54,197 research outputs found
Feasibility of Warehouse Drone Adoption and Implementation
While aerial delivery drones capture headlines, the pace of adoption of drones in warehouses has shown the greatest acceleration. Warehousing constitutes 30% of the cost of logistics in the US. The rise of e-commerce, greater customer service demands of retail stores, and a shortage of skilled labor have intensified competition for efficient warehouse operations. This takes place during an era of shortening technology life cycles. This paper integrates several theoretical perspectives on technology diffusion and adoption to propose a framework to inform supply chain decision-makers on when to invest in new robotics technology
SOLUSI BISNIS BERBASIS AJAX : STUDI KASUS SISTEM POS (POINT OF SALE)
Retailers find themselves up against fierce competition. They must fight for every sale, and work hard to build customer loyalty and protect already slim margins. Today, an increasing number of smaller retailers understand the urgent need to catch up to larger players to remain competitive. They also recognize the important role that IT investments play in organizations� strategic decision-making and operational efficiency in all areas of the business, including point of sale, supply chain management, and inventory. The savvy retailer knows that POS (Point Of Sale) data and functionality has quickly become critical to business rather than a mere convenience. In recent time Ajax based applications have become very popular. Ajax is a new model for web applications to provide more responsive and faster user interfaces resembling more closely to dekstop applications. Typical usage areas are user input validation without page submission, integrating small elements from several servers on a single page, and simulating push-services. Especially the latter are promising for enhancing web applications and for realizing them directly in browsers without plug-ins or additional software. Many frameworks and libraries (open source or comercial) are available which support Ajax development. In this final project, we will integrate some open-source Ajax framework to build low-cost, interactive and integrate POS (Point Of Sale) systems which is accessible to a wide retailer through the Internet. This is we call as iPOS. We hope it�s will become a solution for retailers to run their business more efective and effisien
Value-driven Security Agreements in Extended Enterprises
Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example
Regional Data Archiving and Management for Northeast Illinois
This project studies the feasibility and implementation options for establishing a regional data archiving system to help monitor
and manage traffic operations and planning for the northeastern Illinois region. It aims to provide a clear guidance to the
regional transportation agencies, from both technical and business perspectives, about building such a comprehensive
transportation information system. Several implementation alternatives are identified and analyzed. This research is carried
out in three phases.
In the first phase, existing documents related to ITS deployments in the broader Chicago area are summarized, and a
thorough review is conducted of similar systems across the country. Various stakeholders are interviewed to collect
information on all data elements that they store, including the format, system, and granularity. Their perception of a data
archive system, such as potential benefits and costs, is also surveyed. In the second phase, a conceptual design of the
database is developed. This conceptual design includes system architecture, functional modules, user interfaces, and
examples of usage. In the last phase, the possible business models for the archive system to sustain itself are reviewed. We
estimate initial capital and recurring operational/maintenance costs for the system based on realistic information on the
hardware, software, labor, and resource requirements. We also identify possible revenue opportunities.
A few implementation options for the archive system are summarized in this report; namely:
1. System hosted by a partnering agency
2. System contracted to a university
3. System contracted to a national laboratory
4. System outsourced to a service provider
The costs, advantages and disadvantages for each of these recommended options are also provided.ICT-R27-22published or submitted for publicationis peer reviewe
Impact of Information Technology on Employee Attitudes: A Longitudinal Field Study
This longitudinal study examined the impact of an information technology system on the job and employee attitudes in a parts distribution center for a Fortune 500 company. Data were collected prior to, during, and following the implementation of an automated information technology system. Results of both the within subjects (N=24) and between subjects (N=58) analyses indicated that the automated technology reduced motivational and increased mechanistic aspects of the job as well as reduced employee attitudes
Development and Performance Evaluation of a Connected Vehicle Application Development Platform (CVDeP)
Connected vehicle (CV) application developers need a development platform to build,
test and debug real-world CV applications, such as safety, mobility, and environmental
applications, in edge-centric cyber-physical systems. Our study objective is to develop
and evaluate a scalable and secure CV application development platform (CVDeP)
that enables application developers to build, test and debug CV applications in realtime.
CVDeP ensures that the functional requirements of the CV applications meet the
corresponding requirements imposed by the specific applications. We evaluated the
efficacy of CVDeP using two CV applications (one safety and one mobility application)
and validated them through a field experiment at the Clemson University Connected
Vehicle Testbed (CU-CVT). Analyses prove the efficacy of CVDeP, which satisfies the
functional requirements (i.e., latency and throughput) of a CV application while
maintaining scalability and security of the platform and applications
Data Warehouse Design and Management: Theory and Practice
The need to store data and information permanently, for their reuse in later stages, is a very relevant problem in the modern world and now affects a large number of people and economic agents. The storage and subsequent use of data can indeed be a valuable source for decision making or to increase commercial activity. The next step to data storage is the efficient and effective use of information, particularly through the Business Intelligence, at whose base is just the implementation of a Data Warehouse. In the present paper we will analyze Data Warehouses with their theoretical models, and illustrate a practical implementation in a specific case study on a pharmaceutical distribution companyData warehouse, database, data model.
Recommended from our members
Evaluating the reading performance of semi-passive RFID tags to enhance locating of warehouse resources: An experiment design
Copyright @ 2011 8th European, Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2011)In the supply chain, a warehouse is a crucial component for linking all chain parties. It is necessary to track the real time resource location and status to support warehouse operations effectively. Therefore, RFID technology has been adopted to facilitate the collection and sharing of data in a warehouse environment. However, an essential decision should be made on the type of RFID tags the warehouse managers should adopt, because it is very important to implement RFID tags that work in warehouse environment. As a result, the warehouse resources will be easily tracked and accurately located which will improve the visibility of warehouse operations, enhance the productivity and reduce the operation costs of the warehouse. Therefore, it is crucial to evaluate the reading performance of all types of RFID tags in a warehouse environment in order to choose the most appropriate RFID tags which will enhance the operational efficiency of a warehouse. Reading performance of active and passive RFID tags have been evaluated before while, semi-passive RFID tag, which is battery-assisted with greater sensitivity than passive tags and cheaper than active tags, has not been examined yet in a warehouse environment. This research is in- progress research and it is aiming to perform tests for evaluating the reading performance of semi-passive RFID apparatus to provide an extensive RFID performance comparison for formulating an efficient RFID solution in warehousing environment
- …