660 research outputs found

    La relación entre la formalización de la función de recursos humanos y la intensidad de las prácticas de gestión de recursos humanos en las PYMEs: Un estudio empírico en Sri Lanka

    Get PDF
    [SPA] Human resource management (HRM) intensity is important for any type of business in which human resources play a vital role. However, little is known about HRM intensity in the context of small and medium-sized enterprises (SMEs). The aim of this study is to investigate the relationship between the formalization of HRM function and HRM intensity. The sample of the study consists of mediumsized enterprises operating in Sri Lanka. The results show that although the formalization of HRM function is low, HRM intensity is high. The findings also show that higher levels of formalization lead to a greater intensity in HRM practices. [ENG] La intensidad de las prácticas de gestión de recursos humanos (GRH) es importante para cualquier tipo de empresa en la que las personas desempeñen un papel vital. Sin embargo, poco se sabe sobre la intensidad de las prácticas de GRH en el contexto de las pequeñas y medianas empresas (PYMEs). El objetivo de este estudio es investigar la relación entre la formalización de la función de recursos humanos y la intensidad de las prácticas de GRH. Sobre la base de una muestra de PYMEs que operan en Sri Lanka, los resultados muestran que, aunque la formalización de la función de recursos humanos es baja, la intensidad de las prácticas de GRH es alta, señalando que un mayor nivel de formalización conlleva una mayor intensidad en las prácticas de GRH

    Dynamic Checkpointing of Composite Web Services

    Get PDF
    Web services provide services to their consumers in accordance with terms and conditions laid down in a document called as Service Level Agreement (SLA). Web services have to abide by these terms and conditions failing which, SLA faults result. Fault handling of web services is a key mechanism using which SLA faults can be avoided. We propose fault handling of choreographed web services using checkpointing and recovery. We propose checkpointing in three stages: design, deployment and dynamic checkpointing. We have presented first two stages of checkpointing in our earlier publications. In this paper we discuss the need for dynamic checkpointing and, various factors to be considered while revising checkpoint locations dynamically. We also propose a framework for implementing dynamic checkpointing

    Execution Time Prediction for a Web Service Instance

    Get PDF
    Availability of services on Internet has provided unique opportunity to customers as well as providers for conducting e-business. This new business paradigm can succeed provided selection of services is accomplished to customer satisfaction in terms of service delivery time as well as service quality. Instead of leaving it to service provider to declare, we propose a strategy for forecasting execution time of the web service being called. The paper deals with model details and proposes a framework for implementation of the model. We also demonstrate its usability in scenarios like checkpointing web services

    Framework for Automatic Checkpoint Generation

    Get PDF
    Web services provide services to their consumers in accordance with terms and conditions laid down in a document called as Service Level Agreement (SLA). Web services have to abide by these terms and conditions failing which, SLA faults result. Fault handling of web services is a key mechanism using which SLA faults can be avoided. We propose fault handling of choreographed web services using checkpointing and recovery. We propose checkpointing in three stages: design, deployment and dynamic checkpointing. In this paper we propose a framework for generation of checkpoint locations automatically in a given choreography document by applying design time checkpointing rules. We have also developed a tool to demonstrate that the proposed framework is indeed implementable

    Brackish water culture fisheries: A comment

    Get PDF
    Based on the papers and proceedings of The National Workshop on Development of Inland Fishery Resources, sponsored by the Ministry of Agriculture, Govemment of India, and held during November 1-3, 1983 at Ahmedabad under the joint auspices of the Centre for Management in Agriculture, Indian Institute of Management, Ahmedabad, and the Indian Society of Agricultural Economics, Bomba

    Event Based Approach for Web Services Composition

    Get PDF
    The success of the Internet and the ongoing globalization led to a demand for new solutions to meet the requirements for ITsystems. The paradigm of service-oriented and event-driven architecture with fine grained and loosely coupled services tries to cope with those needs. Service Oriented Architecture (SOA) and Event Driven Architecture (EDA) are two acknowledged architectures for the development of business applications and information systems, which have evolved separately over the years. Today both architectures are acknowledged, but their synergy is not. There are numerous benefits of having an architecture that supports coexistence between operations and events, and composition of services based on operation invocation and event triggering. As part of our ongoing research work, we have tried to analyze in this paper, the basic design of Event based systems, issues that have to be addressed when event based approach is used for composing and coordinating web services. Then we have specified the techniques available that handle these issues, and gave a comparative study on these techniques. Finally we have attempted to sort out the unhandled/ partially handled issues that could be addressed as part of our research

    Checkpointing Orchestrated Web Services

    Get PDF
    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient to faults; we proposed a simple and elegant checkpointing policy called Call based Global Checkpointing of Orchestrated web services which specifies that when a web service calls another web service the calling web service has to save its state. But performance of the web services implementing this policy reduces due to checkpointing overhead. In an effort to improvise this policy, we propose in this paper, a checkpointing policy which uses Predicted Execution Time and Mean Time Between Failures of the called web services to make checkpointing decisions. This policy aims at reducing the required number of Call based Checkpoints but at the same time maintains the resilience of web services to faults

    Auto Deep Learning-based Automated Surveillance Technique to Recognize the Activities in the Cyber-Physical System

    Get PDF
    In recent days, the Internet of Things (IoT) plays a significant role and increasing in rapid usage in various applications. As IoT is being developed for cyber-physical systems in the specific domain of e-health care, military, etc. Based on real-time applications, security plays a vital role in certain activities in educational institutions. In the institutions, there are multiple videos are collected and stored in the data repositories. Those datasets are developed specifically for certain activities and no other datasets are developed for academic activities. As there is a large number of videos and images are collected and considered, advanced technologies like, deep learning and IoT are used to perform certain tasks. In this paper, a Auto Deep learning-based Automated Identification Framework (DLAIF) is proposed to consider and reconsider the activities based on image pre-processing, model can be trained through the proposed GMM model and then predication to make an effective surveillance process based on HMM. This proposed process makes to recognize the activities through EM and log Likelihood for cyber-physical systems. In the performance analysis, the proposed model efficiency can be determined through Accuracy detection, False Positive rate and F1 Score requirement. Then calculating the accuracy is more effective for the proposed model compared to other existing models such as BWMP and LATTE

    Ocean acidification driven changes in pH exposure of zooplankton: projections from the Salish Sea model

    Get PDF
    The Salish Sea Model explicitly evaluates the dynamics of carbonate chemistry parameters (pH, DIC, Alkalinity) at relatively small spatial and temporal scales. These model components served as a basis for estimating the pH exposure dynamics of simulated zooplankton. Zooplankton were modeled assuming a variety of movement behaviors including passive drift with the currents, daily vertical migrations and directed movement toward food or way from unfavorable conditions. These movement behaviors capture the range of possibilities for many of the species in Salish Sea. The pH conditions from the Salish Sea Model included simulations from multiple seasons in recent years and projections of carbonate chemistry expected in the future from ocean acidification. The zooplankton behavior, season, specific location in the Salish Sea ,and changes from ocean acidification all influence the pH exposure trajectories. The analysis provides insight in to which combinations of features lead to the highest and lowest rates of exposure to potentially hazardous pH conditions
    corecore