scholarly journals An Investigation of the Learning and Forgetting of Workers in Dual Resource Constrained Systems

Author(s):  
John Russell Zamiska

This thesis examines worker learning and forgetting in dual resource constrained systems according to the dual-phase learning-forgetting model (DPLFM). The contributions are as follows: (1) equations were developed that output controllable shop factors such as training and transfer policies given existing factors such as the degree of job similarity, processing times, and the learning and forgetting rate of the worker, (2) results suggest that the task-type factor with respect to the worker learning rate and proportion of cognitive and motor elements is a factor to include in DRC research, and (3) the results have suggested that the DPLFM emphasized a greater benefit for upfront training and more frequent transfer policy than the learn forget curve model (LFCM) when tasks are similar, and supported the conclusions of Jaber et al. (2003) by an even greater extent that it is possible to use more flexibility in DRC shops with similar tasks.

2021 ◽  
Author(s):  
John Russell Zamiska

This thesis examines worker learning and forgetting in dual resource constrained systems according to the dual-phase learning-forgetting model (DPLFM). The contributions are as follows: (1) equations were developed that output controllable shop factors such as training and transfer policies given existing factors such as the degree of job similarity, processing times, and the learning and forgetting rate of the worker, (2) results suggest that the task-type factor with respect to the worker learning rate and proportion of cognitive and motor elements is a factor to include in DRC research, and (3) the results have suggested that the DPLFM emphasized a greater benefit for upfront training and more frequent transfer policy than the learn forget curve model (LFCM) when tasks are similar, and supported the conclusions of Jaber et al. (2003) by an even greater extent that it is possible to use more flexibility in DRC shops with similar tasks.


2007 ◽  
Vol 177 (3) ◽  
pp. 1507-1519 ◽  
Author(s):  
John R. Zamiska ◽  
Mohamad Y. Jaber ◽  
Hemant V. Kher

2016 ◽  
Vol 75 ◽  
pp. 06005 ◽  
Author(s):  
Artem Yushev ◽  
Manuel Schappacher ◽  
Axel Sikora

2019 ◽  
Vol 134 ◽  
pp. 106266 ◽  
Author(s):  
Stephen Adams ◽  
Ryan Meekins ◽  
Peter A. Beling ◽  
Kevin Farinholt ◽  
Nathan Brown ◽  
...  

2017 ◽  
Vol 26 (09) ◽  
pp. 1750138 ◽  
Author(s):  
Zahra Jeddi ◽  
Ahmed Khattab ◽  
Esmaeil Amini ◽  
Madgy Bayoumi

This paper presents an analysis of the security performance and evaluation of the hardware architecture of the redundant bit security (RBS) cryptosystem. RBS is a lightweight symmetric encryption algorithm that targets resource-constrained RFID devices. Unlike the existing cryptosystems, RBS simultaneously provides confidentiality, authentication, and integrity of the plaintext by inserting hash-generated redundant bits among the already modified plaintext data. A flexible-length hash algorithm in our optimized hardware architecture allows RBS to support different key sizes which allows flexibility in the security level. Our analysis shows the resilience of RBS against powerful and well-known attacks such as differential attacks and known-plaintext attacks. We compare the performance of the RBS cryptosystem against other distinguished ciphers developed for RFID systems. Simulation results show that RBS results in approximately 100%, 239%, and 153% higher hardware efficiencies while requiring 48%, 56%, and 59% less energy-per-bit compared to H-PRESENT, HB-2, and Grain, respectively. Such results present confirmatory evidence that RBS is a superior solution for providing security in resource-constrained systems such as RFID systems especially when authentication is a priority.


Author(s):  
Norbert Druml ◽  
Manuel Menghin ◽  
Adnan Kuleta ◽  
Christian Steger ◽  
Reinhold Weiss ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document