نتایج جستجو برای: supply security aspects
تعداد نتایج: 658145 فیلتر نتایج به سال:
Automation and optimisation of supply-chain activities are made possible by radio frequency identification (RFID) technology. RFID supply chain performance can be enhanced by integrating RFID functions into the web service paradigm. However, the use of RFID involves growing privacy and security concerns, in part because the lack of RFID tag capacity places the whole supply-chain loop at risk of...
Using a traditional leader-follower decisional sequence as the manifestation of power structure in a supply chain, this work generalizes extant research in IT security. We propose a game theoretic model to analyze the equilibrium IT security of the supply chain in the Stackelberg game, where the power structure in the supply chain manifests in a natural leader. Our results indicate that a natur...
Fluctuations in crude oil prices are among the factors affecting other economic indicators, and therefore these fluctuations have always been of interest to economists. In this paper, the effect of fundamental market factors (supply and demand of crude oil) on changes in world oil prices is addressed and supply and demand elasticity are estimated using the simultaneous equations system consider...
Background and objective: Water supply networks are among the main and vital infrastructures of any city, therefore maintaining the safety of water supply facilities and considering necessary arrangements during encountering the critical conditions is among the main concerns of officials related to security issues of any country. For this purpose, investigation of these facilities in terms of p...
Background: The outlook for hospital care is changing rapidly. Supply and demand stimuli in the health service system are changing dramatically. The health department of the Social Security Administration has also been challenged by the growing number of patients. This study was conducted to help this organization with the aim of designing a conceptual causal model of the interaction between su...
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
This chapter introduces the role that computer hardware plays for attack and defense in cyberphysical systems. Hardware security – whether for attack or defense – differs from software, network, and data security because of the nature of hardware. Often, hardware design and manufacturing occur before or during software development, and as a result, we must consider hardware security early in pr...
This article presents a probabilistic security model for supply chain management systems (SCM) in which the basic goals of security (including confidentiality, integrity, availability and accountability, CIAA) are modeled and analyzed. Consequently, the weak points in system security are identified. A stochastic model using measurable values to describe the information system security of a SCM ...
Supply chain optimization concerns the improvement of performance and efficiency manufacturing distribution supply by making best use resources. In context optimization, scheduling has always been a challenging task for experts, especially when considering distributed system (DMS). The present study aims to tackle problem in DMS while two essential sustainability aspects, namely environmental e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید