26 research outputs found

    Multipath Routing in Cloud Computing using Fuzzy based Multi-Objective Optimization System in Autonomous Networks

    Get PDF
    Intelligent houses and buildings, autonomous automobiles, drones, robots, and other items that are successfully incorporated into daily life are examples of autonomous systems and the Internet of Things (IoT) that have advanced as research areas. Secured data transfer in untrusted cloud applications has been one of the most significant requirements in the cloud in recent times. In order to safeguard user data from unauthorised users, encrypted data is stored on cloud servers. Existing techniques offer either security or efficiency for data transformation. They fail to retain complete security while undergoing significant changes. This research proposes novel technique in multipath routing based energy optimization of autonomous networks. The main goal of this research is to enhance the secure data transmission in cloud computing with network energy optimization. The secure data transmission is carried out using multi-authentication attribute based encryption with multipath routing protocol. Then the network energy has been optimized using multi-objective fuzzy based reinforcement learning. The experimental analysis has been carried out based on secure data transmission and energy optimization of the network. The parameters analysed in terms of scalability of 79%, QoS of 75%, encryption time of 42%, latency of 96%, energy efficiency of 98%, end-end delay of 45%

    Predictive long-term asset maintenance strategy: development of a fuzzy logic condition-based control system

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business IntelligenceTechnology has accelerated the growth of the Facility Management industry and its roles are broadening to encompass more responsibilities and skill sets. FM budgets and teams are becoming larger and more impactful as new technological trends are incorporated into data-driven strategies. This new scenario has motivated institutions such as the European Central Bank to initiate projects aimed at optimising the use of data to improve the monitoring, control and preservation of the assets that enable the continuity of the Bank's activities. Such projects make it possible to reduce costs, plan, manage and allocate resources, reinforce the control, and efficiency of safety and operational systems. To support the long-term maintenance strategy being developed by the Technical Facility Management section of the ECB, this thesis proposes a model to calculate the Left wear margin of the equipment. This is accomplished through the development of an algorithm based on a fuzzy logic system that uses Python language and presents the system's structure, its reliability, feasibility, potential, and limitations. For Facility Management, this project constitutes a cornerstone of the ongoing digital transformation program

    A Fuzzy Logic Multi-Criteria Decision Framework for Selecting IT Service Providers

    Get PDF

    Competency Model: A Study on the Cultivation of College Students’ Innovation and Entrepreneurship Ability

    Get PDF
    Objectives: This study was designed to analyze entrepreneurial competency and enhance college students' abilities in innovation and entrepreneurship. Methods: Ten relevant factors were summarized based on the interview records. Relevant data were collected through questionnaires and tested for reliability and validity. The effectiveness of the ten factors on entrepreneurial competency was tested using the regression analysis method. Then, an analytic hierarchy process model of entrepreneurial competency was established to calculate the relevant weights. Findings: The data collected from the survey questionnaire had sufficient reliability and validity. The ten relevant factors were effective in developing entrepreneurial competence. The weight distribution in the analytic hierarchy model indicated that entrepreneurial knowledge was most important, followed by entrepreneurial ability, and intrinsic potential was least significant. Novelty:The novelty of this article lies in not only verifying the effectiveness of relevant factors through regression analysis but also further analyzing the weight of these factors through an analytic hierarchy process. Doi: 10.28991/HIJ-2023-04-04-011 Full Text: PD

    An analysis on integrated supply chain management in academic university library

    Get PDF
    Supply chain management has been widely used in manufacturing industries and proven by researchers and practitioners as a best practice. It can satisfy stakeholders, increase revenues, and decrease the total costs. However, very few service industries, particularly the academic library, have implemented supply chain management. Several problems related to the academic library supply chain should be addressed, such as how to model the entities and their functions for the general practice of an academic library supply chain, and the linkage among these entities as an integrated model. This research develops an integrated academic library supply chain model, which can be used for the strategic planning of the academic library. It identifies entities and their functions for the academic library supply chain, constructs a conceptual model of the integrated supply chain of the academic library, and analyses the interrelationship among the newly developed model entities. This research used both qualitative and quantitative approaches to achieve the research objectives. The process of identifying the entities and their functions of the academic library supply chain was accomplished by using a theoretical literature review and content analysis techniques. The proposed conceptual supply chain model was developed based on the system thinking method. Eventually, it was validated through the Fuzzy Delphi method, an expert judgment technique. Three conceptual models for the supply chain academic library were successfully developed: The Holistic View of Supply Chain Model for Academic Library, the Material Purchasing Decision Making Model, and the Integrated Academic Library Supply Chain Model. These three models were validated by the academic librarians. This research expands the knowledge of supply chain theory, particularly in the supply chain academic library. It also contributes to the academic library management in planning and formulating a roadmap for the library to increase its quality services for all stakeholders

    Acta Polytechnica Hungarica 2014

    Get PDF

    Evolutionary Service Composition and Personalization Ecosystem for Elderly Care

    Get PDF
    Current demographic trends suggest that people are living longer, while the ageing process entails many necessities, calling for care services tailored to the individual senior’s needs and life style. Personalized provision of care services usually involves a number of stakeholders, including relatives, friends, caregivers, professional assistance organizations, enterprises, and other support entities. Traditional Information and Communication Technology based care and assistance services for the elderly have been mainly focused on the development of isolated and generic services, considering a single service provider, and excessively featuring a techno-centric approach. In contrast, advances on collaborative networks for elderly care suggest the integration of services from multiple providers, encouraging collaboration as a way to provide better personalized services. This approach requires a support system to manage the personalization process and allow ranking the {service, provider} pairs. An additional issue is the problem of service evolution, as individual’s care needs are not static over time. Consequently, the care services need to evolve accordingly to keep the elderly’s requirements satisfied. In accordance with these requirements, an Elderly Care Ecosystem (ECE) framework, a Service Composition and Personalization Environment (SCoPE), and a Service Evolution Environment (SEvol) are proposed. The ECE framework provides the context for the personalization and evolution methods. The SCoPE method is based on the match between the customer´s profile and the available {service, provider} pairs to identify suitable services and corresponding providers to attend the needs. SEvol is a method to build an adaptive and evolutionary system based on the MAPE-K methodology supporting the solution evolution to cope with the elderly's new life stages. To demonstrate the feasibility, utility and applicability of SCoPE and SEvol, a number of methods and algorithms are presented, and illustrative scenarios are introduced in which {service, provider} pairs are ranked based on a multidimensional assessment method. Composition strategies are based on customer’s profile and requirements, and the evolutionary solution is determined considering customer’s inputs and evolution plans. For the ECE evaluation process the following steps are adopted: (i) feature selection and software prototype development; (ii) detailing the ECE framework validation based on applicability and utility parameters; (iii) development of a case study illustrating a typical scenario involving an elderly and her care needs; and (iv) performing a survey based on a modified version of the technology acceptance model (TAM), considering three contexts: Technological, Organizational and Collaborative environment

    A framework for SLA-centric service-based Utility Computing

    Get PDF
    Nicht angegebenService oriented Utility Computing paves the way towards realization of service markets, which promise metered services through negotiable Service Level Agreements (SLA). A market does not necessarily imply a simple buyer-seller relationship, rather it is the culmination point of a complex chain of stake-holders with a hierarchical integration of value along each link in the chain. In service value chains, services corresponding to different partners are aggregated in a producer-consumer manner resulting in hierarchical structures of added value. SLAs are contracts between service providers and service consumers, which ensure the expected Quality of Service (QoS) to different stakeholders at various levels in this hierarchy. \emph{This thesis addresses the challenge of realizing SLA-centric infrastructure to enable service markets for Utility Computing.} Service Level Agreements play a pivotal role throughout the life cycle of service aggregation. The activities of service selection and service negotiation followed by the hierarchical aggregation and validation of services in service value chain, require SLA as an enabling technology. \emph{This research aims at a SLA-centric framework where the requirement-driven selection of services, flexible SLA negotiation, hierarchical SLA aggregation and validation, and related issues such as privacy, trust and security have been formalized and the prototypes of the service selection model and the validation model have been implemented. } The formal model for User-driven service selection utilizes Branch and Bound and Heuristic algorithms for its implementation. The formal model is then extended for SLA negotiation of configurable services of varying granularity in order to tweak the interests of the service consumers and service providers. %and then formalizing the requirements of an enabling infrastructure for aggregation and validation of SLAs existing at multiple levels and spanning % along the corresponding service value chains. The possibility of service aggregation opens new business opportunities in the evolving landscape of IT-based Service Economy. A SLA as a unit of business relationships helps establish innovative topologies for business networks. One example is the composition of computational services to construct services of bigger granularity thus giving room to business models based on service aggregation, Composite Service Provision and Reselling. This research introduces and formalizes the notions of SLA Choreography and hierarchical SLA aggregation in connection with the underlying service choreography to realize SLA-centric service value chains and business networks. The SLA Choreography and aggregation poses new challenges regarding its description, management, maintenance, validation, trust, privacy and security. The aggregation and validation models for SLA Choreography introduce concepts such as: SLA Views to protect the privacy of stakeholders; a hybrid trust model to foster business among unknown partners; and a PKI security mechanism coupled with rule based validation system to enable distributed queries across heterogeneous boundaries. A distributed rule based hierarchical SLA validation system is designed to demonstrate the practical significance of these notions

    Modelling grid architecture.

    Get PDF
    This thesis evaluates software engineering methods, especially event modelling of distributed systems architecture, by applying them to specific data-grid projects. Other methods evaluated include requirements' analysis, formal architectural definition and discrete event simulation. A novel technique for matching architectural styles to requirements is introduced. Data-grids are a new class of networked information systems arising from e-science, itself an emergent method for computer-based collaborative research in the physical sciences. The tools used in general grid systems, which federate distributed resources, are reviewed, showing that they do not clearly guide architecture. The data-grid projects, which join heterogeneous data stores specifically, put required qualities at risk. Such risk of failure is mitigated in the EGSO and AstroGrid solar physics data-grid projects' designs by modelling. Design errors are trapped by rapidly encoding and evaluating informal concepts, architecture, component interaction and objects. The success of software engineering modelling techniques depends on the models' accuracy, ability to demonstrate the required properties, and clarity (so project managers and developers can act on findings). The novel formal event modelling language chosen, FSP, meets these criteria at the diverse early lifecycle stages (unlike some techniques trialled). Models permit very early testing, finding hidden complexity, gaps in designed protocols and risks of unreliability. However, simulation is shown to be more suitable for evaluating qualities like scalability, which emerge when there are many component instances. Design patterns (which may be reused in other data-grids to resolve commonly encountered challenges) are exposed in these models. A method for generating useful models rapidly, introducing the strength of iterative lifecycles to sequential projects, also arises. Despite reported resistance to innovation in industry, the software engineering techniques demonstrated may benefit commercial information systems too
    corecore