Recent advances on reliability evaluation and optimization of linear multistate consecutively connected systems

2020 ◽  
Vol 14 ◽  
Author(s):  
Li Qu ◽  
Chenjing Han ◽  
Yingchun Li ◽  
Kaiye Gao ◽  
Rui Peng

: With the progress of technology, the model of linear multistate consecutively connected systems (LMCCS) is applied more and more widely, such as telecommunication systems, internet of things, etc. LMCCS contains a series of linearly arranged nodes and any disconnection between nodes will lead to the failure of the whole system. Thus, the reliability of a linear multistate system is affected by many factors such as the positioning of elements. In order to be able to incorporate different types of complicated practical factors, researchers have proposed different extensions for LMCCS model. Besides, models are proposed to study the optimal system configurations of such systems considering reliability and some other objectives or constraints. Facing amounts of works on LMCCS, this paper aims to review these literatures, classify them, and elicit some future research directions.

Author(s):  
Jorge A. Romero

The understanding of the link between Information Technology (IT) investments and firm performance is still not completely understood in spite of numerous studies. However, these studies are not united in how they examine the effects of IT on business performance. They differ in their criteria, methodologies, and samples. Therefore, while there are positive effects associated with IT on firm performance, it is still difficult to reach overarching conclusions and highlight that there is still a need for further research. Specifically, this chapter contributes to this area of study by discussing the different types of benefits that firms can get from IT investments, examining the use of accounting variables to quantify the effect of IT, and providing future research directions.


Author(s):  
George A. Sielis ◽  
Aimilia Tzanavari ◽  
George A. Papadopoulos

Recommender or recommendation systems are software tools that make useful suggestions to users, by taking into account their profile, preferences and/or actions during interaction with an application or website. They are usually personalized and can refer to items to buy, people to connect to or books/ articles to read. Recommender Systems (RS) aim at helping users with their interaction by bringing to surface the information that is relevant to them, their needs, or their tasks. This article's objective is to present a review of the different types of RS, the techniques and methods used for building such systems, the algorithms used to generate the recommendations and how these systems can be evaluated. Finally, a number of topics are discussed as envisioned future research directions.


2002 ◽  
Vol 27 (2) ◽  
pp. 13-28 ◽  
Author(s):  
Piyush Kumar Sinha ◽  
Arindam Banerjee ◽  
Dwarika Prasad Uniyal

Store choice is a decision that a shopper is fairly involved in. It is important for a store to understand this behaviour for developing marketing strategies to attract and keep its clientele. It is found that shoppers choose the store based on many aspects that could be classified as primary and image based. It is also found that the importance of each of these aspects changes with the kind of store the shopper wants to visit. In the Indian context where the shopper does not have much variety in store format, the type of store is recognized by the kind of product the store deals in. The paper is an attempt to understand this behaviour of the shopper. The shoppers are explored for the primary reasons for choosing a store. Then, using a factor analysis, the several image dimensions are classified. Further, using multinomial logit regression, the store choice pattern is studied across different types of store. Implications for the managers in the retail business are drawn and future research directions have been highlighted.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 62962-63003 ◽  
Author(s):  
Yasir Saleem ◽  
Noel Crespi ◽  
Mubashir Husain Rehmani ◽  
Rebecca Copeland

Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1793 ◽  
Author(s):  
Yousaf Bin Zikria ◽  
Sung Won Kim ◽  
Oliver Hahm ◽  
Muhammad Khalil Afzal ◽  
Mohammed Y. Aalsalem

Internet of Things (IoT) is rapidly growing and contributing drastically to improve the quality of life. Immense technological innovations and growth is a key factor in IoT advancements. Readily available low cost IoT hardware is essential for continuous adaptation of IoT. Advancements in IoT Operating System (OS) to support these newly developed IoT hardware along with the recent standards and techniques for all the communication layers are the way forward. The variety of IoT OS availability demands to support interoperability that requires to follow standard set of rules for development and protocol functionalities to support heterogeneous deployment scenarios. IoT requires to be intelligent to self-adapt according to the network conditions. In this paper, we present brief overview of different IoT OSs, supported hardware, and future research directions. Therein, we provide overview of the accepted papers in our Special Issue on IoT OS management: opportunities, challenges, and solution. Finally, we conclude the manuscript.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


Author(s):  
Kilian Gericke ◽  
Boris Eisenbart

AbstractResearch and industrial practice have produced a host of function models and modeling approaches over the last decades. Each of these is meant to support designers in their design endeavors. Industrial practice is excessively diversified in terms of contextual requirements, aims, and adopted processes; this automatically begs the question which of the existing models should be selected for application in a specific situation. This paper sets out to contribute to this discourse. It strives to benchmark the fairly novel integrated function modeling (IFM) framework against the well-established function structures modeling approach. The paper comparatively investigates the respective capabilities of the approaches, following the benchmarking protocol used earlier in relation to this Special Issue. Function structures are used as reference as they represent one of the most widespread function modeling approaches in research and practice. Both function structures and the IFM framework are exemplarily applied for modeling a glue gun. The gradual generation and refinement of the models is used to showcase their respective benefits and shortcomings. Eventually, the IFM framework is found to excel over function structures in terms of comprehensiveness and support for different types of function analyses. Finally, future research directions are proposed.


Author(s):  
Victor X. Wang

This article uses a real case to illustrate that marketing educational programs through technology is affected by one’s philosophies positively or negatively, depending on the philosophies adopted. Seven philosophies are discussed in relationship to marketing educational programs via technology. Connections between the seven philosophies and different types of universities/colleges are drawn. Future research directions also revolve around marketing educational programs, Web 2.0 technologies and one’s philosophies. It is recommended that universities/colleges seriously consider hiring those administrators who have adopted the right philosophies as the wrong philosophies will work against the mission of certain academic departments, hence the whole university or college.


2018 ◽  
Vol 37 (2) ◽  
pp. 83-106 ◽  
Author(s):  
Melissa Rouel ◽  
Richard J. Stevenson ◽  
Evelyn Smith

There is evidence that different types of contaminants produce different responses and have different motivations for avoidance. Contaminants directly associated with disease (direct contaminants) are motivated by disgust avoidance, whereas contaminants indirectly associated with disease (indirect contaminants) and contaminants associated with harmful substances (harm contaminants) are motivated by harm avoidance and threat estimations. This study aims to confirm this distinction between contaminant types and examine the role of cognitive load, awareness and time on processing these threats. One hundred and four participants completed three chain of contagion tasks with direct, indirect, and harm contaminants. Cognitive load, awareness of contamination and time were manipulated during the tasks. Consistent with previous findings, direct contaminants produced stronger disgust responses, while harm and indirect contaminants produced stronger threat estimations. Increasing cognitive load did not impact processing of any type of contaminant. There was evidence that a time delay reduced the spread of contagion for all contaminants. This highlights the importance of time in altering the perception of contamination threat. Implications and future research directions are discussed.


Sign in / Sign up

Export Citation Format

Share Document