Search results

1 – 10 of over 45000
Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

Article
Publication date: 1 December 1994

Roger Clarke

Many information systems involve data about people. In order reliably toassociate data with particular individuals, it is necessary that aneffective and efficient identification

5385

Abstract

Many information systems involve data about people. In order reliably to associate data with particular individuals, it is necessary that an effective and efficient identification scheme be established and maintained. There is remarkably little in the information technology literature concerning human identification. Seeks to overcome that deficiency by undertaking a survey of human identity and human identification. Discusses techniques including names, codes, knowledge‐based and token‐based identification, and biometrics. Identifies the key challenge to management as being to devise a scheme which is practicable and economic, and of sufficiently high integrity to address the risks the organization confronts in its dealings with people. Proposes that much greater use be made of schemes which are designed to afford people anonymity, or which enable them to use multiple identities or pseudonyms, while at the same time protecting the organization′s own interest. Describes multi‐purpose and inhabitant registration schemes, and notes the recurrence of proposals to implement and extend them. Identifies public policy issues. Of especial concern is the threat to personal privacy that the general‐purpose use of an inhabitant registrant scheme represents. Speculates that, where such schemes are pursued energetically, the reaction may be strong enough to threaten the social fabric.

Details

Information Technology & People, vol. 7 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 2022

Jonathan Peterson, Loubna Tahssain-Gay and Benraiss-Noailles Laila

This paper examines antecedents to perceived injustice in exclusive talent identification practices.

1068

Abstract

Purpose

This paper examines antecedents to perceived injustice in exclusive talent identification practices.

Design/methodology/approach

31 in-depth interviews with individuals working in for-profit organizations in France were conducted and analyzed. Interviewees represented a variety of sectors such as transportation, aerospace, energy and telecommunications.

Findings

The use of exclusivity in talent identification influences perceived organizational justice through ambiguous advancement policies, support from hidden networks, lack of diversity in the talent identification process, frequent gender discrimination, and premature labeling of talent. These practices suggest breaches in procedural, distributive and interactional justice by allocating advantages to some employees over others. Exclusivity yielded frustration, jealousy and potential retaliatory behavior against those individuals deemed to be unfairly identified as talent.

Practical implications

The challenge of ensuring fair and equitable talent identification is a growing issue for organizations. For managers, it requires paying close attention to how some forms of exclusivity in talent identification may create unfair treatment of employees.

Originality/value

While organizational justice research focuses on the background and practices that promote justice, our research finds its originality in examining the sentiments of injustice that remain contextual, subjective and comparative.

Details

Employee Relations: The International Journal, vol. 44 no. 6
Type: Research Article
ISSN: 0142-5455

Keywords

Article
Publication date: 1 March 2000

Douglas Telford

Growing needs for identification of small items for tracking and traceability purposes have led to the development of encoding structures known as matrix codes, capable of…

Abstract

Growing needs for identification of small items for tracking and traceability purposes have led to the development of encoding structures known as matrix codes, capable of containing machine‐readable data. Describes practical applications for two particular types of high‐density code, the Data Matrix code and the DMT code. The applications relate to needs within the electronics industry, the automotive industry, and the aerospace industry. Through these examples an approach is presented for selecting appropriate codes and marking methods for given applications. The two codes considered, although both high‐density structures, exhibit different features. These are examined as a basis for considering their suitability for the various applications. Later in the paper the codes are discussed, along with the methods of printing and/or realising them in direct‐marking form.

Details

Assembly Automation, vol. 20 no. 1
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 26 October 2012

Li Shouwei and Mei Qiang

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Abstract

Purpose

This paper attempts to construct a public‐key coding system using grey generation and braid group.

Design/methodology/approach

The identification (ID) codes of both sides for communication are public for everyone and considered as public keys. Starting from the ID code of both sides of communication, the temporary secret key of communication can be obtained by the grey 1‐AGO algorithm first. Then the new formal common secret key can be obtained by using the element exchangeability of the braid group during the exchanging process of the temporary secret key between two sides of communication. The paper presents an exchange protocol of secret key based on grey data generation and braid group. It also constructs a cipher communication system by using Hash function based on the exchange protocol of secret key last.

Findings

The exchange protocol of secret key and the system of cipher communication which are proposed in this paper make use of the difficult problem of resolving disper se logarithm from generated code to ID code and the conjugate problem which is not ever resolved in braid group, which can ensure the security of the algorithm theoretically.

Practical implications

The main steps of the exchange protocol and cipher communication system in this paper can be achieved through a computer program. They can be used in many communication processes on the internet.

Originality/value

The paper succeeds in realising both secret key generation and exchanging protocol of communication by using grey systems theory and braid group properties.

Details

Grey Systems: Theory and Application, vol. 2 no. 3
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 9 January 2024

Zhuoyu Zhang, Lijia Zhong, Mingwei Lin, Ri Lin and Dejun Li

Docking technology plays a crucial role in enabling long-duration operations of autonomous underwater vehicles (AUVs). Visual positioning solutions alone are susceptible to…

Abstract

Purpose

Docking technology plays a crucial role in enabling long-duration operations of autonomous underwater vehicles (AUVs). Visual positioning solutions alone are susceptible to abnormal drift values due to the challenging underwater optical imaging environment. When an AUV approaches the docking station, the absolute positioning method fails if the AUV captures an insufficient number of tracers. This study aims to to provide a more stable absolute position visual positioning method for underwater terminal visual docking.

Design/methodology/approach

This paper presents a six-degree-of-freedom positioning method for AUV terminal visual docking, which uses lights and triangle codes. The authors use an extended Kalman filter to fuse the visual calculation results with inertial measurement unit data. Moreover, this paper proposes a triangle code recognition and positioning algorithm.

Findings

The authors conducted a simulation experiment to compare the underwater positioning performance of triangle codes, AprilTag and Aruco. The results demonstrate that the implemented triangular code reduces the running time by over 70% compared to the other two codes, and also exhibits a longer recognition distance in turbid environments. Subsequent experiments were carried out in Qingjiang Lake, Hubei Province, China, which further confirmed the effectiveness of the proposed positioning algorithm.

Originality/value

This fusion approach effectively mitigates abnormal drift errors stemming from visual positioning and cumulative errors resulting from inertial navigation. The authors also propose a triangle code recognition and positioning algorithm as a supplementary approach to overcome the limitations of tracer light positioning beacons.

Details

Industrial Robot: the international journal of robotics research and application, vol. 51 no. 2
Type: Research Article
ISSN: 0143-991X

Keywords

Article
Publication date: 1 April 2014

P.B. Ahamed Mohideen and M. Ramachandran

The purpose of this paper is to develop a systematic strategic approach to handle corrective maintenance onto the failures/breakdowns of construction equipment. For the…

1166

Abstract

Purpose

The purpose of this paper is to develop a systematic strategic approach to handle corrective maintenance onto the failures/breakdowns of construction equipment. For the maintenance crew/team, a breakdown code management is proposed, which will provide focused and unambiguous approach to manage any kind of breakdowns in construction equipments.

Design/methodology/approach

The past breakdown records of a construction organization in the UAE are considered for analysis. From the failure data, through cause effect analysis (CEA) tools, the components and the breakdown codes namely breakdown main codes (BMC) and breakdown sub-codes (BSC) are formulated. With Pareto analysis, the critical codes are identified and validated through failure modes and effects analyses (FMEA) tools for the critical effect on the affected components. From this identified BSC's further closer failure identification codes namely breakdown symptom codes (BSyC) and breakdown reason codes (BRC) are identified through fault tree analysis (FTA) tools. The approach to modified breakdown maintenance management (MB2M) with breakdown maintenance protocol (BMP) is envisaged.

Findings

The study was conducted on four different types of heavy lifting/earth moving/material handling system of equipment and further focused with two earth moving equipment namely dumpers and wheel loaders. Failure analysis is performed and the failure ratio and the component contribution to the failures are identified. Based on the information, the preliminary codes namely BMC and BSC are identified through CEA tools and the BMC and BSC are identified to find the most contributing codes to the maximum number of failures through Pareto analysis. Further the critical sub-codes are further verified through FMEA tools on the severity levels of the sub components due to these codes. The FTA methods are used to identify the closer reasoning and relations of these codes and the further codes namely BSyC and BRC are identified which are the exact cause of the failures. The management of breakdowns is further proposed through MB2M which includes BMP which provides all resources for the breakdowns.

Research limitations/implications

The failure data collected are only pertaining to the Middle East region and applicable to similar regions for similar plant mix in construction companies. The sample equipment is only part representative of the construction equipment. A more robust model can be suggested in the future covering all aspects and for other regions as well.

Practical implications

The proposed methodology and model approach is highly adaptable to similar industries operating in the Middle East countries.

Originality/value

Many authors have studied the preventive maintenance models and procedures and proposals have been proposed. On the breakdown maintenance management of construction equipment, very few studies have been proposed mostly on the cost analysis. This model attempts to provide a code management solution to manage the unpredictable failures in construction equipment through failure data analysis on a construction organization.

Details

Benchmarking: An International Journal, vol. 21 no. 2
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 1 March 2002

Kees‐Jan van Dorp

Although government and business interest in tracking and tracing has grown enormously over the last decade, a clear and coherent overview of the topic is still lacking and is not…

4915

Abstract

Although government and business interest in tracking and tracing has grown enormously over the last decade, a clear and coherent overview of the topic is still lacking and is not found in (logistics) literature. This article presents a structure for development and contemporary practices of tracking and tracing. The development structure is conceptualised by three supply‐chain layers: item coding (the physical layer), information architecture (the information layer); and planning and control (the control layer). On behalf of tracking and tracing, the layers represent different levels of supply‐chain integration. The conceptualisation is derived from similar ideas found in literature on supply‐chain management. From a scientific point of view, the structure provides a coherent and systematic organisation of tracking and tracing concepts. From the viewpoint of business administration, the structure facilitates the determination of the scope of tracking and tracing application(s), which is of management value.

Details

Logistics Information Management, vol. 15 no. 1
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 2 August 2021

Abba Tahir Mahmud, Stephen O. Ogunlana and W.T. Hong

Empirical evidence suggests that many triggers influence poor cost performance in highway projects, whereas previous studies about the cost overrun triggers stem from a positivist…

Abstract

Purpose

Empirical evidence suggests that many triggers influence poor cost performance in highway projects, whereas previous studies about the cost overrun triggers stem from a positivist standpoint supported by conventional statistical techniques, thus disregarding the sophisticated interactions and overall dynamics of the triggers. This study contends for a paradigm shift in investigating and understanding cost overrun triggers by adopting a holistic perspective through the lens of system thinking. This study aims to contend for a paradigm shift in investigating and understanding cost overrun triggers by adopting a holistic perspective through the lens of system thinking.

Design/methodology/approach

Semi-structured interviews with industry stakeholders in Nigeria were conducted buttressed by textual data from literature sources and project documents. Data analysis based on a developed data compatible coding framework and causal relations from textual data sources was used to develop a causal loop diagram depicting the interactions of the triggers which were validated by experts.

Findings

The analysis of the causal loop diagrams (CLDs) allowed identification of action points used to suggest changes for improved cost-effective highway project delivery. Among the suggested interventions are ensuring the provision of adequate funding prior to contract award will result in timely delivery of projects and indeed delivering key projects at the contractual agreed budget. This can be achieved through ensuring strict adherence to the provisions of Section 4 (2) (b) of the Nigerian Public Procurement Act, 2007 which stipulates that no contract should be awarded if funds are not available from the onset.

Research limitations/implications

The study was limited to only highway infrastructure projects in Nigeria and as such caution must be taken before using the outcome of the study to other context within Nigeria and beyond.

Practical implications

From a practical point of view, the causal model demonstrates that this study is capable of being used to make pragmatic decisions regarding policy leverages about improving cost performance in highway projects provision in the Nigerian highway infrastructure sector of the construction industry. Moreover, it will aid a clear understanding of the key influencing triggers of cost overrun by the relevant stakeholders within the highway sector of the industry.

Originality/value

The hybrid-based approach applied in the development of CLDs in this study is expected to provide new insight into understanding the linkages, interactions, feedbacks and processes among the key cost overrun triggers and suggesting leverages for cost performance improvement within the philosophy of system thinking.

Details

Journal of Financial Management of Property and Construction , vol. 27 no. 1
Type: Research Article
ISSN: 1366-4387

Keywords

Book part
Publication date: 21 March 2003

A.Alexandra Michel and Karen E Jehn

This chapter describes a two-year comparative study in two investment banking departments that investigated the relationship between identification, shared cognition, and group…

Abstract

This chapter describes a two-year comparative study in two investment banking departments that investigated the relationship between identification, shared cognition, and group performance. The data replicates previous research that found a positive relationship between group members’ subjective experience of unity with their group, shared cognition, and group performance. However, in contrast to previous research, we found that identification did not facilitate but undermined such a subjective experience of unity. Identification, therefore, impeded shared cognition and group performance, as compared to an alternative way in which bankers experienced unity that we refer to as direct involvement.

Details

Identity Issues in Groups
Type: Book
ISBN: 978-1-84950-168-2

1 – 10 of over 45000