Search results for "deployment"
showing 10 items of 173 documents
The Contribution of TQM to Organizational Ambidexterity: The State of the Art and Promising Research Streams
2015
The purpose of this chapter is to present the state of the art of research on the impact of TQM implementation on organizational ambidexterity. The widespread diffusion of TQM in organizations in all sectors and the already established importance of ambidextrous capability for achieving long-term competitiveness make understanding the connection between both fields a worthwhile objective. We underline the need to include in the analysis the broad and complex nature of TQM. Due to the interactions between its principles and practices, total quality management can act as a platform in creating an ambidextrous organizational context. We also underline the importance of clarity in research on t…
PAUT inspection of complex-shaped composite materials through six DOFs robotic manipulators
2015
The requirement to increase inspection speeds for the non-destructive testing (NDT) of composite aerospace parts is common to many manufacturers. The prevalence of complex curved surfaces in the industry provides significant motivation for the use of six-axis robots for the deployment of NDT probes in these inspections. The IntACom project, developed by TWI Technology Centre (Wales) and supported by a number of major aerospace partners and the Welsh government, has produced a prototype robotic NDT system. The prototype system is capable of inspecting complex-geometry composite components with great time savings. Two six-axis robotic arms deploy end effectors carrying phased array ultrasonic…
Supporting Mobile Virtual Team’s Coordination with SOA-Based Active Entities
2007
The use of IT solutions to support preparedness, response and recovery process has been envisioned as a possible way to improve the support for collaboration among the actors participating in mobile teams operating under constrained scenarios. Software applications supporting mobility have typically been conceived as functional extensions of centralized enterprise systems hosted on corporate servers. However, in this work, we focus on those mobile scenarios which go one step further in terms of interoperability requirements. This proposal aims to support the design, deployment and execution of ad-hoc collaborative business processes (workflows) in mobile networks, operating under constraine…
Remaining useful life estimation of HMPE rope during CBOS testing through machine learning
2021
Fibre rope used in cranes for offshore deployment and recovery has significant potential to perform lifts with smaller cranes and vessels to reach depths limited by weight of steel wire rope. Current condition monitoring methods based on manual inspection and time-based and reactive maintenance have significant potential for improvement coupled with more accurate remaining useful life (RUL) prediction. Machine learning has found use as a condition monitoring approach, coupled with vast improvements in data acquisition methods. This paper details data-driven RUL prediction methods based on machine learning algorithms applied on cyclic-bend-over-sheave (CBOS) tests performed on two fibre rope…
Switched Ethernet Networking over LEO Satellite
2005
Satellite onboard switching capabilities, and their possibility to enable "over-the-air" networks, are a strongly innovative achievement of modern satellite communication. The exploitation of satellite networking is especially relevant in the case of low Earth orbit satellites (LEO), where the reduced latency makes a LEO mesh network highly appealing and competitive with terrestrial solutions also in terms of performance. However, while the idea of a LEO mesh network is well understood, we are far from an ultimate answer on which is the best and more appropriate networking solution for moving LEO satellite network nodes. This paper promotes the adoption of existing layer-2 networking soluti…
FIRST
2018
Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
2017
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…
Low-Power Wide-Area Networks for Sustainable IoT
2019
Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…
A Deployment Model to Extend Ethically Aligned AI Implementation Method ECCOLA
2021
There is a struggle in Artificial intelligence (AI) ethics to gain ground in actionable methods and models to be utilized by practitioners while developing and implementing ethically sound AI systems. AI ethics is a vague concept without a consensus of definition or theoretical grounding and bearing little connection to practice. Practice involving primarily technical tasks like software development is not aptly equipped to process and decide upon ethical considerations. Efforts to create tools and guidelines to help people working with AI development have been concentrating almost solely on the technical aspects of AI. A few exceptions do apply, such as the ECCOIA method for creating ethic…
Rate-Splitting Random Access Mechanism for Massive Machine Type Communications in 5G Cellular Internet-of-Things
2021
The cellular Internet-of-Things has resulted in the deployment of millions of machine-type communication (MTC) devices. These massive number of devices must communicate with a single gNodeB (gNB) via the random access channel (RACH) mechanism. However, existing RACH mechanisms are inefficient when dealing with such large number of devices. To address this issue, we propose the rate-splitting random access (RSRA) mechanism, which uses rate splitting and decoding in rate-splitting multiple access (RSMA) to improve RACH success rates. The proposed mechanism divides the message into common and private messages and enhances the decoding performance. We demonstrate, using extensive simulations, t…