1,015 research outputs found

    Case study : an evaluation of the implementation of an Enterprise Resource Planning System (ERP) at a South African municipal entity.

    Get PDF
    Master of Commerce in Information Systems and Technology. University of KwaZulu-Natal, Pietermaritzburg, 2018.Enterprise resource planning (ERP) is a computer based software application that is widely implemented in many business organisations. These systems have evolved over the years into component based modules with the ability to easily integrate with other systems, provide real time information and improve information sharing and collaboration. Choosing an ERP system is a complex process and the literature clearly illustrates the failure of organisations to effectively specify, select and implement ERP systems resulting in the inability to effectively harness the associated benefits. This study focuses on a South African water utility and the processes followed in procuring and implementing an ERP system. It is interesting to note, that in this study, despite the utility having experienced a failed ERP implementation decided to replace the same? ERP system. A rigorous process was followed to find a replacement ERP system only to set aside all alternate commercial of-the-shelf systems and re-implement the original failed ERP system. To gain insight of the processes followed, the COTS theoretical framework is presented to bring the reader’s attention to associated theoretical studies. In this study, we will conduct a systematic literature review on ERP systems, its background, implementation processes and associated implementation outcomes. This research, presents a case study that will describe and explore the process of ERP implementation at the water utility. We will document the process the utility followed in acquiring and setting up functional and non-functional evaluation criteria for the ERP system. Further, we have considered the processes of preparation, evaluation, selection and implementation. The analysis of the implementation process has brought to light the importance of defining ERP scopes based on business requirements, specifications based on the business scopes and evaluation criterion. The findings and results from this case study will contribute to the conceptual and contextual understanding of the specification, selection and implementation of ERP systems

    A patient agent controlled customized blockchain based framework for internet of things

    Get PDF
    Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph

    Towards contact-less vital sign monitoring using a cots resource-constrained multi-core system: an experience report

    No full text
    Contact-less vital-sign monitoring is enabling in situations where traditional contact-based vital sign monitoring is prohibitive, such as neonatal and burn care where electrodes and attachments risk patient infection or complications. To make vital-sign monitoring available for the consumer market, these algorithms shall use COTS cameras and run on COTS systems. In this paper, we report upon the results of an experiment to improve the performance of a contact-less respiration algorithm on a resource-constrained COTS multi-core system, in our case a Raspberry Pi 3 running Linux, using a state-of-the-art tool to visualize the behavior of a system. The improvements are an increase of the CPU utilization from 72% to almost 94% and an increase of the throughput of the algorithm by more than 45%

    Defense in Depth of Resource-Constrained Devices

    Get PDF
    The emergent next generation of computing, the so-called Internet of Things (IoT), presents significant challenges to security, privacy, and trust. The devices commonly used in IoT scenarios are often resource-constrained with reduced computational strength, limited power consumption, and stringent availability requirements. Additionally, at least in the consumer arena, time-to-market is often prioritized at the expense of quality assurance and security. An initial lack of standards has compounded the problems arising from this rapid development. However, the explosive growth in the number and types of IoT devices has now created a multitude of competing standards and technology silos resulting in a highly fragmented threat model. Tens of billions of these devices have been deployed in consumers\u27 homes and industrial settings. From smart toasters and personal health monitors to industrial controls in energy delivery networks, these devices wield significant influence on our daily lives. They are privy to highly sensitive, often personal data and responsible for real-world, security-critical, physical processes. As such, these internet-connected things are highly valuable and vulnerable targets for exploitation. Current security measures, such as reactionary policies and ad hoc patching, are not adequate at this scale. This thesis presents a multi-layered, defense in depth, approach to preventing and mitigating a myriad of vulnerabilities associated with the above challenges. To secure the pre-boot environment, we demonstrate a hardware-based secure boot process for devices lacking secure memory. We introduce a novel implementation of remote attestation backed by blockchain technologies to address hardware and software integrity concerns for the long-running, unsupervised, and rarely patched systems found in industrial IoT settings. Moving into the software layer, we present a unique method of intraprocess memory isolation as a barrier to several prevalent classes of software vulnerabilities. Finally, we exhibit work on network analysis and intrusion detection for the low-power, low-latency, and low-bandwidth wireless networks common to IoT applications. By targeting these areas of the hardware-software stack, we seek to establish a trustworthy system that extends from power-on through application runtime

    Research & Technology Report Goddard Space Flight Center

    Get PDF
    The main theme of this edition of the annual Research and Technology Report is Mission Operations and Data Systems. Shifting from centralized to distributed mission operations, and from human interactive operations to highly automated operations is reported. The following aspects are addressed: Mission planning and operations; TDRSS, Positioning Systems, and orbit determination; hardware and software associated with Ground System and Networks; data processing and analysis; and World Wide Web. Flight projects are described along with the achievements in space sciences and earth sciences. Spacecraft subsystems, cryogenic developments, and new tools and capabilities are also discussed

    Towards contact-less vital sign monitoring using a cots resource-constrained multi-core system:an experience report

    No full text
    \u3cp\u3eContact-less vital-sign monitoring is enabling in situations where traditional contact-based vital sign monitoring is prohibitive, such as neonatal and burn care where electrodes and attachments risk patient infection or complications. To make vital-sign monitoring available for the consumer market, these algorithms shall use COTS cameras and run on COTS systems. In this paper, we report upon the results of an experiment to improve the performance of a contact-less respiration algorithm on a resource-constrained COTS multi-core system, in our case a Raspberry Pi 3 running Linux, using a state-of-the-art tool to visualize the behavior of a system. The improvements are an increase of the CPU utilization from 72% to almost 94% and an increase of the throughput of the algorithm by more than 45%.\u3c/p\u3

    Progress Towards Controlled Re-entry and Recovery of CubeSats

    Get PDF
    The primary objective of this work was to progress towards performing controlled re-entry and recovery missions using CubeSats to increase the frequency of Solar System exploration missions such as extra-terrestrial sample collection and return and planetary Entry, Descent, and Landing. By developing a novel CubeSat platform and further methods to track CubeSats, the cost of developing technologies for these missions has been reduced, meeting the primary objective and enabling more planetary science research opportunities

    Research and Technology Report. Goddard Space Flight Center

    Get PDF
    This issue of Goddard Space Flight Center's annual report highlights the importance of mission operations and data systems covering mission planning and operations; TDRSS, positioning systems, and orbit determination; ground system and networks, hardware and software; data processing and analysis; and World Wide Web use. The report also includes flight projects, space sciences, Earth system science, and engineering and materials

    An Inquiry Regarding the Development of an Effectual Architecture Framework Supporting Next Generation 9-1-1

    Get PDF
    The emergency 9-1-1 service is a vital part of our nation â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and proved successful in delivering emergency services in times of personal, regional, and national need. The current circuit-switched infrastructure of the 9-1-1 Public Safety Answering Point network cannot receive digital data (e.g., text messages, email, photographs, and video) from the communication devices commonly used by the public today. A national movement known as Next Generation 9-1-1 is underway that will support non-traditional communication digital data processing in the Public Safety Answering Point. This case study will attempt to determine if practical service oriented architecture methodology can be used in the development of an effectual architecture framework supporting the Next Generation 9-1-1framework and the nontraditional communication technology within the Public Safety Answering Points of Colorado
    • …
    corecore