Cost effective analysis of web based transmission

Author(s):  
Neil Williams ◽  
Kheng Cher Yeo ◽  
Sami Azam
2017 ◽  
Vol 26 (1) ◽  
pp. 53-62 ◽  
Author(s):  
Richard Bell ◽  
Braden Te Ao ◽  
Natasha Ironside ◽  
Adam Bartlett ◽  
John A. Windsor ◽  
...  

1999 ◽  
Vol 2 (3) ◽  
pp. 184 ◽  
Author(s):  
EA Alemao ◽  
PS Cady ◽  
HM Phatak ◽  
VL Culbertson

2000 ◽  
Author(s):  
Yusheng Chen ◽  
Satyandra K. Gupta ◽  
Shaw Feng

Abstract This paper describes a web-based process/material advisory system that can be used during conceptual design. Given a set of design requirements for a part during conceptual design stage, our system produces process sequences that can meet the design requirements. Quite often during conceptual design stage, design requirements are not precisely defined. Therefore, we allow users to describe design requirements in terms of parameter ranges. Parameter ranges are used to capture uncertainties in design requirements. Our system accounts for uncertainties in design requirements in generating and evaluating process/material combinations. Our system uses a two step algorithm. During the first step, we generate a material/process option tree. This tree represents various process/material options that can be used to meet the given set of design requirements. During the second step, we evaluate various alternative process/material options using a depth first branch and bound algorithm to identify and recommend the least expensive process/material combination to the designer. Our system can be accessed on the World Wide Web using a standard browser. Our system allows designs to consider a wide variety of process/material options during the conceptual design stage and allows them to find the most cost-effective combination. By selecting the process/material combination during the early design stages, designers can ensure that the detailed design is compatible with all of the process constraints for the selected process.


2008 ◽  
Vol 41 (2) ◽  
pp. 126-134 ◽  
Author(s):  
A.M.E.C. Barreto ◽  
K. Takei ◽  
Sabino E.C. ◽  
M.A.O. Bellesa ◽  
N.A. Salles ◽  
...  

2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Debjit Bhowmick ◽  
Stephan Winter ◽  
Mark Stevenson ◽  
Peter Vortisch

AbstractWalk-sharing is a cost-effective and proactive approach that promises to improve pedestrian safety and has been shown to be technically (theoretically) viable. Yet, the practical viability of walk-sharing is largely dependent on community acceptance, which has not, until now, been explored. Gaining useful insights on the community’s spatio-temporal and social preferences in regard to walk-sharing will ensure the establishment of practical viability of walk-sharing in a real-world urban scenario. We aim to derive practical viability using defined performance metrics (waiting time, detour distance, walk-alone distance and matching rate) and by investigating the effectiveness of walk-sharing in terms of its major objective of improving pedestrian safety and safety perception. We make use of the results from a web-based survey on the public perception on our proposed walk-sharing scheme. Findings are fed into an existing agent-based walk-sharing model to investigate the performance of walk-sharing and deduce its practical viability in urban scenarios.


10.28945/3557 ◽  
2016 ◽  
Vol 1 ◽  
pp. 001-016
Author(s):  
Grandon Gill ◽  
Joni Jones

Jeffrey Stiles pondered these seemingly straightforward questions. As IT Director of Jagged Peak, Inc., a developer of e-commerce solutions located in the Tampa Bay region of Florida, it would be his responsibility to oversee the implementation of security measures that went beyond the existing user name and password currently required for each user. Recent events suggested that a move towards increased security might be inevitable. In just the past year, highly publicized security failures at the U.S. Department of Defense, major healthcare providers and large companies, such as Sony and JP Morgan Chase, had made executives acutely aware of the adverse consequences of IT system vulnerabilities. In fact, a study of business risk managers conducted in 2014 found that 69% of all businesses had experienced some level of hacking in the previous year. The nature of Jagged Peak’s business made the security of its systems a particular concern. The company, which had grown rapidly over the years, reporting over $61 million in revenue in 2014, provided its customers with software that supported web-based ordering, fulfillment and logistics activities, built around a philosophy of “buy anywhere, fulfill anywhere, return anywhere”. To support these activities, the company’s Edge platform needed to handle a variety of payment types, including gift cards (a recent target of hackers), as well as sensitive personal identifying information (PII). Compounding the security challenge: each customer ran its own instance of the Edge platform, and managed its own users. When only a single customer was being considered, the addition of further layers of security to authenticate uses was an eminently solvable problem. A variety of alternative approaches existed, including the use of various biometrics, key fobs that provided codes the user could enter, personalized security questions, and many others. The problem was that where multiple customers were involved, it was much more difficult to form a consensus. One customer might object to biometrics because it users lacked the necessary hardware. Another might object to security keys as being too costly, easily stolen or lost. Personalized questions might be considered too failure-prone by some customers. Furthermore, it was not clear that adding additional layers of authentication would necessarily be the most cost-effective way to reduce vulnerability. Other approaches, such as user training might provide greater value. Even if Stiles decided to proceed with additional authentication, questions remained. Mandatory or a free/added-cost option? Developed in house or by a third party? Used for internal systems only, customer platforms only, or both? Implementation could not begin until these broad questions were answered.


Sign in / Sign up

Export Citation Format

Share Document