31,511 research outputs found

    An agent-based fuzzy cognitive map approach to the strategic marketing planning for industrial firms

    Get PDF
    This is the post-print version of the final paper published in Industrial Marketing Management. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.Industrial marketing planning is a typical example of an unstructured decision making problem due to the large number of variables to consider and the uncertainty imposed on those variables. Although abundant studies identified barriers and facilitators of effective industrial marketing planning in practice, the literature still lacks practical tools and methods that marketing managers can use for the task. This paper applies fuzzy cognitive maps (FCM) to industrial marketing planning. In particular, agent based inference method is proposed to overcome dynamic relationships, time lags, and reusability issues of FCM evaluation. MACOM simulator also is developed to help marketing managers conduct what-if scenarios to see the impacts of possible changes on the variables defined in an FCM that represents industrial marketing planning problem. The simulator is applied to an industrial marketing planning problem for a global software service company in South Korea. This study has practical implication as it supports marketing managers for industrial marketing planning that has large number of variables and their cause–effect relationships. It also contributes to FCM theory by providing an agent based method for the inference of FCM. Finally, MACOM also provides academics in the industrial marketing management discipline with a tool for developing and pre-verifying a conceptual model based on qualitative knowledge of marketing practitioners.Ministry of Education, Science and Technology (Korea

    Urban typologies and heat energy demand. A case-study in the Italian context.

    Get PDF
    Nowadays, large parts of the world population (50-60%) are living in urban areas, which represent the most energy consuming systems (Buckley et al., 2009). Local governments are therefore asked to take new responsibilities in terms of energy management, adopting the urban scale as level of action, developing new methods and strategies to bring energy sustainability (saving/producing) and environmental quality into the cities. The development of a new energetic and environmental planning approach that can set energy as primary key – leading to a high level of urban efficiency and having a broad effect on other urban areas – is hence highly important. Different studies have pointed out the fundamental energetic role of urban morphology and typology (Ratti et al., 2004). Recognizing the key role of planning and design, and the contribution of modeling, some questions are arising: is it possible to analyze the performances of the built environment in a georeferenced way, considering the effect of urban design/form aspects, in order to achieve a better knowledge of those city characteristics that influence energy demand? Which is the role played by typologies in (re)orienting the energy analyses/model? Which targets can be achieved in reducing cost and energy? The project explore different factors involved in the energy performance of the city, in particular using an innovative evaluation model of heat energy demand, which has urban typologies as starting and key point of the analyses. A dynamic and georeferenced method has been specifically developed, allowing the estimation of the energy behavior of the ñ€Ɠrealñ€ city. The empirical study is applied at the City of Gorgonzola - Italy, which holds potential both for the dimension of the built environment and the variety of urban typologies, which allow a comparison between them. Purpose of the paper is thus to analyze the results coming from the estimation, that can lead to a strong integration between energy, urban design and planning system.

    Flash-memories in Space Applications: Trends and Challenges

    Get PDF
    Nowadays space applications are provided with a processing power absolutely overcoming the one available just a few years ago. Typical mission-critical space system applications include also the issue of solid-state recorder(s). Flash-memories are nonvolatile, shock-resistant and power-economic, but in turn have different drawbacks. A solid-state recorder for space applications should satisfy many different constraints especially because of the issues related to radiations: proper countermeasures are needed, together with EDAC and testing techniques in order to improve the dependability of the whole system. Different and quite often contrasting dimensions need to be explored during the design of a flash-memory based solid- state recorder. In particular, we shall explore the most important flash-memory design dimensions and trade-offs to tackle during the design of flash-based hard disks for space application

    The antecedents of e-learning adoption within Italian corporate universities: A comparative case study

    Get PDF
    The implementation of Information and Communication Technologies (ICT) in business education appears to be influenced by a number of organizational issues, such as culture and technological sophistication. However, extant research has had very little to say about the antecedents that shape the adoption and diffusion of ICT across companies. In order to shed light on the phenomenon under investigation, this paper presents a comparative case study between five Italian companies that have instituted a corporate university. By distinguishing companies in typical cases and deviant cases with regard to the extensive use of e-learning technologies, our findings provide some useful insights about the antecedents that make companies more or less prone to employ the new frontiers of technology in their CUs

    A Security Monitoring Framework For Virtualization Based HEP Infrastructures

    Full text link
    High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware. This malware was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.Comment: Proceedings of the 22nd International Conference on Computing in High Energy and Nuclear Physics, CHEP 2016, 10-14 October 2016, San Francisco. Submitted to Journal of Physics: Conference Series (JPCS

    Information and Communication Technologies as means for self-improvement at remote universities: the example of Urgench State University, Uzbekistan

    Get PDF
    This paper describes the research conducted at the Information Resource Center of Urgench State University, located in the Khorezm region of Uzbekistan, on the possibilities and challenges the students and lecturers face in their pursuit for self-improvement and self-education. The article discloses new qualitative approaches and IT methods in the teaching and educational processes in higher education of Central Asian countries in transition, the overall aim of which is to close the gap and shape the spiritual values of the young generation in the globalizing world. The framework conditions for this have been set by the Government of Uzbekistan through particular Decrees, aiming at the creation of e-education at universities and institutions throughout the country and specifically in the remote regions as to improve the access to regularly updated information, to motivate the use of IT in classes as well as to enhance the responsibility of the information services of universities for assuring the quality of research and teaching (pedagogical) activities of the lecturers. The research showed that the Internet can function inter alia as a controlling device when education is delivered through the web. Collection, analysis and preparation of educational-methodological materials on specific subjects and extracurricular activities require specific knowledge on IT and information literacy both in the teaching staff and the students

    Secure data sharing and processing in heterogeneous clouds

    Get PDF
    The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes. The public sector, however, lacks the necessary technology to enable effective, interoperable and secure integration of a multitude of its computing clouds and services. In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities. We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments. We identify the main challenges and frame the future work that serve as an enabler of interoperability among heterogeneous infrastructures and services. Our goal is to enable both security and legal conformance as well as to facilitate transparency, privacy and effectivity of private cloud federations for the public sector needs. © 2015 The Authors

    GNFC: Towards Network Function Cloudification

    Get PDF
    An increasing demand is seen from enterprises to host and dynamically manage middlebox services in public clouds in order to leverage the same benefits that network functions provide in traditional, in-house deployments. However, today's public clouds provide only a limited view and programmability for tenants that challenges flexible deployment of transparent, software-defined network functions. Moreover, current virtual network functions can't take full advantage of a virtualized cloud environment, limiting scalability and fault tolerance. In this paper we review and evaluate the current infrastructural limitations imposed by public cloud providers and present the design and implementation of GNFC, a cloud-based Network Function Virtualization (NFV) framework that gives tenants the ability to transparently attach stateless, container-based network functions to their services hosted in public clouds. We evaluate the proposed system over three public cloud providers (Amazon EC2, Microsoft Azure and Google Compute Engine) and show the effects on end-to-end latency and throughput using various instance types for NFV hosts
    • 

    corecore