153,962 research outputs found

    The Security Rule

    Get PDF

    Experiences in Multi-domain Management Service Development

    No full text
    The developers of management systems and the management services that operate over them will be faced with increasing complexity as services are developed for the open service market. This paper presents experiences in the development of management services that span several administrative domains and which are therefore representative of the complexities of the open service market. The work described involved the development of TMN based management systems that provided management services in support of multimedia teleservices operating over broadband networks

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    HACCP plan fresh fish processing Marituna

    Get PDF
    In the past regulatory authorities for food products had a duty to ensure that foods offered tothe consumer are at least safe to eat. The authorities required a positive approach of using Good Manufacturing Practices (GMP), producing food in a hygienic manner, and by inspection of finished product. It is now realised that inspection of finished product gives a poor control over the safety of foods. Therefore, since 1 January 1993, regulatory authorities in Europe required that companies take a preventative approach to safety based on the principles of Hazard Analysis and Critical Control Points (HACCP). Anyone exporting fish products to Europe or North America will have to implement a programme based on HACCP. If a company cannot demonstrate to the satisfaction of regulating agencies in importing countries that it has an effective programme operating in their processing plant, importers will not be permitted to accept the products. The United Nations food standard group Codex Alimentarius Commission has recommended HACCP's adoption as a system for ensuring the safety of foods (including finfish and shellfish) and the prevention of foodborne diseases

    UAV as a Reliable Wingman: A Flight Demonstration

    Get PDF
    In this brief, we present the results from a flight experiment demonstrating two significant advances in software enabled control: optimization-based control using real-time trajectory generation and logical programming environments for formal analysis of control software. Our demonstration platform consisted of a human-piloted F-15 jet flying together with an autonomous T-33 jet. We describe the behavior of the system in two scenarios. In the first, nominal state communications were present and the autonomous aircraft maintained formation as the human pilot flew maneuvers. In the second, we imposed the loss of high-rate communications and demonstrated an autonomous safe “lost wingman” procedure to increase separation and reacquire contact. The flight demonstration included both a nominal formation flight component and an execution of the lost wingman scenario

    An Adaptive Design Methodology for Reduction of Product Development Risk

    Full text link
    Embedded systems interaction with environment inherently complicates understanding of requirements and their correct implementation. However, product uncertainty is highest during early stages of development. Design verification is an essential step in the development of any system, especially for Embedded System. This paper introduces a novel adaptive design methodology, which incorporates step-wise prototyping and verification. With each adaptive step product-realization level is enhanced while decreasing the level of product uncertainty, thereby reducing the overall costs. The back-bone of this frame-work is the development of Domain Specific Operational (DOP) Model and the associated Verification Instrumentation for Test and Evaluation, developed based on the DOP model. Together they generate functionally valid test-sequence for carrying out prototype evaluation. With the help of a case study 'Multimode Detection Subsystem' the application of this method is sketched. The design methodologies can be compared by defining and computing a generic performance criterion like Average design-cycle Risk. For the case study, by computing Average design-cycle Risk, it is shown that the adaptive method reduces the product development risk for a small increase in the total design cycle time.Comment: 21 pages, 9 figure

    Fast design optimization of UWB antenna with WLAN Band-Notch

    Get PDF
    In this paper, a methodology for rapid design optimization of an ultra-wideband ( UWB) monopole antenna with a lower WLAN band-notch is presented. The band-notch is realized using an open loop resonator implemented in the radiation patch of the antenna. Design optimization is a two stage process, with the first stage focused on the design of the antenna itself, and the second stage aiming at identification of the appropriate dimensions of the resonator with the purpose of allocating the band-notch in the desired frequency range. Both optimization stages are realized using surrogate-based optimization involving variable-fidelity electromagnetic ( EM) simulation models as well as an additive response correction ( first stage), and sequential approximate optimization ( second stage). The final antenna design is obtained at the CPU cost corresponding to only 23 high-fidelity EM antenna simulations

    Reasoning About a Service-oriented Programming Paradigm

    Full text link
    This paper is about a new way for programming distributed applications: the service-oriented one. It is a concept paper based upon our experience in developing a theory and a language for programming services. Both the theoretical formalization and the language interpreter showed us the evidence that a new programming paradigm exists. In this paper we illustrate the basic features it is characterized by

    Iterative criteria-based approach to engineering the requirements of software development methodologies

    Get PDF
    Software engineering endeavours are typically based on and governed by the requirements of the target software; requirements identification is therefore an integral part of software development methodologies. Similarly, engineering a software development methodology (SDM) involves the identification of the requirements of the target methodology. Methodology engineering approaches pay special attention to this issue; however, they make little use of existing methodologies as sources of insight into methodology requirements. The authors propose an iterative method for eliciting and specifying the requirements of a SDM using existing methodologies as supplementary resources. The method is performed as the analysis phase of a methodology engineering process aimed at the ultimate design and implementation of a target methodology. An initial set of requirements is first identified through analysing the characteristics of the development situation at hand and/or via delineating the general features desirable in the target methodology. These initial requirements are used as evaluation criteria; refined through iterative application to a select set of relevant methodologies. The finalised criteria highlight the qualities that the target methodology is expected to possess, and are therefore used as a basis for de. ning the final set of requirements. In an example, the authors demonstrate how the proposed elicitation process can be used for identifying the requirements of a general object-oriented SDM. Owing to its basis in knowledge gained from existing methodologies and practices, the proposed method can help methodology engineers produce a set of requirements that is not only more complete in span, but also more concrete and rigorous
    corecore