Search results for: resource configuration
3533 Configuration as a Service in Multi-Tenant Enterprise Resource Planning System
Authors: Mona Misfer Alshardan, Djamal Ziani
Abstract:
Enterprise resource planning (ERP) systems are the organizations tickets to the global market. With the implementation of ERP, organizations can manage and coordinate all functions, processes, resources and data from different departments by a single software. However, many organizations consider the cost of traditional ERP to be expensive and look for alternative affordable solutions within their budget. One of these alternative solutions is providing ERP over a software as a service (SaaS) model. This alternative could be considered as a cost effective solution compared to the traditional ERP system. A key feature of any SaaS system is the multi-tenancy architecture where multiple customers (tenants) share the system software. However, different organizations have different requirements. Thus, the SaaS developers accommodate each tenant’s unique requirements by allowing tenant-level customization or configuration. While customization requires source code changes and in most cases a programming experience, the configuration process allows users to change many features within a predefined scope in an easy and controlled manner. The literature provides many techniques to accomplish the configuration process in different SaaS systems. However, the nature and complexity of SaaS ERP needs more attention to the details regarding the configuration process which is merely described in previous researches. Thus, this research is built on strong knowledge regarding the configuration in SaaS to define specifically the configuration borders in SaaS ERP and to design a configuration service with the consideration of the different configuration aspects. The proposed architecture will ensure the easiness of the configuration process by using wizard technology. Also, the privacy and performance are guaranteed by adopting the databases isolation technique.Keywords: configuration, software as a service, multi-tenancy, ERP
Procedia PDF Downloads 3933532 Optimal Resource Configuration and Allocation Planning Problem for Bottleneck Machines and Auxiliary Tools
Authors: Yin-Yann Chen, Tzu-Ling Chen
Abstract:
This study presents the case of an actual Taiwanese semiconductor assembly and testing manufacturer. Three major bottleneck manufacturing processes, namely, die bond, wire bond, and molding, are analyzed to determine how to use finite resources to achieve the optimal capacity allocation. A medium-term capacity allocation planning model is developed by considering the optimal total profit to satisfy the promised volume demanded by customers and to obtain the best migration decision among production lines for machines and tools. Finally, sensitivity analysis based on the actual case is provided to explore the effect of various parameter levels.Keywords: capacity planning, capacity allocation, machine migration, resource configuration
Procedia PDF Downloads 4593531 Managing Configuration Management in Different Types of Organizations
Authors: Dilek Bilgiç
Abstract:
Configuration Management (CM) is a discipline assuring the consistency between product information the reality all along the product lifecycle. Although the extensive benefits of this discipline, such as the direct impact on increasing return on investment, reducing lifecycle costs, are realized by most organizations. It is worth evaluating that CM functions might be successfully implemented in some organized anarchies. This paper investigates how to manage ambiguity in CM processes as an opportunity within an environment that has different types of complexities and choice arenas. It is not explained how to establish a configuration management organization in a company; more specifically, it is analyzed how to apply configuration management processes when different types of streams exist. From planning to audit, all the CM functions may provide different organization learning opportunities when those applied with the right leadership methods.Keywords: configuration management, leadership, organizational analysis, organized anarchy, cm process, organizational learning, organizational maturity, configuration status accounting, leading innovation, change management
Procedia PDF Downloads 2103530 Identification of Configuration Space Singularities with Local Real Algebraic Geometry
Authors: Marc Diesse, Hochschule Heilbronn
Abstract:
We address the question of identifying the configuration space singularities of linkages, i.e., points where the configuration space is not locally a submanifold of Euclidean space. Because the configuration space cannot be smoothly parameterized at such points, these singularity types have a significantly negative impact on the kinematics of the linkage. It is known that Jacobian methods do not provide sufficient conditions for the existence of CS-singularities. Herein, we present several additional algebraic criteria that provide the sufficient conditions. Further, we use those criteria to analyze certain classes of planar linkages. These examples will also show how the presented criteria can be checked using algorithmic methods.Keywords: linkages, configuration space-singularities, real algebraic geometry, analytic geometry
Procedia PDF Downloads 1463529 A Numerical Investigation of Flow Maldistribution in Inlet Header Configuration of Plate Fin Heat Exchanger
Authors: Appasaheb Raul
Abstract:
Numerical analysis of a plate fin heat exchanger accounting for the effect of fluid flow maldistribution on the inlet header configuration of the heat exchanger is investigated. It is found that the flow maldistribution is very significant in normal to the flow direction. Various inlet configuration has been studied for various Reynolds Number. By the study, a modified header configuration is proposed and simulated. The two-dimensional parameters are used to evaluate the flow non-uniformity in the header, global flow maldistribution parameter (Sg), and Velocity Ratio (θ). A series of velocity vectors and streamline graphs at different cross-section are achieved and studied qualitatively with experimental results in the literature. The numerical result indicates that the flow maldistribution is serious in the conventional header while in the improved configuration less maldistribution occurs. The flow maldistribution parameter (Sg) and velocity ratio (θ) is reduced in improved configuration. The vortex decreases compared to that of the conventional configuration so the energy and pressure loss is reduced. The improved header can effectively enhance the efficiency of plate fin heat exchanger and uniformity of flow distribution.Keywords: global flow maldistribution parameter, Sg, velocity ratio, plate fin heat exchanger, fluent 14.5
Procedia PDF Downloads 5243528 Resource Management Framework in Cloud Computing
Authors: Gagandeep Kaur, Sonal Chawla
Abstract:
In a Cloud Computing environment, resource provisioning, resource allocation and resource scheduling is the most complex issues these days. Cloud User expects the best resource utilization and Cloud Provider expects revenue maximization by considering budget and time constraints. In this research paper, Resource Management Framework has been proposed to allocate the resources to Cloud Users and Cloud Providers in Cloud environment. The main aim of the proposed work is to provide the resources and services to Cloud Providers and Cloud Users in an efficient and effective manner. The proposed framework has been simulated and tested using the CloudSim simulator tool.Keywords: cloud computing, resource allocation, auction, provisioning
Procedia PDF Downloads 1483527 Resource Constrained Time-Cost Trade-Off Analysis in Construction Project Planning and Control
Authors: Sangwon Han, Chengquan Jin
Abstract:
Time-cost trade-off (TCTO) is one of the most significant part of construction project management. Despite the significance, current TCTO analysis, based on the Critical Path Method, does not consider resource constraint, and accordingly sometimes generates an impractical and/or infeasible schedule planning in terms of resource availability. Therefore, resource constraint needs to be considered when doing TCTO analysis. In this research, genetic algorithms (GA) based optimization model is created in order to find the optimal schedule. This model is utilized to compare four distinct scenarios (i.e., 1) initial CPM, 2) TCTO without considering resource constraint, 3) resource allocation after TCTO, and 4) TCTO with considering resource constraint) in terms of duration, cost, and resource utilization. The comparison results identify that ‘TCTO with considering resource constraint’ generates the optimal schedule with the respect of duration, cost, and resource. This verifies the need for consideration of resource constraint when doing TCTO analysis. It is expected that the proposed model will produce more feasible and optimal schedule.Keywords: time-cost trade-off, genetic algorithms, critical path, resource availability
Procedia PDF Downloads 1853526 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 123525 An Owen Value for Cooperative Games with Pairwise a Priori Incompatibilities
Authors: Jose M. Gallardo, Nieves Jimenez, Andres Jimenez-Losada, Esperanza Lebron
Abstract:
A game with a priori incompatibilities is a triple (N,v,g) where (N,v) is a cooperative game, and (N,g) is a graph which establishes initial incompatibilities between some players. In these games, the negotiation has two stages. In the first stage, players can only negotiate with others with whom they are compatible. In the second stage, the grand coalition will be formed. We introduce a value for these games. Given a game with a priori incompatibility (N,v,g), we consider the family of coalitions without incompatibility relations among their players. This family is a normal set system or coalition configuration Ig. Therefore, we can assign to each game with a priori incompatibilities (N,v,g) a game with coalition configuration (N,v, Ig). Now, in order to obtain a payoff vector for (N,v,g), it suffices to calculate a payoff vector for (N,v, Ig). To this end, we apply a value for games with coalition configuration. In our case, we will use the dual configuration value, which has been studied in the literature. With this method, we obtain a value for games with a priori incompatibilities, which is called the Owen value for a priori incompatibilities. We provide a characterization of this value.Keywords: cooperative game, game with coalition configuration, graph, independent set, Owen value, Shapley value
Procedia PDF Downloads 1303524 Obtaining High-Dimensional Configuration Space for Robotic Systems Operating in a Common Environment
Authors: U. Yerlikaya, R. T. Balkan
Abstract:
In this research, a method is developed to obtain high-dimensional configuration space for path planning problems. In typical cases, the path planning problems are solved directly in the 3-dimensional (D) workspace. However, this method is inefficient in handling the robots with various geometrical and mechanical restrictions. To overcome these difficulties, path planning may be formalized and solved in a new space which is called configuration space. The number of dimensions of the configuration space comes from the degree of freedoms of the system of interest. The method can be applied in two ways. In the first way, the point clouds of all the bodies of the system and interaction of them are used. The second way is performed via using the clearance function of simulation software where the minimum distances between surfaces of bodies are simultaneously measured. A double-turret system is held in the scope of this study. The 4-D configuration space of a double-turret system is obtained in these two ways. As a result, the difference between these two methods is around 1%, depending on the density of the point cloud. The disparity between the two forms steadily decreases as the point cloud density increases. At the end of the study, in order to verify 4-D configuration space obtained, 4-D path planning problem was realized as 2-D + 2-D and a sample path planning is carried out with using A* algorithm. Then, the accuracy of the configuration space is proved using the obtained paths on the simulation model of the double-turret system.Keywords: A* algorithm, autonomous turrets, high-dimensional C-space, manifold C-space, point clouds
Procedia PDF Downloads 1383523 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment
Authors: Wenqing Fan, Yixuan Cheng, Wei Huang
Abstract:
The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence
Procedia PDF Downloads 1193522 Introduction to Multi-Agent Deep Deterministic Policy Gradient
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents
Procedia PDF Downloads 213521 Impact of Climate Change on Water Resource Systems in Taiwan
Authors: Chia-Ling Chang, Hao-Bo Chang
Abstract:
Global climate change alters rainfall characteristics, while the variation of these characteristics further influences environmental conditions, such as hydrologic responses, landslide areas, and the amounts of diffuse pollution. The variations of environmental conditions may impact the stability of water resource systems. The objective of this study is to assess the present conditions of major water resource systems in Taiwan. The impact of climate change on each system is also discussed herein. Compared to the water resource systems in northern Taiwan, the ratio of the precipitation during the rainy season to that during the dry season has a larger increase in southern Taiwan. This variation of hydrologic condition impacts the stability of water resource systems and increases the risk of normal water supply. The findings in this work can be important references for water resource management.Keywords: basin management, climate change, water resource system, water resource management
Procedia PDF Downloads 3783520 Exploring the Application of Human Resource Management Bundles: A Case Study
Authors: Maniam Kaliannan
Abstract:
Studies on best practice or “bundles” of human resource management aims at providing a ‘universal solution’ to organizations yet critics challenge this view and place importance on the architecture of human resource processes in response to the dynamic needs of organizations. This paper identifies these best practices and explores how the applications of selected human resource management practices to a case study help solved their human resource problems. The case study includes insights on the problems faced; the approach taken to identify its root causes and explores how selected human resource management practices helped managed the overall predicament. The case study results supports the importance of aligning ‘bundles’ of practices with organizational architecture and ensuring that the architecture of human resource practices evolve with the changing needs of organizations. In addition, a framework based on the events of the case study is proposed to systematically manage their human resourcesKeywords: bundles, best practices, human resource management, organizational architecture, framework
Procedia PDF Downloads 4263519 Defining Human Resources “Bundles” and Its’ Correlation with Companies’ Financial Performances
Authors: Ivana Tadic, Snjezana Pivac
Abstract:
Although human resources are recognized as the crucial companies’ resources and their positive influence on companies’ performances has been confirmed through different researches, scientists are still debating it. In order to contribute this debate, this paper firstly discusses the most important human resource management elements and practices and its influence on companies’ success. Afterwards it defines human resource “bundles” – interrelated and internally consistent human resource practices, complementary to each other, or the most important human resource practices and elements regarding Croatian companies and its human resource management activities. Finally, the paper provides empirical results; more precisely it reveals the relation of the level of development of human resource management function (“bundles”) and companies’ financial performances (using profitability ratios, liquidity ratios, solvency ratios and a group of additional ratios related to employees’ indicators).Keywords: companies’ performances, human resource bundles, multivariate statistical analysis, marketing
Procedia PDF Downloads 4223518 Analysis of Spatial Disparities of Population for Delicate Configuration of Public Service Facilities:Case of Gongshu District, Hangzhou, China
Authors: Ruan Yi-Chen, Li Wang-Ming, Fang Yuan
Abstract:
With the rapid growth of urbanization in China in recent years, public services are in short supply because of expanding population and limitation of financial support, which makes delicate configuration of public service facilities to become a trend in urban planning. Besides, the facility configuration standard implemented in China is equal to the whole the urban area without considering internal differences in it. Therefore, this article focuses on population Spatial disparities analysis in order to optimize facility configuration in communities of main city district. The used data, including population of 93 communities during 2010 to 2015, comes from GongShu district, Hangzhou city, PRC. Through the analysis of population data, especially the age structure of those communities, the communities finally divided into 3 types. Obviously, urban public service facilities allocation situation directly affect the quality of residents common lives, which turns out that deferent kinds of communities with deferent groups of citizens will have divergences in facility demanding. So in the end of the article, strategies of facility configuration will be proposed based on the population analysis in order to optimize the quantity and location of facilities with delicacy.Keywords: delicacy, facility configuration, population spatial disparities, urban area
Procedia PDF Downloads 3853517 X-Bracing Configuration and Seismic Response
Authors: Saeed Rahjoo, Babak H. Mamaqani
Abstract:
Concentric bracing systems have been in practice for many years because of their effectiveness in reducing seismic response. Depending on concept, seismic design codes provide various response modification factors (R), which itself consists of different terms, for different types of lateral load bearing systems but configuration of these systems are often ignored in the proposed values. This study aims at considering the effect of different x-bracing diagonal configuration on values of ductility dependent term in R computation. 51 models were created and nonlinear push over analysis has been performed. The main variables of this study were the suitable location of X–bracing diagonal configurations, which establishes better nonlinear behavior in concentric braced steel frames. Results show that some x-bracing diagonal configurations improve the seismic performance of CBF significantly and explicit consideration of lateral load bearing systems seems necessary.Keywords: bracing configuration, concentrically braced frame (CBF), push over analyses, response reduction factor
Procedia PDF Downloads 3493516 Review of Speech Recognition Research on Low-Resource Languages
Authors: XuKe Cao
Abstract:
This paper reviews the current state of research on low-resource languages in the field of speech recognition, focusing on the challenges faced by low-resource language speech recognition, including the scarcity of data resources, the lack of linguistic resources, and the diversity of dialects and accents. The article reviews recent progress in low-resource language speech recognition, including techniques such as data augmentation, end to-end models, transfer learning, and multi-task learning. Based on the challenges currently faced, the paper also provides an outlook on future research directions. Through these studies, it is expected that the performance of speech recognition for low resource languages can be improved, promoting the widespread application and adoption of related technologies.Keywords: low-resource languages, speech recognition, data augmentation techniques, NLP
Procedia PDF Downloads 103515 A Resource Based View: Perspective on Acquired Human Resource towards Competitive Advantage
Authors: Monia Hassan Abdulrahman
Abstract:
Resource-based view is built on many theories in addition to diverse perspectives, we extend this view placing emphasis on human resources addressing the tools required to sustain competitive advantage. Highlighting on several theories and judgments, assumptions were established to clearly reach if resource possession alone suffices for the sustainability of competitive advantage, or necessary accommodation are required for better performance. New practices were indicated in terms of resources used in firms, these practices were implemented on the human resources in particular, and results were developed in compliance to the mentioned assumptions. Such results drew attention to the significance of practices that provide enhancement of human resources that have a core responsibility of maintaining resource-based view for an organization to lead the way to gaining competitive advantage.Keywords: competitive advantage, resource based value, human resources, strategic management
Procedia PDF Downloads 3903514 Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology
Authors: Lin Yunuo, Seow Xing Quan, Burra Venkata Durga Kumar
Abstract:
In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section.Keywords: cloud computing, cloud operation system, multitenancy, resource allocation, utilization of cloud resources
Procedia PDF Downloads 833513 A New Resonance Solution to Suppress the Voltage Stresses in the Forward Topology Used in a Switch Mode Power Supply
Authors: Maamar Latroch, Mohamed Bourahla
Abstract:
Forward topology used in switch mode power supply (SMPS) is one of the most famous configuration feeding DC systems such as telecommunication systems and other specific applications where the galvanic isolation is required. This configuration benefits of the high frequency feature of the transformer to provide a small size and light weight of the over all system. However, the stresses existing on the power switch during an ON/OFF commutation limit the transmitted power to the DC load. This paper investigates the main causes of the stresses in voltage existing during a commutation cycle and suggest a low cost solution that eliminates the overvoltage. As a result, this configuration will yield the possibility of the use of this configuration in higher power applications. Simulation results will show the efficiency of the presented method.Keywords: switch mode power supply, forward topology, resonance topology, high frequency commutation
Procedia PDF Downloads 4373512 Best Resource Recommendation for a Stochastic Process
Authors: Likewin Thomas, M. V. Manoj Kumar, B. Annappa
Abstract:
The aim of this study was to develop an Artificial Neural Network0 s recommendation model for an online process using the complexity of load, performance, and average servicing time of the resources. Here, the proposed model investigates the resource performance using stochastic gradient decent method for learning ranking function. A probabilistic cost function is implemented to identify the optimal θ values (load) on each resource. Based on this result the recommendation of resource suitable for performing the currently executing task is made. The test result of CoSeLoG project is presented with an accuracy of 72.856%.Keywords: ADALINE, neural network, gradient decent, process mining, resource behaviour, polynomial regression model
Procedia PDF Downloads 3893511 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems
Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari
Abstract:
Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.Keywords: cloud computing, resource allocation, double auction, winner determination
Procedia PDF Downloads 3583510 Street Begging: A Loss of Human Resource in Nigeria
Authors: Sulaiman Kassim Ibrahim
Abstract:
Human Resource is one of the most important elements in any country. They are very important in actualizing the potential of every sector in the country, i.e Agric, Education, Finance, Judiciary and all formal and informal sectors. The purpose of this study is to investigate the loss of human resource in Nigeria through street begging. The study used intensive literature review. Finding from the review indicate that a significant number of human resource are into street begging in the country undeveloped and untapped. The paper recommend that policy should be initiated to discourage street begging, develop this resource through education and empowerment, stop rural-urban migration by providing infrastructure in the rural areas and abolish informal (Almajiri or beggars school) and transform it into formal school.Keywords: human resource, street begging, Nigeria, Almajiri
Procedia PDF Downloads 2543509 Human Resource Development Strategy in Automotive Industry (Eco-Car) for ASEAN Hub
Authors: Phichak Phutrakhul
Abstract:
The purposes of this research were to study concepts and strategies of human resource development in the automotive manufacturers and to articulate the proposals against the government about the human resource development for automotive industry. In the present study, qualitative study was an in-depth interview in which the qualitative data were collected from the executive or the executive of human resource division from five automotive companies - Toyota Motor (Thailand) Co., Ltd., Nissan Motor (Thailand) Co., Ltd., Mitsubishi Motors (Thailand) Co., Ltd., Honda Automobile (Thailand) Co., Ltd., and Suzuki Motor (Thailand) Co., Ltd. Qualitative data analysis was performed by using inter-coder agreement technique. The research findings were as follows: The external factors included the current conditions of the automotive industry, government’s policy related to the automotive industry, technology, labor market and human resource development systems of the country. The internal factors included management, productive management, organizational strategies, leadership, organizational culture and philosophy of human resource development. These factors were affected to the different concept of human resources development -the traditional human resource development and the strategies of human resource development. The organization focuses on human resources as intellectual capital and uses the strategies of human resource development in all development processes. The strategies of human resource development will enhance the ability of human resources in the organization and the country.Keywords: human resource development strategy, automotive industry, eco-cars, ASEAN
Procedia PDF Downloads 4673508 Packaging in the Design Synthesis of Novel Aircraft Configuration
Authors: Paul Okonkwo, Howard Smith
Abstract:
A study to estimate the size of the cabin and major aircraft components as well as detect and avoid interference between internally placed components and the external surface, during the conceptual design synthesis and optimisation to explore the design space of a BWB, was conducted. Sizing of components follows the Bradley cabin sizing and rubber engine scaling procedures to size the cabin and engine respectively. The interference detection and avoidance algorithm relies on the ability of the Class Shape Transform parameterisation technique to generate polynomial functions of the surfaces of a BWB aircraft configuration from the sizes of the cabin and internal objects using few variables. Interference detection is essential in packaging of non-conventional configuration like the BWB because of the non-uniform airfoil-shaped sections and resultant varying internal space. The unique configuration increases the need for a methodology to prevent objects from being placed in locations that do not sufficiently enclose them within the geometry.Keywords: packaging, optimisation, BWB, parameterisation, aircraft conceptual design
Procedia PDF Downloads 4623507 Development of Configuration Software of Space Environment Simulator Control System Based on Linux
Authors: Zhan Haiyang, Zhang Lei, Ning Juan
Abstract:
This paper presents a configuration software solution in Linux, which is used for the control of space environment simulator. After introducing the structure and basic principle, it is said that the developing of QT software frame and the dynamic data exchanging between PLC and computer. The OPC driver in Linux is also developed. This driver realizes many-to-many communication between hardware devices and SCADA software. Moreover, an algorithm named “Scan PRI” is put forward. This algorithm is much more optimizable and efficient compared with "Scan in sequence" in Windows. This software has been used in practical project. It has a good control effect and can achieve the expected goal.Keywords: Linux OS, configuration software, OPC Server driver, MYSQL database
Procedia PDF Downloads 2873506 Dynamic Marketing Capabilities; From Marketing to Product Development and Technological Change: An Exploratory Study of Independent Companies of the Swiss Luxury Watchmaking Industry
Authors: Maria Bashutkina
Abstract:
In seeking to identify marketing factors that influence company’s performance, product management as well as new technology configuration, this study adopts resource based theory and applies it to the Swiss watchmaking companies. This paper presents results of qualitative research based on semi-structured interviews with CEO and marketing managers among watchmaking companies. This paper provides empirical evidences illustrating the link between the use of dynamic marketing capabilities and competitive advantage. We also present a set of propositions that outline how dynamic marketing capabilities could benefit product management and technological change in the Swiss independent watchmaking company, revealing competitive advantage in the highly competitive and turbulent market.Keywords: dynamic marketing capabilities, luxury marketing, resource based theory, product management, Swiss watchmaking
Procedia PDF Downloads 2113505 Analysis of Fault Tolerance on Grid Computing in Real Time Approach
Authors: Parampal Kaur, Deepak Aggarwal
Abstract:
In the computational Grid, fault tolerance is an imperative issue to be considered during job scheduling. Due to the widespread use of resources, systems are highly prone to errors and failures. Hence, fault tolerance plays a key role in the grid to avoid the problem of unreliability. Scheduling the task to the appropriate resource is a vital requirement in computational Grid. The fittest resource scheduling algorithm searches for the appropriate resource based on the job requirements, in contrary to the general scheduling algorithms where jobs are scheduled to the resources with best performance factor. The proposed method is to improve the fault tolerance of the fittest resource scheduling algorithm by scheduling the job in coordination with job replication when the resource has low reliability. Based on the reliability index of the resource, the resource is identified as critical. The tasks are scheduled based on the criticality of the resources. Results show that the execution time of the tasks is comparatively reduced with the proposed algorithm using real-time approach rather than a simulator.Keywords: computational grid, fault tolerance, task replication, job scheduling
Procedia PDF Downloads 4353504 The Effect of Resource Misallocation on the Productivity of Rice Farming in Thailand: Evidence from Household-Level Data
Authors: Siwapong Dheera-Aumpon
Abstract:
Resource misallocation is known to be prevalent in many countries. Such misallocation in the manufacturing sector is large and has a considerable negative effect on aggregate productivity. Thailand is one of the countries having large resource misallocation in the manufacturing sector. Resource misallocation is also known to be widespread in the agricultural sector. It is, therefore, likely that resource misallocation exists in the agricultural sector of Thailand as well. This study aims to evaluate the extent of resource misallocation in Thai rice farming. Using household-level data from 2013 Thai Agricultural Census, this study calculates farm total factor productivity (TFP) controlling for land quality and rain. Similar to the case of Malawi, marginal products of land and capital are found to be related to farm TFP implying large resource misallocation. The output gain from a reallocation of resources to their best use is 67 percent. The gain from reallocation is highest for farms in the southern region and followed by the northeastern region.Keywords: agriculture, misallocation, productivity, rice
Procedia PDF Downloads 231