scholarly journals An analysis on the improvement of system for proof of delivery

Author(s):  
Aliya Dharaningtyas ◽  
Adirizal Nizar

The delivery system for Base Transceiver System (BTS) to strengthen the telecommunication network throughout Indonesia maritime country is needed to speed up the process due to uneven distribution of sufficient telecommunications infrastructure. PT. Gunadhya Rajawali Logistik (GRL) is a third-party logistics company that focuses on transportation and warehouse management and delivery for telecommunication equipment tools. Unfortunately, in delivering BTS installation part throughout Indonesia, PT. GRL received several warning letters and had to pay a penalty from one of customers, for being late in reporting the delivery proof. This study aims to analyze the root causes of late submission of Soft Copy of Proof of Delivery (SCPOD) to avoid penalty given by the customer and determine suitable solutions to improve the process. The approach used in this study is lean six sigma with the help of Define, Measure, Analyze, Improve, and Control (DMAIC) roadmap. According to the interview with the employees related, the root causes of late submission of SCPOD are irresponsible drivers, indiscipline drivers in carrying out deliveries, and lack of data management in the transportation system. To be able to solve this problem, several proposed solutions can be applied. The proposed solutions to overcome the root causes that should be applied by the company are to hire a document control, retraining the Standard Operating Procedure (SOP) for drivers, utilize transportation management system application, and apply incentive systems for drivers. In the future, it is recommended for PT. GRL to have a minimum standard in recruiting the drivers for example only recruit who possess a minimum of high school education to ease the completion of administrative tasks.  

2015 ◽  
Vol 637 ◽  
pp. 21-26 ◽  
Author(s):  
Lesya Demchuk ◽  
Roman Baitsar

Classic intention, which pursues the management of any company – is to improve the quality and competitiveness of its own production, aiming at the end to speed up the receiving of profit. Such an implementation is primarily made possible by optimizing production processes. The manufacturing processes are influenced by various factors that may lead to deviations from the process requirements. Management of processes is needed to counteract such change in the process.Processes that are not managed, can lead to the production of a large number of defective products earlier before the detection of nonconformity, causing significant damage and lead to disruption of production schedules. It is important to develop an effective system of management and control, capable of detecting variations in the process as early as possible so you can take corrective action before it is produced by a large number of defective products. To optimize production processes in quality assurance the following systems have been known as Theory of Constraints, Lean, Six Sigma. Typically, these systems are used separately. However, their combination and comprehensive utilization can be more efficient and can give a much better result.As a rule, first by using Theory of Constraints (TOC) the bottleneck is defined – weak area, which is an obstacle of improving of the quality and efficiency of the company and profit increasing. Then Lean tools manage this area. And the next phase includes Six Sigma, which allows you to receive a significant increase in the effectiveness and efficiency of production and profit.Each of these techniques is unique and their complex usage is important in managing the quality of processes and products.


2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.


2004 ◽  
Vol 27 (1) ◽  
pp. 39 ◽  
Author(s):  
Hans Lofgren

Public and private third-party payers in many countries encourage or mandate the use of generic drugs. This articleexamines the development of generics policy in Australia, against the background of a description of internationaltrends in this area, and related experiences of reference pricing programs. The Australian generics market remainsunderdeveloped due to a historical legacy of small Pharmaceutical Benefits Scheme price differentials betweenoriginator brands and generics. It is argued that policy measures open to the Australian government can be conceivedas clustering around two different approaches: incremental changes within the existing regulatory framework, or a shifttowards a high volume/low price role of generics which would speed up the delivery of substantial cost savings, andcould provide enhanced scope for the financing of new, patented drugs.


2011 ◽  
Vol 12 (1-2) ◽  
pp. 127-156 ◽  
Author(s):  
JOACHIM SCHIMPF ◽  
KISH SHEN

AbstractECLiPSe is a Prolog-based programming system, aimed at the development and deployment of constraint programming applications. It is also used for teaching most aspects of combinatorial problem solving, for example, problem modelling, constraint programming, mathematical programming and search techniques. It uses an extended Prolog as its high-level modelling and control language, complemented by several constraint solver libraries, interfaces to third-party solvers, an integrated development environment and interfaces for embedding into host environments. This paper discusses language extensions, implementation aspects, components, and tools that we consider relevant on the way from Logic Programming to Constraint Logic Programming.


Web Services ◽  
2019 ◽  
pp. 882-903
Author(s):  
Izabella V. Lokshina ◽  
Barbara J. Durkin ◽  
Cees J.M. Lanting

The Internet of Things (IoT) provides the tools for the development of a major, global data-driven ecosystem. When accessible to people and businesses, this information can make every area of life, including business, more data-driven. In this ecosystem, with its emphasis on Big Data, there has been a focus on building business models for the provision of services, the so-called Internet of Services (IoS). These models assume the existence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated by any party. Different business models may support opportunities that generate revenue and value for various types of customers. This paper contributes to the literature by considering business models and opportunities for third-party data analysis services and discusses access to information generated by third parties in relation to Big Data techniques and potential business opportunities.


2019 ◽  
pp. 567-596
Author(s):  
Eric Baskind ◽  
Greg Osborne ◽  
Lee Roach
Keyword(s):  

This chapter discusses situations wherein the shipper will only form a contract to book space on a ship. In such a case, the person requiring the goods to be carried, called the ‘shipper’, enters into a contract of carriage of the goods with the person having possession and control of the ship, the ‘carrier’. The carrier need not have title to an absolute interest in the ship; he or she may be a charterer having at most only possessory title, and the shipper may well pass his or her rights in the goods along with his or her rights against the carrier to a third party. Although the terms ‘shipper’ and ‘carrier’ are used here, the parties concerned would often be more accurately described as the ‘cargo interests’ and the ‘ship interests’.


2019 ◽  
Vol 23 (01) ◽  
pp. 1950015 ◽  
Author(s):  
YANDONG XIAO ◽  
CHULIANG SONG ◽  
LIANG TIAN ◽  
YANG-YU LIU

Our ability to understand and control the emergence of order in swarming systems is a fundamental challenge in contemporary science. The standard Vicsek model (SVM) — a minimal model for swarming systems of self-propelled particles — describes a large population of agents reaching global alignment without the need of central control. Yet, the emergence of order in this model takes time and is not robust to noise. In many real-world scenarios, we need a decentralized protocol to guide a swarming system (e.g., unmanned vehicles or nanorobots) to reach an ordered state in a prompt and noise-robust manner. Here, we find that introducing a simple adaptive rule based on the heading differences of neighboring particles in the Vicsek model can effectively speed up their global alignment, mitigate the disturbance of noise to alignment, and maintain a robust alignment under predation. This simple adaptive model of swarming systems could offer new insights in understanding the prompt and flexible formation of animals and help us design better protocols to achieve fast and robust alignment for multi-agent systems.


Sign in / Sign up

Export Citation Format

Share Document