994 resultados para ENTERPRISE NETWORK
Resumo:
Konferenssiraportti
Resumo:
Today, renewable energy technologies and modern power electronics have made it feasible to implement low voltage direct current (LVDC) microgrids (MGs) ca-pable to island operation. Such LVDC networks are particularly useful in remote areas. However, there are still pending issues in island operated LVDC MGs like electrical safety and controlled operation, which should be addressed before wide-scale implementation. This thesis is focused on the overall protection of an island operated LVDC network concept, including protection against electrical shocks, mains equipment protection and protection of photovoltaic (PV) power sources and battery energy storage systems (BESSs). The topic is approached through ex-amination of the safety hazards and the appropriate methods to protect against them, comprising considerations for earthing system selection and realisation of the protection system.
Resumo:
The importance of industrial maintenance has been emphasized during the last decades; it is no longer a mere cost item, but one of the mainstays of business. Market conditions have worsened lately, investments in production assets have decreased, and at the same time competition has changed from taking place between companies to competition between networks. Companies have focused on their core functions and outsourced support services, like maintenance, above all to decrease costs. This new phenomenon has led to increasing formation of business networks. As a result, a growing need for new kinds of tools for managing these networks effectively has arisen. Maintenance costs are usually a notable part of the life-cycle costs of an item, and it is important to be able to plan the future maintenance operations for the strategic period of the company or for the whole life-cycle period of the item. This thesis introduces an itemlevel life-cycle model (LCM) for industrial maintenance networks. The term item is used as a common definition for a part, a component, a piece of equipment etc. The constructed LCM is a working tool for a maintenance network (consisting of customer companies that buy maintenance services and various supplier companies). Each network member is able to input their own cost and profit data related to the maintenance services of one item. As a result, the model calculates the net present values of maintenance costs and profits and presents them from the points of view of all the network members. The thesis indicates that previous LCMs for calculating maintenance costs have often been very case-specific, suitable only for the item in question, and they have also been constructed for the needs of a single company, without the network perspective. The developed LCM is a proper tool for the decision making of maintenance services in the network environment; it enables analysing the past and making scenarios for the future, and offers choices between alternative maintenance operations. The LCM is also suitable for small companies in building active networks to offer outsourcing services for large companies. The research introduces also a five-step constructing process for designing a life-cycle costing model in the network environment. This five-step designing process defines model components and structure throughout the iteration and exploitation of user feedback. The same method can be followed to develop other models. The thesis contributes to the literature of value and value elements of maintenance services. It examines the value of maintenance services from the perspective of different maintenance network members and presents established value element lists for the customer and the service provider. These value element lists enable making value visible in the maintenance operations of a networked business. The LCM added with value thinking promotes the notion of maintenance from a “cost maker” towards a “value creator”.
Resumo:
This thesis aims to redesign the supply chain system in an automotive industry in order to obtain space reduction in the inventory by using tailored logistics network. The redesigning process by tailored supply chain will combine all possible shipment methods including direct shipment, milk-run, milk-run via distribution center and Kanban delivery. The current supply chain system in Nissan goes rather well when the production volume is in moderate level. However, when the production volume is high, there is a capacity problem in the warehouse to accommodate all delivered parts from suppliers. Hence, the optimization of supply chain system is needed in order to obtain efficient logistics process and effective inventory consumption. The study will use primary data for both qualitative and quantitative approach as the research methods. Qualitative data will be collected by conducting interviews with people related to procurement and inventory control. Quantitative data consists of list of suppliers with their condition in several parameters which will be evaluated and analyzed by using scoring method to assign the most suitable transportation network to each suppliers for improvement of inventory reduction in a cost efficient manner.
Resumo:
This thesis aims to provide insight into the social-business tensions the social enterprises face in their operation and how they manage them. The social-business tensions are examined from four theoretical perspectives using triangulation approach. The theoretical lenses chosen are organizational identity, stakeholder theory, paradox theory and institutional theory. The theories aim to clarify, how the tensions are formed, how they appear and how they are managed in social enterprises. One viewpoint of this thesis is to examine the competence of these theories in explaining the social-business tensions in practise. The qualitative data was collected by interviewing persons from the management of two social enterprises. The empirical evidence of this thesis suggests that the appearing of social-business tensions varies between the social enterprises and they can be seen both as an advantage and as a challenge. Most of the social-business tensions arise from the enterprise’s multiple incoherent objectives, their stakeholders’ various demands and the differing understanding of the company’s central operation among the members of the organization. According to this thesis, the theories of organizational identity, stakeholder, paradox and institution are all able to provide unique insight into the identification and management of the social-business tensions. However, the paradox theory turned out to be the most abstract of the theories and thus being the farthest from the practise.
Resumo:
The purpose of this work was to describe and compare sourcing practices and challenges in different geographies, to discuss possible options to advance sustainability of global sourcing, and to provide examples to answer why sourcing driven by sustainability principles is so challenging to implement. The focus was on comparison between Europe & Asia & South-America from the perspective of sustainability adoption. By analyzing sourcing practices of the case company it was possible to describe main differences and challenges of each continent, available sourcing options, supplier relationships and ways to foster positive chance. In this qualitative case study gathered theoretical material was compared to extensive sourcing practices of case company in a vast supplier network. Sourcing specialist were interviewed and information provided by them analyzed in order to see how different research results and theories are reflecting reality and to find answers to proposed research questions.
Resumo:
The escalation in the number of mergers and acquisition transactions involving emerging market firms is a relatively recent phenomenon; as a consequence academic research in such topic is rather limited. The purpose of this research study was to discuss the possible reasons that led the acquisition failure of an emerging multinational firm and an Indonesian player. Extensive theoretical research was performed and it had been achieved, based on this, the finding of a framework that facilitated to understand the way in which the concepts of cultural distances and relate liabilities of foreignness in the process of acquisitions of foreign companies in emerging markets. The theoretical background collects literature related to acquisitions, models of cultural studies between nations and liabilities of foreignness. It has been generated a variety of frameworks that aid to understand the way that the institutional distance and cultural factors together with the concept of liabilities of foreignness can affect the process of market entry of an emerging multinational company to the extent that the best way to stop losing money is to abandon the project. The empirical research consisted of selective semi-structured interviews and an extensive research in available public data on the chosen study case of this research. There were several factors that were identified as the cause of the failure in the market entry of a Mexican multinational firm in Indonesia. The weakness shown by the local government authorities was used by the local community leaders who rioted because of discomfort. These groups were the ones who made the government submit to the extent that the agreements reached at the beginning of the deal were either canceled or modified in a way that favored always the local community. The contributions of this study fall into the knowledge field of emerging multinational firms and market entry process.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Työn alustavana tavoitteena oli havaita yrityksen ict-ryhmässä käytettävien teknisten välineiden, informaation hallinnan järjestelmien ja ryhmän työtilojen vaikutus hiljasen tiedon jakamiseen tai sen estymiseen. Työssä tarkasteltiin myös vaikutusta ryhmän oppimiseen sekä ryhmään muodostuvan hiljaisen tiedon syntymisen ja henkilöitymisen syihin sekä hiljaisen tiedon laatuun. Lisäksi työssä pyritään löytämään tapoja, joiden avulla hiljaista tietoa voidaan hyödyntää ja jakaa ryhmässä siten että se mahdollistaa myös ryhmän oppimisen. Haastatteluissa nousivat esiin informaation hallintaongelmat, jotka johtuvat informaation hajautumisesta informaation eri hallinta järjestelmiin, tietoturvamääräysten aiheuttamiin esteisiin ja kriittisen teknisen dokumentaation tallentamiseen. Nämä vaikeuttavat tallennetun informaation hyödyntämistä ict-ryhmässä. Tämä osaltaan aiheuttaa hiljaisen tiedon henkilöitymistä ryhmässä ja hiljaisen tiedon jakamisen menetelmien jää hyödyntämättä. Haastatteluissa osoittautui, että hiljaisen tiedon hyödyntämisongelmat johtuvat osittain ryhmän sisäisten yhteyksien verkoston rakenteesta. Vahvojen linkkien vähyys ryhmässä ja vahvojen linkkien suuntautuminen ryhmän ulkoisiin verkostoihin vaikeuttaa hiljaisen tiedon siirtymistä ryhmässä ja aiheuttaa hiljaisen tiedon henkilöitymistä. Kiire todettiin ryhmän kannalta ongelmalliseksi hiljaisen tiedon jakamisen ja hyödyntämisen esteeksi. Tiedon adaptaatioon ja omaksumiseen liittyvät ongelmat ovat sidoksissa aikaan ja hiljaisen tiedon henkilöitymiseen ryhmässä. Ryhmätyö ja ryhmän päivittäisessä toiminnassa käytettävissä olevat hiljaisen tiedon jakamisen menetelmät osoittautuvat sopivimmiksi edistämään ryhmän yhteistyökykyä sekä sosiaalisen rakenteen ja luottamuksen kehittymistä. Ne poistavat myös tiedon omaksumisen ja adaptaation esteitä. Ryhmätyö vaikuttaa myönteisesti ryhmän kollektiiviseen osaamiseen ja ryhmän hiljaisen tiedon kehittymiseen. Lisäksi se parantaa teknisen dokumentaation ymmärrettävyyttä.