55 research outputs found

    An empirical study of employee loyalty, service quality, cost reduction and company performance

    Get PDF
    The focus of this study was on investigating the relationships among employee loyalty, service quality, cost reduction and company performance, with the aim to investigate the impact of employee loyalty to company performance. The research model was developed and empirically tested on the sample of 100 service companies with 317 questionnaire surveys conducted in the Republic of Serbia and Bosnia and Herzegovina. Using different statistical analysis (the Kolmogorov-Smirnovljev statistic, Path analysis, A.M.O.S. statistic software and lavaan software) leads to the conclusion that employee loyalty is significantly related and has a positive influence on company performance

    Securing industrial cyber-physical systems: A run-time multi-layer monitoring

    Get PDF
    Industrial Cyber-Physical Systems (ICPSs) are widely deployed in monitoring and control of the nation's critical industrial processes such as water distribution networks and power grids. ICPSs are the tight integration of cyber (software) and physical entities connected via communication networks. Communication networks are typically realised via wireless channels to reduce the cost of wires and installation. However, they are also inherently unreliable, easy to disrupt and subvert, which makes them a potential target for cyber attacks. The failure of communication can cause data loss or delays, which can compromise system functionality and have catastrophic consequences due to the strict real-time requirements of ICPSs. Current run-time security monitors protect ICPSs either at communication level (through network intrusion monitors) or application level (through threat detection monitors). Such monitors are layer-specific and thus fail to detect advanced threats arising from the multi-layer disruption. In this paper, we present a multi-layer run-time security monitor that can detect discrepancies caused by interdependent application and communication layer attacks and prevent their propagation into the system's control loops. We demonstrate the effectiveness of the approach via an example of the ICPS used for control and monitoring of a water distribution network

    Performance analysis of distributed control configurations in LQR multi-agent system design

    Get PDF
    The paper considers a distributed Linear Quadratic Regulator (LQR) design framework for a network of identical dynamically decoupled multi-agent systems. It is known that in this case a stabilizing distributed controller for the network can be obtained by solving a centralized LQR problem whose size depends on the maximum vertex degree of the graph. A systematic method is presented for computing the performance loss of various distributed control configurations relative to the performance of the centralized controller. A procedure is developed for analyzing the performance loss for general distributed control configurations and state-space directions. It is also shown that by removing a single link we can always define a control configuration for which there is no performance loss, provided the initial state of the aggregate system lies in a particular direction of state-space which is identified. The results are illustrated by an exhaustive analysis of the network consisting of six identical agents

    A survey of potential security issues in existing wireless sensor network protocols

    Get PDF
    The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems

    Failures from the Environment, a Report on the First FAILSAFE workshop

    Get PDF
    This document presents the views expressed in the submissions and discussions at the FAILSAFE workshop about the common problems that plague embedded sensor system deployments in the wild. We present analysis gathered from the submissions and the panel session of the FAILSAFE 2017 workshop held at the SenSys 2017 conference. The FAILSAFE call for papers specifically asked for descriptions of wireless sensor network (WSN) deployments and their problems and failures. The submissions, the questions raised at the presentations, and the panel discussion give us a sufficient body of work to review, and draw conclusions regarding the effect that the environment has as the most common cause of embedded sensor system failures

    Disadvantages of electrocoagulation-flotation treatment of offset printing effluents

    Get PDF
    The efficiency of electrocoagulation-flotation (ECF) treatment was estimated based on the quantity of pollutants (cooper, turbidity, and organic substances) in printing effluents (waste offset printing developer and waste offset fountain solution) at selected process parameters. Four sets of aluminum or/and iron electrode combinations were applied, each with a current density of 2, 4, and 8 mA cmāˆ’2 and interelectrode distances of 0.5, 1.0, and 1.5 cm. In the progress of the ECF treatment, samples were taken at certain process times (1, 5, 10, 20, 40, and 60 min). Based on the obtained results, the disadvantages of ECF treatment of offset printing effluents are defined

    The heavy metals in the processing screen printing inks

    Get PDF
    The contents of heavy metals were analyzed in the two types (solvent-based and water-based) of processing screen printing inks. Mass concentrations of heavy metals (copper, iron, zinc, manganese, chromium, nickel, cadmium, and lead) were determined in the tested screen inks by combining the gravimetric method and atomic absorption spectroscopy. The results indicated that the measured mass concentration of copper (2049.9 mg kg-1 ) in solvent-based cyan ink is 2.4 times higher than in water-based cyan. Other detected metals show higher concentration values with water-based processing inks

    Electrocoagulation removal of heavy metals from wastewater generated by washing a screen printing plate

    Get PDF
    The possibility of applying electrocoagulation treatment to remove heavy metals (zinc, copper, and chromium) from wastewater generated during the washing process of the screen printing plate was carried out. The electrocoagulation efficiency is estimated based on reducing the concentrations of detected heavy metals in the screen wastewater at defined process parameters such as electrode material, current density, interelectrode distance, and operating times
    • ā€¦
    corecore