Search results for "deployment"

showing 10 items of 173 documents

The Contribution of TQM to Organizational Ambidexterity: The State of the Art and Promising Research Streams

2015

The purpose of this chapter is to present the state of the art of research on the impact of TQM implementation on organizational ambidexterity. The widespread diffusion of TQM in organizations in all sectors and the already established importance of ambidextrous capability for achieving long-term competitiveness make understanding the connection between both fields a worthwhile objective. We underline the need to include in the analysis the broad and complex nature of TQM. Due to the interactions between its principles and practices, total quality management can act as a platform in creating an ambidextrous organizational context. We also underline the importance of clarity in research on t…

EngineeringQuality managementTotal quality managementKnowledge managementbusiness.industrymedia_common.quotation_subjectResearch streamlaw.inventionState (polity)lawOrganizational contextCLARITYbusinessQuality function deploymentAmbidexteritymedia_common
researchProduct

PAUT inspection of complex-shaped composite materials through six DOFs robotic manipulators

2015

The requirement to increase inspection speeds for the non-destructive testing (NDT) of composite aerospace parts is common to many manufacturers. The prevalence of complex curved surfaces in the industry provides significant motivation for the use of six-axis robots for the deployment of NDT probes in these inspections. The IntACom project, developed by TWI Technology Centre (Wales) and supported by a number of major aerospace partners and the Welsh government, has produced a prototype robotic NDT system. The prototype system is capable of inspecting complex-geometry composite components with great time savings. Two six-axis robotic arms deploy end effectors carrying phased array ultrasonic…

Engineeringbusiness.industryMechanical EngineeringMetals and AlloysMechanical engineeringCompositeIntAComRobot end effectorPhased array ultrasonicslaw.inventionRoboticNDTSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineMechanics of MaterialslawSoftware deploymentNondestructive testingMaterials ChemistrySystems engineeringPath-planningRobotAerospacebusinessRobotic armGraphical user interface
researchProduct

Supporting Mobile Virtual Team’s Coordination with SOA-Based Active Entities

2007

The use of IT solutions to support preparedness, response and recovery process has been envisioned as a possible way to improve the support for collaboration among the actors participating in mobile teams operating under constrained scenarios. Software applications supporting mobility have typically been conceived as functional extensions of centralized enterprise systems hosted on corporate servers. However, in this work, we focus on those mobile scenarios which go one step further in terms of interoperability requirements. This proposal aims to support the design, deployment and execution of ad-hoc collaborative business processes (workflows) in mobile networks, operating under constraine…

Enterprise systemProcess managementKnowledge managementBusiness processSoftware deploymentbusiness.industryServerCollaborative networkInteroperabilityVirtual teamMobile business developmentBusiness
researchProduct

Remaining useful life estimation of HMPE rope during CBOS testing through machine learning

2021

Fibre rope used in cranes for offshore deployment and recovery has significant potential to perform lifts with smaller cranes and vessels to reach depths limited by weight of steel wire rope. Current condition monitoring methods based on manual inspection and time-based and reactive maintenance have significant potential for improvement coupled with more accurate remaining useful life (RUL) prediction. Machine learning has found use as a condition monitoring approach, coupled with vast improvements in data acquisition methods. This paper details data-driven RUL prediction methods based on machine learning algorithms applied on cyclic-bend-over-sheave (CBOS) tests performed on two fibre rope…

Environmental EngineeringArtificial neural networkbusiness.industryComputer scienceCondition monitoringOcean EngineeringWire ropeengineering.materialMachine learningcomputer.software_genreRandom forestSupport vector machineVDP::Teknologi: 500Data acquisitionSoftware deploymentengineeringArtificial intelligencebusinesscomputerRope
researchProduct

Switched Ethernet Networking over LEO Satellite

2005

Satellite onboard switching capabilities, and their possibility to enable "over-the-air" networks, are a strongly innovative achievement of modern satellite communication. The exploitation of satellite networking is especially relevant in the case of low Earth orbit satellites (LEO), where the reduced latency makes a LEO mesh network highly appealing and competitive with terrestrial solutions also in terms of performance. However, while the idea of a LEO mesh network is well understood, we are far from an ultimate answer on which is the best and more appropriate networking solution for moving LEO satellite network nodes. This paper promotes the adoption of existing layer-2 networking soluti…

EthernetSpanning treebusiness.industryComputer scienceVirtual LANSettore ING-INF/03 - TelecomunicazioniMesh networkinglaw.inventionInteroperationSoftware deploymentlawCommunications satelliteSatellitebusinessComputer network
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Low-Power Wide-Area Networks for Sustainable IoT

2019

Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…

FOS: Computer and information sciencesComputer scienceComputer Science - Information Theory0805 Distributed Computing02 engineering and technologylaw.inventionComputer Science - Networking and Internet ArchitectureBluetoothGSMlaw1005 Communications Technologies0202 electrical engineering electronic engineering information engineeringBandwidth (computing)Resource managementElectrical and Electronic EngineeringNetworking and Internet Architecture (cs.NI)business.industryInformation Theory (cs.IT)020206 networking & telecommunicationsComputer Science ApplicationsPower (physics)0906 Electrical and Electronic EngineeringWide areaSoftware deploymentNetworking & TelecommunicationsTelecommunicationsbusinessInternet of Things
researchProduct

A Deployment Model to Extend Ethically Aligned AI Implementation Method ECCOLA

2021

There is a struggle in Artificial intelligence (AI) ethics to gain ground in actionable methods and models to be utilized by practitioners while developing and implementing ethically sound AI systems. AI ethics is a vague concept without a consensus of definition or theoretical grounding and bearing little connection to practice. Practice involving primarily technical tasks like software development is not aptly equipped to process and decide upon ethical considerations. Efforts to create tools and guidelines to help people working with AI development have been concentrating almost solely on the technical aspects of AI. A few exceptions do apply, such as the ECCOIA method for creating ethic…

FOS: Computer and information sciencesValue (ethics)Knowledge managementRequirements engineeringComputingMilieux_THECOMPUTINGPROFESSIONComputer sciencebusiness.industryProcess (engineering)Software developmentPhase (combat)GeneralLiterature_MISCELLANEOUSComputer Science - Computers and SocietySoftwareComputingMethodologies_PATTERNRECOGNITIONSoftware deploymentComputers and Society (cs.CY)businessSimple (philosophy)
researchProduct

Rate-Splitting Random Access Mechanism for Massive Machine Type Communications in 5G Cellular Internet-of-Things

2021

The cellular Internet-of-Things has resulted in the deployment of millions of machine-type communication (MTC) devices. These massive number of devices must communicate with a single gNodeB (gNB) via the random access channel (RACH) mechanism. However, existing RACH mechanisms are inefficient when dealing with such large number of devices. To address this issue, we propose the rate-splitting random access (RSRA) mechanism, which uses rate splitting and decoding in rate-splitting multiple access (RSMA) to improve RACH success rates. The proposed mechanism divides the message into common and private messages and enhances the decoding performance. We demonstrate, using extensive simulations, t…

FOS: Computer and information sciencesbusiness.industryMechanism (biology)Computer scienceComputer Science - Information TheoryInformation Theory (cs.IT)Type (model theory)Random-access channelSoftware deploymentInternet of Thingsbusiness5GRandom accessDecoding methodsComputer network2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
researchProduct