46,252 research outputs found

    The significance of logistics in servicing growing volumes of e-commerce

    Get PDF
    Purpose: The article highlights the multi-task nature and prospects of the development of the transit potential of warehouse logistics systems, reveals the theoretical and methodological foundations of logistics in the storage and cargo handling system, indicates and confirms the importance of warehousing logistics in the context of servicing the growing volumes of electronic commerce. Design/Methodology/Approach: For the purposes of developing logistics in the storage and cargo handling system we study the technical and technological support and design developments that have significant potential for increasing the efficiency of logistics processes, and to study consumer behavior in the warehouse services market and transport market trends - warehouse activities. Findings: Automation significantly simplifies logistics processes, information exchange, remote control and management, optimizes costs by combining various market entities and objects, target groups and parameters of logistics processes on electronic platforms. Integration in modern logistics allows synchronizing the complex information component of electronic services and platforms and activating the formation of a system interface that is common for all elements of the logistics system of warehousing, cargo processing and inventory management. Practical implications: The results of the study can be implemented in the activities of Russian companies in order to develop the transit potential of warehouse logistics systems. Originality/value: The significance of this study lies in shifting the emphasis to the need to switch to improved customer service systems taking into account the needs and development of online retail and fulfillment of logistics operators (full-cycle operator: taking goods from the customer’s warehouse, responsible storage, packaging, delivery, work with returns), tied to the development of infrastructure, as the foundation for increasing the efficiency, speed and quality of logistics processes.peer-reviewe

    Design of an autonomous software platform for future symbiotic service management

    Get PDF
    Nowadays, public as well as private communication infrastructures are all contending for the same limited amount of bandwidth. To optimally share network resources, symbiotic networks have been proposed, which cross logical and physical boundaries to improve the reliability, scalability, and energy efficiency of the network as a whole as well as its constituents. This paper focuses on software services in such symbiotic networks. We propose a platform for the intelligent composition of services provided by symbiotically connected parties, resulting in novel cooperation opportunities. The platform harvests Semantic Web technology to describe services in a highly expressive manner, and constructs service compositions using SeCoA, our tunable best-first search algorithm. The resulting compositions are then enacted via CaPI, a reconfigurable middleware infrastructure. By means of an illustrative scenario, we provide further insight into the platform's functioning

    Value-driven Security Agreements in Extended Enterprises

    Get PDF
    Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service. Although outsourcing has been around for some time, what is now new is the fact that organizations are increasingly outsourcing critical business processes, engaging on complex service bundles, and moving infrastructure and their management to the custody of third parties. Although this gives competitive advantage by reducing cost and increasing flexibility, it increases security risks by eroding security perimeters that used to separate insiders with security privileges from outsiders without security privileges. The classical security distinction between insiders and outsiders is supplemented with a third category of threat agents, namely external insiders, who are not subject to the internal control of an organization but yet have some access privileges to its resources that normal outsiders do not have. Protection against external insiders requires security agreements between organizations in an extended enterprise. Currently, there is no practical method that allows security officers to specify such requirements. In this paper we provide a method for modeling an extended enterprise architecture, identifying external insider roles, and for specifying security requirements that mitigate security threats posed by these roles. We illustrate our method with a realistic example

    MULTI-AGENT SYSTEM OF PROTECTING INFORMATION FROM UNAUTHORIZED ACCESS

    Get PDF
    This article lists methods and tools for unlocking data from the local network. Modern methods and software tools for protecting data from unauthorized access from local area network have been analyzed. The advantages and disadvantages of the DLP (Data Loss / Leakage Prevention) system are demonstrated to protect data from unauthorized access. The criteria for increasing the effectiveness of the DLP system and the multi-intellect DLP system were suggested.Перечислены методы и инструменты для разблокировки данных из локальной сети. Проанализированы современные методы и программные средства защиты данных от несанкционированного доступа из локальной сети. Показаны преимущества и недостатки системы DLP, предназначенной для предотвращения потери / утечки данных от несанкционированного доступа. Предложены критерии повышения эффективности системы DLP и системы DLP с многоагентным интеллектом

    Regional Data Archiving and Management for Northeast Illinois

    Get PDF
    This project studies the feasibility and implementation options for establishing a regional data archiving system to help monitor and manage traffic operations and planning for the northeastern Illinois region. It aims to provide a clear guidance to the regional transportation agencies, from both technical and business perspectives, about building such a comprehensive transportation information system. Several implementation alternatives are identified and analyzed. This research is carried out in three phases. In the first phase, existing documents related to ITS deployments in the broader Chicago area are summarized, and a thorough review is conducted of similar systems across the country. Various stakeholders are interviewed to collect information on all data elements that they store, including the format, system, and granularity. Their perception of a data archive system, such as potential benefits and costs, is also surveyed. In the second phase, a conceptual design of the database is developed. This conceptual design includes system architecture, functional modules, user interfaces, and examples of usage. In the last phase, the possible business models for the archive system to sustain itself are reviewed. We estimate initial capital and recurring operational/maintenance costs for the system based on realistic information on the hardware, software, labor, and resource requirements. We also identify possible revenue opportunities. A few implementation options for the archive system are summarized in this report; namely: 1. System hosted by a partnering agency 2. System contracted to a university 3. System contracted to a national laboratory 4. System outsourced to a service provider The costs, advantages and disadvantages for each of these recommended options are also provided.ICT-R27-22published or submitted for publicationis peer reviewe

    Stanovení racionální struktury bezpeýnostní služby integrovaného logistického podporného systému založeného na regionálních logistikých klastrech

    Get PDF
    Development of an integrated logistical support system for all types of national security services requires the solution to a problem of definition its rational structure. The methodical approach proposes to consider this issue as a complex of two successive optimization tasks. In the first place, it assumes to determine regional logistics clusters amount and then to optimize their logistics infrastructure. The models and methods are developed to allow optimization of the integrated logistical support system structure according to a real transport network communications and a regional supply chain by a minimal total logistics costs criterion

    Development and Performance Evaluation of a Connected Vehicle Application Development Platform (CVDeP)

    Get PDF
    Connected vehicle (CV) application developers need a development platform to build, test and debug real-world CV applications, such as safety, mobility, and environmental applications, in edge-centric cyber-physical systems. Our study objective is to develop and evaluate a scalable and secure CV application development platform (CVDeP) that enables application developers to build, test and debug CV applications in realtime. CVDeP ensures that the functional requirements of the CV applications meet the corresponding requirements imposed by the specific applications. We evaluated the efficacy of CVDeP using two CV applications (one safety and one mobility application) and validated them through a field experiment at the Clemson University Connected Vehicle Testbed (CU-CVT). Analyses prove the efficacy of CVDeP, which satisfies the functional requirements (i.e., latency and throughput) of a CV application while maintaining scalability and security of the platform and applications

    Assessing the UK experience functional separation in fixed telecommunications markets

    Get PDF
    This paper focuses on functional separation. After reviewing the literature on separation in its various guises and describing the circumstances that culminated in the creation of Openreach in the UK, the paper focuses on the implementation of the undertakings. It is shown that difficulties have been encountered in the implementation of the undertakings, and that while the relationship between BT and other service providers may have improved, tensions remain

    A robot swarm assisting a human fire-fighter

    Get PDF
    Emergencies in industrial warehouses are a major concern for fire-fighters. The large dimensions, together with the development of dense smoke that drastically reduces visibility, represent major challenges. The GUARDIANS robot swarm is designed to assist fire-fighters in searching a large warehouse. In this paper we discuss the technology developed for a swarm of robots assisting fire-fighters. We explain the swarming algorithms that provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also the means to locate the robots and humans. Thus, the robot swarm is able to provide guidance information to the humans. Together with the fire-fighters we explored how the robot swarm should feed information back to the human fire-fighter. We have designed and experimented with interfaces for presenting swarm-based information to human beings
    corecore