29 research outputs found

    Trusted Supply Chains: Surveying Competitive Value Of The Cloud

    Get PDF
    Cloud computing has become a force multiplier for organizations as they realize the benefit from the shared computing platforms and services offered by cloud computing.  Providers market shared computing platforms and services because of their convenience, dynamism, elasticity, and scalability to meet the growing demands of organizations, specifically in widespread supply chain networks.   Yet, the issuance of trust has become a concern in the cloud web as cloud computing service technologies advance faster than measures to secure it.  This research presents a framework to determine which specific supply chain functions can derive the most value from cloud capabilities and to understand how to leverage these technologies strategically to develop a competitive advantage.  It proposes a strategic integration of cloud functionalities to create profitable supply chain network partnerships and to improve the processes, quality and innovation potential in the overall Supply Chain Management (SCM), while maintaining a trusted cloud environment

    Radio Frequency Identification (RFID) Technology: Gaining A Competitive Value Through Cloud Computing

    Get PDF
    Radio Frequency Identification (RFID) uses radio waves to track the movement of goods through the Supply Chain system. The identity of an object is captured with a unique serial number that is transmitted wirelessly to a computer system. Small businesses are facing RFID implementation barriers.  The barriers range from the perspective of the consumer-goods manufacturers and retail organizations.  We propose implementing RFID technology using cloud computing framework to alleviate or reduce the implementation cost which is the most prevalent barrier

    Evaluation of commercial probiotic lactic cultures against biofilm formation by

    Get PDF
    Background/Aims Cronobacter sakazakii, an emergent pathogen is considered as a major concern to infants and neonates fed on reconstituted powdered infant milk formula. In conjunction with many other factors, biofilm forming capacity adds to its pathogenic potential. In view of the facts that infants are at highest risk to C. sakazakii infections, and emerging antibiotic resistance among pathogens, it is imperative to evaluate probiotic cultures for their efficacy against C. sakazakii. Therefore, pure probiotic strains were isolated from commercial probiotic products and tested for their antimicrobial and anti-biofilm activities against C. sakazakii. Methods A total of 6 probiotic strains were tested for their antibiotic susceptibility followed by antimicrobial activity using cell-free supernatant (CFS) against C. sakazakii. The inhibitory activity of CFS against biofilm formation by C. sakazakii was determined using standard crystal violet assay and microscopic observations. Results All the probiotic strains were sensitive to ampicillin, tetracycline, vancomycin and carbenicillin whereas most of the strains were resistant to erythromycin and novobiocin. Four of the 6 probiotic derived CFS possessed antimicrobial activity against C. sakazakii at a level of 40 μL. A higher biofilm inhibitory activity (>80%) was observed at initial stages of biofilm formation with weaker activity during longer incubation upto 48 hours (50%–60%). Conclusions The study indicated the efficacy of isolated commercial probiotics strains as potential inhibitor of biofilm formation by C. sakazakii and could be further explored for novel bioactive molecules to limit the emerging infections of C. sakazakii

    Online auction deception using a shill bidding agent

    Get PDF
    Shill bidding is the act of using bids in an online auction to drive up the final price for the seller, thereby defrauding legitimate bidders. While 'shilling' is recognized as a problem and shill bidding is strictly forbidden in online auctions, presently there is little to no established means of defense against shills. This paper presents a software bidding agent that follows a shill bidding strategy. The agent incrementally increases an auction's price, forcing legitimate bidders to submit higher bids in order to win the item. The agent ceases bidding when the desired profit from shilling has been attained, or in the case that it is too risky to continue bidding without winning the auction. Its ability to inflate the price has been tested in a simulated marketplace and experimental results are presented. Furthermore, the agent is used to assist in developing algorithms to detect the presence of shill bidding in online auctions

    Secure Rail Interchange Routing

    No full text
    Abstract—Locations that connect tracks from different railroad companies - referred to as interchange points - exchange crew, locomotives, and their associated consists. Because trains have a single degree of freedom in movement, that is, they can only operate along the tracks, any delay occurring at an interchange point causes cascading delays in connecting tracks. In addition, authentication and authorization that is expected to take place at interchanges in PTC controlled train movement may add extra delays due to mutual authentication between two security domains. In this paper we propose a model that can address safety and security concerns and their interrelationships that govern train movement through an interchange point. We show how a profile of safe operations can be computed for operating an interchange point

    Do women fare better in female-owned businesses?

    No full text
    Numerous studies have chronicled the problems women experience in seeking to be hired and subsequently break through the glass ceiling in corporate America. These studies have been approached from the traditional perspective of male-dominated organizations. However, using a human resource management (HRM) framework, this article explores the possibility of further extending to female-owned businesses Kanter\u27s homosocial reproduction thesis that increased numbers of women in positions of management would increase hiring and advancement of women in corporate America. Results show that, at each step in the HRM process, female business owners in this study fulfill expectations by hiring, promoting and retaining significantly more women than male business owner counterparts. In addition, there were significant differences between minority and non-minority female business owners in the proportion of co-racial managers. Moreover, Whites and Blacks showed a significant preference for co-racial managers, while Hispanics and Asians did not
    corecore