14,402 research outputs found
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
ERP implementation methodologies and frameworks: a literature review
Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
Recommended from our members
Sustainable supply chain management in the digitalisation era: The impact of Automated Guided Vehicles
Internationalization of markets and climate change introduce multifaceted challenges for modern supply chain (SC) management in the today's digitalisation era. On the other hand, Automated Guided Vehicle (AGV) systems have reached an age of maturity that allows for their utilization towards tackling dynamic market conditions and aligning SC management focus with sustainability considerations. However, extant research only myopically tackles the sustainability potential of AGVs, focusing more on addressing network optimization problems and less on developing integrated and systematic methodological approaches for promoting economic, environmental and social sustainability. To that end, the present study provides a critical taxonomy of key decisions for facilitating the adoption of AGV systems into SC design and planning, as these are mapped on the relevant strategic, tactical and operational levels of the natural hierarchy. We then propose the Sustainable Supply Chain Cube (S2C2), a conceptual tool that integrates sustainable SC management with the proposed hierarchical decision-making framework for AGVs. Market opportunities and the potential of integrating AGVs into a SC context with the use of the S2C2 tool are further discussed
E-learning-based competence development in logistics
Die Logistik ist ein hochgradig interdisziplinäres, komplexes Wissensgebiet und Kompetenzfeld, das sich kontinuierlich und sehr dynamisch weiterentwickelt. Dies erfordert nicht nur eine fortgesetzte Anpassung von Ausbildungsangeboten, sondern auch die systematische Weiterbildung von Logistikern, um Defizite in der beruflichen Handlungskompetenz zu vermeiden oder abzubauen. Lernen am Arbeitsplatz, eventuell in Verbindung mit E-Learning, erscheint als geeigneter Weg, die Entwicklung von beruflicher Handlungskompetenz auch in der Logistik zu unterstützen. Der Beitrag stellt verschiedene Ansätze für die Kompetenzermittlung und –entwicklung speziell in der Logistik dar und leitet Schlussfolgerungen zu den heutigen Kompetenzanforderungen bei Logistikpraktikern ab. Dies bildet die Basis für einen Handlungsrahmen, der im EU-geförderten Projekt lot4eng.com entstanden ist und hilft, das logistische Kompetenzniveau einer Person zu spezifizieren, geeignete Lerneinheiten zu seiner Steigerung vorzuschlagen und die individuelle Kompetenzentwicklung zu unterstützen. Im Weiteren wird die Gestaltung von E-Learning zum Füllen der lot4eng.com-Plattform diskutiert, bevor Erfahrungen aus der Projektarbeit und Schlussfolgerungen für die weitere Arbeit abgeleitet werden. Damit möchte der Beitrag die laufende Forschung dazu, wie lebenslanges Lernen unterstützt werden kann, anreichern.The logistics field of knowledge and professional competence is highly multidisciplinary and complex but also continuously and very dynamically developing. This does not only require constant updating of educational programmes but also systematic training of logistics professionals in order to avoid or reduce professional competence gaps. Workplace learning amongst others in combination with e-learning methodology seems to be an appropriate way to support professional competence development in logistics, too. The paper presents some research aspects particularly related to logistics competence profiling and development and derives conclusions on nowadays competence requirements with logistics professionals. This forms the basis for introducing a framework to help in specifying a person’s level of logistics competence, recommending suitable learning units and supporting individual competence development as it results from the EU-funded lot4eng.com project. E-learning design to populate the lot4eng.com portal is discussed before lessons learned and conclusions on further work are derived. With this the paper wants to contribute to ongoing research on how to foster lifelong learning
In the Battle for Reality: Social Documentaries in the U.S.
Provides an overview of documentaries that address social justice and democracy issues, and includes case studies of successful strategic uses of social documentaries
Design and evaluation of an advanced air-ground data-link system for air traffic control
The design and evaluation of the ground-based portion of an air-ground data-link system for air traffic control (ATC) are described. The system was developed to support the 4D Aircraft/ATC Integration Study, a joint simulation experiment conducted at NASA's Ames and Langley Research Centers. The experiment focused on airborne and ground-based procedures for handling aircraft equipped with a 4D-Flight Management System (FMS) and the system requirements needed to ensure conflict-free traffic flow. The Center/TRACON Automation System (CTAS) at Ames was used for the ATC part of the experiment, and the 4D-FMS-equipped aircraft was simulated by the Transport Systems Research Vehicle (TSRV) simulator at Langley. The data-link system supported not only conventional ATC communications, but also the communications needed to accommodate the 4D-FMS capabilities of advanced aircraft. Of great significance was the synergism gained from integrating the data link with CTAS. Information transmitted via the data link was used to improve the monitoring and analysis capability of CTAS without increasing controller input workload. Conversely, CTAS was used to anticipate and create prototype messages, thus reducing the workload associated with the manual creation of data-link messages
Modeling Adaptive Middleware and Its Applications to Military Tactical Datalinks
Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example of an active applied research area. Adaptive middleware is being developed and applied to meet the ever-increasing challenges set forth by the next generation of mission-critical distributed real-time and embedded (DRE) systems. The driving force behind many next-generation DRE systems is the establishment of QoS requirements typically associated with workloads that vary dynamically. The Weapon System Open Architecture (WSOA), an adaptive middleware platform developed by Boeing, is modeled as a part of this research to determine the scalability of the architecture. The WSOA adaptive middleware was previously flight-tested with one tactical node, and the test results represent the performance baseline the architecture. The WSOA adaptive middleware is modeled with 1, 2, 4, 8 and 16 tactical nodes. The results of the modeling and simulation is that the WSOA adaptive middleware can achieve the performance baseline achieved during the original flight-test, in the cases of 1, 2, and 4 tactical nodes. In addition, the results of the modeling and simulation also demonstrate that the WSOA adaptive middleware cannot achiev
Cyber Security of Critical Infrastructures
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
- …