Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476719
Elvira Febiani, Huaqun Guo, W. Goh
The importance of internal network security has been on the rise due to the demand of businesses in organizations that deal complicated device connections in SCADA networks. Ideally, the firewall rule searching speed must be as effective as O(1) time complexity, to filter all network traffic regardless of the number of fields filtered and the number of firewall rules. This paper proposes an advanced firewall rules matching algorithm with designed hash table function. The proposed firewall rule matching algorithm based on our designed hash table function is able to achieve far better speed than other search algorithms. Additionally, our hash table-based algorithm shows a constant execution time regardless the number of firewall rules.
{"title":"An Advanced Firewall Rule Matching Algorithm","authors":"Elvira Febiani, Huaqun Guo, W. Goh","doi":"10.1109/SOLI.2018.8476719","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476719","url":null,"abstract":"The importance of internal network security has been on the rise due to the demand of businesses in organizations that deal complicated device connections in SCADA networks. Ideally, the firewall rule searching speed must be as effective as O(1) time complexity, to filter all network traffic regardless of the number of fields filtered and the number of firewall rules. This paper proposes an advanced firewall rules matching algorithm with designed hash table function. The proposed firewall rule matching algorithm based on our designed hash table function is able to achieve far better speed than other search algorithms. Additionally, our hash table-based algorithm shows a constant execution time regardless the number of firewall rules.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132080058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476693
Lulu Xu, Yulong Liu, Yi Li, P. Lau, Haitao Si, Terry Tao Ye
With advances in materials and fabrication methods, wireless communication devices are widely employed in Internet-of-Things (IOT) and human wearable applications. In this paper, we present a set of RFID labels using embroidered yarns that can be seamlessly integrated into clothing or textiles in fabrication processes. Detailed embroidery methods based on conductive yarns and textile substrates are proposed. The simulation and measurement results show that textile-based RFID antennas can provide stable electromagnetic performances and compete with the metallic counterparts.
{"title":"Design and Fabrication of Embroidered RFID Antennas for Wearable Applications","authors":"Lulu Xu, Yulong Liu, Yi Li, P. Lau, Haitao Si, Terry Tao Ye","doi":"10.1109/SOLI.2018.8476693","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476693","url":null,"abstract":"With advances in materials and fabrication methods, wireless communication devices are widely employed in Internet-of-Things (IOT) and human wearable applications. In this paper, we present a set of RFID labels using embroidered yarns that can be seamlessly integrated into clothing or textiles in fabrication processes. Detailed embroidery methods based on conductive yarns and textile substrates are proposed. The simulation and measurement results show that textile-based RFID antennas can provide stable electromagnetic performances and compete with the metallic counterparts.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476727
Haitao Si
This paper presents a flexible printed sensor tag antenna design for Ultra high frequency radio frequency identification (UHF RFID). This sensor tag is battery-powered for accurately logging temperature data such as in cold-chain applications.
{"title":"A Flexible Printed Sensor Tag for Cold-chain Applications","authors":"Haitao Si","doi":"10.1109/SOLI.2018.8476727","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476727","url":null,"abstract":"This paper presents a flexible printed sensor tag antenna design for Ultra high frequency radio frequency identification (UHF RFID). This sensor tag is battery-powered for accurately logging temperature data such as in cold-chain applications.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476801
M. Althoff, S. Urban, Markus Koschi
Detailed road maps are an important building block for autonomous driving. They accelerate creating a semantic environment model within the vehicle and serve as a backup solution when sensors are occluded or otherwise impaired. Due to the required detail of maps for autonomous driving and virtual test drives, creating such maps is quite labor-intensive. While some detailed maps for fairly large regions already exist, they are often in different formats and thus cannot be exchanged between companies and research institutions. To address this problem, we present the first publicly available converter from the OpenDRIVE format to lanelets—both representations are among the most popular map formats. We demonstrate the capabilities of the converter by using publicly available maps.
{"title":"Automatic Conversion of Road Networks from OpenDRIVE to Lanelets","authors":"M. Althoff, S. Urban, Markus Koschi","doi":"10.1109/SOLI.2018.8476801","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476801","url":null,"abstract":"Detailed road maps are an important building block for autonomous driving. They accelerate creating a semantic environment model within the vehicle and serve as a backup solution when sensors are occluded or otherwise impaired. Due to the required detail of maps for autonomous driving and virtual test drives, creating such maps is quite labor-intensive. While some detailed maps for fairly large regions already exist, they are often in different formats and thus cannot be exchanged between companies and research institutions. To address this problem, we present the first publicly available converter from the OpenDRIVE format to lanelets—both representations are among the most popular map formats. We demonstrate the capabilities of the converter by using publicly available maps.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476802
H. Sirisena, N. A. Samarasekera
Facility Location Decision (FLD) modelling is a strategic level assessment technique which can be considered as one of the most critical aspects when designing a supply chain. In the maritime industry, an efficient supply chain of vessel spare-parts is vital to maintain uninterrupted operational activities of a shipping line. Thus, storing vessel spare parts in a strategic location and distribution of spares is considered as an important feature in a Ship Maintenance Supply Chain (SMSC). The intermittent nature of demand for vessel spare parts and restrictions to store them on board create the need of locating a Distribution Centre (DC) at a suitable on shore location. Finding a strategic location for a vessel spare parts DC has been given top priority by the decision makers involved in the logistics process. As a timely research, this study has attempted to develop a model to locate a vessel spare parts DC, while carrying out a feasibility analysis to find the most suitable location for a vessel spare-parts DC in Sri Lanka.Purpose: Identify the major factors affecting a FLD in SMSC through evaluation of site alternatives to find the most suitable vessel spare parts DC location in Sri Lanka and to develop a FLD model for SMSC in Sri Lankan context.Methodology: A mixed approach was used for this study where both quantitative and qualitative data was collected. The initial literature review, interviews carried out with industry professionals, survey questionnaires and collection of secondary data from official industry records were the main data sources. Analytical Hierarchy Process (AHP) and Factor Rating Method were used as data analytic tools to derive the best location. In conclusion, the proposed FLD model was developed using the identified factors and the developed indices for each location alternative.
{"title":"Vessel Spare Parts Distribution Center Location Decision Model for Ship Maintenance Supply Chain","authors":"H. Sirisena, N. A. Samarasekera","doi":"10.1109/SOLI.2018.8476802","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476802","url":null,"abstract":"Facility Location Decision (FLD) modelling is a strategic level assessment technique which can be considered as one of the most critical aspects when designing a supply chain. In the maritime industry, an efficient supply chain of vessel spare-parts is vital to maintain uninterrupted operational activities of a shipping line. Thus, storing vessel spare parts in a strategic location and distribution of spares is considered as an important feature in a Ship Maintenance Supply Chain (SMSC). The intermittent nature of demand for vessel spare parts and restrictions to store them on board create the need of locating a Distribution Centre (DC) at a suitable on shore location. Finding a strategic location for a vessel spare parts DC has been given top priority by the decision makers involved in the logistics process. As a timely research, this study has attempted to develop a model to locate a vessel spare parts DC, while carrying out a feasibility analysis to find the most suitable location for a vessel spare-parts DC in Sri Lanka.Purpose: Identify the major factors affecting a FLD in SMSC through evaluation of site alternatives to find the most suitable vessel spare parts DC location in Sri Lanka and to develop a FLD model for SMSC in Sri Lankan context.Methodology: A mixed approach was used for this study where both quantitative and qualitative data was collected. The initial literature review, interviews carried out with industry professionals, survey questionnaires and collection of secondary data from official industry records were the main data sources. Analytical Hierarchy Process (AHP) and Factor Rating Method were used as data analytic tools to derive the best location. In conclusion, the proposed FLD model was developed using the identified factors and the developed indices for each location alternative.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476753
Fok Kar Wai, Wee-Yong Lim, D. Divakaran, V. Thing
A vulnerability discovery model (VDM) describes the number of security vulnerabilities for a software across time. Several models have been proposed to capture characteristics of the vulnerabilities discovery trend for different stages in the life cycle of various software. Such models can help in assessing the risk of a software by helping to predict its number and trend of vulnerabilities discovery. However, existing work examine software independently when investigating the use of such VDMs for predicting its vulnerability discovery trend. In this work, we propose two algorithms—MeanFit and TrendFit— to utilise vulnerability discovery data from past versions of a current software to help in building its vulnerability discovery model. Experimental results indicate merit in the algorithms in cases where there is limited data for the current software.
{"title":"Predicting vulnerability discovery rate using past versions of a software","authors":"Fok Kar Wai, Wee-Yong Lim, D. Divakaran, V. Thing","doi":"10.1109/SOLI.2018.8476753","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476753","url":null,"abstract":"A vulnerability discovery model (VDM) describes the number of security vulnerabilities for a software across time. Several models have been proposed to capture characteristics of the vulnerabilities discovery trend for different stages in the life cycle of various software. Such models can help in assessing the risk of a software by helping to predict its number and trend of vulnerabilities discovery. However, existing work examine software independently when investigating the use of such VDMs for predicting its vulnerability discovery trend. In this work, we propose two algorithms—MeanFit and TrendFit— to utilise vulnerability discovery data from past versions of a current software to help in building its vulnerability discovery model. Experimental results indicate merit in the algorithms in cases where there is limited data for the current software.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476769
Luying Zhou, Huaqun Guo
IIoT networks are different from general IT networks such as office or business networks where multiple various types of applications, protocols and traffic profiles are presented, and the cyber security challenges are more on protecting data confidentiality and integrity than on network availability. IIoT networks have special features and face unique challenges in defending against cyber-attacks. This paper briefly describes the requirements and challenges in IIoT network security, and presents an overview of the existing network anomaly detection methods. The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the anomalies in the observed behavior.
{"title":"Anomaly Detection Methods for IIoT Networks","authors":"Luying Zhou, Huaqun Guo","doi":"10.1109/SOLI.2018.8476769","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476769","url":null,"abstract":"IIoT networks are different from general IT networks such as office or business networks where multiple various types of applications, protocols and traffic profiles are presented, and the cyber security challenges are more on protecting data confidentiality and integrity than on network availability. IIoT networks have special features and face unique challenges in defending against cyber-attacks. This paper briefly describes the requirements and challenges in IIoT network security, and presents an overview of the existing network anomaly detection methods. The paper further presents other anomaly detection methods that are specifically applicable to IIoT networks, as those methods exploit the deterministic features of the physical world in detecting the anomalies in the observed behavior.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130506328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476750
Ngo Anh Phuong, T. Guidat
To optimize resource use in production, Lean manufacturing is the most widely implemented method in the world. One of the most useful tools in Lean production is Value Stream Mapping (VSM). With focus on visualizing key data of a production process in a single picture, VSM attempts to reveal bottleneck steps in a process. As a consequence, industrial engineers can determine which stages of the process should be put emphasis on improving. However, VSM sole consideration is economics and other aspects of sustainability such as societal and environmental are neglected. With Sustainable Value Stream Mapping (SVSM), all necessary illustrations for a sustainable manufacturing process can be visualized, which leads to higher chances to identify potential problems in the efficiency of production processes beyond the ones identified using lean manufacturing. This research provides a case study where SVSM is applied in an apparel company in order to identify potential issues in the sustainability of their production process. Furthermore, this paper highlights several potential solutions such as Radio-frequency identification (RFID), big data and ergonomics improvement by discussing the impact of their implementation on the process sustainability. Finally, the conclusion section discusses limits in the solutions implementation and suggest future research.
{"title":"Sustainable value stream mapping and technologies of Industry 4.0 in manufacturing process reconfiguration: A case study in an apparel company","authors":"Ngo Anh Phuong, T. Guidat","doi":"10.1109/SOLI.2018.8476750","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476750","url":null,"abstract":"To optimize resource use in production, Lean manufacturing is the most widely implemented method in the world. One of the most useful tools in Lean production is Value Stream Mapping (VSM). With focus on visualizing key data of a production process in a single picture, VSM attempts to reveal bottleneck steps in a process. As a consequence, industrial engineers can determine which stages of the process should be put emphasis on improving. However, VSM sole consideration is economics and other aspects of sustainability such as societal and environmental are neglected. With Sustainable Value Stream Mapping (SVSM), all necessary illustrations for a sustainable manufacturing process can be visualized, which leads to higher chances to identify potential problems in the efficiency of production processes beyond the ones identified using lean manufacturing. This research provides a case study where SVSM is applied in an apparel company in order to identify potential issues in the sustainability of their production process. Furthermore, this paper highlights several potential solutions such as Radio-frequency identification (RFID), big data and ergonomics improvement by discussing the impact of their implementation on the process sustainability. Finally, the conclusion section discusses limits in the solutions implementation and suggest future research.","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SOLI.2018.8476759
P. T. Amararathne, K. Herath
PurposeThe purpose of this study is to analyze different aspects of demand planning processes in different retail sectors, in order to identify the features in different areas of the demand planning, which contributes to the accuracy of the demand planning.Design/ Methodology/ ApproachA descriptive analysis was done to identify demand and demand planning process characteristics in the retail industry. Weighted Index Method was used to develop a maturity index for demand planning processes. A relationship between the process maturity level and the accuracy level was found to develop a benchmark guideline.FindingsDifferent aspects of the demand planning process such as demand planning strategy, process, technology investment, HR involvement, frequency and performance evaluation contributes to the accuracy of the demand planning. The results further indicate the process attributes related to each of these areas that can enhance the process accuracy level.Originality/ ValueThis study provides a maturity index to assess the maturity level of demand planning processes of the seven retail sectors. Also, it provides a benchmark guideline which can be used to assess any demand planning process in the retail industry, using which organizations can assess the maturity level of their existing demand planning processes
{"title":"Enhancement of the Demand Planning Accuracy in the Retail Industry in Sri Lanka","authors":"P. T. Amararathne, K. Herath","doi":"10.1109/SOLI.2018.8476759","DOIUrl":"https://doi.org/10.1109/SOLI.2018.8476759","url":null,"abstract":"PurposeThe purpose of this study is to analyze different aspects of demand planning processes in different retail sectors, in order to identify the features in different areas of the demand planning, which contributes to the accuracy of the demand planning.Design/ Methodology/ ApproachA descriptive analysis was done to identify demand and demand planning process characteristics in the retail industry. Weighted Index Method was used to develop a maturity index for demand planning processes. A relationship between the process maturity level and the accuracy level was found to develop a benchmark guideline.FindingsDifferent aspects of the demand planning process such as demand planning strategy, process, technology investment, HR involvement, frequency and performance evaluation contributes to the accuracy of the demand planning. The results further indicate the process attributes related to each of these areas that can enhance the process accuracy level.Originality/ ValueThis study provides a maturity index to assess the maturity level of demand planning processes of the seven retail sectors. Also, it provides a benchmark guideline which can be used to assess any demand planning process in the retail industry, using which organizations can assess the maturity level of their existing demand planning processes","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129460983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/soli.2018.8476758
Thomas Ho Chee Tat, P. Franti
{"title":"Real-time Electric Vehicle Load Forecast to Meet Timely Energy Dispatch","authors":"Thomas Ho Chee Tat, P. Franti","doi":"10.1109/soli.2018.8476758","DOIUrl":"https://doi.org/10.1109/soli.2018.8476758","url":null,"abstract":"","PeriodicalId":424115,"journal":{"name":"2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","volume":"71 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126984257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}