282,272 research outputs found
How to promote knowledge sharing in cross-functional NPD teams
This paper investigates the common issues that may arise in cross-functional new product development (NPD) teams from a Knowledge Management perspective. The study has been built around a contextualized trigger, where several factors were preventing a new-born NPD team from performing effectively. The purpose of this paper is to give insights of the main dynamics involved in the knowledge sharing process throughout the application of a systematic problem-solving approach to the case investigated by the authors. Due to the impossibility of building a universal recipe suitable for every team in every situation, this work represents a compromise trying to exemplify how to prioritise interventions in a given context, in order to provide a benchmark for similar circumstances. This paper, using an action research method within a single case context, takes shape around the advises and suggestions made by authors to Electronic Connected Ltd (disguised name), a small-medium enterprise (SME) in a situation of NPD paralysis. In particular, the paper emphasizes the importance of effective leadership and supporting environment in facilitating communication, enhancing cohesiveness, fostering joint commitment and giving direction in order to enable knowledge sharing and to leverage capabilities to conclusively deliver new products
Simulating My Own or Others Action Plans? – Motor Representations, Not Visual Representations Are Recalled in Motor Memory
Seegelke C, Hughes CML, Schack T. Simulating My Own or Others Action Plans? – Motor Representations, Not Visual Representations Are Recalled in Motor Memory. PLoS ONE. 2013;8(12): e84662.Action plans are not generated from scratch for each movement, but features of recently generated plans are recalled for subsequent movements. This study investigated whether the observation of an action is sufficient to trigger plan recall processes. Participant dyads performed an object manipulation task in which one participant transported a plunger from an outer platform to a center platform of different heights (first move). Subsequently, either the same (intra-individual task condition) or the other participant (inter-individual task condition) returned the plunger to the outer platform (return moves). Grasp heights were inversely related to center target height and similar irrespective of direction (first vs. return move) and task condition (intra- vs. inter-individual). Moreover, participants' return move grasp heights were highly correlated with their own, but not with their partners' first move grasp heights. Our findings provide evidence that a simulated action plan resembles a plan of how the observer would execute that action (based on a motor representation) rather than a plan of the actually observed action (based on a visual representation)
Hikester - the event management application
Today social networks and services are one of the most important part of our
everyday life. Most of the daily activities, such as communicating with
friends, reading news or dating is usually done using social networks. However,
there are activities for which social networks do not yet provide adequate
support. This paper focuses on event management and introduces "Hikester". The
main objective of this service is to provide users with the possibility to
create any event they desire and to invite other users. "Hikester" supports the
creation and management of events like attendance of football matches, quest
rooms, shared train rides or visit of museums in foreign countries. Here we
discuss the project architecture as well as the detailed implementation of the
system components: the recommender system, the spam recognition service and the
parameters optimizer
Wearable Platform for Automatic Recognition of Parkinson Disease by Muscular Implication Monitoring
The need for diagnostic tools for the characterization of progressive movement disorders - as the Parkinson Disease (PD) - aiming to early detect and monitor the pathology is getting more and more impelling. The parallel request of wearable and wireless solutions, for the real-time monitoring in a non-controlled environment, has led to the implementation of a Quantitative Gait Analysis platform for the extraction of muscular implications features in ordinary motor action, such as gait. The here proposed platform is used for the quantification of PD symptoms. Addressing the wearable trend, the proposed architecture is able to define the real-time modulation of the muscular indexes by using 8 EMG wireless nodes positioned on lower limbs. The implemented system “translates” the acquisition in a 1-bit signal, exploiting a dynamic thresholding algorithm. The resulting 1-bit signals are used both to define muscular indexes both to drastically reduce the amount of data to be analyzed, preserving at the same time the muscular information. The overall architecture has been fully implemented on Altera Cyclone V FPGA. The system has been tested on 4 subjects: 2 affected by PD and 2 healthy subjects (control group). The experimental results highlight the validity of the proposed solution in Disease recognition and the outcomes match the clinical literature results
Multi-tenant Pub/Sub processing for real-time data streams
Devices and sensors generate streams of data across a diversity of locations and protocols. That data usually reaches a central platform that is used to store and process the streams. Processing can be done in real time, with transformations and enrichment happening on-the-fly, but it can also happen after data is stored and organized in repositories. In the former case, stream processing technologies are required to operate on the data; in the latter batch analytics and queries are of common use.
This paper introduces a runtime to dynamically construct data stream processing topologies based on user-supplied code. These dynamic topologies are built on-the-fly using a data subscription model defined by the applications that consume data. Each user-defined processing unit is called a Service Object. Every Service Object consumes input data streams and may produce output streams that others can consume. The subscription-based programing model enables multiple users to deploy their own data-processing services. The runtime does the dynamic forwarding of data and execution of Service Objects from different users. Data streams can originate in real-world devices or they can be the outputs of Service Objects.
The runtime leverages Apache STORM for parallel data processing, that combined with dynamic user-code injection provides multi-tenant stream processing topologies. In this work we describe the runtime, its features and implementation details, as well as we include a performance evaluation of some of its core components.This work is partially supported by the European Research Council (ERC) un-
der the EU Horizon 2020 programme (GA 639595), the Spanish Ministry of
Economy, Industry and Competitivity (TIN2015-65316-P) and the Generalitat
de Catalunya (2014-SGR-1051).Peer ReviewedPostprint (author's final draft
Arm Mbed – AWS IoT System Integration [Open access]
This project explores the different Internet of Things (IoT) architectures and the available platforms
to define a general IoT Architecture to connect Arm microcontrollers to Amazon Web Services. In
order to accommodate the wide range of IoT applications, the architecture was defined with different
routes that an Arm microcontroller can take to reach AWS. Once this Architecture was defined, a
performance analysis on the different routes was performed in terms of communication speed and
bandwidth. Finally, a Smart Home use case scenario is implemented to show the basic functionalities
of an IoT system such as sending data to the device and data storage in the Cloud. Furthermore, a
Cloud ML algorithm is triggered in real time by the Smart Home to receive a prediction of the current
Comfort Level in the room
On Ladder Logic Bombs in Industrial Control Systems
In industrial control systems, devices such as Programmable Logic Controllers
(PLCs) are commonly used to directly interact with sensors and actuators, and
perform local automatic control. PLCs run software on two different layers: a)
firmware (i.e. the OS) and b) control logic (processing sensor readings to
determine control actions). In this work, we discuss ladder logic bombs, i.e.
malware written in ladder logic (or one of the other IEC 61131-3-compatible
languages). Such malware would be inserted by an attacker into existing control
logic on a PLC, and either persistently change the behavior, or wait for
specific trigger signals to activate malicious behaviour. For example, the LLB
could replace legitimate sensor readings with manipulated values. We see the
concept of LLBs as a generalization of attacks such as the Stuxnet attack. We
introduce LLBs on an abstract level, and then demonstrate several designs based
on real PLC devices in our lab. In particular, we also focus on stealthy LLBs,
i.e. LLBs that are hard to detect by human operators manually validating the
program running in PLCs. In addition to introducing vulnerabilities on the
logic layer, we also discuss countermeasures and we propose two detection
techniques.Comment: 11 pages, 14 figures, 2 tables, 1 algorith
- …
