5,140 research outputs found

    Adjacent LSTM-Based Page Scheduling for Hybrid DRAM/NVM Memory Systems

    Get PDF
    Recent advances in memory technologies have led to the rapid growth of hybrid systems that combine traditional DRAM and Non Volatile Memory (NVM) technologies, as the latter provide lower cost per byte, low leakage power and larger capacities than DRAM, while they can guarantee comparable access latency. Such kind of heterogeneous memory systems impose new challenges in terms of page placement and migration among the alternative technologies of the heterogeneous memory system. In this paper, we present a novel approach for efficient page placement on heterogeneous DRAM/NVM systems. We design an adjacent LSTM-based approach for page placement, which strongly relies on page accesses prediction, while sharing knowledge among pages with behavioral similarity. The proposed approach leads up to 65.5% optimized performance compared to existing approaches, while achieving near-optimal results and saving 20.2% energy consumption on average. Moreover, we propose a new page replacement policy, namely clustered-LRU, achieving up to 8.1% optimized performance, compared to the default Least Recently Used (LRU) policy

    A Phenomenological Study of Scripture-Based Ethical Principles Embedded Within Corporate Leadership Practices

    Get PDF
    The ethical treatment of others within the corporate working environment is essential for that corporation\u27s success. Ethical treatment of others applies to business transactions with customers and clients and engages the policies designed to formulate the ethical treatment of company employees. Although most major corporation documentation includes corporate code of conduct policies, the ethical principles used to define those policies and enact leadership based upon those policies are not always consistent. Four research questions defined the structure of this qualitative phenomenological study. The study’s purpose was to define the nature of Scripture-based ethics within the corporate environment. The theory guiding this study is Servant Leadership Theory as defined by Greenleaf (1977) and supported by Northouse (2019) as it identifies the critical nature of leaders acting as servants for their followers. The study utilized a purposeful sampling strategy to recruit 15 participants. The researcher collected data through recorded online video interviews and transcribed the data using the NVIVO software package. The research identified six main themes: (1) Corporate Foundations, (2) Beliefs, (3) Ethical Foundations, (4) Scriptural Foundations, (5) Life Experience, and (6) Doing the Right Thing. Theme analysis revealed that an ingrained sense of right and wrong resides within humanity, and that sense derives its nature from God’s moral character written on the hearts of humanity. Data analysis also revealed a lack of formal professional ethics training at the leadership level. Future research should deploy a research design that expands this study to additional leadership levels, other industries, and internationally

    Z-Numbers-Based Approach to Hotel Service Quality Assessment

    Get PDF
    In this study, we are analyzing the possibility of using Z-numbers for measuring the service quality and decision-making for quality improvement in the hotel industry. Techniques used for these purposes are based on consumer evalu- ations - expectations and perceptions. As a rule, these evaluations are expressed in crisp numbers (Likert scale) or fuzzy estimates. However, descriptions of the respondent opinions based on crisp or fuzzy numbers formalism not in all cases are relevant. The existing methods do not take into account the degree of con- fidence of respondents in their assessments. A fuzzy approach better describes the uncertainties associated with human perceptions and expectations. Linguis- tic values are more acceptable than crisp numbers. To consider the subjective natures of both service quality estimates and confidence degree in them, the two- component Z-numbers Z = (A, B) were used. Z-numbers express more adequately the opinion of consumers. The proposed and computationally efficient approach (Z-SERVQUAL, Z-IPA) allows to determine the quality of services and iden- tify the factors that required improvement and the areas for further development. The suggested method was applied to evaluate the service quality in small and medium-sized hotels in Turkey and Azerbaijan, illustrated by the example

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance

    Advanced Energy Harvesting Technologies

    Get PDF
    Energy harvesting is the conversion of unused or wasted energy in the ambient environment into useful electrical energy. It can be used to power small electronic systems such as wireless sensors and is beginning to enable the widespread and maintenance-free deployment of Internet of Things (IoT) technology. This Special Issue is a collection of the latest developments in both fundamental research and system-level integration. This Special Issue features two review papers, covering two of the hottest research topics in the area of energy harvesting: 3D-printed energy harvesting and triboelectric nanogenerators (TENGs). These papers provide a comprehensive survey of their respective research area, highlight the advantages of the technologies and point out challenges in future development. They are must-read papers for those who are active in these areas. This Special Issue also includes ten research papers covering a wide range of energy-harvesting techniques, including electromagnetic and piezoelectric wideband vibration, wind, current-carrying conductors, thermoelectric and solar energy harvesting, etc. Not only are the foundations of these novel energy-harvesting techniques investigated, but the numerical models, power-conditioning circuitry and real-world applications of these novel energy harvesting techniques are also presented
    corecore