, executed in commission of the 'Open Universiteit' (Bork & van der Wal, 2014). From the literature review it is clear: among other management accountant roles we need business partners. And there is a relation between the personal trait Extraversion and fulfilling the role as business partner. At the same time a lack of necessary personal traits for this role has been noticed, among which is Extraversion. The factor- and cluster analyses reported by Bork & van der Wal (2014) resulted in the identification of two types of management accountant roles. In this extended research TYPE II is identified as a business partner because (s)he practices activity-combinations which are related to strategy, analyzing, supporting management in decision making, advisory, change-agency and representing the organization. 36% of the population of Dutch management accountants with a master degree (or similar) meet with the role of the business partner. Although the fulfillment of the role (TYPE II) is not purely business partnering. E.g. reporting and scorekeeping are still activities executed by TYPE II and it is not clear to what extent. Apart from that, role TYPE I executes change management and risk-management activities, which are (according to the definition) activities that belong to the business partner. The role as business partner is practiced but not that optimal as defined in theory. The logistic regression analyses on the survey-data show that Extraversion among three other triggers is significant for the prediction of the fulfillment of the management accountant role (Bork & van der Wal, 2014). A more extravert personal trait predicts a preference for TYPE II, which relates to the business partner. This 'in depth research' concentrated on the relation between the Big Five personal traits and the six activity-combinations (factors) instead of on the two clusters (I and II). The statistic analyses confirm the predicting influence of Extraversion on the business partner role. Although, except for one factor, no extra significance has been found in this additional research. The essential question can be confirmed positively: the management accountant role business partner exists in practice, some management accountants are more extravert then others, and there is a positive relation between extraversion and fulfilling the business partner role. Some formulated research limitations are related to the statistical weakness of some prediction outcomes and to interpretation differences that might occur. Further research can e.g. concentrate on the other personal traits and the significance for role-differentiation in education programs. The management accountant survey 2013 Management accountant roles in 2013 in the Netherlands Open Universiteit Nederland End thesis MSc Management, Accounting & Finance Support 1: Prof. dr. A.C.N. van de Ven RA Support 2: dr. P.C.M. Claes Examinator: dr. P. Kamminga Date of approval: September 3, 2014 student: P.R. van der Wal and H.J. Bork studentnumber: 839104017 and 838532340) email: petervanderwal2003@yahoo.com and hjbork@hotmail.com This paper describes the conceptual model and results of the 'management accountants survey 2013'. The survey is part of a longitudinal survey, earlier executed in 2004, 2007 and 2010 under responsibility of the 'Open Universiteit Nederland'. Secondly the dataset of this survey will be used by us to do our own analyses on the predicting value of the triggers 'personality factor: extraversion' and 'lever of control: interactive controls' on the management accounting role that comes close to a role defined as 'Business Partner'. Scientific research shows that there are different management accounting roles, and that these roles change and that preferences exist for certain roles (Verstegen B. , Loo, Mol, Slagter, & Geerkens, 2007). The main question that will be answered in this paper is which coherent combinations of activities are being executed by management accountants in 2013 in the Netherlands by master-graduates? And secondly which triggers of management accountants' activities predict to which cluster a management accountant belongs? The conceptual model of this research has been developed in 2004 (Verstegen B. , Loo, Mol, Slagter, & Geerkens, 2007). For this research the same 37 activities as in the former researches are included (appendix 1). In the trigger-set (appendix 1) some adaptations have been made for reasons of restricting the length of the survey and to pinpoint on particular research goals (e.g. personality and levers of control). The coherent combinations of activities were found by a factor-analysis and the groups of controllers by a cluster analysis. A regression analysis shows which trigger-items are most significant. The survey has been sent to 2.353 students that finished a controller-study on a Dutch University. There was a 9% (211) response with a completely filled survey. 137 of which indicated to work in a controller-function at the moment. These controllers have been included in the results. The factor-analysis results in six different coherent combinations of activities (factors). Shortly these factors are: advising top management on strategic level with result-effecting information (1), organizing internal reporting (2) organizing and representing the organization on external reporting (3), advising and managing changes by shortcomings in processes and control systems (4), maintaining and managing administrative organization- , information- and control systems (5) and organizing/executing risk management and internal audit (6). Factors 4, 5 and 6 are clustered in cluster TYPE I (125 controllers) and factors 1, 2 and 3 in cluster TYPE II (69 controllers). TYPE II can be associated with the management accountant role 'Business Partner', although the accountant keeps partly active in a scorekeeper role. The four most significant triggers for predicting being a TYPE II controller are 'Executing a risk-management task in order to meet compliance standards' (1), extraversion (2), company size in terms of fte (3) and gender (4).
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.
Resumo:
This work presents a computational, called MOMENTS, code developed to be used in process control to determine a characteristic transfer function to industrial units when radiotracer techniques were been applied to study the unit´s performance. The methodology is based on the measuring the residence time distribution function (RTD) and calculate the first and second temporal moments of the tracer data obtained by two scintillators detectors NaI positioned to register a complete tracer movement inside the unit. Non linear regression technique has been used to fit various mathematical models and a statistical test was used to select the best result to the transfer function. Using the code MOMENTS, twelve different models can be used to fit a curve and calculate technical parameters to the unit.
Resumo:
Describes project management control loop for managing an MSc dissertation
Resumo:
This article discusses the application of Information and Communication Technologies and strategies for best practices in order to capture and maintain faculty students' attention. It is based on a case study of ten years, using a complete information system. This system, in addition to be considered an ERP, to support the activities of academic management, also has a strong component of SRM that provides support to academic and administrative activities. It describes the extent to which the presented system facilitates the interaction and communication between members of the academic community, using the Internet, with services available on the Web complementing them with email, SMS and CTI. Through a perception, backed by empirical analysis and results of investigations, it demonstrates how this type of practice may raise the level of satisfaction of the community. In particular, it is possible to combat failure at school, avoid that students leave their course before its completion and also that they recommend them to potential students. In addition, such a strategy also allows strong economies in the management of the institution, increasing its value. As future work, we present the new phase of the project towards implementation of Business Intelligence to optimize the management process, making it proactive. The technological vision that guides new developments to a construction based on Web services and procedural languages is also presented.
Resumo:
In this document, we wish to describe statistics, data and the importance of the 13th CONTECSI – International Conference on Information Systems and Technology Management, which took place in the University of São Paulo, from June 1st through 3rd and was organized by TECSI/EAC/FEA/USP/ECA/POLI. This report presents statistics of the 13th CONTECSI, Goals and Objectives, Program, Plenary Sessions, Doctoral Consortium, Parallel Sessions, Honorable Mentions and Committees. We would like to point out the huge importance of the financial aid given by CAPES, CNPq, FAPESP, as well as the support of FEA USP, POLI USP, ECA USP, ANPAD, AIS, ISACA, UNINOVE, Mackenzie, Universidade do Porto, Rutgers School/USA, São Paulo Convention Bureau and CCINT-FEA-USP.
Resumo:
Um dos efeitos da digitalização do campo de batalha é o uso intensivo de novas tecnologias ao nível tático, de forma a agilizar a gestão e facilitar a compreensão do mesmo, com objetivo de contribuir decisivamente para a obtenção da superioridade de informação durante a condução das operações militares, assumindo particular relevância nesta temática a utilização de sistemas de informação para o comando e controlo. Observando a crescente importância destes sistemas para os exércitos, em particular para os baixos escalões, o presente trabalho, com o tema “Informações, Vigilância e Reconhecimento: Contributo para as Funções de Combate Comando-Missão e Informações”, estuda e analisa o papel dos dados, notícias e informações nessas funções de combate, bem como a sua relação com os sistemas de informação para o comando e controlo. São estudados e definidos os conceitos considerados base para a investigação, à luz da doutrina nacional e NATO, constituindo um suporte essencial para o estudo de sistemas de informação para o comando e controlo utilizados no exército norte-americano (com arquitetura de sistemas considerada como referência nos desenvolvimentos em curso no nosso exército) e para a análise dos sistemas de informação para o comando e controlo utilizados atualmente no Exército Português nas suas forças de manobra, com foco nos baixos escalões, abordando o que se encontra igualmente em desenvolvimento. Do estudo realizado determinaram-se uma série de requisitos operacionais, passíveis de serem integrados num sistema de informação para o comando e controlo de baixos escalões; verificou-se que tipo de dados e notícias eram recolhidos das viaturas utilizadas pela unidade em estudo, neste caso o Grupo de Reconhecimento da Brigada de Intervenção; e relacionaram-se os dados, notícias, informações e funcionalidades presentes com as variáveis de missão e, posteriormente, às funções de combate Comando-Missão e Informações.
Resumo:
No âmbito do plano curricular do Mestrado em Administração Militar (AdMil) procedemos á realização do presente Trabalho de Investigação Aplicada (TIA) intitulado de “A importância dos módulos logísticos do SIG na reorganização logística e financeira do Exército”. É de referir que este assunto é de total interesse porque se enquadra no objetivo estratégico do Exército (OEPB10) que visa incrementar a gestão de recursos apoiada em sistemas de informação publicados na Diretiva de Planeamento do Exército para o biénio 2015 e 2016. O objetivo geral desta investigação é explicar se as funcionalidades do módulo MM do SIG respondem às necessidades do Exército. Pretendemos também identificar se o processo de compras logístico é utilizado em pleno, determinar se é possível fazer uma análise das compras já efetuadas e em curso, determinar se o Exército em SIG consegue gerir as suas existências em quantidade e valor, identificar se existe gestão de necessidades de reabastecimento das U/E/O em SIG e expor as vantagens e inconvenientes da sua utilização, descrever as vantagens da migração dos dados para a aplicação SIG de outras aplicações usadas para a gestão de stocks. O módulo MM do SIG integra a administração de materiais, planeamento, controlo dos materiais, compras, recebimentos de mercadorias, administração de stocks e verificação de faturas. A presente investigação trata-se de um estudo de caso, para tal recorremos ao método hipotético-dedutivo e aplicámos um estudo exploratório/descritivo. Nesta investigação procedeu-se à recolha de informação através de inquéritos por entrevista e por questionário, tendo sido selecionado consequentemente um método misto (qualitativo e quantitativo). Após a análise e discussão dos resultados concluímos que as funcionalidades do módulo MM do SIG implementado no Exército não respondem na totalidade às necessidades do Exército, em determinadas classes de abastecimento no âmbito das existências. Assim é de salientar que do antecedente foram implementadas as ferramentas MM compras centrais e locais, e desde o ano de 2014, têm sido implementados em sistema a gestão dos combustíveis e neste momento o fardamento. Acrescentamos que o módulo MM está integrado e como tal há necessidade de resolver vários problemas considerados externos, nomeadamente a agilização do processo da catalogação, a descentralização das compras que leva a que as U/E/O recorram maioritariamente à utilização de NNA genéricos, não possibilitando a gestão dos materiais em sistema SIG, o que resulta posteriormente numa apresentação incorreta da conta 3 das existências no balanço.
Resumo:
El siguiente trabajo de grado propone un modelo simplificado de gobierno y gestión de las tecnologías de información en las pequeñas y medianas empresas de servicios en Colombia, a partir de la selección e integración de procesos enunciados por algunos de los marcos de trabajo y buenas prácticas de TI que gozan de un reconocimiento generalizado -- En concreto, se han tomado elementos de COBIT 5, ISO/IEC 20000, ITIL V3, CMMI 1.3, PMBOK 5 e ISO/IEC 27000 -- Para el diseño del modelo propuesto se han identificado cada uno de los procesos dispuestos por los diferentes marcos de referencia -- Acto seguido se ha procedido a identificar todos los procesos comunes entre los diferentes modelos de gestión, seleccionando aquellos que se consideran imprescindibles en la generación de valor y evitando aquellos que complejizaran la gestión para el foco de nuestro alcance -- Los procesos identificados y seleccionados fueron agrupados bajo áreas de proceso, las cuales, a su vez, describen subprocesos que tienen un propósito declarado y unas estrategias de gestión y actividades propuestas, que seguidas, satisfacen el objetivo establecido para cada uno de los subprocesos, y en conjunto, suponen un modelo de gobierno de TI adecuado para las pequeñas y medianas empresas prestadoras de servicios en Colombia
Resumo:
En 1991 Colombia presenció la promulgación de una nueva Carta Política que trajo consigo renovadoras esperanzas y generó expectativas muy altas. La presente investigación examina y analiza las transformaciones y limitaciones de los sistemas de control sobre la Hacienda Pública, propuestos por esta nueva Constitución. En este sentido, se caracteriza y se cuestiona el funcionamiento del nuevo sistema de control fiscal, del sistema de control político y finalmente del sistema de control económico y financiero. Los resultados de este trabajo son reflexiones a propósito de las fallas que han dilucidado estos sistemas desde su implementación, y fueron posibles gracias a la revisión sistemática de informes institucionales, documentos académicos y trabajo de campo con los funcionarios de las entidades a cargo del control.