4,777 research outputs found

    A Framework To Develop Business Models For The Exploitation Of Disruptive Technology

    Get PDF
    Adopting new technology to expand business prospects is not a new trend. Certainly, this brings innovation and new opportunities to the business but also raises several challenges. This research addresses the challenges of business modelling in relation to disruptive technologies. Emerging technologies are very dynamic, resulting in continuous new developments. Therefore, businesses need to adjust their business models to stay sustained with this dynamic nature of technology. This research aims to create a conceptual framework and a related methodology to develop business models for the commercial use of disruptive technologies. The research evaluates the gaps in the major business model development methodologies and argues that these methodologies are not adequate for businesses that offer high-end products and services to their customers. It creates a framework to make a methodical comparison among different business model methodologies. Based on that framework, it conducts a systematic comparison of five significant business model development methodologies to identify possible flaws. It analyses business elements of two use cases, where a disruptive technology, in this case, cloud computing in the form of cloud-based simulation, offers significant value to customers. Thereafter, it compares the components of all the five identified methodologies with each other using business elements of the selected use case. While the analysis highlights the differences and the similarities between the methodologies, it also reveals the limitations of the current approaches and the need for further decomposing technological elements. Therefore, the study carries out an empirical investigation based on selective sampling. Seven real-life business use cases that execute the application of disruptive technology (i.e., cloud/HPC-based simulation as a solution based on cloud computing & high-performance computing) have been explored, involving 30 individual companies. Thenceforth, a thematic analysis of these use cases, based on a detailed report provided by a European research project, is conducted. Besides, three months of observation is carried out by participating in the same project as a ‘Research Associate’ from the period of July 2019 to September 2019. This three-month observation supports not only providing access to 26 business use cases and their relevant documents but also validating the information provided, as well as finding clarity in collected data. Moreover, the selected business use cases are particularly useful for identifying the technology elements that are required to create the proposed framework. The analysis has resulted in an understanding of the dynamics of the interrelationship of social and technical factors for developing new technological solutions that push the development of new business models devised for delivering solutions exploiting disruptive technologies. Based on this understanding, the research extends a widely used business model ontology (Osterwalder’s Business Model Ontology), and offers a new business model methodology with the introduction of new business model elements related to technology. The technological elements are being identified as the results of the above empirical analysis. Utilising this extended ontology, a novel methodology for developing business models for the exploitation of disruptive technologies is suggested and its applicability is demonstrated in the example of cloud-based simulation case studies. The research creates three main contributions. Firstly, it uses a systematic approach and identifies that the technological elements are not explicitly defined in the analysed business model methodologies, as well as the factors of disruption in the context of the socio-materiality view is missing. Secondly, it conducts an empirical analysis and defines the specific social and technological elements such as ‘Dynamic Capabilities’, ‘Competition Network’, ‘Technology Type’, ‘Technology Infrastructure’, ‘Technology Platform’, and ‘Technology Network’; that are needed to create a new business model methodology. Finally, it extends an existing business model ontology (which was developed by Alexander Osterwalder) and constructs a new ontological framework with an accompanying methodology to develop business models, particularly for organisations that introduce technological solutions as their main value using disruptive technologies

    NURS 128: Evidence-based Nursing Practice Course Redesign

    Get PDF
    Poster summarizing course redesign activities for NURS 128: Evidence-based Nursing Practice.https://scholarworks.sjsu.edu/davinci_itcr2014/1004/thumbnail.jp

    Morphological and germination physiognomies of Carissa carandas seedlings influenced by seed storage at ambient conditions

    Get PDF
    The present study was taken up to know the morphological and germination physiognomies of karonda (Carissa carandas) seeds influenced by seed storage period at ambient conditions (26 ?C temperature and 55 % RH). Seeds were subjected to store at 10, 20, 30, 40, 50 and 60 days at room temperature (26?C). Germination percentage and various morphological characteristics viz., vigour index, fresh weight of shoot and root, dry weight of shoot and root, root to shoot ratio were recorded. Among stored seeds 10 days old seeds recorded highest germina-tion percentage (57 %) and 60 days old seeds recorded lowest germination (20.33 %). At the end (90 days after sowing) 10 days old seeds again possessed higher fresh weight of root (0.300 g) and shoot (1.240 g), dry weight of root (0.103 g) and shoot (0.487 g), root to shoot ratio (0.212) and vigour index (1772.70 cm) among stored seeds. These physiological observations were quite similar with the freshly harvested seed which found maximum values for all the parameters owing to higher moisture content. Karonda seeds showed good viability upto10 days thereafter its value declined and it reached minimum after 60 days of storage

    How Smart is your Android Smartphone?

    Get PDF
    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security

    Enrichment on quality of aonla (Emblica officinalis G.) fruit bars by blending

    Get PDF
    The main objective of the study was to standardize enrichment of aonla pulp to develop fruit bars. The experiment was laid out in Completely Randomized Design (CRD) with 10 treatments. Aonla pulp was blended with 25 to 75% of different fruit (mango, papaya and jackfruit) pulp viz. Aonla pulp, Aonla with mango, papaya and jackfruit in different proportion of 3:1, 1:1 and 1:3 each fruit respectively. The initial moisture content was higher in aonlapulp enriched with mango pulp in 1:3 proportions. Enrichment of aonlapulp with fruit pulp of mango, papaya and jackfruit reduced the ascorbic acid, titratable acidity and tannin content of the resultant fruit bars compared to that from pure aonla pulp, which is an indication in the reduction of astringency. Enrichment also resulted in an increase in total soluble solids, reducing, non-reducing and total sugars of the resultant fruit bars. Enrichment of aonla pulp with fruit pulp of provitamin A rich fruits like mango, papaya and jackfruit showed a rise in total carote-noids and reduced astringency and acidity, thereby resulting in fruit bars with altered palatability and enhanced nutrition. Enriched fruit bars contained three vital antioxidants viz. Vitamin C, carotenoids and polyphenols of all the treatments, enriched fruit bar containing 25 % aonlaand 75 % mango (T4) was found superior in organoleptic evaluation

    Challenges and Opportunities for Trade and Financial Integration in Asia and the Pacific

    Get PDF
    During the past two decades, intraregional trade has assumed a lot of importance - with intraregional trade growing rapidly in several regions, such as the Association of Southeast Asian Nations (ASEAN), North American Free Trade Agreement (NAFTA) and the European Union. However, intraregional trade in South Asia has not witnessed rapid expansion despite the institutional measures taken by the South Asian countries through the South Asian Preferential Trade Agreement (SAPTA) and the South Asian Free Trade Agreement (SAFTA).intraregional trade, South Asia, ASEAN, NAFTA, SAFTA, SAPTA

    Impact of Infrastructure on Productivity: Case of Indian Registered Manufacturing

    Get PDF
    This study is primarily focused on the productivity impacts of the provision of infrastructure on the registered manufacturing sector in India. This is analyzed by estimating the cost elasticity of infrastructure inputs. For this purpose we postulate a variable cost function model for the manufacturing sector with cost as a function of the prices of the variable inputs, levels of output and infrastructure stocks. Variable inputs include capital, labour and intermediate input. Infrastructure is assumed to be a quasi-fixed input since its provision is done mainly by the public sector and it cannot be instantaneously adjusted in the short-run. The cost function model estimated consists of the variable translog cost function and the cost share equations for the variable inputs. We have used time series data and it pertains to the period 1965-1999. Twenty-three infrastructure variables are used in this study which, are aggregated using the principal component methodology. Three alternative specifications of the quasi-fixed inputs are explored. The alternatives are economic infrastructure, social infrastructure and aggregate infrastructure. Estimated results suggest that infrastructure provision enhances the productivity in the manufacturing sector and it helps to lower the costs in the sector. Apart from this it also has several bias effects with respect to the variable inputs.

    Dynamic Hierarchical Cache Management for Cloud RAN and Multi- Access Edge Computing in 5G Networks

    Get PDF
    Cloud Radio Access Networks (CRAN) and Multi-Access Edge Computing (MEC) are two of the many emerging technologies that are proposed for 5G mobile networks. CRAN provides scalability, flexibility, and better resource utilization to support the dramatic increase of Internet of Things (IoT) and mobile devices. MEC aims to provide low latency, high bandwidth and real- time access to radio networks. Cloud architecture is built on top of traditional Radio Access Networks (RAN) to bring the idea of CRAN and in MEC, cloud computing services are brought near users to improve the user’s experiences. A cache is added in both CRAN and MEC architectures to speed up the mobile network services. This research focuses on cache management of CRAN and MEC because there is a necessity to manage and utilize this limited cache resource efficiently. First, a new cache management algorithm, H-EXD-AHP (Hierarchical Exponential Decay and Analytical Hierarchy Process), is proposed to improve the existing EXD-AHP algorithm. Next, this paper designs three dynamic cache management algorithms and they are implemented on the proposed algorithm: H-EXD-AHP and an existing algorithm: H-PBPS (Hierarchical Probability Based Popularity Scoring). In these proposed designs, cache sizes of the different Service Level Agreement (SLA) users are adjusted dynamically to meet the guaranteed cache hit rate set for their corresponding SLA users. The minimum guarantee of cache hit rate is for our setting. Net neutrality, prioritized treatment will be in common practice. Finally, performance evaluation results show that these designs achieve the guaranteed cache hit rate for differentiated users according to their SLA

    Exploring the meaning behind “Technical Translation”

    Get PDF
    Technical Translation is a type of specialized translation involving the translation of documents produced by technical writers, or more specifically, texts which relate to technological subject areas or texts which deal with the practical application of scientific and technological information. While the presence of specialized terminology is a feature of technical texts, specialized terminology alone is not sufficient for classifying a text as ‘technical’ since numerous disciplines and subjects which are not ‘technical’ possess what can be regarded as specialized terminology. Translation is the concept of double understanding. Translation as an activity is required for the better understanding of text in the exchanging socio-cultural context. In a way the activity of translation deals with and also highlights the process of transformation of language. Translation serves as a means to study the progressive course of language in the changing frame, frame here including the social, cultural, historical and psychological perspectives
    • 

    corecore