Muhd Sharil Reiza Ismail, Andrew Keong Ng, Oh Sin Hin, Tan Chuan Heng
{"title":"Integrated Systems Analysis Software for Interdependency Analysis of Railway Systems","authors":"Muhd Sharil Reiza Ismail, Andrew Keong Ng, Oh Sin Hin, Tan Chuan Heng","doi":"10.1109/SOLI.2018.8476696","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476696","url":null,"abstract":"As the complexity of railway network increases, tools and methods for analyzing the interactions and behaviors of railway systems are needed by system engineers. This paper aims to design and develop an integrated systems analysis software (ISAS) that can efficiently access the railway integrated system design information and effectively analyze the interdependencies of railway systems, thereby increasing work productivity while reducing time and labor costs. With Microsoft Access, a relational database management system, the proposed ISAS can also extract information relevant to the user query, display it on a user-friendly graphical user interface, and summarize it in an easy-to-read report to facilitate system design discussions and meetings.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Servitization as a key driver for Digital Transformation of manufacturing companies’ Spare Parts Service","authors":"U. Dombrowski, Simon Fochler","doi":"10.1109/SOLI.2018.8476713","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476713","url":null,"abstract":"The increasing service orientation of manufacturing companies places new requirements on traditional business areas such as the Spare Parts Service. The development of Servitization is a driver of Digital Transformation, especially in the After Sales Service. For the front-end processes between customer and customer service, the Digital Transformation acts as a technological vehicle that makes it possible to satisfy the new requirements demanded by the customer. For the back-end processes between Customer Service and Spare Parts Service, on the other hand, the Digital Transformation is an opportunity to face the internal efficiency and cost pressure resulting from Servitization in line with requirements. Especially the selection of implementation projects of the technologies of Digital Transformation with regard to high investment costs as well as a vague benefit transparency face companies with huge challenges. Against this background, 743 use cases are analyzed on the basis of a network analysis in order to identify possible causal chains between target values, process characteristics and technologies used. On this basis, target figure profiles are derived that can help manufacturing companies in the Spare Parts Service to select and implement technologies that meet their individual goals in order to meet the challenges of Servitization.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Alias, I. Nikolaev, E. G. C. Magallanes, B. Noche
{"title":"An Overview of Warehousing Applications based on Cable Robot Technology in Logistics","authors":"C. Alias, I. Nikolaev, E. G. C. Magallanes, B. Noche","doi":"10.1109/SOLI.2018.8476760","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476760","url":null,"abstract":"Robotics belongs to the megatrends radically changing the logistics industry which has long time been reluctant to the adoption of technological innovation. Facing aggravated competition by ever new and stronger actors in the industry, labor shortage due to demographic shifts, and constant cost pressure, logistics robots are considered as an effective means to tackle those problems. By taking a look at the market of logistics robots, the market condition for cable-driven parallel robots for storage purposes can be studied and a successful introduction into the market of material handling devices initiated. Hence, this paper examines the prevalence of robotics solutions in general and cable-robot applications in particular in the logistics industry.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymization and Analysis of Horizontally and Vertically Divided User Profile Databases with Multiple Sensitive Attributes","authors":"Yuki Ina, Y. Sei, Yasuyuki Tahara, Akihiko Ohsuga","doi":"10.1109/SOLI.2018.8476730","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476730","url":null,"abstract":"Preventing the identification of individuals is important when data analyzers have to guarantee the safety of the data analysis they work with. A method proposed to solve this problem entails altering a part of the data value or deleting it. As to the processes, attributes of the individual data are divided into three groups: identifier (ID), quasi-identifier (QID), and sensitive attribute (SA). ID is the data that identify an individual directly, such as name. QID is the attributes that could identify an individual by combining them, such as age and birthplace. SA is very important information and should not be exposed when the data is identified to an individual. Utilizing these concepts, a safety metric for the data, such as l-diversity, is proposed so far. Under l-diversity, we use the assumption that the SA value is not known for anyone, and we process the data to prevent attackers from identifying. However, there are scenarios in which existing methods cannot protect the data against an invasion of privacy. In an analysis completed by multiple organizations, they integrated their data to carry out the effective data research. Although they can obtain profitable results, the integrated data could include information that attackers use to identify people. Specifically speaking, if the attacker is an institute providing data, they can use their own data’ SA value as a QID value. The assumption of l-diversity is violated, so the existing safety metric loses its effect on protecting data. In this paper, we propose a new anonymization method to conceal organizations’ important data by inserting dummy values, thereby enabling analysts to use the data safely. At the same time, we provide a calculating method to decrease the influence of the noise generated from the dummy insertion. We confirm these methods’ effectiveness by measuring accuracy in a data analysis experiments.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei E. I. Liu, Zhi Ning Chen, Edna Ng Kai Yin, Yunjia Zeng, X. Qing
{"title":"An Inductive Perforated Ground Backed Thin Electrically Large Zero-Phase-Shift Line Loop Antenna for UHF Near-Field RFID Reader","authors":"Wei E. I. Liu, Zhi Ning Chen, Edna Ng Kai Yin, Yunjia Zeng, X. Qing","doi":"10.1109/SOLI.2018.8476763","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476763","url":null,"abstract":"An electrically large zero-phase-shift line (ZPSL) segmented loop antenna backed by an inductive perforated ground plane is proposed for ultra-high frequency near-field RFID systems. The ZPSL segmented loop configuration enables a uniform distribution of magnetic field over an electrically large interrogation zone, while the backed inductive perforated ground plane is introduced to realize a stronger magnetic field for a longer reading range, even with a thinner overall profile as compared with a metal ground plane backed counterpart.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115624576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hwa-Nan Chang, Su-Chuan Liu, C. Chiang, Kei-Kei Lai
{"title":"Inter-organizational Knowledge Flow and R&D portfolio of Patent Citation Network - The Case of the Socket Wrench Industry","authors":"Hwa-Nan Chang, Su-Chuan Liu, C. Chiang, Kei-Kei Lai","doi":"10.1109/SOLI.2018.8476786","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476786","url":null,"abstract":"Manufacturers invest in research and development, absorb the technical knowledge of competing operators, to become the core competencies, and further construct a different portfolio of technical capacities. This study, from the perspective of patent statistics, examines retrieved patent information and formulates patent statistics to use patent backward citation, then group the information of the knowledge betweenness is obtained. The patent between the citation network and the relative citation propensity in order to measure the source of technology and direction of movement, explore the industrial technical competitive advantages of Socket Wrench Industry. This study analyzes the strengths and weaknesses of the research and development portfolio of knowledge betweenness of Socket Wrench Industry. Knowledge betweenness companies can effectively monitor their own technical capabilities, and technological advantages to adjust the direction of R&D.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UNSTRUCTURED BIG DATA ANALYTICS FOR AIR CARGO LOGISTICS MANAGEMENT","authors":"Pei-Ju Wu, Chun-Kai Yang","doi":"10.1109/SOLI.2018.8476741","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476741","url":null,"abstract":"Air cargo logistics plays a crucial role in speedy distribution enabling products to be promptly shipped between locations, but few studies have explored the business knowledge of air cargo logistics by unstructured big data. Hence, this study develops a hybrid data mining model to tackle critical issues of air cargo logistics as well as to generate operational strategies for those who would like to manage aviation logistics. Eight vital themes of air cargo logistics from the analytical results of the proposed hybrid data mining model are runway expansion, the air cargo platform, special logistics and certification, e-commerce logistics, cooperation, network expansion, market observation, and airplane conversion. Furthermore, innovation diffusion theory and resource dependence theory are incorporated into the empirical results of a hybrid data mining model to generate the following air cargo logistics strategies: \"develop innovative aviation logistics in a suitable manner\" and \"establish strategic cooperation to enhance aviation logistics performance.\"","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-Isolated Coplanar-Fed Circularly Polarized 2×2 Curl Antenna for MIMO Applications","authors":"Yuanyan Su, Zhi Ning Chen","doi":"10.1109/SOLI.2018.8476762","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476762","url":null,"abstract":"This paper proposes a coplanar-fed circularly polarized curl antenna for MIMO applications, whose feeding element consists of a metal strip and an inner conductor of coaxial line to match the 50Ω system and to ease the fabrication process. The radiation element including a horizontal strip and a curl strip is etched on the Rogers4003C substrate to enhance the robustness of the antenna system. Besides, a design guideline of a high-isolated 2×2 MIMO antenna is provided such that the antenna isolation of > 25 dB can be obtained theoretically. Both the simulation and measurement results are quite in agreement with each other, indicating that the isolation of > 22 dB is achieved within the axial ratio bandwidth of ~ 4%.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography","authors":"Ahmad Al Badawi, B. Veeravalli, Khin Mi Mi Aung","doi":"10.1109/SOLI.2018.8476725","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476725","url":null,"abstract":"The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time. This is known as the most time-consuming operation in Ring–based HE schemes. Therefore; accelerating NTT is key to realize efficient implementations. As such, in its current version, a fast NTT implementation is included in cuHE, which is a publicly available HE library in Compute Unified Device Architecture (CUDA). We analyzed cuHE NTT kernels and found out that they suffer from two performance pitfalls: shared memory conflicts and thread divergence. We show that by using a set of CUDA tailored-made optimizations, we can improve on the speed of cuHE NTT computation by 20%-50% for different problem sizes.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles","authors":"A. Kuzmin, Evgeny Znak","doi":"10.1109/SOLI.2018.8476785","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476785","url":null,"abstract":"Unmanned Aerial Vehicles — UAVs, or drones — are now being operated by several military forces and currently, to a more limited extent, by civilian organizations. These latter operations, however, may eventually expand to exceed, in number and diversity, those of the military. Further expected development in battery capacity, construction materials and software, especially regarding machine learning algorithms and drone integration, will definitely increase UAVs’ autonomous. Unique risks associated with UAVs like risk of hackers’ attacks to intercept the control are also increasing. More incidents likely will occur once regulations are finalized that encourage more use that is widespread. Such incidents could result in multi-million dollar claims against businesses, operators and manufacturers.Blockchain is the basis technology for cryptocurrencies. However, Blockchain can have far larger applications in the field of UAVs, because Blockchain is highly distributed and publically viewable system of sequentially linked cryptographically.This paper presents a concept of application, where each UAV in the UAVNet is a Blockchain node, has on-board functionality for creating and reading transactions from the block, as well as communication tools for exchanging transactions with other UAVs.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115721518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}