A Semantic Information Services Framework for Sustainable WEEE Management Toward Cloud-Based Remanufacturing

Author(s):  
Kai Xia ◽  
Liang Gao ◽  
Lihui Wang ◽  
Weidong Li ◽  
Kuo-Ming Chao

Sustainable management of waste electrical and electronic equipment (WEEE) has attracted escalating concerns of researchers and industries. Closer information linking among the participants in the products's lifecycle should take place. How to interoperate among the distributed and heterogeneous information systems of various participants is a challenge faced. Targeting the cloud-based remanufacturing, this article aims to develop a semantic information services framework for sustainable WEEE management. In the proposed framework, an ontology based approach is developed to integrate and represent the lifecycle information from multiple local data sources within an information services provider. Meanwhile, a semantic information services management platform is introduced for the advertisement, matchmaking and retrieval of semantic information services. Some relevant techniques used to build the framework are introduced extensively. A demonstration case study on waste LCD TV is used to illustrate the effectiveness and significance of the proposed framework.

2010 ◽  
Vol 26-28 ◽  
pp. 426-429
Author(s):  
Bao Liang Hu

Combined with the deep case study of Wahaha, this paper probe into the issue of enterprise heterogeneous information systems(IS) resources acquisition. And the findings show: learning by doing and learning by using are the effective approaches for the enterprise to acquire the heterogeneous IS human capital; initiative is crucial to acquire heterogeneous IS partnership; the preferred contractor is the important model for the enterprises to acquire the heterogeneous IS infrastructure. These findings not only enrich the theory of IS resources, but also expand the scope of existing research.


1998 ◽  
Vol 13 (2) ◽  
pp. 111-126
Author(s):  
Alan Jeffs ◽  
Fowler Ben

This paper examines the issue of outsourcing information services (IS) through the framework of case study-based, grounded research, located in a major UK company. The impact of outsourcing drivers including efficiency, IS alignment and the human resource dimension are explored and balanced against the perceived outsourcing risks. It is also postulated that although managers claim rational economic benefits, when making outsourcing decisions, they may, in fact, be bounded in their rationality by their perception of the quality experienced as users of IS/IT. Hence, it is suggested that the real justification for outsourcing may be that it provides a definitive, albeit drastic, vehicle for change.


2013 ◽  
Vol 455 ◽  
pp. 434-437
Author(s):  
Jing Tao Zhou

Master-slave P2P mapping principle proposed in our previous work [ is a semantic P2P mapping paradigm with modularity and loosely coupled characteristics. The intent of this paper is to define a common case study of this paradigm for the semantic information integration. The domain of the case study is a semantic P2P information integration system called SGII[, i.e., system that help in information coordinating and interoperating by orchestrating the content and formalization expression of master-slave P2P mapping between elements from different peer node models which represent the data exposed (shared) by data sources. Furthermore, an illustrative example of master-slave P2P mapping paradigm is given to explain how the mappings are implemented and to demonstrate the paradigm can hence be applied in semantic information integration scenarios.


2021 ◽  
Vol 10 (11) ◽  
pp. 779
Author(s):  
Raymond Low ◽  
Zeynep Duygu Tekler ◽  
Lynette Cheah

Point of interest (POI) data serves as a valuable source of semantic information for places of interest and has many geospatial applications in real estate, transportation, and urban planning. With the availability of different data sources, POI conflation serves as a valuable technique for enriching data quality and coverage by merging the POI data from multiple sources. This study proposes a novel end-to-end POI conflation framework consisting of six steps, starting with data procurement, schema standardisation, taxonomy mapping, POI matching, POI unification, and data verification. The feasibility of the proposed framework was demonstrated in a case study conducted in the eastern region of Singapore, where the POI data from five data sources was conflated to form a unified POI dataset. Based on the evaluation conducted, the resulting unified dataset was found to be more comprehensive and complete than any of the five POI data sources alone. Furthermore, the proposed approach for identifying POI matches between different data sources outperformed all baseline approaches with a matching accuracy of 97.6% with an average run time below 3 min when matching over 12,000 POIs to result in 8699 unique POIs, thereby demonstrating the framework’s scalability for large scale implementation in dense urban contexts.


Author(s):  
Navin Sewberath Misser ◽  
◽  
Joris Jaspers ◽  
Bas van Zaane ◽  
Hein Gooszen ◽  
...  

Digitization of activities in hospitals receives more attention, due to Covid-19 related regulations. The use of ehealth to support patient care is increasing and efficient ways to implement digitization of processes and other technological equipment are needed. We constructed a protocol for implementation and in this study, we evaluate this protocol based on a case to implement a device in the OR. We used various data sources to evaluate this protocol: semi-structured interviews, questionnaires, and project documents. Based on these findings, this protocol, including identified implementation activities and implementation instructions can be used for implementations of other devices. Implementation activities include setting up a project plan, organizational and technological preparation, maintenance, and training. In future research, these activities and instructions need to be evaluated in more complex projects and a flexible tool needs to be developed to select relevant activities and instructions for implementations of information systems or devices.


2013 ◽  
Vol 61 (3) ◽  
pp. 569-579 ◽  
Author(s):  
A. Poniszewska-Marańda

Abstract Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.


Author(s):  
Marie-Pascale Chagny ◽  
John A. Naoum

Abstract Over the years, failures induced by an electrostatic discharge (ESD) have become a major concern for semiconductor manufacturers and electronic equipment makers. The ESD events that cause destructive failures have been studied extensively [1, 2]. However, not all ESD events cause permanent damage. Some events lead to recoverable failures that disrupt system functionality only temporarily (e.g. reboot, lockup, and loss of data). These recoverable failures are not as well understood as the ones causing permanent damage and tend to be ignored in the ESD literature [3, 4]. This paper analyzes and characterizes how these recoverable failures affect computer systems. An experimental methodology is developed to characterize the sensitivity of motherboards to ESD by simulating the systemlevel ESD events induced by computer users. The manuscript presents a case study where this methodology was used to evaluate the robustness of desktop computers to ESD. The method helped isolate several weak nets contributing to the failures and identified a design improvement. The result was that the robustness of the systems improved by a factor of 2.


Sign in / Sign up

Export Citation Format

Share Document