Search results

1 – 10 of over 3000
Open Access
Article
Publication date: 16 October 2017

Grzegorz Bocewicz, Mukund Nilakantan Janardhanan, Damian Krenczyk and Zbigniew Banaszak

The purpose of this paper is to focus on the reference model of a grid-like supply network that enables formulation of delivery routing and scheduling problems in the context of…

3118

Abstract

Purpose

The purpose of this paper is to focus on the reference model of a grid-like supply network that enables formulation of delivery routing and scheduling problems in the context of the periodic vehicle routing problem.

Design/methodology/approach

The conditions for seamless (collision-free) synchronization of periodically executed local transport processes presented in this paper guarantee cyclic execution of supply processes, thereby preventing traffic flow congestion.

Findings

Systems that satisfy this characteristic, cyclic deliveries executed along supply chains are given and what is sought is the number of vehicles needed to operate the local transport processes in order to ensure delivery from and to specific loading/unloading points on given dates. Determination of sufficient conditions guaranteeing the existence of feasible solutions that satisfy these constraints makes it possible to solve the considered class of problems online.

Practical implications

The computer experiments reported in this paper show the possibilities of practical application of the proposed approach in the construction of decision support systems for food supply chain management.

Originality/value

The aim of the present work is to develop a methodology for the synthesis of regularly structured supply networks that would ensure fixed cyclic execution of local transport processes. The proposed methodology, which implements sufficient conditions for the synchronization of local cyclic processes, allows one to develop a method for rapid prototyping of supply processes that satisfies the time windows constraints given.

Details

Industrial Management & Data Systems, vol. 117 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Article
Publication date: 7 April 2020

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered…

2245

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Details

International Journal of Crowd Science, vol. 4 no. 2
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 25 April 2022

Vuyokazi Precious Camngca, Christopher Amoah and Emma Ayesu-Koranteng

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of…

2090

Abstract

Purpose

The construction industry’s daily processes demand heavy data usage and communication between project participants to meet client requirements. Thus, the application of information technology in project implementation has been increasing in the construction sector (CS) lately. However, the same cannot be seen in public sectors responsible for implementing government projects in South Africa. This study aimed to investigate the causes and effects of the underutilisation of information communication technology (ICT) in the building section of a public sector in a municipality in South Africa.

Design/methodology/approach

A qualitative approach was adopted for the study, using a public sector in one of the municipalities as a case study. Face-to-face interviews were conducted among the building unit workers, using unstructured interview questions. The data collected were analysed using the ATLAS.ti software.

Findings

The findings indicate a lack of understanding of existing and newly available ICT software and hardware technology among staff within the building technology due to lack of digitalisation in construction projects implementation, inadequate system upgrades, lack of adequate ICT resources, lack of financial resources for internet and software application subscriptions and lack of ICT training leading. The issues mentioned above have led to the outsourcing of projects professionals, slow pace of electronic emails, untrained professionals, usage of different and unlicensed software, resulting in the underutilisation of ICT within the whole building section. This change also adversely affects all officials, especially the junior officials who have graduated using the most recent ICT technology during their studies.

Research limitations/implications

The building department of only one public sector was used for the study; therefore, the findings may not be generalisable. The case study public sector’s name is withheld for confidentiality purposes.

Practical implications

Adequate change management and continuous development, combined with the allocation of proper resources, would be necessary for all staff members. Enormous investments had to be made in the ICT equipment by providing a sufficient budget in the building section of the public sectors. The building section within public sectors should provide change management to all aged skills staff by attending seminars to learn new ICT technology applied within its work environment.

Originality/value

The study established the causes of the underutilisation of ICT in the CS, especially in the public work departments and municipalities, and how this contributes to service delivery.

Details

Journal of Facilities Management , vol. 22 no. 1
Type: Research Article
ISSN: 1472-5967

Keywords

Open Access
Article
Publication date: 9 December 2019

Xiaoni Wang, Zhiwen Pan, Zhouxia Li, Wen Ji and Feng Yang

This paper aims to optimize and evaluating the performance of the crowd networks through analyzing their information sharing patterns. That is, in a crowd network, the qualities…

Abstract

Purpose

This paper aims to optimize and evaluating the performance of the crowd networks through analyzing their information sharing patterns. That is, in a crowd network, the qualities of accomplishing tasks are highly dependent on the effective information sharing among intelligent subjects within the networks. Hence, proposing an adaptive information-sharing approach can help improve the performance of crowd networks on accomplishing tasks that are assigned to them.

Design/methodology/approach

This paper first introduces the factors that affect effectiveness of information-sharing pattern: the network topology, the resources owned by intelligent subjects and the degree of information demand. By analyzing the correlation between these factors and the performance of crowd networks, an Adaptive Information Sharing Approach for Crowd Networks (AISCN approach) is proposed. By referring to information needed for accomplishing the historical tasks that are assigned to a crowd network, the AISCN approach can explore the optimized information-sharing pattern based on the predefined composite objective function. The authors implement their approach on two crowd networks including bee colony and supply chain, to prove the effectiveness of the approach.

Findings

The shared information among intelligent subjects affects the efficiency of task completion in the crowd network. The factors that can be used to describe the effectiveness of information-sharing patterns include the network topology, the resources owned by intelligent subjects and the degree of information demand. The AISCN approach used heuristic algorithm to solve a composite objective function which takes all these factors into consideration, so that the optimized information-sharing pattern can be obtained.

Originality/value

This paper introduces a set of factors that can be used to describe the correlation between information-sharing pattern and performance of crowd network. By quantifying such correlation based on these factors, this paper proposes an adaptive information-sharing approach which can explore the optimized information-sharing pattern for a variety of crowd networks. As the approach is a data-driven approach that explores the information-sharing pattern based on the network’s performance on historical tasks and network’s characteristics, it is adaptive to the dynamic change (change of incoming tasks, change of network characteristics) of the target crowd network. To ensure the commonality of the information-sharing approach, the proposed approach is not designed for a specific optimization algorithm. In this way, during the implementation of the proposed approach, heuristic algorithms can be chosen according to the complexity of the target crowd network.

Details

International Journal of Crowd Science, vol. 3 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Open Access
Article
Publication date: 18 July 2022

Youakim Badr

In this research, the authors demonstrate the advantage of reinforcement learning (RL) based intrusion detection systems (IDS) to solve very complex problems (e.g. selecting input…

1266

Abstract

Purpose

In this research, the authors demonstrate the advantage of reinforcement learning (RL) based intrusion detection systems (IDS) to solve very complex problems (e.g. selecting input features, considering scarce resources and constrains) that cannot be solved by classical machine learning. The authors include a comparative study to build intrusion detection based on statistical machine learning and representational learning, using knowledge discovery in databases (KDD) Cup99 and Installation Support Center of Expertise (ISCX) 2012.

Design/methodology/approach

The methodology applies a data analytics approach, consisting of data exploration and machine learning model training and evaluation. To build a network-based intrusion detection system, the authors apply dueling double deep Q-networks architecture enabled with costly features, k-nearest neighbors (K-NN), support-vector machines (SVM) and convolution neural networks (CNN).

Findings

Machine learning-based intrusion detection are trained on historical datasets which lead to model drift and lack of generalization whereas RL is trained with data collected through interactions. RL is bound to learn from its interactions with a stochastic environment in the absence of a training dataset whereas supervised learning simply learns from collected data and require less computational resources.

Research limitations/implications

All machine learning models have achieved high accuracy values and performance. One potential reason is that both datasets are simulated, and not realistic. It was not clear whether a validation was ever performed to show that data were collected from real network traffics.

Practical implications

The study provides guidelines to implement IDS with classical supervised learning, deep learning and RL.

Originality/value

The research applied the dueling double deep Q-networks architecture enabled with costly features to build network-based intrusion detection from network traffics. This research presents a comparative study of reinforcement-based instruction detection with counterparts built with statistical and representational machine learning.

Open Access
Article
Publication date: 28 June 2023

Vladimirs Reiskarts and Konstantins Savenkovs

This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and…

Abstract

Purpose

This study aims to explore the need for highly technological complexes for control and monitoring, as well as, new concepts and methodologies for maritime resource exploration and exploitation, which are in great demand nowadays.

Design/methodology/approach

This paper provides an analysis of demand, means of creation and development of the methodology and infrastructure for global monitoring, pollution control and supervision of smart systems for activities in exploration, future resource exploitation in deep-water and coastal areas based on Smarthub architecture, Unmanned Aircraft System (UAS), Continuous Acquisition and Life-Cycle Support (CALS) and Blockchain technologies.

Findings

Observational, experimental, simulation, derivational, hybrid descriptive and analytical models, as well as, surrogate models were created, analyzed and implemented for assigned tasks realization. Concept of distributed system for marine environmental monitoring, control and supervising as pilot technology in the context of Technology Readiness Levels (TRL) 3–5 was designed and evaluated.

Originality/value

The activities described in this article should be realized in the design and development of a complex, reliable, robust and sustainable monitoring and inspection system for the control and evaluation of the impact and risk assessment of the exploration and future exploitation of maritime resources.

Details

Marine Economics and Management, vol. 6 no. 1
Type: Research Article
ISSN: 2516-158X

Keywords

Open Access
Article
Publication date: 13 January 2020

Claudia Lizette Garay-Rondero, Jose Luis Martinez-Flores, Neale R. Smith, Santiago Omar Caballero Morales and Alejandra Aldrette-Malacara

The purpose of this paper is to present a conceptual model that defines the essential components shaping the new Digital Supply Chains (DSCs) through the implementation and…

47380

Abstract

Purpose

The purpose of this paper is to present a conceptual model that defines the essential components shaping the new Digital Supply Chains (DSCs) through the implementation and acceleration of Industry 4.0.

Design/methodology/approach

The scope of the present work exposes a conceptual approach and review of the key literature from 1989 to 2019, concerning the evolution and transformation of the actors and constructs in logistics and Supply Chain Management (SCM) by means of examining different conceptual models and a state-of-the-art review of Industry 4.0’s concepts and elements, with a focus on digitization in supply chain (SC) processes. A detailed study of the constructs and components of SCM, as defined by their authors, resulted in the development of a referential and systematic model that fuses the inherent concepts and roles of SCM, with the new technological trends directed toward digitization, automation, and the increasing use of information and communication technologies across logistics global value chains.

Findings

Having achieved an exploration of the different conceptual frameworks, there is no compelling evidence of the existence of a conceptual SCM that incorporates the basic theoretical constructs and the new roles and elements of Industry 4.0. Therefore, the main components of Industry 4.0 and their impact on DSC Management are described, driving the proposal for a new conceptual model which addresses and accelerates a vision of the future of the interconnectivity between different DSCs, grouped in clusters in order to add value, through new forms of cooperation and digital integration.

Originality/value

This research explores the gap in the current SCM models leading into Industry 4.0. The proposed model provides a novel and comprehensive overview of the new concepts and components driving the nascent and current DSCs. This conceptual framework will further aid researchers in the exploration of knowledge regarding the variables and components presented, as well as the verification of the newly revealed roles and constructs to understand the new forms of cooperation and implementation of Industry 4.0 in digitalized SCs.

Details

Journal of Manufacturing Technology Management, vol. 31 no. 5
Type: Research Article
ISSN: 1741-038X

Keywords

Open Access
Article
Publication date: 1 May 2023

Veronica Johansson and Maria Lindh

The purpose of this paper is to describe and explore the current state of internet regulation through content filters in Swedish public libraries.

Abstract

Purpose

The purpose of this paper is to describe and explore the current state of internet regulation through content filters in Swedish public libraries.

Design/methodology/approach

Data was collected through an electronic survey directed to library managers of Sweden’s 290 main municipal libraries. 164 answers were returned, yielding a 57% response rate. The analysis comprises descriptive statistics for quantitative data and an activity theory approach with focus on contradictions for qualitative counterparts.

Findings

In total, 33% of the responding libraries report having content filters; 50% have not; and a surprising 18% do not know. There is a strong correlation between internet misuse and positive attitudes towards filters, and, reversely, between lack of misuse and lack of active stances concerning filters. Rather than seeing this as weakness, the authors suggest that there is strength in a context-bound flexibility open to practical experience and weighting of values, ethics, legislation and local circumstances. More troublesome indications concern the high deferral of decision-making to local authorities (municipalities) whereby libraries are left with limited insight and influence.

Research limitations/implications

The situation calls for professional organisations to address political mandate questions, and educational programs to strengthen future information professionals’ knowledge of IT in general; filter issues in specific; and local authority decision-making. The study highlights the need of adequate information professional competences and mandates to decide on and oversee internet regulation.

Originality/value

To the best of the authors’ knowledge, this is the first internationally published study on content filters in Swedish public libraries.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 3
Type: Research Article
ISSN: 1477-996X

Keywords

Open Access
Book part
Publication date: 4 May 2018

Syahril Efendi, Baihaqi Siregar and Heru Pranoto

Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry…

Abstract

Innovation in a decentralized blockchain infrastructure can be used by medicine as a prerequisite for the exchange of patient data. Developments in the medical device industry that support the technology of the internet of things and wireless sensor networks also facilitate the examination of patient medical records that no longer require visits to the practice of doctors or hospitals which in some cases takes in a considerable time. Not to mention the consideration of traffic congestion and busy routine in the work. Patients can check their healthcare concerns using only sensors such as e-Health Sensor Shield Platform which then sends recording results through the transmission line to the data lakes. However, this patient’s medical record data is very confidential and may only be accessed by certain parties only. This required the design of the concept of security in the transmission of data so that the data does not leak to parties who are not eligible. This paper attempts to provide an overview of the concept of using encryption with an asymmetric key for securing data from sensors to data lakes before forwarding to a decentralized, interconnected blockchain infrastructure.

1 – 10 of over 3000