Search results for "Software deployment"

showing 10 items of 150 documents

PASSI: Process for Agent Societies Specification and Implementation

2014

PASSI (a Process for Agent Societies Specification and Implementation) is a step-by-step requirement-to-code methodology for designing and developing multiagent societies, integrating design models and concepts from both Object-Oriented software engineering and artificial intelligence approaches using the UML notation. The models and phases of PASSI encompass anthropomorphic representation of system requirements, social viewpoint, solution architecture, code production and reuse, and deployment configuration supporting mobility of agents. PASSI is made up of five models, concerning different design levels, and 12 activities performed to build multiagent systems. In PASSI, the UML notation i…

EngineeringModeling languagebusiness.industryProcess (engineering)Multi-agent systemSolution architectureDesign process IEEE-FIPA standardSystem requirementsSequence diagramSoftware deploymentSystems engineeringClass diagrambusinessSoftware engineering
researchProduct

The SADC Standby Force and Its Regional Peacekeeping Training Centre: Uncertain Operational Readiness and Future of an Externally Fuelled Brigade

2017

This chapter offers a comprehensive explanation of why and how SADC countries engaged in military integration and put efforts in establishing a regional standby brigade with an associated peacekeeping training centre. This chapter pays special attention to the impact of extra-regional actors and donors’ funding in this regard since the development of the SADC Standby Force occurs at a time when the region lacks an actual external threat. Instead, the African Union, together with the EU, provides financial incentives and thus promotes the build-up of a SADC brigade. The EU’s external influence, however, has been ambivalent insofar as a freezing of donations paralysed the operational capacity…

EngineeringOperational readinessFinancial incentivesSoftware deploymentEconomic policybusiness.industryOperations managementbusinessTraining (civil)Peacekeeping
researchProduct

Problems in the interplay of development and IT operations in system development projects: A Delphi study of Norwegian IT experts

2011

ContextThe assumption of the presented work is that the ability of system developers and IT operations personnel to cooperate effectively in system development projects has great impact on the quality of the final system solution, as well as on the service level of its subsequent operation. ObjectiveThe present research explores the interplay of system development and IT operations and the challenges they are meeting. We are especially interested in identifying problems encountered between these two parties in system development projects. MethodWe identify and rank problems by using a ranking-type Delphi study. We involved 42 Norwegian IT experts and split them into three expert panels: sys…

EngineeringProcess managementbusiness.industrymedia_common.quotation_subjectDelphi methodSoftware requirements specificationInformation technology operationsComputer Science ApplicationsSoftware deploymentBrainstormingSystems engineeringQuality (business)Information flow (information theory)businessRequirements analysisSoftwareInformation Systemsmedia_commonInformation and Software Technology
researchProduct

Strategic Priorities and Lean Manufacturing Practices in Automotive Suppliers. Ten Years After

2011

Currently, automobile manufacturers have transformed their philosophy of production in favour of the lean manufacturing paradigm. By doing so, they hope to improve efficiency and to obtain better results in the markets in which they operate. This transformation must occur not only in their plants, but it seems important that their suppliers should also modify their production systems in line with the lean manufacturing philosophy (Liker & Wu, 2000; Morris et al., 2006; Oliver & Delbridge, 2002). The effects of this wave will probably result that one integrated supply chain can be built. Supply companies can see benefits from the implantation of lean manufacturing practices in certain of the…

EngineeringProcess managementbusiness.industrymedia_common.quotation_subjectSupply chainAutomotive industryLean manufacturingManufacturing engineeringLean project managementSoftware deploymentHuman resource managementProduction (economics)Quality (business)businessmedia_common
researchProduct

PAUT inspection of complex-shaped composite materials through six DOFs robotic manipulators

2015

The requirement to increase inspection speeds for the non-destructive testing (NDT) of composite aerospace parts is common to many manufacturers. The prevalence of complex curved surfaces in the industry provides significant motivation for the use of six-axis robots for the deployment of NDT probes in these inspections. The IntACom project, developed by TWI Technology Centre (Wales) and supported by a number of major aerospace partners and the Welsh government, has produced a prototype robotic NDT system. The prototype system is capable of inspecting complex-geometry composite components with great time savings. Two six-axis robotic arms deploy end effectors carrying phased array ultrasonic…

Engineeringbusiness.industryMechanical EngineeringMetals and AlloysMechanical engineeringCompositeIntAComRobot end effectorPhased array ultrasonicslaw.inventionRoboticNDTSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineMechanics of MaterialslawSoftware deploymentNondestructive testingMaterials ChemistrySystems engineeringPath-planningRobotAerospacebusinessRobotic armGraphical user interface
researchProduct

Supporting Mobile Virtual Team’s Coordination with SOA-Based Active Entities

2007

The use of IT solutions to support preparedness, response and recovery process has been envisioned as a possible way to improve the support for collaboration among the actors participating in mobile teams operating under constrained scenarios. Software applications supporting mobility have typically been conceived as functional extensions of centralized enterprise systems hosted on corporate servers. However, in this work, we focus on those mobile scenarios which go one step further in terms of interoperability requirements. This proposal aims to support the design, deployment and execution of ad-hoc collaborative business processes (workflows) in mobile networks, operating under constraine…

Enterprise systemProcess managementKnowledge managementBusiness processSoftware deploymentbusiness.industryServerCollaborative networkInteroperabilityVirtual teamMobile business developmentBusiness
researchProduct

Remaining useful life estimation of HMPE rope during CBOS testing through machine learning

2021

Fibre rope used in cranes for offshore deployment and recovery has significant potential to perform lifts with smaller cranes and vessels to reach depths limited by weight of steel wire rope. Current condition monitoring methods based on manual inspection and time-based and reactive maintenance have significant potential for improvement coupled with more accurate remaining useful life (RUL) prediction. Machine learning has found use as a condition monitoring approach, coupled with vast improvements in data acquisition methods. This paper details data-driven RUL prediction methods based on machine learning algorithms applied on cyclic-bend-over-sheave (CBOS) tests performed on two fibre rope…

Environmental EngineeringArtificial neural networkbusiness.industryComputer scienceCondition monitoringOcean EngineeringWire ropeengineering.materialMachine learningcomputer.software_genreRandom forestSupport vector machineVDP::Teknologi: 500Data acquisitionSoftware deploymentengineeringArtificial intelligencebusinesscomputerRope
researchProduct

Switched Ethernet Networking over LEO Satellite

2005

Satellite onboard switching capabilities, and their possibility to enable "over-the-air" networks, are a strongly innovative achievement of modern satellite communication. The exploitation of satellite networking is especially relevant in the case of low Earth orbit satellites (LEO), where the reduced latency makes a LEO mesh network highly appealing and competitive with terrestrial solutions also in terms of performance. However, while the idea of a LEO mesh network is well understood, we are far from an ultimate answer on which is the best and more appropriate networking solution for moving LEO satellite network nodes. This paper promotes the adoption of existing layer-2 networking soluti…

EthernetSpanning treebusiness.industryComputer scienceVirtual LANSettore ING-INF/03 - TelecomunicazioniMesh networkinglaw.inventionInteroperationSoftware deploymentlawCommunications satelliteSatellitebusinessComputer network
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct