188,877 research outputs found

    MASK-SM : multi-agent system based knowledge management system to support knowledge sharing of software maintenance knowledge environment.

    Get PDF
    Knowledge management (KM) has become an important topic as organizations wish to take advantage of the information that they produce and that can be brought to bear on present decisions. This paper described a system to manage the information and knowledge generated during the software maintenance process (SMP). Knowledge Management System (KMS) is utilizing to help employees build a shared vision, since the same codification is used and misunderstanding in staff communications may be avoided. The architecture of the system is formed from a set of agent communities each community of practice(CoP) is in charge of managing a specific type of knowledge. The agents can learn from previous experience and share their knowledge with other agents or communities in a group of multi-agent system (MAS). This paper also described on the theoretical concept and approach of multi-agent technology framework that could be implemented software maintenance process (SMP) in order to facilitate knowledge sharing among the maintainers of the learning organization. as well as to demonstrate it into the system wise, on how the multi-agent technology could be utilized in the software maintenance process (SMP) system model for serving the maintainer that is developed by using groupware such as Lotus Notes software. This architecture will be named as MASK-SM (MAS Architecture to Facilitate Knowledge Sharing of Software Maintenance). The author followed the Prometheus methodology to design the MAS architecture. This paper applied the definition of ISO 9241-11 (1998) that examines effectiveness, efficiency, and satisfaction. The emphasis will be given to the software maintenance process (SMP) activities that may concern with multi-agent technology to help the maintainers especially in learning organization to work collaboratively including critical success factor in order to ensure that software maintenance process (SMP) initiatives would be delivered competitive advantage for the community of practice(CoP) as well as users of the organization

    PREDICTIVE MAINTENANCE USING MACHINE LEARNING AND EXISTING DATA SOURCES

    Get PDF
    Includes supplementary materialThe United States Marine Corps must address material-readiness challenges with emerging technologies at minimum cost. Predictive maintenance using machine learning is a growing field that can be applied using free or commercial-off-the-shelf software. Naval aviation organizations already maintain a network of data repositories that collect and store current and historical data on repairable flight-critical components. Many components fail before their expected structural life as published their manufacturers, which results in costly unscheduled maintenance. The ability to predict component failures and plan for their replacement or repair can significantly increase operational readiness. This thesis develops and analyzes machine-learning models to predict the conditional probability of failure of various MV-22B flight-critical components using data from existing Naval aviation repositories. Data preprocessing, model training, and predictions use commercial-off-the-shelf software. This work can help improve material readiness and acclimatize military-aviation personnel to emerging technologies in decision making.Captain, United States Marine CorpsApproved for public release. Distribution is unlimited

    Development of Village Administration Data E-Monography Application

    Get PDF
    Utilization and processing of basic village data by the Kedungluk Village Government, Candi District, Sidoarjo Regency, through e-monograph is an effort by the village government to carry out a transformation process to develop an information culture. This study aims to determine the development and design of an application-based information system prototype (village monograph) that provides information and potential as well as village profiles, and provides convenience for village monograph data managers and users. In addition to providing benefits to the village government through the e-monograph application prototype, this research is also expected to contribute to learning in the State Administration Study Program by presenting a learning model that can provide opportunities for students to learn directly (become a laboratory) related to the use of information technology in designing and managing public sector organizations in accordance with the learning outcomes of the fourth study program. The research method used is the Research & Development (R&D) method where one of the models suitable for this research is the SDLC (Software Development Life Cycle) model and specifically the Waterfall model which consists of six stages of software development namely requirements, design, implementation, testing, deployment and maintenance. The output of this research is software or software

    Developing strategic learning alliances: partnerships for the provision of global education and training solutions

    Get PDF
    The paper describes a comprehensive model for the development of strategic alliances between education and corporate sectors, which is required to ensure effective provision of education and training programmes for a global market. Global economic forces, combined with recent advances in information and communication technologies, have provided unprecedented opportunities for education providers to broaden the provision of their programmes both on an international scale and across new sectors. Lifelong learning strategies are becoming increasingly recognized as an essential characteristic of a successful organization and therefore large organizations have shown a preparedness to invest in staff training and development. The demands for lifelong learning span a wide range of training and educational levels from school-level and vocational courses to graduate-level training for senior executive

    Engaging without over-powering: A case study of a FLOSS project

    Get PDF
    This is the post-print version of the published chapter. The original publication is available at the link below. Copyright @ 2010 IFIP International Federation for Information Processing.The role of Open Source Software (OSS) in the e-learning business has become more and more fundamental in the last 10 years, as long as corporate and government organizations have developed their educational and training programs based on OSS out-of-the-box tools. This paper qualitatively documents the decision of the largest UK e-learning provider, the Open University, to adopt the Moodle e-learning system, and how it has been successfully deployed in its site after a multi-million investment. A further quantitative study also provides evidence of how a commercial stakeholder has been engaged with, and produced outputs for, the Moodle community. Lessons learned from this experience by the stakeholders include the crucial factors of contributing to the OSS community, and adapting to an evolving technology. It also becomes evident how commercial partners helped this OSS system to achieve the transition from an “average” OSS system to a successful multi-site, collaborative and community-based OSS project

    Internet of things security implementation using blockchain for wireless technology

    Get PDF
    Blockchain is a new security system which group many data into a block or so called classifying the data into a block. The block can have many types and each of them content data and security code. By using a decentralize mechanism, one security code protect all the data. That could happen at the server. In this research, a network of wireless sensor technology is proposed. The transmission of sensor data is via the Internet of things (Internet of Thing) technology. As many data transmitted, they have to classified and group them into a block. All the blocks are then send to the central processing unit, like a microcontroller. The block of data is then processed, identified and encrypted before send over the internet network. At the receiver, a GUI or Apps is developed to open and view the data. The Apps or GUI have an encrypted data or security code. User must key in the password before they can view the data. The password used by the end user at the Apps or GUI must be equivalent to the one encrypted at the sensor nodes. This is to satisfy the decentralized concept used in the Blockchain. To demonstrate the Blockchain technology applied to the wireless sensor network, a MATLAB Simulink function is used. The expected results should show a number of block of data in cryptography manner and chain together. The two set of data. Both have the data encrypted using hash. The black dots indicate the data has been encrypted whereas the white dot indicate indicates the data is not encrypted. The half white and half black indicates the data is in progress of encrypted. All this data should arrange in cryptography order and chain together in a vertical line. A protocol called block and chain group the data into the block and then chain then. The data appears in the blocks and send over the network. As seen in the simulation results, the yellow color represents the user data. This data has a default amplitude as 1 or 5. The data is chained and blocked to produce the Blockchain waveform Keywords: Blockchain, Internet of things, Wireless Sensor Network and MATLAB Simulin

    Evaluating cost taxonomies for information systems management

    Get PDF
    The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much of their effort on the benefits achievable from the adoption of new technology, as it is often not in the interest of key stakeholders to spend too much time considering the wider cost and risk implications of enterprise-wide technology adoptions. In identifying a void in the literature, the authors of the paper present a critical analysis of IS-cost taxonomies. In doing so, the authors establish that such cost taxonomies tend to be esoteric and difficult to operationalize, as they lack specifics in detail. Therefore, in developing a deeper understanding of IS-related costs, the authors position the need to identify, control and reduce IS-related costs within the information systems evaluation domain, through culminating and then synthesizing the literature into a frame of reference that supports the evaluation of information systems through a deeper understanding of IS-cost taxonomies. The paper then concludes by emphasizing that the total costs associated with IS-adoption can only be determined after having considered the multi-faceted dimensions of information system investments
    corecore