1,585 research outputs found
Applying autonomy to distributed satellite systems: Trends, challenges, and future prospects
While monolithic satellite missions still pose significant advantages in terms of accuracy and
operations, novel distributed architectures are promising improved flexibility, responsiveness,
and adaptability to structural and functional changes. Large satellite swarms, opportunistic satellite
networks or heterogeneous constellations hybridizing small-spacecraft nodes with highperformance
satellites are becoming feasible and advantageous alternatives requiring the adoption
of new operation paradigms that enhance their autonomy. While autonomy is a notion that
is gaining acceptance in monolithic satellite missions, it can also be deemed an integral characteristic
in Distributed Satellite Systems (DSS). In this context, this paper focuses on the motivations
for system-level autonomy in DSS and justifies its need as an enabler of system qualities. Autonomy
is also presented as a necessary feature to bring new distributed Earth observation functions
(which require coordination and collaboration mechanisms) and to allow for novel structural
functions (e.g., opportunistic coalitions, exchange of resources, or in-orbit data services). Mission
Planning and Scheduling (MPS) frameworks are then presented as a key component to implement
autonomous operations in satellite missions. An exhaustive knowledge classification explores the
design aspects of MPS for DSS, and conceptually groups them into: components and organizational
paradigms; problem modeling and representation; optimization techniques and metaheuristics;
execution and runtime characteristics and the notions of tasks, resources, and constraints.
This paper concludes by proposing future strands of work devoted to study the trade-offs of
autonomy in large-scale, highly dynamic and heterogeneous networks through frameworks that
consider some of the limitations of small spacecraft technologies.Postprint (author's final draft
Recommended from our members
Integrating the IS with the enterprise: Key EAI research challenges
Enterprise Application Integration (EAI) technologies provide the means to integrate strategic business solutions within and across the component parts of organisational information system infrastructures. The continuing development of both digitally integrated business models, through various eCommerce and eBusiness initiatives, has meant that the importance of EAI within enterprise IS, has increased significantly. Noting that EAI incurs not only technological but stakeholder-level commitments, this paper outlines the product of a sustained investigation into key challenges within Enterprise IS and EAI, and provides a framework for future research and investigation into this emerging and evolving area
Towards a cloud migration decision support system for Small and Medium enterprises in Tamil Nadu
Cloud computing is a promising computing paradigm which has the potential to speed up Information Technology adoption among SMEs in developing economies like India. The user friendly, pay per use cloud computing model offers SMEs access to highly scalable and reliable cloud infrastructure without having to invest on buying and maintaining expensive Information Technology resources. However, moving data and application to a cloud infrastructure is not straightforward and can be very challenging as decision makers need to consider numerous aspects before deciding to adopt cloud infrastructure. A review of the literature reveals that there are frameworks available to support cloud migration. However, there are no frameworks, models or tools available to support the whole cloud migration process. This research aims to fill that gap by proposing a conceptual framework for cloud migration decision support system targeted for SMEs in Tamil Nadu
Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies
This paper proposes a methodology for designing decision support systems for
visualising and mitigating the Internet of Things cyber risks. Digital
technologies present new cyber risk in the supply chain which are often not
visible to companies participating in the supply chains. This study
investigates how the Internet of Things cyber risks can be visualised and
mitigated in the process of designing business and supply chain strategies. The
emerging DSS methodology present new findings on how digital technologies
affect business and supply chain systems. Through epistemological analysis, the
article derives with a decision support system for visualising supply chain
cyber risk from Internet of Things digital technologies. Such methods do not
exist at present and this represents the first attempt to devise a decision
support system that would enable practitioners to develop a step by step
process for visualising, assessing and mitigating the emerging cyber risk from
IoT technologies on shared infrastructure in legacy supply chain systems
Integration of Real-Intelligence in Energy Management Systems to Enable Holistic Demand Response Optimization in Buildings and Districts
Although multiple trials have been conducted demonstrating that demand side flexibility works and even though technology roll-out progresses significantly fast, the business application of residential and small tertiary demand response has been slow to develop. This paper introduces a holistic demand response optimization framework that enables significant energy costs reduction at the consumer side, while introducing buildings as a major contributor to energy networks' stability in response to network constraints and conditions. The backbone of the solution consists in a modular interoperability and data management framework that enables open standards-based communication along the demand response value chain. The solution is validated in four large-scale pilot sites, incorporating diverse building types, heterogeneous home, building and district energy systems and devices, a variety of energy carriers and spanning diverse climatic conditions, demographic and cultural characteristics.European Commission's H2020, 76861
Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications
The unprecedented proliferation of smart devices together with novel
communication, computing, and control technologies have paved the way for the
Advanced Internet of Things~(A-IoT). This development involves new categories
of capable devices, such as high-end wearables, smart vehicles, and consumer
drones aiming to enable efficient and collaborative utilization within the
Smart City paradigm. While massive deployments of these objects may enrich
people's lives, unauthorized access to the said equipment is potentially
dangerous. Hence, highly-secure human authentication mechanisms have to be
designed. At the same time, human beings desire comfortable interaction with
their owned devices on a daily basis, thus demanding the authentication
procedures to be seamless and user-friendly, mindful of the contemporary urban
dynamics. In response to these unique challenges, this work advocates for the
adoption of multi-factor authentication for A-IoT, such that multiple
heterogeneous methods - both well-established and emerging - are combined
intelligently to grant or deny access reliably. We thus discuss the pros and
cons of various solutions as well as introduce tools to combine the
authentication factors, with an emphasis on challenging Smart City
environments. We finally outline the open questions to shape future research
efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for
publication in IEEE Network, 2019. Copyright may be transferred without
notice, after which this version may no longer be accessibl
Strategic Fit In Inter-Organizational Networks: A Life Cycle Framework For The Healthcare IDS
Strategic alliances in the form of inter-organizational networks continue to receive attention in both service and manufacturing industries as a potential form of competitive. The healthcare industry has embraced these strategic alliances with much intensity and perhaps to a greater extent than many other industries. Yet, despite the increasing prevalence of inter-organizational arrangements across most industries, empirical evidence of the value of IT to enhance and support these arrangements is lacking in the IT. Therefore, a need exists to extend IT theory and research to the inter-organizational level of analysis to better meet the needs of contemporary organizations and partnerships. Using the healthcare IDS as the unit of analysis, the primary objective of this study is to stimulate research at the inter-organizational network level of analysis. A conceptual framework of IT value for the inter-organizational network is developed that merges three complementary theoretical concepts, namely the Strategic Alignment Model, the IT-Enabled Business Transformation Framework, and the IT Integration Life Cycle
Assessing Business-IT Alignment Maturity
Strategic alignment focuses on the activities that management performs to achieve cohesive goals across the IT (Information Technology) and other functional organizations (e.g., finance, marketing, H/R, manufacturing). Therefore, alignment addresses both how IT is in harmony with the business, and how the business should, or could be in harmony with IT. Alignment evolves into a relationship where the function of IT and other business functions adapt their strategies together. Achieving alignment is evolutionary and dynamic. It requires strong support from senior management, good working relationships, strong leadership, appropriate prioritization, trust, and effective communication, as well as a thorough understanding of the business and technical environments. Achieving and sustaining alignment demands focusing on maximizing the enablers and minimizing the inhibitors that cultivate alignment. The strategic alignment maturity assessment provides organizations with a vehicle to evaluate these activities. Knowing the maturity of its strategic choices and alignment practices make it possible for a firm to see where it stands and how it can improve. This paper discusses an approach for assessing the maturity of the business-IT alignment. Once maturity is understood, an organization can identify opportunities for enhancing the harmonious relationship of business and IT
- …