3,694 research outputs found
A Cost-sensitive Intelligent Prediction Model for Outsourced Software Project Risk
Outsourced software project is one of the main ways of software development, which is of high failure rate. Intelligent risk prediction model can help identify high risk project in time. However, the existing models are mostly based on such a hypothesis that all the cost of misclassification is equal, which is not consistent with the reality that in the domain of software project risk prediction, the cost of predicting a fail-prone project as a success-prone project is different from predicting a success-prone project as a fail-prone project. To the best of our knowledge, the cost-sensitive learning method has not yet been applied in the domain of outsourced software project risk management though it has been widely used in a variety of fields. Based on this situation, we selected five classifiers, and introduced cost-sensitive learning method to build intelligent prediction models respectively. This paper totally collected 292 real data of outsourced software project for modeling. Experiment results showed that, under cost-sensitive scenario, the polynomial kernel support vector machine is the best classifier for outsourced software project risk prediction among the five classifiers due to its high prediction accuracy, stability and low cost
Digital transformation in the footwear industry : assessing the potential of IoT on portuguese SMEs in the footwear industry
In the last few years, manufacturing companies, from the most diverse industries and
sectors, have been investing in industry 4.0 technologies. One of these technologies is the
Internet of Things (IoT), which has been revolutionising industries, namely manufacturing,
healthcare, energy, retail, and agriculture. Manufacturing firms are adopting IoT not only to
improve quality, production and reduce costs but also to enhance the logistic chain and
improve customer experience. However, very little progress has been made in the
Portuguese footwear industry towards the implementation of the Internet of Things,
particularly in the SME segment.
This dissertation has analysed the potential operational and production advantages of IoT,
the associated economic impact, as well as the limitations of this technology and the
challenges for its implementation in Portuguese footwear SMEs. Finally, this dissertation
aims to present an adoption roadmap.
The results provided positive indicators of operational and productivity gains translated into
cost reduction in work insurance, energy, travelling, acquisition of raw materials and
decrease of inventory units, and production waste. Nevertheless, the associated potential of
each IoT use case is dependent on the capacity of Portuguese footwear SMEs to invest and
acquire the necessary technical resources.
The main barriers to the adoption of IoT derive from the limitations of the technology and
the specific challenges associated to the Portuguese footwear SMEs economic and technical
framework. Nonetheless, the technological advances, the cross collaboration among the
different footwear stakeholders, and a well-defined implementation strategy can overcome
these barriers and bring operational and economic benefits.A Internet of Things (IoT), uma tecnologia da indústria 4.0, tem revolucionado indústrias
como a da manufactura, saúde, energia, retalho e agricultura. As empresas de manufactura
estão a adoptar a IoT não apenas para melhorar a qualidade dos productos, eficiência
produtiva, e reduzir custos, mas também para aprimorar a cadeia logÃstica e melhorar a
experiência do cliente. Contudo, poucos foram os progressos feitos referentes à IoT na
indústria do calçado Português, principalmente no segmento das PMEs.
A seguinte dissertação analisou as potenciais vantagens operacionais e productivas da IoT e
os seus impactos económicos, bem como as limitações da tecnologia e os desafios de
implementação para as PME do calçado Português. Por último, é apresentado um plano de
implementação da tecnologia.
Subsequentemente os resultados mostraram indicadores favoráveis de ganhos operacionais e
produtivos, que se traduzem na redução de custos com seguros de trabalho, inventário,
desperdÃcios de produção, custos de manutenção, encargos com deslocações, custos de
energia e custos de aquisição de matérias-primas. Contudo, o potencial de cada caso de uso
de IoT depende da capacidade das PMEs do calçado Português para fazer o investimento
financeiro e adquirir os recursos técnicos necessários.
As principais barreiras à adopção da IoT derivam das limitações da própria tecnologia e dos
desafios relativos ao quadro económico e técnico das PMEs Portuguesas do calçado. Não
obstante, os avanços tecnológicos, a colaboração entre os diferentes intervenientes e uma
estratégia de implementação bem definida podem superar estas barreiras e garantir a
adopção e trazer ganhos operacionais e económicos
A smart resource management mechanism with trust access control for cloud computing environment
The core of the computer business now offers subscription-based on-demand
services with the help of cloud computing. We may now share resources among
multiple users by using virtualization, which creates a virtual instance of a
computer system running in an abstracted hardware layer. It provides infinite
computing capabilities through its massive cloud datacenters, in contrast to
early distributed computing models, and has been incredibly popular in recent
years because to its continually growing infrastructure, user base, and hosted
data volume. This article suggests a conceptual framework for a workload
management paradigm in cloud settings that is both safe and
performance-efficient. A resource management unit is used in this paradigm for
energy and performing virtual machine allocation with efficiency, assuring the
safe execution of users' applications, and protecting against data breaches
brought on by unauthorised virtual machine access real-time. A secure virtual
machine management unit controls the resource management unit and is created to
produce data on unlawful access or intercommunication. Additionally, a workload
analyzer unit works simultaneously to estimate resource consumption data to
help the resource management unit be more effective during virtual machine
allocation. The suggested model functions differently to effectively serve the
same objective, including data encryption and decryption prior to transfer,
usage of trust access mechanism to prevent unauthorised access to virtual
machines, which creates extra computational cost overhead
Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.
This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces
A catalog of information systems outsourcing risks
Information systems outsourcing risks are a vital component in the decision and management process associated to the provision of information systems and technology services by a provider to a customer. Although there is a rich literature on information systems outsourcing risks, the accumulated knowledge on this area is fragmented. In view of this situation, an argument is put forward on the usefulness of having a theory that integrates the various constructs related to information systems outsourcing risks. This study aims to contribute towards the synthesis of that theory, by proposing a conceptual framework for interpreting the literature and presenting a catalog of information systems outsourcing risks. The conceptual framework articulates together six key risk elements, namely dangers, negative outcomes, undesirable consequences, factors and mitigation actions. The catalog condenses and categorizes the information systems outsourcing risk elements found on the literature reviewed, both from the perspective of the outsourcing customer and from the perspective of the outsourcing provider. Proposals for subsequent work towards the generation of the theory of information systems outsourcing risk are suggested
Toward intelligent cyber-physical systems: Digital twin meets artificial intelligence
Industry 4.0 aims to support smarter and autonomous processes while improving agility, cost efficiency, and user experience. To fulfill its promises, properly processing the data of the industrial processes and infrastructures is required. Artificial intelligence (AI) appears as a strong candidate to handle all generated data, and to help in the automation and smartification process. This article overviews the digital twin as a true embodiment of a cyber-physical system (CPS) in Industry 4.0, showing the mission of AI in this concept. It presents the key enabling technologies of the digital twin such as edge, fog, and 5G, where the physical processes are integrated with the computing and network domains. The role of AI in each technology domain is identified by analyzing a set of AI agents at the application and infrastructure levels. Finally, movement prediction is selected and experimentally validated using real data generated by a digital twin for robotic arms with results showcasing its potential.This work has been (partially) funded by the H2020 EU/TW joint action 5G-DIVE (Grant #859881) and the H2020 5Growth project (Grant #856709). It has also been funded by the Spanish State Research Agency (TRUE5G project, PID2019-108713RB-C52/AEI/10.13039/501100011033)
Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions
In recent years, low-carbon transportation has become an indispensable part
as sustainable development strategies of various countries, and plays a very
important responsibility in promoting low-carbon cities. However, the security
of low-carbon transportation has been threatened from various ways. For
example, denial of service attacks pose a great threat to the electric vehicles
and vehicle-to-grid networks. To minimize these threats, several methods have
been proposed to defense against them. Yet, these methods are only for certain
types of scenarios or attacks. Therefore, this review addresses security aspect
from holistic view, provides the overview, challenges and future directions of
cyber security technologies in low-carbon transportation. Firstly, based on the
concept and importance of low-carbon transportation, this review positions the
low-carbon transportation services. Then, with the perspective of network
architecture and communication mode, this review classifies its typical attack
risks. The corresponding defense technologies and relevant security suggestions
are further reviewed from perspective of data security, network management
security and network application security. Finally, in view of the long term
development of low-carbon transportation, future research directions have been
concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable
Energy Review
- …