Search results for: enterprise IoT cybersecurity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 655

Search results for: enterprise IoT cybersecurity

205 Understanding the Operational Challenges of Social Enterprises: A Review of Real-Life Issues in the Context of Developing Countries

Authors: Humayun Murshed

Abstract:

There is growing importance of ‘social enterprise’ among the researchers and policy makers around the globe. Such enterprises have been viewed as alternative means for addressing the concerns relating to financing of corporate enterprises and social empowerment. This, some cases, has led to relatively unrealistic and higher level of expectations among policy makers and the members of the society at large. There is a general perception among different social actors that these enterprises provide universal and magic solution towards employment generation, and thus resulting in eradicating poverty, and ensuring equitable distribution of income and wealth. However, in many cases, these enterprises find a challenging journey in terms of prevailing market structure, socio-political environment, and unrealistic perception and expectations of social participants. This paper is focused on reviewing case studies based on empirical research and information from secondary sources and geared to looking at the challenges that social enterprises face. The research will draw the experience primarily from the developing countries’ perspective by adopting case study methodology. A tentative action plan will be suggested for further review by the policy makers and researchers in this growing arena of discipline. This research will attempt to highlight the myths and realities surrounding the operation of social enterprises.

Keywords: social enterprises, social empowerment, economic development, financing need

Procedia PDF Downloads 155
204 Prototyping the Problem Oriented Medical Record for Connected Health Based on TypeGraphQL

Authors: Sabah Mohammed, Jinan Fiaidhi, Darien Sawyer

Abstract:

Data integration of health through connected services can save lives in the event of a medical emergency or provide efficient and effective interventions for the benefit of the patients through the integration of bedside and bench side clinical research. Such integration will support all wind of change in healthcare by being predictive, pre-emptive, personalized, problem-oriented and participatory. Prototyping a healthcare system that enables data integration has been a big challenge for healthcare for a long time. However, an innovative solution started to emerge by focusing on problem lists where everything can connect the problem list forming a growing graph. This notion was introduced by Dr. Lawrence Weed in early 70’s, but the enabling technologies weren’t mature enough to provide a successful implementation prototype. In this article, we are describing our efforts in prototyping Dr. Lawrence Weed's problem-oriented medical record (POMR) and his patient case schema (SOAP) to shape a prototype for connected health. For this, we are using the TypeGraphQL API and our enterprise-based QL4POMR to describe a Web-Based gateway for healthcare services connectivity. Our prototype has reported success in connecting to the HL7 FHIR medical record and the OpenTarget biomedical repositories.

Keywords: connected health, problem-oriented healthcare record, SOAP, QL4POMR, typegraphQL

Procedia PDF Downloads 68
203 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 231
202 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 78
201 3D Human Face Reconstruction in Unstable Conditions

Authors: Xiaoyuan Suo

Abstract:

3D object reconstruction is a broad research area within the computer vision field involving many stages and still open problems. One of the existing challenges in this field lies with micromotion, such as the facial expressions on the appearance of the human or animal face. Similar literatures in this field focuses on 3D reconstruction in stable conditions such as an existing image or photos taken in a rather static environment, while the purpose of this work is to discuss a flexible scan system using multiple cameras that can correctly reconstruct 3D stable and moving objects -- human face with expression in particular. Further, a mathematical model is proposed at the end of this literature to automate the 3D object reconstruction process. The reconstruction process takes several stages. Firstly, a set of simple 2D lines would be projected onto the object and hence a set of uneven curvy lines can be obtained, which represents the 3D numerical data of the surface. The lines and their shapes will help to identify object’s 3D construction in pixels. With the two-recorded angles and their distance from the camera, a simple mathematical calculation would give the resulting coordinate of each projected line in an absolute 3D space. This proposed research will benefit many practical areas, including but not limited to biometric identification, authentications, cybersecurity, preservation of cultural heritage, drama acting especially those with rapid and complex facial gestures, and many others. Specifically, this will (I) provide a brief survey of comparable techniques existing in this field. (II) discuss a set of specialized methodologies or algorithms for effective reconstruction of 3D objects. (III)implement, and testing the developed methodologies. (IV) verify findings with data collected from experiments. (V) conclude with lessons learned and final thoughts.

Keywords: 3D photogrammetry, 3D object reconstruction, facial expression recognition, facial recognition

Procedia PDF Downloads 124
200 Value Chain Analysis of Melon “Egusi” (Citrullus lanatus Thunb. Mansf) among Rural Farm Enterprises in South East, Nigeria

Authors: Chigozirim Onwusiribe, Jude Mbanasor

Abstract:

Egusi Melon (Citrullus Lanatus Thunb. Mansf ) is a very important oil seed that serves a major ingredient in the diet of most of the households in Nigeria. Egusi Melon is very nutritious and very important in meeting the food security needs of Nigerians. Egusi Melon is cultivated in most farm enterprise in South East Nigeria but the profitability of its value chain needs to be investigated. This study analyzed the profitability of the Egusi Melon value chain. Specifically this study developed a value chain map for Egusi Melon, analysed the profitability of each stage of the Egusi Melon Value chain and analysed the determinants of the profitability of the Egusi Melon at each stage of the value chain. Multi stage sampling technique was used to select 125 farm enterprises with similar capacity and characteristics. Questionnaire and interview were used to elicit the required data while descriptive statistics, Food and Agriculture Organization Value Chain Analysis Tool, profitability ratios and multiple regression analysis were used for the data analysis. One of the findings showed that the stages of the Egusi Melon value chain are very profitable. Based on the findings, we recommend the provision of grants by government and donor agencies to the farm enterprises through their cooperative societies, this will provide the necessary funds for the local fabrication of value addition and processing equipment to suit their unique value addition needs not met by the imported equipment.

Keywords: value, chain, melon, farm, enterprises

Procedia PDF Downloads 99
199 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 205
198 Application of Innovative Implementations in the SME Sector

Authors: Mateusz Janas

Abstract:

Innovative implementations in the micro, small, and medium-sized enterprises (MSME) sector are among the essential activities considering the current market realities, technological advancements, and digitization trends. MSMEs play a crucial role and significantly influence the economic conditions of countries, as their competitiveness directly impacts the global economy. Business development and investment in innovation and technology are integral parts of every modern enterprise's strategy, seeking to maintain and achieve a desired competitive position. The instability of the socio-economic environment, along with contemporary changes in artificial intelligence implementation and digitization, requires businesses to adopt increasingly newer solutions and actions. Enterprises must strive to survive in the global market and build competitive positions, especially in uncertain conditions. Being aware of the significance of innovative actions is crucial for MSMEs as it enables them to enhance their operations and expand their scope. It is essential for managers and executives of MSMEs to be focused on development and innovation, as their approach will also impact their employees, emphasizing results and maximizing the company's value. Managers of MSMEs must be aware of various threats, costs, opportunities, and gains that can arise from implementing new technical and organizational solutions. Businesses must view development as an integral part of their strategy and continuously strive for improvement.

Keywords: innovation, SME, develop, management

Procedia PDF Downloads 38
197 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
196 Problems and Needs Help of Frozen Shrimp Industry Small and Medium in the Central Region of the Lower Three Provinces

Authors: P. Thepnarintra

Abstract:

Frozen shrimp industry plays an important role in the development of production industry of the country. There has been a continuing development to response the increasing demand; however, there have been some problems in running the enterprises. The purposes of this study are to: 1) investigate problems related to basic factors in operating frozen shrimp industry based on the entrepreneurs’ points of view. The enterprises involved in this study were small and medium industry receiving Thai Frozen Foods Association. 2) Compare the problems of the frozen shrimp industry according to their sizes of operation in 3 provinces of the central region Thailand. Population in this study consisted of 148 managers from 148 frozen shrimp enterprises Thai Frozen Foods Association, of which 77 were small size and 71 were medium size. The data were analyzed to find percentage, arithmetic mean, standard deviation, and independent sample T-test with the significant hypothesis at .05. The results revealed that the problems of the frozen shrimp industries of both size were in high level. The needs for government supporting were in high level. The comparison of the problems and the basic factors between the small and medium size enterprises showed no statistically significant level. The problems that they mentioned included raw materials, labors, production, marketing, and the need for academic supporting from the government sector.

Keywords: frozen shrimp industry, problems, related to the enterprise, operation

Procedia PDF Downloads 519
195 The Good, the Bad and the Ugly in E-Procurement: A Case Study of Agricultural Company in Vietnam

Authors: D. T. Tran, H. P. Tran, L. G. Hoang, V. N. H. Bui, Q. T. Nguyen, A. K. Das

Abstract:

This paper provides some insight information about a current situation of e-procurement implementation in Vietnam, including opportunities and challenges. A case study of Phuc Thien Company which is classified as a medium enterprise in the country, specialising on animal feed production. Since the technological development rapidly changes, companies have implemented advanced technologies in supply chain management to increase efficiency and gain collaboration amidst partners in their manufacturing and development activities. The findings of this research reveal strengths and ongoing weaknesses when Phuc Thien company internally implemented eProcurement system. Although cost savings, visibility of payment and speedy procurement process are one of the largest benefits of eProcurement implementation, the company faces greater hurdles, such as employee capability to use technology and their resistance to change, that overshadow everything else. In terms of governmental policy, the adaptation of e-invoicing has commenced since June 2015 in Vietnam, legal regulations and administrative framework related to e-Procurement carries various ambiguous in its content and extremely fragment. Hence, this adds a great burden to enterprises in general and Phuc Thien in particular in view of creating higher competitive advantage for animal feed industry in Vietnam as well as South East Asia region.

Keywords: procurement, e-procurement, animal feed industry, efficiency

Procedia PDF Downloads 299
194 Design and Evaluation of Production Performance Dashboard for Achieving Oil and Gas Production Target

Authors: Ivan Ramos Sampe Immanuel, Linung Kresno Adikusumo, Liston Sitanggang

Abstract:

Achieving the production targets of oil and gas in an upstream oil and gas company represents a complex undertaking necessitating collaborative engagement from a multidisciplinary team. In addition to conducting exploration activities and executing well intervention programs, an upstream oil and gas enterprise must assess the feasibility of attaining predetermined production goals. The monitoring of production performance serves as a critical activity to ensure organizational progress towards the established oil and gas performance targets. Subsequently, decisions within the upstream oil and gas management team are informed by the received information pertaining to the respective production performance. To augment the decision-making process, the implementation of a production performance dashboard emerges as a viable solution, providing an integrated and centralized tool. The deployment of a production performance dashboard manifests as an instrumental mechanism fostering a user-friendly interface for monitoring production performance, while concurrently preserving the intrinsic characteristics of granular data. The integration of diverse data sources into a unified production performance dashboard establishes a singular veritable source, thereby enhancing the organization's capacity to uphold a consolidated and authoritative foundation for its business requisites. Additionally, the heightened accessibility of the production performance dashboard to business users constitutes a compelling substantiation of its consequential impact on facilitating the monitoring of organizational targets.

Keywords: production, performance, dashboard, data analytics

Procedia PDF Downloads 34
193 The Influence of Gender Role Socialization on Entrepreneurial Choices in 21st Century Africa: The Case of Cultural Ghana

Authors: Priscilla Adoley Moffat

Abstract:

Over the years, entrepreneurship has been promoted as an important tool for bridging the socioeconomic gap between the male gender and the female gender. In the face of the efforts to advance gender equity, however, there exist sociocultural factors whose influence on these efforts cannot be ignored or underrated. This study explored the influence of gender role socialization on entrepreneurial decisions in the male-dominated African society, with special focus on Ghana. The study essentially sought to find out whether gender role socialization in the Ghanaian culture affects the individual’s entrepreneurial choices and/or ventures. And if it does, how? The study analyzed the common gender roles found in the Ghanaian culture and the perceptions about these gender roles. 2507 male and female Ghanaian entrepreneurs were randomly sampled and interviewed. One particularly interesting finding of the study is that, while some entrepreneurs have interests in other enterprises, they fear becoming challengers of societal norms, as those ventures have been assigned to the other gender by the culture. Additionally, most of these entrepreneurs fear low or no patronage from members of the society. The study, thus, revealed a significant relationship between culture, especially gender role socialization, and patronage of businesses, as well as the success and profitability of an enterprise. It was, thus, concluded that most entrepreneurs’ entrepreneurial decisions or choices are influenced by the entrepreneur’s gender role socialization. By extension, gender role socialization was found to influence and limit entrepreneurial ventures.

Keywords: gender, role, socialization, entrepreneur, culture, ghana

Procedia PDF Downloads 61
192 The Analysis of Secondary Case Studies as a Starting Point for Grounded Theory Studies: An Example from the Enterprise Software Industry

Authors: Abilio Avila, Orestis Terzidis

Abstract:

A fundamental principle of Grounded Theory (GT) is to prevent the formation of preconceived theories. This implies the need to start a research study with an open mind and to avoid being absorbed by the existing literature. However, to start a new study without an understanding of the research domain and its context can be extremely challenging. This paper presents a research approach that simultaneously supports a researcher to identify and to focus on critical areas of a research project and prevent the formation of prejudiced concepts by the current body of literature. This approach comprises of four stages: Selection of secondary case studies, analysis of secondary case studies, development of an initial conceptual framework, development of an initial interview guide. The analysis of secondary case studies as a starting point for a research project allows a researcher to create a first understanding of a research area based on real-world cases without being influenced by the existing body of theory. It enables a researcher to develop through a structured course of actions a firm guide that establishes a solid starting point for further investigations. Thus, the described approach may have significant implications for GT researchers who aim to start a study within a given research area.

Keywords: grounded theory, interview guide, qualitative research, secondary case studies, secondary data analysis

Procedia PDF Downloads 242
191 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 236
190 Variables for Measuring the Impact of the Social Enterprises in the Field of Community Development

Authors: A. Irudaya Veni Mary, M. Victor Louis Anthuvan, P. Christie, A. Indira

Abstract:

In India, social enterprises are working to create social value in various fields including education; health; women and child development; environment protection and community development. Although social enterprises have brought about tremendous changes in the lives of beneficiaries, the importance of their works is not understood thoroughly. One of the ways to prove themselves is to measure the impact, which in recent times has received much attention. This paper focuses on the study of social value created by the social enterprises in the field of community development. It also aims to put forth a research tool for measuring the social value created by the social enterprises in the field of community development. A close-ended interview schedule was prepared to measure the social value creation and it was administered among 60 beneficiaries of two social enterprises who work in the field of community development. The study results show that the social enterprises have brought four types of impact in the life of their beneficiaries; economic impact, social impact, political impact and cultural impact. This study is limited to the social enterprises those who work towards community development. This empirical finding will enable the reader to understand various types of social value created by the social enterprises working in the field of community development. This study will also serve as guide for social enterprises in community development activities to measure their impact and thereby improve their operation towards the betterment of the society. This paper is derived from an empirical research carried out to describe the different types of social value created by the social enterprises in India.

Keywords: social enterprise, social entrepreneurs, social impact, social value, tool for social impact measurement

Procedia PDF Downloads 246
189 Comparison the Anchoring Effect Application in Employee Management in Silesian Voivodeship with Prague, Moravian-Silesian Region and Vysočina Region

Authors: Omar Ameir, Jakub Chlopecký, Jaroslav Hubáček

Abstract:

Behavioral aspects are very important for successful human resource management. This fact is becoming more and more apparent. Therefore, the paperdeals with behaviora leconomics, human resource management, and theenterpriseswith 100+ employees. More precisely, thepaperfocuses on the degree of the anchoring effect, i.e. the degree of the use of the instruments for influencing and persuasionthatmanagersapply to manage their employees. This paper builds on the results of previous researches and further develops these results. The authors used the questionnaire to identify how much the anchoring effect is applied in enterprise with 100+ employees. The main goal of the paper is to compare the anchoring effect application in employee management in SilesianVoivodeship (Polish region) with three Czech regions which are Prague, Moravian-Silesian region, and Vysočina region. The comparison applies to enterprises with 100+ employees. The second goal of the paper is to find out how tentheanchoring effectisused in the SilesianVoivodeship. The authors set one hypothesis and the result soft the paper rejected it. The basic assumption led the authors of this paper to this research. The authors predicted that managers of SilesianVoivodeshipcompanies use anchoring methods less often than the three regions mentioned above, i.ethemanagersof Prague companies, themanagersofMoravian-Silesian region companies, and themanagersofVysočina region companies. Confirmation or rejection of the above mentioned assumptions discussed in more detail.

Keywords: anchoring effect, behavioral economics, enterprises with 100+ employees, nescience of the anchoring

Procedia PDF Downloads 144
188 Female Entrepreneurship in Egypt: Barriers and Challenges in the Aftermath of the Arab Spring

Authors: Kate Ebere Maduforo

Abstract:

Examining the constraints faced by female entrepreneurs is an important subject which most literature on female entrepreneurship is centered on. However, the majority of the existing literature has focused on studying female entrepreneurs in developed societies. Recently, a sense of urgency that has emerged in trying to understand the challenges and motivations of female entrepreneurs in developing countries. The arousal of such interest has been attributed to women entrepreneurs in developing countries being identified as catalysts of economic development at a national level and champions of poverty eradication at the domestic level. This paper, therefore, examines the peculiar constraints faced by women-owned businesses in the mist of political chaos and instability. In this case, the issues experienced by female entrepreneurs in Egypt during the aftermath of the Arab Spring is the focus. Using the logit and probit regression models, data from the World Bank Middle East North Africa Enterprise Survey (MENA ES) are analyzed. The results identified that female entrepreneurs still lack business funding through financial institutions, but get significant funding assistance from family, friends, and money lenders. In addition, women-owned businesses promote and hire mostly women. Female entrepreneurs showed a preference for an impartial judicial system as a contributor to business growth.

Keywords: female entrepreneurship, development, Middle East, developing countries

Procedia PDF Downloads 95
187 A Verification Intellectual Property for Multi-Flow Rate Control on Any Single Flow Bus Functional Model

Authors: Pawamana Ramachandra, Jitesh Gupta, Saranga P. Pogula

Abstract:

In verification of high volume and complex packet processing IPs, finer control of flow management aspects (for example, rate, bits/sec etc.) per flow class (or a virtual channel or a software thread) is needed. When any Software/Universal Verification Methodology (UVM) thread arbitration is left to the simulator (e.g., Verilog Compiler Simulator (VCS) or Incisive Enterprise Simulator core simulation engine (NCSIM)), it is hard to predict its pattern of resulting distribution of bandwidth by the simulator thread arbitration. In many cases, the patterns desired in a test scenario may not be accomplished as the simulator might give a different distribution than what was required. This can lead to missing multiple traffic scenarios, specifically deadlock and starvation related. We invented a component (namely Flow Manager Verification IP) to be intervening between the application (test case) and the protocol VIP (with UVM sequencer) to control the bandwidth per thread/virtual channel/flow. The Flow Manager has knobs visible to the UVM sequence/test to configure the required distribution of rate per thread/virtual channel/flow. This works seamlessly and produces rate stimuli to further harness the Design Under Test (DUT) with asymmetric inputs compared to the programmed bandwidth/Quality of Service (QoS) distributions in the Design Under Test.

Keywords: flow manager, UVM sequencer, rated traffic generation, quality of service

Procedia PDF Downloads 70
186 Analysis of the Reasons behind the Deteriorated Standing of Engineering Companies during the Financial Crisis

Authors: Levan Sabauri

Abstract:

In this paper, we discuss the deteriorated standing of engineering companies, some of the reasons behind it and the problems facing engineering enterprises during the financial crisis. We show the part that financial analysis plays in the detection of the main factors affecting the standing of a company, classify internal problems and the reasons influencing efficiency thereof. The publication contains the analysis of municipal engineering companies in post-Soviet transitional economies. In the wake of the 2008 world financial crisis the issue became even more poignant. It should be said though that even before the problem had been no less acute for some post-Soviet states caught up in a lengthy transitional period. The paper highlights shortcomings in the management of transportation companies, with new, more appropriate methods suggested. In analyzing the financial stability of a company, three elements need to be considered: current assets, investment policy and structural management of the funding sources leveraging the stability, should be focused on. Inappropriate management of the three may create certain financial problems, with timely and accurate detection thereof being an issue in terms of improved standing of an enterprise. In this connection, the publication contains a diagram reflecting the reasons behind the deteriorated financial standing of a company, as well as a flow chart thereof. The main reasons behind low profitability are also discussed.

Keywords: efficiency, financial management, financial analysis funding structure, financial sustainability, investment policy, profitability, solvency, working capital

Procedia PDF Downloads 279
185 New Technologies in Corporate Finance Management in the Digital Economy: Case of Kyrgyzstan

Authors: Marat Kozhomberdiev

Abstract:

The research will investigate the modern corporate finance management technologies currently used in the era of digitalization of the global economy and the degree to which financial institutions are utilizing these new technologies in the field of corporate finance management in Kyrgyzstan. The main purpose of the research is to reveal the role of financial management technologies as joint service centers, intercompany banks, specialized payment centers in the third-world country. Particularly, the analysis of the implacability of automated corporate finance management systems such as enterprise resource planning system (ERP) and treasury management system (TMS) will be carried out. Moreover, the research will investigate the role of cloud accounting systems in corporate finance management in Kyrgyz banks and whether it has any impact on the field of improving corporate finance management. The study will utilize a data collection process via surveying 3 banks in Kyrgyzstan, namely Mol-Bulak, RSK, and KICB. The banks were chosen based on their ownerships, such as state banks, private banks with local authorized capital, and private bank with international capital. The regression analysis will be utilized to reveal the correlation between the ownership of the bank and the use of new financial management technologies. The research will provide policy recommendations to both private and state banks on developing strategies for switching and utilizing modern corporate finance management technologies in their daily operations.

Keywords: digital economy, corporate finance, digital environment, digital technologies, cloud technologies, financial management

Procedia PDF Downloads 43
184 Evaluation of Urban-Rural Integration of Characteristic Towns in Yunnan Province

Authors: Huang Yong, Chen Qianting, Zhao Shurong

Abstract:

In order to identify the role and effect of Characteristic Towns as an important means to promote urban-rural integration, this paper uses Flow Theory and complex network analysis methods to jointly construct the identification path of urban-rural integration capabilities of Characteristic Towns. Take the National Characteristic Towns of Yunnan Province as the empirical objects to identify their role laws. The study found that in the implementation of the National Characteristic Town Project in Yunnan Province, (1) the population is more susceptible to the impact of the Characteristic Town Project than the technical elements, but the stability is poor; (2) The flow capacity of urban and rural technical elements is weak, and the quality of the enterprise cooperation network in general; (3) Compared with the batch of Characteristic Towns in 2016, its ability to promote urban-rural integration is higher in 2017; (4) The role of the Characteristic Town Project on urban-rural integration focuses on the improvement of the number of urban and rural flow elements. This paper analyzes the mode of the role of Characteristic Towns on urban-rural integration from the perspective of ‘flow,’ establishes a research paradigm for evaluating the role of Characteristic Towns in urban-rural integration capabilities, and builds a path for the application of Characteristic Towns to support the realization of urban-rural integration goals.

Keywords: characteristic town, urban-rural integration, flow theory, complex network analysis

Procedia PDF Downloads 104
183 Ideological and Poetological Tensions: Wu Mi’s Enterprise of Imitating and Translating George Gordon Byron

Authors: Hanjin Yan

Abstract:

The English Romantic George Gordon Byron (1788-1824) was widely celebrated by men of letters in early republican China as a Satanic freedom fighter challenging classical poetics and traditional values. However, Wu Mi (1894-1978), the most persistent critic of contemporary iconoclasm, perceived Byron as a paragon of self-righteous poet-exiles who maintained moral integrity and achieved poetic excellence during times of frustration, just like canonized classical Chinese poets. Wu Mi not only composed lengthy imitations of the third canto of Byron’s Childe Harold’s Pilgrimage (1816) but also patronized a rendering of the canto. Taking André Lefevere’s rewriting theory as a framework, this paper explores the interplay of ideology and poetics by examining Wu Mi’s imitations against Byron’s original and its Chinese translation patronized by Wu Mi. Textual analysis shows that Wu Mi’s approach to Byron’s poetry was informed not only by his endeavor to invigorate classical Chinese poetics, but also by his program to preserve China’s cultural traditions and integrate Western new humanism, a theory proposed by his Harvard mentor Irving Babbitt (1865-1933). This study reveals how Byron was appropriated to serve conflicting poetic and ideological purposes in early republican China and suggests that imitation as a type of rewriting merits further attention.

Keywords: George Gordon Byron, ideology, imitation, poetics, translation

Procedia PDF Downloads 187
182 Dynamic Cellular Remanufacturing System (DCRS) Design

Authors: Tariq Aljuneidi, Akif Asil Bulgak

Abstract:

Remanufacturing may be defined as the process of bringing used products to “like-new” functional state with warranty to match, and it is one of the most popular product end-of-life scenarios. An efficient remanufacturing network lead to an efficient design of sustainable manufacturing enterprise. In remanufacturing network, products are collected from the customer zone, disassembled and remanufactured at a suitable remanufacturing facility. In this respect, another issue to consider is how the returned product to be remanufactured, in other words, what is the best layout for such facility. In order to achieve a sustainable manufacturing system, Cellular Manufacturing System (CMS) designs are highly recommended, CMSs combine high throughput rates of line layouts with the flexibility offered by functional layouts (job shop). Introducing the CMS while designing a remanufacturing network will benefit the utilization of such a network. This paper presents and analyzes a comprehensive mathematical model for the design of Dynamic Cellular Remanufacturing Systems (DCRSs). In this paper, the proposed model is the first one to date that consider CMS and remanufacturing system simultaneously. The proposed DCRS model considers several manufacturing attributes such as multi-period production planning, dynamic system reconfiguration, duplicate machines, machine capacity, available time for workers, worker assignments, and machine procurement, where the demand is totally satisfied from a returned product. A numerical example is presented to illustrate the proposed model.

Keywords: cellular manufacturing system, remanufacturing, mathematical programming, sustainability

Procedia PDF Downloads 352
181 Management Software for the Elaboration of an Electronic File in the Pharmaceutical Industry Following Mexican Regulations

Authors: M. Peña Aguilar Juan, Ríos Hernández Ezequiel, R. Valencia Luis

Abstract:

For certification, certain goods of public interest, such as medicines and food, it is required the preparation and delivery of a dossier. For its elaboration, legal and administrative knowledge must be taken, as well as organization of the documents of the process, and an order that allows the file verification. Therefore, a virtual platform was developed to support the process of management and elaboration of the dossier, providing accessibility to the information and interfaces that allow the user to know the status of projects. The development of dossier system on the cloud allows the inclusion of the technical requirements for the software management, including the validation and the manufacturing in the field industry. The platform guides and facilitates the dossier elaboration (report, file or history), considering Mexican legislation and regulations, it also has auxiliary tools for its management. This technological alternative provides organization support for documents and accessibility to the information required to specify the successful development of a dossier. The platform divides into the following modules: System control, catalog, dossier and enterprise management. The modules are designed per the structure required in a dossier in those areas. However, the structure allows for flexibility, as its goal is to become a tool that facilitates and does not obstruct processes. The architecture and development of the software allows flexibility for future work expansion to other fields, this would imply feeding the system with new regulations.

Keywords: electronic dossier, cloud management software, pharmaceutical industry, sanitary registration

Procedia PDF Downloads 267
180 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 443
179 Earnings vs Cash Flows: The Valuation Perspective

Authors: Megha Agarwal

Abstract:

The research paper is an effort to compare the earnings based and cash flow based methods of valuation of an enterprise. The theoretically equivalent methods based on either earnings such as Residual Earnings Model (REM), Abnormal Earnings Growth Model (AEGM), Residual Operating Income Method (ReOIM), Abnormal Operating Income Growth Model (AOIGM) and its extensions multipliers such as price/earnings ratio, price/book value ratio; or cash flow based models such as Dividend Valuation Method (DVM) and Free Cash Flow Method (FCFM) all provide different estimates of valuation of the Indian giant corporate Reliance India Limited (RIL). An ex-post analysis of published accounting and financial data for four financial years from 2008-09 to 2011-12 has been conducted. A comparison of these valuation estimates with the actual market capitalization of the company shows that the complex accounting based model AOIGM provides closest forecasts. These different estimates may be derived due to inconsistencies in discount rate, growth rates and the other forecasted variables. Although inputs for earnings based models may be available to the investor and analysts through published statements, precise estimation of free cash flows may be better undertaken by the internal management. The estimation of value from more stable parameters as residual operating income and RNOA could be considered superior to the valuations from more volatile return on equity.

Keywords: earnings, cash flows, valuation, Residual Earnings Model (REM)

Procedia PDF Downloads 344
178 Automatic Tofu Stick Cutter to Increase the Production Capacity of Small and Medium Enterprises

Authors: Chaca Nugraha Zaid, Hikmat Ronaldo, Emerald Falah Brayoga, Azizah Eddy Setiawati, Soviandini Dwiki Kartika Putri, Novita Wijayanti

Abstract:

In the tofu stick production, the manual cutting process takes a half of working day or 4 hours for 21 kg of tofu. This issue has hampered the small and medium enterprises (SMEs) to increase the capacity of production to fulfill the market demand. In order to address the issue, the cutting process should be automized to create fast, efficient, and effective tools. This innovation to tackle this problem is an automatic cutter tool that is able to move continuously to cut the tofu into stick size. The tool uses the 78,5-watt electric motor and automatic sensors to drive the cutting tool automatically, resulting faster process time with more uniform size compared to the manual cutter. The component of this tool, i.e., cutting knife and the driver, electric motor, limit switch sensors, riley, Arduino nano, and power supply. The cutting speed cutting speed of this tool is 101,25 mm/s producing 64 tofu sticks. Benefits that can be obtained from the use of automatic tofu stick cutter, i.e. (1) Faster process (2) More uniform cutting result; (3) The quality of the tofu stick is maintained due to minimal contact with humans so that contamination can be suppressed; (4) The cutting knife can be modified to the desired size of the owner.

Keywords: automatic, cutter, small and medium enterprise, tofu stick

Procedia PDF Downloads 144
177 Supply Chains Resilience within Machine-Made Rug Producers in Iran

Authors: Malihe Shahidan, Azin Madhi, Meisam Shahbaz

Abstract:

In recent decades, the role of supply chains in sustaining businesses and establishing their superiority in the market has been under focus. The realization of the goals and strategies of a business enterprise is largely dependent on the cooperation of the chain, including suppliers, distributors, retailers, etc. Supply chains can potentially be disrupted by both internal and external factors. In this paper, resilience strategies have been identified and analyzed in three levels: sourcing, producing, and distributing by considering economic depression as a current risk factor for the machine-made rugs industry. In this study, semi-structured interviews for data gathering and thematic analysis for data analysis are applied. Supply chain data has been gathered from seven rug factories before and after the economic depression through semi-structured interviews. The identified strategies were derived from literature review and validated by collecting data from a group of eighteen industry and university experts, and the results were analyzed using statistical tests. Finally, the outsourcing of new products and products in the new market, the development and completion of the product portfolio, the flexibility in the composition and volume of products, the expansion of the market to price-sensitive, direct sales, and disintermediation have been determined as strategies affecting supply chain resilience of machine-made rugs' industry during an economic depression.

Keywords: distribution, economic depression, machine-made rug, outsourcing, production, sourcing, supply chain, supply chain resilience

Procedia PDF Downloads 122
176 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 45