3,694 research outputs found

    A Cost-sensitive Intelligent Prediction Model for Outsourced Software Project Risk

    Get PDF
    Outsourced software project is one of the main ways of software development, which is of high failure rate. Intelligent risk prediction model can help identify high risk project in time. However, the existing models are mostly based on such a hypothesis that all the cost of misclassification is equal, which is not consistent with the reality that in the domain of software project risk prediction, the cost of predicting a fail-prone project as a success-prone project is different from predicting a success-prone project as a fail-prone project. To the best of our knowledge, the cost-sensitive learning method has not yet been applied in the domain of outsourced software project risk management though it has been widely used in a variety of fields. Based on this situation, we selected five classifiers, and introduced cost-sensitive learning method to build intelligent prediction models respectively. This paper totally collected 292 real data of outsourced software project for modeling. Experiment results showed that, under cost-sensitive scenario, the polynomial kernel support vector machine is the best classifier for outsourced software project risk prediction among the five classifiers due to its high prediction accuracy, stability and low cost

    Digital transformation in the footwear industry : assessing the potential of IoT on portuguese SMEs in the footwear industry

    Get PDF
    In the last few years, manufacturing companies, from the most diverse industries and sectors, have been investing in industry 4.0 technologies. One of these technologies is the Internet of Things (IoT), which has been revolutionising industries, namely manufacturing, healthcare, energy, retail, and agriculture. Manufacturing firms are adopting IoT not only to improve quality, production and reduce costs but also to enhance the logistic chain and improve customer experience. However, very little progress has been made in the Portuguese footwear industry towards the implementation of the Internet of Things, particularly in the SME segment. This dissertation has analysed the potential operational and production advantages of IoT, the associated economic impact, as well as the limitations of this technology and the challenges for its implementation in Portuguese footwear SMEs. Finally, this dissertation aims to present an adoption roadmap. The results provided positive indicators of operational and productivity gains translated into cost reduction in work insurance, energy, travelling, acquisition of raw materials and decrease of inventory units, and production waste. Nevertheless, the associated potential of each IoT use case is dependent on the capacity of Portuguese footwear SMEs to invest and acquire the necessary technical resources. The main barriers to the adoption of IoT derive from the limitations of the technology and the specific challenges associated to the Portuguese footwear SMEs economic and technical framework. Nonetheless, the technological advances, the cross collaboration among the different footwear stakeholders, and a well-defined implementation strategy can overcome these barriers and bring operational and economic benefits.A Internet of Things (IoT), uma tecnologia da indústria 4.0, tem revolucionado indústrias como a da manufactura, saúde, energia, retalho e agricultura. As empresas de manufactura estão a adoptar a IoT não apenas para melhorar a qualidade dos productos, eficiência produtiva, e reduzir custos, mas também para aprimorar a cadeia logística e melhorar a experiência do cliente. Contudo, poucos foram os progressos feitos referentes à IoT na indústria do calçado Português, principalmente no segmento das PMEs. A seguinte dissertação analisou as potenciais vantagens operacionais e productivas da IoT e os seus impactos económicos, bem como as limitações da tecnologia e os desafios de implementação para as PME do calçado Português. Por último, é apresentado um plano de implementação da tecnologia. Subsequentemente os resultados mostraram indicadores favoráveis de ganhos operacionais e produtivos, que se traduzem na redução de custos com seguros de trabalho, inventário, desperdícios de produção, custos de manutenção, encargos com deslocações, custos de energia e custos de aquisição de matérias-primas. Contudo, o potencial de cada caso de uso de IoT depende da capacidade das PMEs do calçado Português para fazer o investimento financeiro e adquirir os recursos técnicos necessários. As principais barreiras à adopção da IoT derivam das limitações da própria tecnologia e dos desafios relativos ao quadro económico e técnico das PMEs Portuguesas do calçado. Não obstante, os avanços tecnológicos, a colaboração entre os diferentes intervenientes e uma estratégia de implementação bem definida podem superar estas barreiras e garantir a adopção e trazer ganhos operacionais e económicos

    A smart resource management mechanism with trust access control for cloud computing environment

    Full text link
    The core of the computer business now offers subscription-based on-demand services with the help of cloud computing. We may now share resources among multiple users by using virtualization, which creates a virtual instance of a computer system running in an abstracted hardware layer. It provides infinite computing capabilities through its massive cloud datacenters, in contrast to early distributed computing models, and has been incredibly popular in recent years because to its continually growing infrastructure, user base, and hosted data volume. This article suggests a conceptual framework for a workload management paradigm in cloud settings that is both safe and performance-efficient. A resource management unit is used in this paradigm for energy and performing virtual machine allocation with efficiency, assuring the safe execution of users' applications, and protecting against data breaches brought on by unauthorised virtual machine access real-time. A secure virtual machine management unit controls the resource management unit and is created to produce data on unlawful access or intercommunication. Additionally, a workload analyzer unit works simultaneously to estimate resource consumption data to help the resource management unit be more effective during virtual machine allocation. The suggested model functions differently to effectively serve the same objective, including data encryption and decryption prior to transfer, usage of trust access mechanism to prevent unauthorised access to virtual machines, which creates extra computational cost overhead

    Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.

    Get PDF
    This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces

    A catalog of information systems outsourcing risks

    Get PDF
    Information systems outsourcing risks are a vital component in the decision and management process associated to the provision of information systems and technology services by a provider to a customer. Although there is a rich literature on information systems outsourcing risks, the accumulated knowledge on this area is fragmented. In view of this situation, an argument is put forward on the usefulness of having a theory that integrates the various constructs related to information systems outsourcing risks. This study aims to contribute towards the synthesis of that theory, by proposing a conceptual framework for interpreting the literature and presenting a catalog of information systems outsourcing risks. The conceptual framework articulates together six key risk elements, namely dangers, negative outcomes, undesirable consequences, factors and mitigation actions. The catalog condenses and categorizes the information systems outsourcing risk elements found on the literature reviewed, both from the perspective of the outsourcing customer and from the perspective of the outsourcing provider. Proposals for subsequent work towards the generation of the theory of information systems outsourcing risk are suggested

    Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence

    Get PDF
    Industry 4.0 aims to support smarter and autonomous processes while improving agility, cost efficiency, and user experience. To fulfill its promises, properly processing the data of the industrial processes and infrastructures is required. Artificial intelligence (AI) appears as a strong candidate to handle all generated data, and to help in the automation and smartification process. This article overviews the digital twin as a true embodiment of a cyber-physical system (CPS) in Industry 4.0, showing the mission of AI in this concept. It presents the key enabling technologies of the digital twin such as edge, fog, and 5G, where the physical processes are integrated with the computing and network domains. The role of AI in each technology domain is identified by analyzing a set of AI agents at the application and infrastructure levels. Finally, movement prediction is selected and experimentally validated using real data generated by a digital twin for robotic arms with results showcasing its potential.This work has been (partially) funded by the H2020 EU/TW joint action 5G-DIVE (Grant #859881) and the H2020 5Growth project (Grant #856709). It has also been funded by the Spanish State Research Agency (TRUE5G project, PID2019-108713RB-C52/AEI/10.13039/501100011033)

    Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions

    Full text link
    In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon transportation has been threatened from various ways. For example, denial of service attacks pose a great threat to the electric vehicles and vehicle-to-grid networks. To minimize these threats, several methods have been proposed to defense against them. Yet, these methods are only for certain types of scenarios or attacks. Therefore, this review addresses security aspect from holistic view, provides the overview, challenges and future directions of cyber security technologies in low-carbon transportation. Firstly, based on the concept and importance of low-carbon transportation, this review positions the low-carbon transportation services. Then, with the perspective of network architecture and communication mode, this review classifies its typical attack risks. The corresponding defense technologies and relevant security suggestions are further reviewed from perspective of data security, network management security and network application security. Finally, in view of the long term development of low-carbon transportation, future research directions have been concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Review

    Data mining and fusion

    No full text
    • …
    corecore