Globalization push container terminal grown rapidly in decade. To fulfill the future traffic requirement, this study highlights marginal expansion planning of infrastructure in a container terminal. By using marginal ...Globalization push container terminal grown rapidly in decade. To fulfill the future traffic requirement, this study highlights marginal expansion planning of infrastructure in a container terminal. By using marginal approach, the expansion plan can be determine correctly and economically stage by stage. A mathematical model has generated to calculate the expansion size, expansion time, interval of expansion, expansion cost, and significant of expansion for each infrastructure respectively. It recommended determining the expansion plan for each infrastructure respectively. This is because one of the infrastructures needs to be expanding but the other may not. The generated model was verified with others model and validated with case study to investigate the practicability of the model. The model serves as expansion decision making tools to assist port expansion planners.展开更多
This paper addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based vehicle-to-infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE ...This paper addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based vehicle-to-infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each road side unit (RSU), for granting channel access. Due to this, a vehicle moving with higher velocity has less chance to communicate with the RSU, as compared to vehicles with lower velocity, due to its shorter residence time in the coverage area of RSU. Accordingly, the data transfer performance of a higher velocity vehicle gets degraded significantly, as compared to that of the vehicle with lower velocity, resulting in unfairness among them. In this paper, our aim is to resolve this unfairness problem by assigning the transmission opportunity (TXOP) limits to vehicles according to their mean velocities. Using an analytical model, we prove that tuning TXOP limit proportional to mean velocity can ensure fairness among vehicles belonging to distinct classes of mean velocities, in the sense of equal chance of communicating with RSU. Analytical results are validated using extensive simulations.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Sondu-Miriu hydropower (SMHP) project experienced delay for about five years and one of the contributing factors was delayed payment of the contractor, with ripples effect extending down the contractual hierarchy. T...Sondu-Miriu hydropower (SMHP) project experienced delay for about five years and one of the contributing factors was delayed payment of the contractor, with ripples effect extending down the contractual hierarchy. This study assessed the effects of delayed payment of the contractor on the completion of SMHP project in Kisumu County, Kenya. More specifically, the study addressed two research questions: What is the relative importance of delayed payment of the contractor compared to other forms of contractual delays? What is the perceived effect of delayed payment of the contractor on the project's completion? A causal-comparative design was adopted and primary data sourced in May 2011 from 39 senior management staff of contractual parties. Relative importance index (RII) was used to determine the relative importance of perceived effects of delayed payment of the contractor on the project's completion; while Kendell's coefficient of concordance was applied to determine the degree of agreement among participants regarding their perceived effects of delayed payment. The study found that delayed payment of the contractor affected the project by causing: loss of productivity and efficiency (71.8%); increase in time-related costs (71.8%); re-scheduling and re-sequencing of works (69.2%); extension of time and acceleration (69.2%); as well as prevention of early completion (53.8%). The study concludes that timely payment of contractors is crucial for ensuring the continuity of works and completion of infrastructural projects within time, budget, and quality specifications. The study recommends the need for appropriate mitigative measures against potential risks, such as delayed disbursement of funds by external financiers, delayed approval of contractors' payment requests, as well as community participation and involvement of civil society to influence accountability in the management of project funds and expedite disbursement of funds for subsequent project phases.展开更多
The“13th Five-Year Plan”for the Construction of Municipal Infrastructures in Cities of China that was compiled by the Ministry of Housing and Urban-Rural Development and the National Development and Reform Commissio...The“13th Five-Year Plan”for the Construction of Municipal Infrastructures in Cities of China that was compiled by the Ministry of Housing and Urban-Rural Development and the National Development and Reform Commission was released for enforcement on May 26,2017.It is a first state-level and comprehensive plan for municipal infrastructures construction,which changes the conventional method of compiling different plans in different domains.As a systematic integration of展开更多
文摘Globalization push container terminal grown rapidly in decade. To fulfill the future traffic requirement, this study highlights marginal expansion planning of infrastructure in a container terminal. By using marginal approach, the expansion plan can be determine correctly and economically stage by stage. A mathematical model has generated to calculate the expansion size, expansion time, interval of expansion, expansion cost, and significant of expansion for each infrastructure respectively. It recommended determining the expansion plan for each infrastructure respectively. This is because one of the infrastructures needs to be expanding but the other may not. The generated model was verified with others model and validated with case study to investigate the practicability of the model. The model serves as expansion decision making tools to assist port expansion planners.
文摘This paper addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based vehicle-to-infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each road side unit (RSU), for granting channel access. Due to this, a vehicle moving with higher velocity has less chance to communicate with the RSU, as compared to vehicles with lower velocity, due to its shorter residence time in the coverage area of RSU. Accordingly, the data transfer performance of a higher velocity vehicle gets degraded significantly, as compared to that of the vehicle with lower velocity, resulting in unfairness among them. In this paper, our aim is to resolve this unfairness problem by assigning the transmission opportunity (TXOP) limits to vehicles according to their mean velocities. Using an analytical model, we prove that tuning TXOP limit proportional to mean velocity can ensure fairness among vehicles belonging to distinct classes of mean velocities, in the sense of equal chance of communicating with RSU. Analytical results are validated using extensive simulations.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘Sondu-Miriu hydropower (SMHP) project experienced delay for about five years and one of the contributing factors was delayed payment of the contractor, with ripples effect extending down the contractual hierarchy. This study assessed the effects of delayed payment of the contractor on the completion of SMHP project in Kisumu County, Kenya. More specifically, the study addressed two research questions: What is the relative importance of delayed payment of the contractor compared to other forms of contractual delays? What is the perceived effect of delayed payment of the contractor on the project's completion? A causal-comparative design was adopted and primary data sourced in May 2011 from 39 senior management staff of contractual parties. Relative importance index (RII) was used to determine the relative importance of perceived effects of delayed payment of the contractor on the project's completion; while Kendell's coefficient of concordance was applied to determine the degree of agreement among participants regarding their perceived effects of delayed payment. The study found that delayed payment of the contractor affected the project by causing: loss of productivity and efficiency (71.8%); increase in time-related costs (71.8%); re-scheduling and re-sequencing of works (69.2%); extension of time and acceleration (69.2%); as well as prevention of early completion (53.8%). The study concludes that timely payment of contractors is crucial for ensuring the continuity of works and completion of infrastructural projects within time, budget, and quality specifications. The study recommends the need for appropriate mitigative measures against potential risks, such as delayed disbursement of funds by external financiers, delayed approval of contractors' payment requests, as well as community participation and involvement of civil society to influence accountability in the management of project funds and expedite disbursement of funds for subsequent project phases.
文摘The“13th Five-Year Plan”for the Construction of Municipal Infrastructures in Cities of China that was compiled by the Ministry of Housing and Urban-Rural Development and the National Development and Reform Commission was released for enforcement on May 26,2017.It is a first state-level and comprehensive plan for municipal infrastructures construction,which changes the conventional method of compiling different plans in different domains.As a systematic integration of