191 research outputs found

    Inventory Model with Seasonal Demand: A Specific Application to Haute Couture

    Get PDF
    In the stochastic multiperiod inventory problem, a vast majority of the literature deals with demand volume uncertainty. Other dimensions of uncertainty have generally been overlooked. In this paper, we develop a newsboy formulation for the aggregate multiperiod inventory problem intended for products of short sales season and without replenishments. A distinguishing characteristic of our formulation is that it takes a time dimension of demand uncertainty into account. The proposed model is particularly suitable for applications in haute couture, i.e., high fashion industry. The model determines the time of switching primary sales effort from one season to the next as well as optimal order quantity for each season with the objective of maximizing expected profit over the planning horizon. We also derive the optimality conditions for the time of switching primary sales effort and order quantity. Furthermore, we show that if time uncertainty and volume uncertainty are independent, order quantity becomes the main decision over the interval of the primary selling season. Finally, we demonstrate that the results from the two-season case can be directly extended to the multi-season case and the limited resource multiple-item case

    Update on Controlling Herds of Cooperative Robots

    Get PDF
    A document presents further information on the subject matter of "Controlling Herds of Cooperative Robots". The document describes the results of the computational simulations of a one-blimp, three-surface-sonde herd in various operational scenarios, including sensitivity studies as a function of distributed communication and processing delays between the sondes and the blimp. From results of the simulations, it is concluded that the methodology is feasible, even if there are significant uncertainties in the dynamical models

    Mapping Nearby Terrain in 3D by Use of a Grid of Laser Spots

    Get PDF
    A proposed optoelectronic system, to be mounted aboard an exploratory robotic vehicle, would be used to generate a three-dimensional (3D) map of nearby terrain and obstacles for purposes of navigating the vehicle across the terrain and avoiding the obstacles. The difference between this system and the other systems would lie in the details of implementation. In this system, the illumination would be provided by a laser. The beam from the laser would pass through a two-dimensional diffraction grating, which would divide the beam into multiple beams propagating in different, fixed, known directions. These beams would form a grid of bright spots on the nearby terrain and obstacles. The centroid of each bright spot in the image would be computed. For each such spot, the combination of (1) the centroid, (2) the known direction of the light beam that produced the spot, and (3) the known baseline would constitute sufficient information for calculating the 3D position of the spot

    A framework for cryptography algorithms on mobile devices

    Get PDF
    Mobile communication devices have become a popular tool for gathering and disseminating information and data. With the evidence of the growth of wireless technology and a need for more flexible, customizable and better-optimised security schemes, it is evident that connection-based security such as HTTPS may not be sufficient. In order to provide sufficient security at the application layer, developers need access to a cryptography package. Such packages are available as third party mobile cryptographic toolkits or are supported natively on the mobile device. Typically mobile cryptographic packages have reduced their number of API methods to keep the package lightweight in size, but consequently making it quite complex to use. As a result developers could easily misuse a method which can weaken the entire security of a system without knowing it. Aside from the complexities in the API, mobile cryptography packages often do not apply sound cryptography within the implementation of the algorithms thus causing vulnerabilities in its utilization and initialization. Although FIPS 140-2 and CAPI suggest guidelines on how cryptographic algorithms should be implemented, they do not define the guidelines for implementing and using cryptography in a mobile environment. In our study, we do not define new cryptographic algorithms, instead, we investigate how sound cryptography can be applied practically in a mobile application environment and developed a framework called Linca (which stands for Logical Integration of Cryptographic Architectures) that can be used as a mobile cryptographic package to demonstrate our findings. The benefit that Linca has is that it hides the complexity of making incorrect cryptographic algorithm decisions, cryptographic algorithm initialization and utilization and key management, while maintaining a small size. Linca also applies sound cryptographic fundamentals internally within the framework, which radiates these benefits outwards at the API. Because Linca is a framework, certain architecture and design patterns are applied internally so that the cryptographic mechanisms and algorithms can be easily maintained. Linca showed better results when evaluated against two mobile cryptography API packages namely Bouncy Castle API and Secure and Trust Service API in terms of security and design. We demonstrate the applicability of Linca on using two realistic examples that cover securing network channels and on-device data.Dissertation (MSc (Computer Science))--University of Pretoria, 2007.Computer ScienceMScunrestricte

    Cloud and IoT-based emerging services systems

    Get PDF
    The emerging services and analytics advocate the service delivery in a polymorphic view that successfully serves a variety of audience. The amalgamation of numerous modern technologies such as cloud computing, Internet of Things (IoT) and Big Data is the potential support behind the emerging services Systems. Today, IoT, also dubbed as ubiquitous sensing is taking the center stage over the traditional paradigm. The evolution of IoT necessitates the expansion of cloud horizon to deal with emerging challenges. In this paper, we study the cloud-based emerging services, useful in IoT paradigm, that support the effective data analytics. Also, we conceive a new classification called CNNC {Clouda, NNClouda} for cloud data models; further, some important case studies are also discussed to further strengthen the classification. An emerging service, data analytics in autonomous vehicles, is then described in details. Challenges and recommendations related to privacy, security and ethical concerns have been discussed

    I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Get PDF
    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark

    Mars Science Laboratory Workstation Test Set

    Get PDF
    The Mars Science Laboratory developed the Workstation TestSet (WSTS) is a computer program that enables flight software development on virtual MSL avionics. The WSTS is the non-real-time flight avionics simulator that is designed to be completely software-based and run on a workstation class Linux PC

    An Application-Based Performance Evaluation of NASAs Nebula Cloud Computing Platform

    Get PDF
    The high performance computing (HPC) community has shown tremendous interest in exploring cloud computing as it promises high potential. In this paper, we examine the feasibility, performance, and scalability of production quality scientific and engineering applications of interest to NASA on NASA's cloud computing platform, called Nebula, hosted at Ames Research Center. This work represents the comprehensive evaluation of Nebula using NUTTCP, HPCC, NPB, I/O, and MPI function benchmarks as well as four applications representative of the NASA HPC workload. Specifically, we compare Nebula performance on some of these benchmarks and applications to that of NASA s Pleiades supercomputer, a traditional HPC system. We also investigate the impact of virtIO and jumbo frames on interconnect performance. Overall results indicate that on Nebula (i) virtIO and jumbo frames improve network bandwidth by a factor of 5x, (ii) there is a significant virtualization layer overhead of about 10% to 25%, (iii) write performance is lower by a factor of 25x, (iv) latency for short MPI messages is very high, and (v) overall performance is 15% to 48% lower than that on Pleiades for NASA HPC applications. We also comment on the usability of the cloud platform

    A Novel Interdisciplinary Course in Gerontechnology for Disseminating Computational Thinking

    Get PDF
    While specialized knowledge and skills are the hallmark of modern society, the size and complexity of contemporary problems often require cooperative effort to analyze and solve. Therefore, experiences with skills, methodologies, and tools for effective interdisciplinary collaboration and structured problem solving are vital for preparing students for future academic and professional success. Meanwhile, computational systems have permeated much of modern professional and personal life, making computational thinking an essential skill for members of modern society. However, formal training in these techniques is primarily limited to students within computer science, mathematics, management of information systems, and engineering. At Iowa State University, we have designed and offered an experimental course to develop undergraduate students’ abilities for interdisciplinary teamwork and to disseminate computational thinking skills to a broader range of students. This novel course was jointly designed and instructed by faculty from the Computer Science Department, Gerontology Program, and Graphic Design Program to incorporate diverse faculty expertise and pedagogical approaches. Students were required to interview real users to identify real-life problems, gather requirements, and assess candidate solutions, which necessitated communication both within the group and with technologically-disinclined users. In-class presentations and wiki-based project websites provided regular practice at disseminating domain expertise to larger interdisciplinary audiences. Workshops, group-based mentoring, peer learning, and guided discovery allowed non-CS majors to learn much more about computer programs and tools, and grading criteria held students individually accountable within their disciplines but also emphasized group collaboration

    Patient safety in dentistry: development of a candidate 'never event' list for primary care

    Get PDF
    Introduction The 'never event' concept is often used in secondary care and refers to an agreed list of patient safety incidents that 'should not happen if the necessary preventative measures are in place'. Such an intervention may raise awareness of patient safety issues and inform team learning and system improvements in primary care dentistry. Objective To identify and develop a candidate never event list for primary care dentistry. Methods A literature review, eight workshops with dental practitioners and a modified Delphi with 'expert' groups were used to identify and agree candidate never events. Results Two-hundred and fifty dental practitioners suggested 507 never events, reduced to 27 distinct possibilities grouped across seven themes. Most frequently occurring themes were: 'checking medical history and prescribing' (119, 23.5%) and 'infection control and decontamination' (71, 14%). 'Experts' endorsed nine candidate never event statements with one graded as 'extreme risk' (failure to check past medical history) and four as 'high risk' (for example, extracting wrong tooth). Conclusion Consensus on a preliminary list of never events was developed. This is the first known attempt to develop this approach and an important step in determining its value to patient safety. Further work is necessary to develop the utility of this method
    • …
    corecore