Search results for: complaint management
1299 Adaptation Measures for Sustainable Development of the Agricultural Potential of the Flood-Risk Zones of Ghareb Lowland, Morocco
Authors: R. Bourziza, W. El Khoumsi, I. Mghabbar, I. Rahou
Abstract:
The flood-risk zones called Merjas are lowlands that are flooded during the rainy season. Indeed, these depressed areas were reclaimed to dry them out in order to exploit their agricultural potential. Thus, farmers were able to start exploiting these drained lands. As the development of modern agriculture in Morocco progressed, farmers began to practice irrigated agriculture. In a context of vulnerability to floods and the need for optimal exploitation of the agricultural potential of the flood-risk zones, the question of how farmers are adapting to this context and the degree of exploitation of this potential arises. It is in these circumstances that this work was initiated, aiming at the characterization of irrigation practices in the flood-risk zones of the Ghareb lowland (Morocco). This characterization is based on two main axes: the characterization of irrigation techniques used, as well as the management of irrigation in these areas. In order to achieve our objective, two complementary approaches have been adopted; the first one is based on interviews with administrative agents and on farmer surveys, and the second one is based on field measurements of a few parameters, such as flow rate, pressure, uniformity coefficient of drippers and salinity. The results of this work led to conclude that the choice of the practiced crop (crop resistant to excess water in winter and vegetable crops during other seasons) and the availability and nature of water resources are the main criteria that determine the choice of the irrigation system. Even if irrigation management is imprecise, farmers are able to achieve agricultural yields that are comparable to those recorded in the entire irrigated perimeter. However, agricultural yields in these areas are still threatened by climate change, since these areas play the role of water retaining basins during floods by protecting the downstream areas, which can also damage the crops there instilled during the autumn. This work has also noted that the predominance of private pumping in flood-risk zones in the coastal zone creates a risk of marine intrusion, which risks endangering the groundwater table. Thus, this work enabled us to understand the functioning and the adaptation measures of these vulnerable zones for the sustainability of the Merjas and a better valorization of these marginalized lowlands.
Keywords: Flood-risk zones, irrigation practices, climate change, adaptation measures.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4351298 Data Migration between Document-Oriented and Relational Databases
Authors: Bogdan Walek, Cyril Klimes
Abstract:
Current tools for data migration between documentoriented and relational databases have several disadvantages. We propose a new approach for data migration between documentoriented and relational databases. During data migration the relational schema of the target (relational database) is automatically created from collection of XML documents. Proposed approach is verified on data migration between document-oriented database IBM Lotus/ Notes Domino and relational database implemented in relational database management system (RDBMS) MySQL.Keywords: data migration, database, document-oriented database, XML, relational schema
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35251297 Security Threat and Countermeasure on 3G Network
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Recent communications environment significantly expands the mobile environment. The popularization of smartphones with various mobile services has emerged, and smartphone users are rapidly increasing. Because of these symptoms, existing wired environment in a variety of mobile traffic entering to mobile network has threatened the stability of the mobile network. Unlike traditional wired infrastructure, mobile networks has limited radio resources and signaling procedures for complex radio resource management. So these traffic is not a problem in wired networks but mobile networks, it can be a threat. In this paper, we analyze the security threats in mobile networks and provide direction to solve it.Keywords: 3G, Core Network Security, GTP, Mobile NetworkSecurity
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21411296 The Effects of Loyalty Program Quality on Word -of -Mouth Recommendations Intentions
Authors: Nedra Bahri-Ammari
Abstract:
Literature review revealed the importance of the adoption of marketing Relationship for loyalty and retaining profitable customer (Customer Relationship Management). LPQ satisfaction will reinforce the loyalty and customer brand attachment. Customer will communicate the operator to others. The focus of this study is to examine the relationship between the LPPQ and the WOM recommendations through: customer satisfaction, loyalty and attachment. The results show that LPQ affect positively the satisfaction, negatively the loyalty. LPQ has an indirectly effect on WOM recommendations but through the satisfaction and attachment. The mediating effect of satisfaction in the relationship between LPQ and Loyalty is rejected. This finding can be explained by the nature of mobile sector in Tunisia.Keywords: Attachment, Loyalty program quality, satisfaction, WOM
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35211295 Knowledge Management in Cross- Organizational Networks as Illustrated by One of the Largest European ICT Associations A Case Study of the “METORA
Authors: Thomas Klauß
Abstract:
In networks, mainly small and medium-sized businesses benefit from the knowledge, experiences and solutions offered by experts from industry and science or from the exchange with practitioners. Associations which focus, among other things, on networking, information and knowledge transfer and which are interested in supporting such cooperations are especially well suited to provide such networks and the appropriate web platforms. Using METORA as an example – a project developed and run by the Federal Association for Information Economy, Telecommunications and New Media e.V. (BITKOM) for the Federal Ministry of Economics and Technology (BMWi) – This paper will discuss how associations and other network organizations can achieve this task and what conditions they have to consider.
Keywords: Associations, collaboration, communities, crossdepartmental organizations, semantic web, web 2.0.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13041294 Stability of Electrical Drives Supplied by a Three Level Inverter
Authors: M. S. Kelaiaia, H. Labar, S. Kelaiaia, T. Mesbah
Abstract:
The development of the power electronics has allowed increasing the precision and reliability of the electrical devices, thanks to the adjustable inverters, as the Pulse Wide Modulation (PWM) applied to the three level inverters, which is the object of this study. The authors treat the relation between the law order adopted for a given system and the oscillations of the electrical and mechanical parameters of which the tolerance depends on the process with which they are integrated (paper factory, lifting of the heavy loads, etc.).Thus, the best choice of the regulation indexes allows us to achieve stability and safety training without investment (management of existing equipment). The optimal behavior of any electric device can be achieved by the minimization of the stored electrical and mechanical energy.Keywords: Multi level inverter, PWM, Harmonics, oscillation, control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13731293 Dynamic Inverted Index Maintenance
Authors: Leo Galambos
Abstract:
The majority of today's IR systems base the IR task on two main processes: indexing and searching. There exists a special group of dynamic IR systems where both processes (indexing and searching) happen simultaneously; such a system discards obsolete information, simultaneously dealing with the insertion of new in¬formation, while still answering user queries. In these dynamic, time critical text document databases, it is often important to modify index structures quickly, as documents arrive. This paper presents a method for dynamization which may be used for this task. Experimental results show that the dynamization process is possible and that it guarantees the response time for the query operation and index actualization.
Keywords: Search engine, inverted file, index management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13771292 The Transfer of Energy Technologies in a Developing Country Context Towards Improved Practice from Past Successes and Failures
Authors: Lindiwe O. K. Mabuza, Alan C. Brent, Maxwell Mapako
Abstract:
Technology transfer of renewable energy technologies is very often unsuccessful in the developing world. Aside from challenges that have social, economic, financial, institutional and environmental dimensions, technology transfer has generally been misunderstood, and largely seen as mere delivery of high tech equipment from developed to developing countries or within the developing world from R&D institutions to society. Technology transfer entails much more, including, but not limited to: entire systems and their component parts, know-how, goods and services, equipment, and organisational and managerial procedures. Means to facilitate the successful transfer of energy technologies, including the sharing of lessons are subsequently extremely important for developing countries as they grapple with increasing energy needs to sustain adequate economic growth and development. Improving the success of technology transfer is an ongoing process as more projects are implemented, new problems are encountered and new lessons are learnt. Renewable energy is also critical to improve the quality of lives of the majority of people in developing countries. In rural areas energy is primarily traditional biomass. The consumption activities typically occur in an inefficient manner, thus working against the notion of sustainable development. This paper explores the implementation of technology transfer in the developing world (sub-Saharan Africa). The focus is necessarily on RETs since most rural energy initiatives are RETs-based. Additionally, it aims to highlight some lessons drawn from the cited RE projects and identifies notable differences where energy technology transfer was judged to be successful. This is done through a literature review based on a selection of documented case studies which are judged against the definition provided for technology transfer. This paper also puts forth research recommendations that might contribute to improved technology transfer in the developing world. Key findings of this paper include: Technology transfer cannot be complete without satisfying pre-conditions such as: affordability, maintenance (and associated plans), knowledge and skills transfer, appropriate know how, ownership and commitment, ability to adapt technology, sound business principles such as financial viability and sustainability, project management, relevance and many others. It is also shown that lessons are learnt in both successful and unsuccessful projects.
Keywords: Technology transfer, technology management, renewable energy, sustainable development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16421291 Wangle the Organizational Internal and External Knowledge – A New Horizon for Sustaining the Business Stability
Authors: Asim N., M. Mazhar Manzoor, Shariq A.
Abstract:
Knowledge is renowned as a significant component for sustaining competitive advantage and gives leading edge in business. This study emphasizes towards proper and effectuate utilization of internal and external (both either explicit or tacit) knowledge comes from stakeholders, highly supportive to combat with the challenges and enhance organizational productivity. Furthermore, it proposed a model under context of IRSA framework which facilitates the organization including flow of knowledge and experience sharing among employees. In discussion section an innovative model which indulges all functionality as mentioned in analysis section.Keywords: Effective Decision-Making, Internal & ExternalKnowledge, Knowledge Management, Tacit & Explicit Knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13161290 Application of Simulation and Response Surface to Optimize Hospital Resources
Authors: Shamsuddin Ahmed, Francis Amagoh
Abstract:
This paper presents a case study that uses processoriented simulation to identify bottlenecks in the service delivery system in an emergency department of a hospital in the United Arab Emirates. Using results of the simulation, response surface models were developed to explain patient waiting time and the total time patients spend in the hospital system. Results of the study could be used as a service improvement tool to help hospital management in improving patient throughput and service quality in the hospital system.Keywords: Simulation, Hospital Service, Resource Utilization, United Arab Emirates.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14991289 Simplex Method for Solving Linear Programming Problems with Fuzzy Numbers
Authors: S. H. Nasseri, E. Ardil, A. Yazdani, R. Zaefarian
Abstract:
The fuzzy set theory has been applied in many fields, such as operations research, control theory, and management sciences, etc. In particular, an application of this theory in decision making problems is linear programming problems with fuzzy numbers. In this study, we present a new method for solving fuzzy number linear programming problems, by use of linear ranking function. In fact, our method is similar to simplex method that was used for solving linear programming problems in crisp environment before.Keywords: Fuzzy number linear programming, rankingfunction, simplex method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35331288 Virtualizing Attendance and Reducing Impacts on the Environment with a Mobile Application
Authors: Paulo R. M. de Andrade, Adriano B. Albuquerque, Otávio F. Frota, Robson V. Silveira, Fátima A. da Silva
Abstract:
Information technology has been gaining more and more space whether in industry, commerce or even for personal use, but the misuse of it brings harm to the environment and human health as a result. Contribute to the sustainability of the planet is to compensate the environment, all or part of what withdraws it. The green computing also came to propose practical for use in IT in an environmentally correct way in aid of strategic management and communication. This work focuses on showing how a mobile application can help businesses reduce costs and reduced environmental impacts caused by its processes, through a case study of a public company in Brazil.Keywords: E-government, green computing, information technology, mobile computing, sustainable development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16501287 Adding Security Blocks to the DevOps Lifecycle
Authors: Andrew John Zeller, Francis Pouatcha
Abstract:
Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.
Keywords: Information security, data security, cybersecurity, DevOps, IT management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1191286 Restriction of Iodine Release under Severe Accident Conditions at NPP MIR.1200
Authors: V. Bezlepkin, A. Frolov, L. Lebedev, E. Kharchenko
Abstract:
Iodine radionuclides in accident releases under severe accident conditions at NPP with VVER are the most radiationimportant with a view to population dose generation at the beginning of the accident. To decrease radiation consequences of severe accidents the technical solutions for severe accidents management have been proposed in MIR.1200 project, with consideration of the measures for suppression of volatile iodine forms generation in the containment. Behavior dynamics of different iodine forms in the containment under severe accident conditions has been analyzed for the purpose of these technical solutions justification.Keywords: Iodine radionuclides, VVER, severe accident.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18861285 STRPRO Tool for Manipulation of Stratified Programs Based on SEPN
Authors: Chadlia Jerad, Amel Grissa-Touzi, Habib Ounelli
Abstract:
Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. SEPN nets are well adapted extension of predicate nets for the definition and manipulation of stratified programs. This formalism is characterized by two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimization (maximal stratification, incremental updates ...). We propose, in this paper, useful algorithms for manipulating stratified programs using SEPN. These algorithms were implemented and validated with STRPRO tool.
Keywords: stratified programs, update operations, SEPN formalism, algorithms, STRPRO.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12661284 Modeling the Impact of Controls on Information System Risks
Authors: M. Ndaw, G. Mendy, S. Ouya
Abstract:
Information system risk management helps to reduce or eliminate risk by implementing appropriate controls. In this paper, we propose a quantification model of controls impact on information system risks by automatizing the residual criticality estimation step of FMECA which is based on a inductive reasoning. For this, we defined three equations based on type and maturity of controls. For testing, the values obtained with the model were compared to estimated values given by interlocutors during different working sessions and the result is satisfactory. This model allows an optimal assessment of controls maturity and facilitates risk analysis of information system.Keywords: Information System, Risk, Control, FMECA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15771283 Human Capital Development for ASEAN Community
Authors: Chutikarn Sriwiboon
Abstract:
The main purpose of this research paper was to study the requirements for human capital development in order to be ready for ASEAN Community. Thai education institutions are encountering a challenging course of change to be effective members of ASEAN Economic Community (AEC) in 2015. It was vital that everyone and every organization participate in the process of becoming part of the ASEAN community, a pluralistic society. Thai universities will be required to partake in the human capital development in a variety of fields. In order to assist the whole nation to enhance potential development, there was a need to collaborate with other ASEAN leading universities to do researches to ameliorate the qualifications and capabilities of university management, administers, professors, and staffs.Keywords: ASEAN, Education, Human capital development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27391282 Web Information System for e-Learning
Authors: Anna Angelini, Enrica Gentile, Paola Plantamura, Vito Leonardo Plantamura
Abstract:
A suitable e-learning system management needs to carry out a web-information system in order to allow integrated fruition of data and metadata concerning the activities typical of elearning environment. The definition of a “web information system" for e-learning takes advantage of the potentialities of Web technologies both as for the access to metadata present on the several platforms, and as for the implementation of courseware which make up the relative didactic environment. What information systems have in common is the technological environment on which they are generally implemented and the use of metadata in order to structure information at all cognitive and organization levels. In this work we are going to define a methodology for the implementation of a specific web information system for an e-learning environment.Keywords: e-learning, information systems, coursemanagement, web-based system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15931281 Institutional Aspects of Information Security in Russian Economy
Authors: Mingaleva Zhanna, Kapuskina Tatiana
Abstract:
The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region has been chosen as the bases for the analysis, being the fastestdeveloping region that uses methods of information security in managing it economy. As a result of the study the authors of the given article have formulated their own vision of the problem of information security in various branches of economy and stated prospects of information security development and its growing role in Russian economy
Keywords: security of business, management of information security, institutional analyses.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13191280 FEM Investigation of Induction Heating System for Pipe Brazing
Authors: Ilona I. Iatcheva, Rumena D. Stancheva, Mario Metodiev
Abstract:
The paper deals with determination of electromagnetic and temperature field distribution of induction heating system used for pipe brazing. The problem is considered as coupled – time harmonic electromagnetic and transient thermal field. It has been solved using finite element method. The detailed maps of electromagnetic and thermal field distribution have been obtained. The good understanding of the processes in the considered system ensures possibilities for control, management and increasing the efficiency of the welding process.Keywords: Electromagnetic field, temperature field, finiteelement method, induction heating, pipe brazing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20631279 Scheduled Maintenance and Downtime Cost in Aircraft Maintenance Management
Authors: Remzi Saltoglu, Nazmia Humaira, Gokhan Inalhan
Abstract:
During aircraft maintenance scheduling, operator calculates the budget of the maintenance. Usually, this calculation includes only the costs that are directly related to the maintenance process such as cost of labor, material, and equipment. In some cases, overhead cost is also included. However, in some of those, downtime cost is neglected claiming that grounding is a natural fact of maintenance; therefore, it is not considered as part of the analytical decision-making process. Based on the normalized data, we introduce downtime cost with its monetary value and add its seasonal character. We envision that the rest of the model, which works together with the downtime cost, could be checked with the real life cases, through the review of MRO cost and airline spending in the particular and scheduled maintenance events.
Keywords: Aircraft maintenance, downtime, downtime cost, maintenance cost.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 44261278 Fairness and Quality of Service Issues and Analysis of IEEE 802.11e Wireless LAN
Authors: Ammar Abbas, Ibrahim M. Hussain, Osama M. Hussain
Abstract:
The IEEE 802.11e which is an enhanced version of the 802.11 WLAN standards incorporates the Quality of Service (QoS) which makes it a better choice for multimedia and real time applications. In this paper we study various aspects concerned with 802.11e standard. Further, the analysis results for this standard are compared with the legacy 802.11 standard. Simulation results show that IEEE 802.11e out performs legacy IEEE 802.11 in terms of quality of service due to its flow differentiated channel allocation and better queue management architecture. We also propose a method to improve the unfair allocation of bandwidth for downlink and uplink channels by varying the medium access priority level.
Keywords: Wireless, IEEE 802.11e, EDCA, Throughput, QoS, MAC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22091277 Benefits from a SMED Application in a Punching Machine
Authors: Eric Costa, Sara Bragança, Rui Sousa, Anabela Alves
Abstract:
This paper presents an application of the Single-Minute Exchange of Die (SMED) methodology to a turret punching machine in an elevators company, in Portugal. The work was developed during five months, in the ambit of a master thesis in Industrial Engineering and Management. The Lean Production tool SMED was applied to reduce setup times in order to improve the production flexibility of the machine. The main results obtained were a reduction of 64% in setup time (from 15.1 to 5.4min), 50% in work-in-process amount (from 12.8 to 6.4 days) and 99% in the distance traveled by the operator during the internal period (from 136.7 to 1.7m). These improvements correspond to gains of about €7,315.38 per year.
Keywords: Lean production, setup process, SMED.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40831276 A Fuzzy Decision Making Approach for Supplier Selection in Healthcare Industry
Authors: Zeynep Sener, Mehtap Dursun
Abstract:
Supplier evaluation and selection is one of the most important components of an effective supply chain management system. Due to the expanding competition in healthcare, selecting the right medical device suppliers offers great potential for increasing quality while decreasing costs. This paper proposes a fuzzy decision making approach for medical supplier selection. A real-world medical device supplier selection problem is presented to illustrate the application of the proposed decision methodology.
Keywords: Fuzzy decision making, fuzzy multiple objective programming, medical supply chain, supplier selection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26731275 “Friction Surfaces” of Airport Emergency Plan
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.
Keywords: Airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19491274 Processing Web-Cam Images by a Neuro-Fuzzy Approach for Vehicular Traffic Monitoring
Authors: A. Faro, D. Giordano, C. Spampinato
Abstract:
Traffic management in an urban area is highly facilitated by the knowledge of the traffic conditions in every street or highway involved in the vehicular mobility system. Aim of the paper is to propose a neuro-fuzzy approach able to compute the main parameters of a traffic system, i.e., car density, velocity and flow, by using the images collected by the web-cams located at the crossroads of the traffic network. The performances of this approach encourage its application when the traffic system is far from the saturation. A fuzzy model is also outlined to evaluate when it is suitable to use more accurate, even if more time consuming, algorithms for measuring traffic conditions near to saturation.
Keywords: Neuro-fuzzy networks, computer vision, Fuzzy systems, intelligent transportation system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15931273 Efficient Design of Distribution Logistics by Using a Model-Based Decision Support System
Abstract:
The design of distribution logistics has a decisive impact on a company's logistics costs and performance. Hence, such solutions make an essential contribution to corporate success. This article describes a decision support system for analyzing the potential of distribution logistics in terms of logistics costs and performance. In contrast to previous procedures of business process re-engineering (BPR), this method maps distribution logistics holistically under variable distribution structures. Combined with qualitative measures the decision support system will contribute to a more efficient design of distribution logistics.
Keywords: Decision support system distribution logistics, potential analyses, supply chain management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18241272 Practical Application of Simulation of Business Processes
Authors: Markéta Gregušová, Vladimíra Schindlerová, Ivana Šajdlerová, Petr Mohyla, Jan Kedroň
Abstract:
Company managers are always looking for more and more opportunities to succeed in today's fiercely competitive market. To maintain your place among the successful companies on the market today or to come up with a revolutionary business idea is much more difficult than before. Each new or improved method, tool, or approach that can improve the functioning of business processes or even of the entire system is worth checking and verification. The use of simulation in the design of manufacturing systems and their management in practice is one of the ways without increased risk, which makes it possible to find the optimal parameters of manufacturing processes and systems. The paper presents an example of use of simulation for solution of the bottleneck problem in the concrete company.
Keywords: Practical applications, business processes, systems, simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30331271 In Search of the Meaning of Entrepreneurship
Authors: H. Fabian Weber, Betina Szkudlarek
Abstract:
The following study aims to outline, whether the perceptions of entrepreneurs about their entrepreneurial activities and the underlying meanings of their activities are universal or whether they vary systematically across cultures. In contrast to previous studies, the phenomenographical approach and the resulting findings of this study provide new insights into what constitutes entrepreneurship by drawing an inference from the perceptions of entrepreneurs in the United States and in Germany. Culture is shown to have an important impact on entrepreneurship, since the underlying meanings of entrepreneurship vary significantly among the two sample groups. Furthermore, the study sheds more light on the culturally contingent 'why' of entrepreneurship by looking at the internal motivations of individuals instead of exclusively focusing on character traits or external influences of the respective economic environments.Keywords: Cross-Cultural Management, Entrepreneurship, Phenomenography, Qualitative Research.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31591270 Human Tracking across Heterogeneous Systems Based On Mobile Agent Technologies
Authors: Tappei Yotsumoto, Atsushi Nomura, Kozo Tanigawa, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara
Abstract:
In a human tracking system, expanding a monitoring range of one system is complicating the management of devices and increasing its cost. Therefore, we propose a method to realize a wide-range human tracking by connecting small systems. In this paper, we examined an agent deploy method and information contents across the heterogeneous human tracking systems. By implementing the proposed method, we can construct a human tracking system across heterogeneous systems, and the system can track a target continuously between systems.
Keywords: Human tracking system, mobile agent, monitoring.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1517