Amsterdam’s Schiphol capacity is limited to 500,000 air traffic movements per year and currently is reaching the limit. For that reason, Schiphol Group decided to divert the non-hub related traffic to the regional airport in Lelystad. This airport will be upgraded to handle commercial traffic, mainly low cost carriers. We used a divide and conquer approach in SIMIO modules in which we included the main elements in the system namely airspace, runway, taxiways and airport stands for analyzing the future performance and potential operative problems of the airport. An analysis of the different operative areas of the system was performed and we could identify problems due to the emergent dynamics once the different subsystems interacted between them.
Purpose The purpose of this paper is to synthesize the fragmented literature on organizational citizenship behavior (OCB), leader–member exchange (LMX), learning, innovative work behavior (IWB) and employee performance across different countries, disciplines and organizations, thereby broadening the literature breath and making gap identification comprehensive. Second, it provides information on how much studies have been concentrated on Africa with the goal of provoking scholarly work in a unique cultural setting on the interrelatedness of these concepts. Design/methodology/approach Relevant literature search was undertaken using key search terms, “employee performance,” “OCB,” “LMX,” “IWB,” “individual learning” and “team learning.” Findings The findings show positive relationships between the behaviors and employee performance. They also reveal an interesting diversity in the study across multidisciplinary fields holding both cultural and contextual significance for academia and practitioners. Research limitations/implications – The limitation of literature to peer-reviewed journals from the authors’ university library might have missed important information not in this domain. Further studies must make use of additional search terms and engines excluded from this study to provide a more comprehensive analysis. Practical implications The paper has important managerial implications for practitioners. The analysis can support the understanding of employee performance from a broader and more diverse view points; and help in providing insight into real-life opportunities, constraints and solutions in enhancing performance management. Originality/value – This systematic literature review highlights important knowledge gaps which need to be explored especially in the African and Ghanaian contexts.
Due to the existing pressure for a more rational use of the water, many public managers and industries have to re-think/adapt their processes towards a more circular approach. Such pressure is even more critical in the Rio Doce region, Minas Gerais, due to the large environmental accident occurred in 2015. Cenibra (pulp mill) is an example of such industries due to the fact that it is situated in the river basin and that it has a water demanding process. The current proposal is meant as an academic and engineering study to propose possible solutions to decrease the total water consumption of the mill and, thus, decrease the total stress on the Rio Doce basin. The work will be divided in three working packages, namely: (i) evaluation (modelling) of the mill process and water balance (ii) application and operation of a pilot scale wastewater treatment plant (iii) analysis of the impacts caused by the improvement of the process. The second work package will also be conducted (in parallel) with a lab scale setup in The Netherlands to allow fast adjustments and broaden evaluation of the setup/process performance. The actions will focus on reducing the mill total water consumption in 20%.
The focus of the research is 'Automated Analysis of Human Performance Data'. The three interconnected main components are (i)Human Performance (ii) Monitoring Human Performance and (iii) Automated Data Analysis . Human Performance is both the process and result of the person interacting with context to engage in tasks, whereas the performance range is determined by the interaction between the person and the context. Cheap and reliable wearable sensors allow for gathering large amounts of data, which is very useful for understanding, and possibly predicting, the performance of the user. Given the amount of data generated by such sensors, manual analysis becomes infeasible; tools should be devised for performing automated analysis looking for patterns, features, and anomalies. Such tools can help transform wearable sensors into reliable high resolution devices and help experts analyse wearable sensor data in the context of human performance, and use it for diagnosis and intervention purposes. Shyr and Spisic describe Automated Data Analysis as follows: Automated data analysis provides a systematic process of inspecting, cleaning, transforming, and modelling data with the goal of discovering useful information, suggesting conclusions and supporting decision making for further analysis. Their philosophy is to do the tedious part of the work automatically, and allow experts to focus on performing their research and applying their domain knowledge. However, automated data analysis means that the system has to teach itself to interpret interim results and do iterations. Knuth stated: Science is knowledge which we understand so well that we can teach it to a computer; and if we don't fully understand something, it is an art to deal with it.[Knuth, 1974]. The knowledge on Human Performance and its Monitoring is to be 'taught' to the system. To be able to construct automated analysis systems, an overview of the essential processes and components of these systems is needed.Knuth Since the notion of an algorithm or a computer program provides us with an extremely useful test for the depth of our knowledge about any given subject, the process of going from an art to a science means that we learn how to automate something.
Today, embedded devices such as banking/transportation cards, car keys, and mobile phones use cryptographic techniques to protect personal information and communication. Such devices are increasingly becoming the targets of attacks trying to capture the underlying secret information, e.g., cryptographic keys. Attacks not targeting the cryptographic algorithm but its implementation are especially devastating and the best-known examples are so-called side-channel and fault injection attacks. Such attacks, often jointly coined as physical (implementation) attacks, are difficult to preclude and if the key (or other data) is recovered the device is useless. To mitigate such attacks, security evaluators use the same techniques as attackers and look for possible weaknesses in order to “fix” them before deployment. Unfortunately, the attackers’ resourcefulness on the one hand and usually a short amount of time the security evaluators have (and human errors factor) on the other hand, makes this not a fair race. Consequently, researchers are looking into possible ways of making security evaluations more reliable and faster. To that end, machine learning techniques showed to be a viable candidate although the challenge is far from solved. Our project aims at the development of automatic frameworks able to assess various potential side-channel and fault injection threats coming from diverse sources. Such systems will enable security evaluators, and above all companies producing chips for security applications, an option to find the potential weaknesses early and to assess the trade-off between making the product more secure versus making the product more implementation-friendly. To this end, we plan to use machine learning techniques coupled with novel techniques not explored before for side-channel and fault analysis. In addition, we will design new techniques specially tailored to improve the performance of this evaluation process. Our research fills the gap between what is known in academia on physical attacks and what is needed in the industry to prevent such attacks. In the end, once our frameworks become operational, they could be also a useful tool for mitigating other types of threats like ransomware or rootkits.