1,585 research outputs found

    Applying autonomy to distributed satellite systems: Trends, challenges, and future prospects

    Get PDF
    While monolithic satellite missions still pose significant advantages in terms of accuracy and operations, novel distributed architectures are promising improved flexibility, responsiveness, and adaptability to structural and functional changes. Large satellite swarms, opportunistic satellite networks or heterogeneous constellations hybridizing small-spacecraft nodes with highperformance satellites are becoming feasible and advantageous alternatives requiring the adoption of new operation paradigms that enhance their autonomy. While autonomy is a notion that is gaining acceptance in monolithic satellite missions, it can also be deemed an integral characteristic in Distributed Satellite Systems (DSS). In this context, this paper focuses on the motivations for system-level autonomy in DSS and justifies its need as an enabler of system qualities. Autonomy is also presented as a necessary feature to bring new distributed Earth observation functions (which require coordination and collaboration mechanisms) and to allow for novel structural functions (e.g., opportunistic coalitions, exchange of resources, or in-orbit data services). Mission Planning and Scheduling (MPS) frameworks are then presented as a key component to implement autonomous operations in satellite missions. An exhaustive knowledge classification explores the design aspects of MPS for DSS, and conceptually groups them into: components and organizational paradigms; problem modeling and representation; optimization techniques and metaheuristics; execution and runtime characteristics and the notions of tasks, resources, and constraints. This paper concludes by proposing future strands of work devoted to study the trade-offs of autonomy in large-scale, highly dynamic and heterogeneous networks through frameworks that consider some of the limitations of small spacecraft technologies.Postprint (author's final draft

    Towards a cloud migration decision support system for Small and Medium enterprises in Tamil Nadu

    Get PDF
    Cloud computing is a promising computing paradigm which has the potential to speed up Information Technology adoption among SMEs in developing economies like India. The user friendly, pay per use cloud computing model offers SMEs access to highly scalable and reliable cloud infrastructure without having to invest on buying and maintaining expensive Information Technology resources. However, moving data and application to a cloud infrastructure is not straightforward and can be very challenging as decision makers need to consider numerous aspects before deciding to adopt cloud infrastructure. A review of the literature reveals that there are frameworks available to support cloud migration. However, there are no frameworks, models or tools available to support the whole cloud migration process. This research aims to fill that gap by proposing a conceptual framework for cloud migration decision support system targeted for SMEs in Tamil Nadu

    Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies

    Full text link
    This paper proposes a methodology for designing decision support systems for visualising and mitigating the Internet of Things cyber risks. Digital technologies present new cyber risk in the supply chain which are often not visible to companies participating in the supply chains. This study investigates how the Internet of Things cyber risks can be visualised and mitigated in the process of designing business and supply chain strategies. The emerging DSS methodology present new findings on how digital technologies affect business and supply chain systems. Through epistemological analysis, the article derives with a decision support system for visualising supply chain cyber risk from Internet of Things digital technologies. Such methods do not exist at present and this represents the first attempt to devise a decision support system that would enable practitioners to develop a step by step process for visualising, assessing and mitigating the emerging cyber risk from IoT technologies on shared infrastructure in legacy supply chain systems

    Integration of Real-Intelligence in Energy Management Systems to Enable Holistic Demand Response Optimization in Buildings and Districts

    Get PDF
    Although multiple trials have been conducted demonstrating that demand side flexibility works and even though technology roll-out progresses significantly fast, the business application of residential and small tertiary demand response has been slow to develop. This paper introduces a holistic demand response optimization framework that enables significant energy costs reduction at the consumer side, while introducing buildings as a major contributor to energy networks' stability in response to network constraints and conditions. The backbone of the solution consists in a modular interoperability and data management framework that enables open standards-based communication along the demand response value chain. The solution is validated in four large-scale pilot sites, incorporating diverse building types, heterogeneous home, building and district energy systems and devices, a variety of energy carriers and spanning diverse climatic conditions, demographic and cultural characteristics.European Commission's H2020, 76861

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Strategic Fit In Inter-Organizational Networks: A Life Cycle Framework For The Healthcare IDS

    Get PDF
    Strategic alliances in the form of inter-organizational networks continue to receive attention in both service and manufacturing industries as a potential form of competitive. The healthcare industry has embraced these strategic alliances with much intensity and perhaps to a greater extent than many other industries. Yet, despite the increasing prevalence of inter-organizational arrangements across most industries, empirical evidence of the value of IT to enhance and support these arrangements is lacking in the IT. Therefore, a need exists to extend IT theory and research to the inter-organizational level of analysis to better meet the needs of contemporary organizations and partnerships. Using the healthcare IDS as the unit of analysis, the primary objective of this study is to stimulate research at the inter-organizational network level of analysis. A conceptual framework of IT value for the inter-organizational network is developed that merges three complementary theoretical concepts, namely the Strategic Alignment Model, the IT-Enabled Business Transformation Framework, and the IT Integration Life Cycle

    Assessing Business-IT Alignment Maturity

    Get PDF
    Strategic alignment focuses on the activities that management performs to achieve cohesive goals across the IT (Information Technology) and other functional organizations (e.g., finance, marketing, H/R, manufacturing). Therefore, alignment addresses both how IT is in harmony with the business, and how the business should, or could be in harmony with IT. Alignment evolves into a relationship where the function of IT and other business functions adapt their strategies together. Achieving alignment is evolutionary and dynamic. It requires strong support from senior management, good working relationships, strong leadership, appropriate prioritization, trust, and effective communication, as well as a thorough understanding of the business and technical environments. Achieving and sustaining alignment demands focusing on maximizing the enablers and minimizing the inhibitors that cultivate alignment. The strategic alignment maturity assessment provides organizations with a vehicle to evaluate these activities. Knowing the maturity of its strategic choices and alignment practices make it possible for a firm to see where it stands and how it can improve. This paper discusses an approach for assessing the maturity of the business-IT alignment. Once maturity is understood, an organization can identify opportunities for enhancing the harmonious relationship of business and IT
    • …
    corecore