Trust is one of the most important dimensions in developing and maintaining business relationships. However, due to the difficult to collect trust-related data from industry, given its concerns surrounding privacy and...
详细信息
ISBN:
(纸本)9783319591711;9783319591704
Trust is one of the most important dimensions in developing and maintaining business relationships. However, due to the difficult to collect trust-related data from industry, given its concerns surrounding privacy and trade secret protection, it still very problematic to investigate it. Motivated by the growing interest in behavioral research in the field of operations and supply chain management, and by the lack of supply chain trust-related datasets, the authors of this paper proposed and designed a novel trust behavioral experiment. Utilizing concepts of gamification and serious games, the experiment is capable of gathering information regarding individuals' behavior during procurement, information exchange, and ordering decisions considering trust relations in the context of supply chains.
Industry 4.0 technology is based on the concepts of flexibility and dynamic assembly system design. This enables new production strategies and creates new challenges for job shop scheduling. In particular, manufacturi...
详细信息
ISBN:
(纸本)9783319669236;9783319669229
Industry 4.0 technology is based on the concepts of flexibility and dynamic assembly system design. This enables new production strategies and creates new challenges for job shop scheduling. In particular, manufacturing processes for different customer orders may have individual machine structures whereas the flexible stations are able to execute different functions subject to individual sets of operations within the jobs. This study develops a control approach to job shop scheduling in a customized manufacturing process and job sequencing of operations within the jobs. The developed approach presents a contribution to flexible distributed scheduling in the emerging field of Industry 4.0-based innovative production systems.
Otoliths are the fish bones that allow it to hear sounds and achieve balance. The otolith grows in size as fish grows;ring bands are formed in the otoliths' surface registering periods of rapid and slow growth, op...
详细信息
ISBN:
(纸本)9783319560779
Otoliths are the fish bones that allow it to hear sounds and achieve balance. The otolith grows in size as fish grows;ring bands are formed in the otoliths' surface registering periods of rapid and slow growth, opaque bands appear alternating with translucent bands. Age classification was made considering the number of translucent rings in the otolith;one translucent ring was equivalent to one year. The modeling of fish species abundance on the majority of fisheries assessment use age based models. The task of ring counting and ageing is time consuming and may introduce errors that can have a strong impact in stock assessment results. Thus, accurate and precise age estimates are crucial for the effective management and understanding of fisheries resources because recruitment dynamics, growth and mortality estimates relies on these data. The main goal of this study is to produce automatic reading procedures to help researchers, ageing blue whiting fish, minimize ring error count and improve accuracy and precision on age estimation.
Increasing market dynamics rapidly change the business landscape. Collaboration amongst organizations is a common way to cope with these dynamics. Achieving a state of Business/IT-alignment (BITA) within Collaborative...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Increasing market dynamics rapidly change the business landscape. Collaboration amongst organizations is a common way to cope with these dynamics. Achieving a state of Business/IT-alignment (BITA) within Collaborative Networked Organizations (CNOs) appears to be a valuable endeavor. Therefore, this paper investigates CNO characteristics, as a basis, to incrementally design BITA artifacts that facilitate CNO-dynamism. Via a structured literature review and an expert session, we synthesized a list of 6 main and 22 sub-characteristics for CNOs. This list provides more detailed characteristics than we found in the literature. We also discuss the importance of the characteristic "Dynamic and self-regulating network" and the need for new BITA models that can cope with the dynamics.
A problematic aspect of software management systems in view of integrity preservation is the handling, approval, tracking and eventual execution of change requests. In the context of the relation between clients and r...
详细信息
ISBN:
(纸本)9783319591711;9783319591704
A problematic aspect of software management systems in view of integrity preservation is the handling, approval, tracking and eventual execution of change requests. In the context of the relation between clients and repositories, trust can help identifying all packages required by the intended installation. Negative trust, in turn, can be used to approach the complementary problem induced by removing packages. In this paper we offer a logic for negative trust which allows to identify admissible and no-longer admissible software packages in the current installation profile in view of uninstall processes. We provide a simple working example and the system is formally verified using the Coq theorem prover.
For each manufacturer, exact cost estimation is both a major priority and a challenge. This routine task is far from being optimized and depends on a very large number of parameters both strategic and technical. To he...
详细信息
ISBN:
(纸本)9783319729053;9783319729046
For each manufacturer, exact cost estimation is both a major priority and a challenge. This routine task is far from being optimized and depends on a very large number of parameters both strategic and technical. To help estimate a cost, applications have been developed but estimation is a task that would greatly benefit from the re-use of knowledge and data found in alphanumeric and geometric documents. Every manufacturing company has switched to numerical data with CAD, CAM, or ERP systems but one of the main drawbacks is the low usage of all these information that contain valuable knowledge and expertise. This paper describes the current state of cost estimation and proposes a new hybrid approach whose purpose is to maximize the re-use of information for machined parts. Our approach is based on a parameterized and customized cost model, an extractor of semantic descriptors in geometric documents (Model Based Definition files) and related textual documents and finally correlations to adjust the cost of machined parts.
Industrial Control Systems (ICSs) are computers managing many critical infrastructures like power plants, aeroplanes, production lines, etc. While ICS were specialised hardware circuits without internet connection in ...
详细信息
ISBN:
(数字)9783319584690
ISBN:
(纸本)9783319584690;9783319584683
Industrial Control Systems (ICSs) are computers managing many critical infrastructures like power plants, aeroplanes, production lines, etc. While ICS were specialised hardware circuits without internet connection in former times, they are nowadays commodity computers with network connection, TCP/IP stack, and a full operating system, making them vulnerable to common attacks. The defensive mechanisms, however, are still lacking behind due to the strong requirement for availability of ICSs which prohibits to deploy typical countermeasures like e.g. an anti-virus. New techniques are needed to defend these systems under their distinct prerequisites. We introduce the concept of a malware-tolerant ICS network architecture which can still operate securely even when some components are entirely compromised by an attacker. This was done by replacing all single point-of-failures with multiple components verifying each other. We provide ProVerif proofs to show the correctness of the network protocol one-by-one assuming each device compromised. Furthermore, we added a self-healing mechanism based on invariants to the architecture on network as well as system level which will reset failed or compromised systems. To demonstrate system level self-healing, we implemented it on top of FreeRTOS and ARM TrustZone. The network level self-healing was incorporated into the ProVerif proofs by formally verifying the absence of type 1 (falsely identified attacks) and type 2 errors (missed attacks).
This paper deals with the problem of optimal bidding in a day-ahead market of electricity for a power producer having joint operation of wind with photovoltaic power systems and storage of energy. Uncertainty, not onl...
详细信息
ISBN:
(纸本)9783319560779
This paper deals with the problem of optimal bidding in a day-ahead market of electricity for a power producer having joint operation of wind with photovoltaic power systems and storage of energy. Uncertainty, not only on electricity market prices, but also on wind and photovoltaic powers, has to be faced in order to achieve optimal bidding. The problem is viewed as a sort of a two-stage stochastic optimization problem formulated by mix-integer linear programming. A case study with data from the Iberian Peninsula is presented and a comparison between joint and disjoint operations is discussed, allowing concluding that the joint operation attenuates the economic impact of disjoint operation volatility.
In this article, we discuss existing literature on DSS in agriculture, on DSS that use data available in the Semantic Web, and on Semantic Web initiatives focusing on agriculture information. Our goal is to assess the...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
In this article, we discuss existing literature on DSS in agriculture, on DSS that use data available in the Semantic Web, and on Semantic Web initiatives focusing on agriculture information. Our goal is to assess the readiness of the Semantic Web as a platform to empower DSS that can keep risk and uncertainty in agriculture under control. Key agricultural activities targeted by DSS reported in literature are nutrient management, insect and pest management, land use and planning, environmental change and forecasting, and water and drought management. The most relevant use of Semantic Web in DSS, is in data analysis, as a means of making DSS more intelligent. There are initiatives to produce vocabularies and semantic repositories in the domain of agriculture. However, data and models are still isolated in specific domain repositories, and interoperability is still weak.
Generic representation of web services is targeted, in order to generate machine readable specification of business processes that run at each partner organization within the virtual organization (VO). A holistic and ...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Generic representation of web services is targeted, in order to generate machine readable specification of business processes that run at each partner organization within the virtual organization (VO). A holistic and formal service specification model is defined that can then be used unambiguously for discovery of business services, i.e. for finding a suitable service available at the VO to perform a given task. Especially, the proposed model, called C3Q, augments the description of service by its behavioral specification. A light extension of the WSDL documents is represented to specify all aspects of C3Q. Finally, a GUI is implemented to assist users with the behavioral description of the VO services.
暂无评论