scholarly journals The Effectiveness of Automated Machine Over Manual Machine in Operational Line

Author(s):  
Helmi Adly Mohd Noor ◽  
Muhamad Nor Sadiqin Bin Ramli ◽  
Rahimah Kassim ◽  
Fauziah Abdul Rahman ◽  
Zirawani Baharum ◽  
...  

As for the project research that had to be done by the researcher, it will be more concentrates on the effectiveness of machine over manual machine in operation line at LGL Technology Sdn Bhd. So, based on the problem research regarding the effectiveness of LGL operation, it will be necessary as to investigate their operation that are mostly depending on manual machine. So, the researcher would decide to exert two research techniques in order to get the information by the first sources is the primary sources that are include observation, and interview, and for the second sources is the secondary sources is based on journal, website, books and also article. By having a simulation as to mimic the real-world system on computer, by making simulation on their current and with the proposed design as to compare which is more effective. So, in the future this project would be able to help the LGL as to improve their effectiveness in their operation as it also can improve their service to their customer.

Author(s):  
Mary Lee Dunn ◽  
Polly Hoppin ◽  
Beth Rosenberg

Eula Bingham, toxicologist and former head of the Occupational Safety and Health Administration, is now at that place in her professional life where she can look back over her long career and identify its turning points and evaluate what worked and what didn't, what was important and what of lesser significance. In two interviews, she also looks at the present and the future and expresses concerns about the way we live now.


2021 ◽  
pp. 1-14
Author(s):  
Irina Astrova ◽  
Arne Koschel ◽  
Marc Schaaf ◽  
Samuel Klassen ◽  
Kerim Jdiya

This paper is aimed at helping organizations to understand what they can expect from a serverless architecture in the future and how they can make sound decisions about the choice between microservice and serverless architectures in the present. A serverless architecture is a new approach to offering services in the cloud. It was invented as a solution to the problem that many organizations are facing today – about 85% of their servers have underutilized capacity, which is proved to be costly and wasteful. By employing the serverless architecture, the organizations get a way to eliminate idle, underutilized servers and thus, to reduce their operational costs. Many cloud providers are now jumping to the serverless world because they know it is going to be the future of software architectures. However, being a new approach, the serverless architecture is still relatively immature – it is in the early stages of its support by cloud service platform providers. This paper provides an in-depth study about the serverless architecture and how to apply FaaS in the real world.


2019 ◽  
pp. 250-261 ◽  
Author(s):  
Deena Skolnick Weisberg

The imagination is a necessary tool for doing science, because it allows scientists to form hypotheses, make predictions about the future, and consider non-actual possibilities. But some have worried that the imagination is too unconstrained to be used in the service of scientific inquiry, which needs to be tied closely to reality. This chapter reviews these arguments and provides empirical evidence that the imagination is constrained enough for science. Both children and adults base their imagined worlds on the real world, and these worlds rarely stray from the causal structure of reality. And although the imagination may be subject to some biases that make certain kinds of worlds easier to imagine, these biases can be identified and corrected through training and enculturation in science. Finally, the conclusions drawn within an imagined context can be brought to bear appropriately on reality, allowing the results of thought experiments and hypothetical scenarios to inform the practice of science.


1990 ◽  
Vol 46 (3) ◽  
Author(s):  
J. J. Kritzinger

World evangelisation within the Lausanne movement This article considers a number of key themes regarding world evangelisation. The point of departure is the second general conference of the Lausanne movement, which was held in Manila during July 1989. The first section gives some background to the Lausanne movement and events leading to this large and representative gathering. Secondly, some personal impressions gained at the conference itself are related. This is followed by a section on the Philippine setting of the conference, which played an important role in creating an atmosphere of involvement with the real world. The last section deals with some of the important issues arising from the conference. What should the future agenda be for world missions?


2017 ◽  
Vol 1 (2) ◽  
pp. 76-90 ◽  
Author(s):  
Jassim Happa ◽  
Michael Goldsmith

Purpose Several attack models attempt to describe behaviours of attacks with the intent to understand and combat them better. However, all models are to some degree incomplete. They may lack insight about minor variations about attacks that are observed in the real world (but are not described in the model). This may lead to similar attacks being classified as the same type of attack, or in some cases the same instance of attack. The appropriate solution would be to modify the model or replace it entirely. However, doing so may be undesirable as the model may work well for most cases or time and resource constraints may factor in as well. This paper aims to explore the potential value of adding information about attacks and attackers to existing models. Design/methodology/approach This paper investigates used cases of minor variations in attacks and how it may and may not be appropriate to communicate subtle differences in existing attack models through the use of annotations. In particular, the authors investigate commonalities across a range of existing models and identify where and how annotations may be helpful. Findings The authors propose that nuances (of attack properties) can be appended as annotations to existing attack models. Using annotations appropriately should enable analysts and researchers to express subtle but important variations in attacks that may not fit the model currently being used. Research limitations/implications This work only demonstrated a few simple, generic examples. In the future, the authors intend to investigate how this annotation approach can be extended further. Particularly, they intend to explore how annotations can be created computationally; the authors wish to obtain feedback from security analysts through interviews, identify where potential biases may arise and identify other real-world applications. Originality/value The value of this paper is that the authors demonstrate how annotations may help analysts communicate and ask better questions during identification of unknown aspects of attacks faster,e.g. as a means of storing mental notes in a structured manner, especially while facing zero-day attacks when information is incomplete.


2020 ◽  
pp. 125-183
Author(s):  
Christina Schachtner

Abstract In this chapter, the empirical data are presented as a typology of narratives in which experiences and activities in virtual space and the real world are interwoven, along with ideas and wishes for the future, what has happened in the past, and what is happening in the present. They run like a subterranean web through the narrators’ lives, initiating patterns of thinking and doing which revolve around a specific focus. The following types of narrations were identified: stories about interconnectedness, self-staging, supplying and selling, managing boundaries, and transformation, as well as setting out and breaking away.


There are hundreds of technologies today. Companies and brands continuously try to create and bring something innovative in the market to attract consumers to them in order to get a rise in market share. In the world where people have started getting used to hundreds of technologies, if asked about those which have affected them the most in last ten to twelve years, no one will miss mentioning blockchain. Blockchain has gained very much popularity after the introduction of bitcoin and ethereum in its environment. Blockchain mainly has two types of functionalities. One that involves transactions and the other which talks about contracts. This work highlights some of the very much talked about applications of this technology in the real world. The work also considers various factors and methods by which this technology can be introduced to the audience by suggesting ways in which blockchain can be introduced in the lives. Discussion on how this technology can affect human lives in the future is also an important part of this paper. Because blockchain has huge number of applications that the paper has tried to inculcate, it can be a technology of future which many scientists and industrialists have already started to believe. That is why this work finds a unique and all in one collection of applications and possibilities of Blockchain.


Author(s):  
Xiaoyu Tang ◽  
Yulin Gao ◽  
Weiping Yang ◽  
Ming Zhang ◽  
Jinglong Wu

Bimodal audiovisual (AV) stimuli are detected or discriminated faster and more accurately than either visual or auditory unimodal stimuli. This effect is called audiovisual integration. Recently, researchers have been increasingly focused on the audiovisual integration of natural, auditory, and visual stimuli in real-world situations. There are some differences between audiovisual integration of naturalistic stimuli and non-naturalistic stimuli, such as the time of occurrence of audiovisual integration, and the neural mechanism. Factors affecting audiovisual integration in real-world situations are summarized here, with particular focus on temporal asynchrony and semantic matching. Stimuli of audiovisual integration in the real-world situation should be controlled strictly, especially emotional factors, familiarity factors, semantic matching, and the match of the naturalistic stimuli and non-naturalistic stimuli. In the future, researchers should study the influence of attention on audiovisual integration and the mechanism of audiovisual integration with naturalistic stimuli in the real-world situation.


Author(s):  
Raghu Echempati

Abstract When the engineering students graduate and are about to enter the “real world of engineering” — be it an engineering industry (as a coop or as an engineer), or return to an educational institution for further studies, they must appreciate and possibly be already familiar with the concept of “Total Design of the Mechanical System”. This means that the students be given excellent training before they graduate, to fulfil the current and the future needs of an industry. This paper presents the methodology adopted by the author based on his own experience as a consultant to an industry, in teaching 2 different design courses at the Michigan Technological University. The feedback obtained (from time to time) from the student alumni has been a totally rewarding experience.


Sign in / Sign up

Export Citation Format

Share Document