Search results
1 – 10 of over 14000Albert Vasso, Richard Cobb, John Colombi, Bryan Little and David Meyer
The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an…
Abstract
Purpose
The US Government is challenged to maintain pace as the world’s de facto provider of space object cataloging data. Augmenting capabilities with nontraditional sensors present an expeditious and low-cost improvement. However, the large tradespace and unexplored system of systems performance requirements pose a challenge to successful capitalization. This paper aims to better define and assess the utility of augmentation via a multi-disiplinary study.
Design/methodology/approach
Hypothetical telescope architectures are modeled and simulated on two separate days, then evaluated against performance measures and constraints using multi-objective optimization in a heuristic algorithm. Decision analysis and Pareto optimality identifies a set of high-performing architectures while preserving decision-maker design flexibility.
Findings
Capacity, coverage and maximum time unobserved are recommended as key performance measures. A total of 187 out of 1017 architectures were identified as top performers. A total of 29% of the sensors considered are found in over 80% of the top architectures. Additional considerations further reduce the tradespace to 19 best choices which collect an average of 49–51 observations per space object with a 595–630 min average maximum time unobserved, providing redundant coverage of the Geosynchronous Orbit belt. This represents a three-fold increase in capacity and coverage and a 2 h (16%) decrease in the maximum time unobserved compared to the baseline government-only architecture as-modeled.
Originality/value
This study validates the utility of an augmented network concept using a physics-based model and modern analytical techniques. It objectively responds to policy mandating cataloging improvements without relying solely on expert-derived point solutions.
Details
Keywords
Space as a domain of warfare.
Details
DOI: 10.1108/OXAN-DB252511
ISSN: 2633-304X
Keywords
Geographic
Topical
Larissa Statsenko, Ruchini Senarath Jayasinghe and Claudine Soosay
This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive…
Abstract
Purpose
This study aims to investigate supply network (SN) resilience capabilities across the organizational, supply chain (SC) and industry levels by drawing on the complex adaptive systems (CASs) theory and the social–ecological perspective of resilience. An empirically grounded framework operationalizes the concept of social–ecological resilience by expounding resilience capabilities across phases of the CAS adaptive cycle.
Design/methodology/approach
This research uses a qualitative multiple case study approach. It draws on the case of the Australian Defence Manufacturing SN (ADM SN) during COVID-19 disruptions. A total of 28 interviews with senior decision makers from 17 companies, complemented by 5 interviews with the Australian Defence SC organizations and secondary data analysis, support the findings.
Findings
Individual organizations’ SC visibility and flexibility enabled by effective risk management and collaboration enhance the ability of the SN to anticipate and prepare for disruption. At the same time, the strength of SC relationships reduces resilience. SN disruption response velocity is enabled by inventory redundancy, process flexibility at the organizational level and visibility and collaboration at the SC level. Institutional support at the national industry level, development of value-adding capabilities and manufacturing process flexibility at the organizational level enhances the SN’s ability to re-organize. The transition from hierarchical to decentralized collaborative governance enhances SN resilience.
Practical implications
From a practitioner’s perspective, the findings highlight the need to embrace a broader view of SC beyond immediate tiers. Decision-makers in multinational companies must recognize the long-term impact of their procurement decisions on the supplier ecosystem. Developing local supplier capabilities rather than relying on established global SCs will pay off with future resilience. It, however, demands substantial investment and radical changes across all SC tiers. The lesson for smaller firms is not to over-rely on the existing relationships with supply partners. Although trust-based relationships and collaboration are essential, over-commitment can be counterproductive during global disruptions. With a lack of visibility and control over the SC, operational flexibility is critical for small firms to adapt to shifts in supply and demand.
Originality/value
To the best of the authors’ knowledge, this empirical research is one of the first attempts to operationalize the social–ecological perspective of SN resilience. Evidence-based theoretical propositions contribute to the emerging conversation about the CAS nature of resilience by demonstrating the multi-level effects of resilience capabilities.
Details
Keywords
To reflect on the matter of self‐consciousness.
Abstract
Purpose
To reflect on the matter of self‐consciousness.
Design/methodology/approach
The purpose is achieved through the process of answering four questions presented to me by Heinz von Foerster in the course of our many conversations.
Findings
It is not possible to understand the nature of self‐consciousness without understanding the operation of human beings as living systems that exist as emotional languaging living systems: self‐consciousness is a manner of living.
Practical implications
We human beings can become more aware of our responsibility in the design of robots that imitate us.
Originality/value
Reflects on what makes us humans special, on subjective experience, and on the world we bring forth.
Details
Keywords
Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu
A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.
Abstract
Purpose
A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.
Design/methodology/approach
First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.
Findings
Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.
Originality/value
Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.
Details
Keywords
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with…
Abstract
Purpose
Pervasive computing environments such as a pervasive campus domain, shopping, etc. will become commonplaces in the near future. The key to enhance these system environments with services relies on the ability to effectively model and represent contextual information, as well as spontaneity in downloading and executing the service interface on a mobile device. The system needs to provide an infrastructure that handles the interaction between a client device that requests a service and a server which responds to the client's request via Web service calls. The system should relieve end‐users from low‐level tasks of matching services with locations or other context information. The mobile users do not need to know or have any knowledge of where the service resides, how to call a service, what the service API detail is and how to execute a service once downloaded. All these low‐level tasks can be handled implicitly by a system. The aim of this paper is to investigate the notion of context‐aware regulated services, and how they should be designed, and implemented.
Design/methodology/approach
The paper presents a detailed design, and prototype implementation of the system, called mobile hanging services (MHS), that provides the ability to execute mobile code (service application) on demand and control entities' behaviours in accessing services in pervasive computing environments. Extensive evaluation of this prototype is also provided.
Findings
The framework presented in this paper enables a novel contextual services infrastructure that allows services to be described at a high level of abstraction and to be regulated by contextual policies. This contextual policy governs the visibility and execution of contextual services in the environment. In addition, a range of contextual services is developed to illustrate different types of services used in the framework.
Originality/value
The main contribution of this paper is a high‐level model of a system for context‐aware regulated services, which consists of environments (domains and spaces), contextual software components, entities and computing devices.
Details
Keywords
The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and…
Abstract
Purpose
The purpose of this paper is to explore the value of utilising a holistic ergonomic approach, covering engineering, cognitive and social perspectives, to cultivate beneficial and productive collaborative information seeking (CIS) systems and environments, specifically with regard to three main CIS pillars (control, communication and awareness).
Design/methodology/approach
A qualitative research approach, based on a selective corpus of CIS literature, was utilised to perform a content analysis to note if terms and concepts normally associated with engineering, cognitive and social ergonomics can be used to eliminate terms reflecting issues related to three CIS pillars (control, communication and awareness) that can benefit from a holistic ergonomic approach.
Findings
The content analysis revealed that a fairly extensive amount of holistic ergonomic terminology is prominent within the CIS literature, therefore establishing a connection between the two disciplines: CIS and ergonomics. This suggests that CIS system issues could benefit from the insights of a holistic ergonomic approach.
Research limitations/implications
Since this is an exploratory study the scope of CIS literature utilised in the content analysis was limited to a selection considered most important by the authors; this should be supplemented by further research.
Practical implications
Intended to instigate interest in further exploration of the beneficial and productive implications and practical application of holistic ergonomics in designing CIS systems and environments.
Originality/value
This is the first research paper in the Library and Information Science literature that explores the potential of utilising holistic ergonomics to cultivate CIS systems and environments.
Details
Keywords
Noluxolo Gcaza, Rossouw von Solms, Marthie M. Grobler and Joey Jansen van Vuuren
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks…
Abstract
Purpose
The purpose of this paper is to define and delineate cyber security culture. Cyber security has been a concern for many years. In an effort to mitigate the cyber security risks, technology-centred measures were deemed to be the ultimate solution. Nowadays, however, it is accepted that the process of cyber security requires much more than mere technical controls. On the contrary, it now demands a human-centred approach, including a cyber security culture. Although the role of cultivating a culture in pursuing cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined.
Design/methodology/approach
General morphological analysis (GMA) is used to define, structure and analyse the cyber security environment culture.
Findings
This paper identifies the most important variables in cultivating a cyber security culture.
Research implications
The delineation of the national cyber security domain will contribute to the relatively new domain of cyber security culture. They contribute to the research community by means of promoting a shared and common understanding of terms. It is a step in the right direction towards eliminating the ambiguity of domain assumptions.
Practical implications
Practically, the study can assist developing nations in constructing strategies that addresses the key factors that need to be apparent in lieu to cultivating its envisaged national culture of cyber security. Additionally, the GMA will contribute to the development of solutions or means that do not overlook interrelations of such factors.
Originality/value
Delineating and defining the cyber security culture domain more precisely could greatly contribute to realizing the elements that collectively play a role in cultivating such a culture for a national perspective.
Details