Organizations are increasingly turning to information technology (IT) to help them respond to unanticipated environmental threats and opportunities. In this paper, we introduce a systematic review of the literature on IT-enabled agility, helping to establish the boundary between what we know and what we don’t know. We base our review on a wide body of literature drawn from the AIS Basket of Eight IT journals, a cross-section of non-Basket journals, IT practitioner outlets, and premier international IS conferences. We review the use of different theoretical lenses used to investigate the relationship between IT and organizational agility and how the literature has conceptualized agility, its antecedents, and consequences. We also map the evolution of the literature through a series of stages that highlight how researchers have built on previous work. Lastly, we discuss opportunities for future research in an effort to close important gaps in our understanding. 相似文献
Wireless Networks - In this paper, we consider full-duplex (FD) two-way relaying networks, where wireless power transfers from hybrid power access-point, H to user and wireless information... 相似文献
In Wireless Sensor Network, sensed data reflects two types of correlations of physical attributes: spatial and temporal. In this paper, a scheme named, Adaptive Prediction Strategy with ClusTering (APSCT) is proposed. In APSCT, a data-driven clustering and grey prediction model is used to exploit both the correlations. APSCT minimizes the transmission of messages in the network. However, the use of prediction includes additional computation overhead. There is a trade-off between prediction accuracy and energy consumption in computation and communication in wireless networks. This paper also gives an approach to calculate the upper and lower bound of the prediction interval which is used to evaluate different confidence levels and provides an energy-efficient sensor environment. Simulation is carried out on real-world data collected by Intel Berkeley Lab and results are compared with existing approaches.
Photonic Network Communications - This paper depicts the design of 0.55 Tb/s heterogeneous Flexi-rate Nyquist-wavelength division multiplexed (Nyquist-WDM) Superchannel. Here, for the... 相似文献
Innovations in Systems and Software Engineering - In the recent years due to technological development, Internet is omnipresent. With advancement, more and more people are connected through... 相似文献
We present a partitioned iterative formulation for the modeling of fluid-structure interaction (FSI) in two-phase flows. The variational formulation consists of a stable and robust integration of three blocks of differential equations, viz, an incompressible viscous fluid, a rigid or flexible structure, and a two-phase indicator field. The fluid-fluid interface between the two phases, which may have high density and viscosity ratios, is evolved by solving the conservative phase-field Allen-Cahn equation in the arbitrary Lagrangian-Eulerian coordinates. While the Navier-Stokes equations are solved by a stabilized Petrov-Galerkin method, the conservative Allen-Cahn phase-field equation is discretized by the positivity preserving variational scheme. Fully decoupled implicit solvers for the two-phase fluid and the structure are integrated by the nonlinear iterative force correction in a staggered partitioned manner and the generalized-α method is employed for the time marching. We assess the accuracy and stability of the phase-field/ALE variational formulation for two- and three-dimensional problems involving the dynamical interaction of rigid bodies with free surface. We consider the decay test problems of increasing complexity, namely, free translational heave decay of a circular cylinder and free rotation of a rectangular barge. Through numerical experiments, we show that the proposed formulation is stable and robust for high density ratios across fluid-fluid interface and for low structure-to-fluid mass ratio with strong added-mass effects. Overall, the proposed variational formulation produces results with high accuracy and compares well with available measurements and reference numerical data. Using unstructured meshes, we demonstrate the second-order temporal accuracy of the coupled phase-field/ALE method via decay test of a circular cylinder interacting with the free surface. Finally, we demonstrate the three-dimensional phase-field FSI formulation for a practical problem of internal two-phase flow in a flexible circular pipe subjected to vortex-induced vibrations due to external fluid flow. 相似文献
The present paper reports the effect of B- and BN-doped \(\hbox {C}_{60}\) as catalysts for lowering the dehydrogenation energy in \(\hbox {MXH}_{4}\) clusters (M = Na and Li, X = Al and B) using density functional calculations. \(\hbox {MXH}_{4}\) interacts strongly with B-doped \(\hbox {C}_{60}\) and weakly with BN-doped \(\hbox {C}_{60}\) in comparison with pure \(\hbox {C}_{60}\) with binding energy 0.56–0.80 and 0.05–0.34 eV, respectively. The hydrogen release energy \((E_{\mathrm{HRE}})\) of \(\hbox {MXH}_{4}\) decreases sharply in the range of 38–49% when adsorbed on B-doped \(\hbox {C}_{60}\); however, with BN-doped \(\hbox {C}_{60}\) the decrease in the \(E_{\mathrm{HRE}}\) varies in the range of 6–20% as compared with pure \(\hbox {MXH}_{4}\) clusters. The hydrogen release energy of second hydrogen atom in \(\hbox {MXH}_{4}\) decreases sharply in the range of 1.7–41% for BN-doped \(\hbox {C}_{60}\) and decreases in the range of 0.2–11.3% for B-doped \(\hbox {C}_{60}\) as compared with pure \(\hbox {MXH}_{4}\) clusters. The results can be explained on the basis of charge transfer within \(\hbox {MXH}_{4}\) cluster and with the doped \(\hbox {C}_{60}\). 相似文献
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order preference by similarity ideal solution (fuzzy TOPSIS). To establish the efficacy of this methodology, the results are obtained after the evaluation have been tested on fifteen different web application projects (Online Quiz competition, Entrance Test, and others) of the Babasaheb Bhimrao Ambedkar University, Lucknow, India. The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications. The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security. 相似文献
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 相似文献
Lithium–CO2 batteries are attractive energy‐storage systems for fulfilling the demand of future large‐scale applications such as electric vehicles due to their high specific energy density. However, a major challenge with Li–CO2 batteries is to attain reversible formation and decomposition of the Li2CO3 and carbon discharge products. A fully reversible Li–CO2 battery is developed with overall carbon neutrality using MoS2 nanoflakes as a cathode catalyst combined with an ionic liquid/dimethyl sulfoxide electrolyte. This combination of materials produces a multicomponent composite (Li2CO3/C) product. The battery shows a superior long cycle life of 500 for a fixed 500 mAh g?1 capacity per cycle, far exceeding the best cycling stability reported in Li–CO2 batteries. The long cycle life demonstrates that chemical transformations, making and breaking covalent C? O bonds can be used in energy‐storage systems. Theoretical calculations are used to deduce a mechanism for the reversible discharge/charge processes and explain how the carbon interface with Li2CO3 provides the electronic conduction needed for the oxidation of Li2CO3 and carbon to generate the CO2 on charge. This achievement paves the way for the use of CO2 in advanced energy‐storage systems. 相似文献