974 resultados para Chain-end
Resumo:
Ten years ago the intelligent product model was introduced as a means of motivating a supply chain in which product or orders were central as opposed to the organizations that stored or delivered them. This notion of a physical product influencing its own movement through the supply chain was enabled by the evolution of low cost RFID systems which promised low cost connection between physical goods and networked information environments. In 2002 the notion of product intelligence was regarded as a useful but rather esoteric construct. However, in the intervening ten years there have been a number of technological advances coupled with an increasingly challenged business environment which make the prospects for intelligent product deployment seem more likely. This paper reviews a number of these developments and assesses their impact on the intelligent product approach. © 2012 IFAC.
Resumo:
Decision-making at the front-end of innovation is critical for the success of companies. This paper presents a simple visual method, called DMCA (Decision-Making Criteria Assessment), which was created to clarify and improve decision-making at the front-end of innovation. The method maps the uncertainty of project information and importance of decision criteria, compiling a measure that indicates whether the decision is highly uncertain, what information interferes with it, and what criteria are actually being considered. The DMCA method was tested in two projects that faced decision-making issues, and the results confirm the benefits of using this method in decision-making at the front-end. © 2012 IEEE.
Resumo:
We investigated the thermal evolution of end-of-range (EOR) defects in germanium and their impact on junction thermal stability. After solid-phase epitaxial regrowth of a preamorphized germanium layer, EOR defects exhibiting dislocation loop-like contrast behavior are present. These defects disappear during thermal annealing at 400 °C, while boron electrical deactivation occurs. After the whole defect population vanishes, boron reactivation is observed. These results indicate that germanium self-interstitials, released by EOR defects, are the cause of B deactivation. Unlike in Si, the whole deactivation/reactivation cycle in Ge is found to take place while the maximum active B concentration exceeds its solubility limit. © 2010 American Institute of Physics.
Resumo:
Demand for aluminum in final products has increased 30-fold since 1950 to 45 million tonnes per year, with forecasts predicting this exceptional growth to continue so that demand will reach 2-3 times today's levels by 2050. Aluminum production uses 3.5% of global electricity and causes 1% of global CO2 emissions, while meeting a 50% cut in emissions by 2050 against growing demand would require at least a 75% reduction in CO2 emissions per tonne of aluminum produced--a challenging prospect. In this paper we trace the global flows of aluminum from liquid metal to final products, revealing for the first time a complete map of the aluminum system and providing a basis for future study of the emissions abatement potential of material efficiency. The resulting Sankey diagram also draws attention to two key issues. First, around half of all liquid aluminum (~39 Mt) produced each year never reaches a final product, and a detailed discussion of these high yield losses shows significant opportunities for improvement. Second, aluminum recycling, which avoids the high energy costs and emissions of electrolysis, requires signification "dilution" (~ 8 Mt) and "cascade" (~ 6 Mt) flows of higher aluminum grades to make up for the shortfall in scrap supply and to obtain the desired alloy mix, increasing the energy required for recycling.
Resumo:
Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.
Resumo:
In the face of increasing demand and limited emission reduction opportunities, the steel industry will have to look beyond its process emissions to bear its share of emission reduction targets. One option is to improve material efficiency - reducing the amount of metal required to meet services. In this context, the purpose of this paper is to explore why opportunities to improve material efficiency through upstream measures such as yield improvement and lightweighting might remain underexploited by industry. Established input-output techniques are applied to the GTAP 7 multi-regional input-output model to quantify the incentives for companies in key steel-using sectors (such as property developers and automotive companies) to seek opportunities to improve material efficiency in their upstream supply chains under different short-run carbon price scenarios. Because of the underlying assumptions, the incentives are interpreted as overestimates. The principal result of the paper is that these generous estimates of the incentives for material efficiency caused by a carbon price are offset by the disincentives to material efficiency caused by labour taxes. Reliance on a carbon price alone to deliver material efficiency would therefore be misguided and additional policy interventions to support material efficiency should be considered. © 2013 Elsevier B.V.
Resumo:
The Pharma(ceuticals) industry is at a cross-roads. There are growing concerns that illegitimate products are penetrating the supply chain. There are proposals in many countries to apply RFID and other traceability technologies to solve this problem. However there are several trade-offs and one of the most crucial is between data visibility and confidentiality. In this paper, we use the TrakChain assessment framework tools to study the US Pharma supply chain and to compare candidate solutions to achieve traceability data security: Point-of-Dispense Authentication, Network-based electronic Pedigree, and Document-based electronic Pedigree. We also propose extensions to a supply chain authorization language that is able to capture expressive data sharing conditions considered necessary by the industry's trading partners. © 2013 IEEE.
Resumo:
A design methodology is presented for turbines in an annulus with high end wall angles. Such stages occur where large radial offsets between the stage inlet and stage outlet are required, for example in the first stage of modern low pressure turbines, and are becoming more prevalent as bypass ratios increase. The turbine vanes operate within s-shaped ducts which result in meridional curvature being of a similar magnitude to the bladeto-blade curvature. Through a systematic series of idealized computational cases, the importance of two aspects of vane design are shown. First, the region of peak end wall meridional curvature is best located within the vane row. Second, the vane should be leant so as to minimize spanwise variations in surface pressure-this condition is termed "ideal lean." This design philosophy is applied to the first stage of a low pressure turbine with high end wall angles. © 2014 by ASME.
Resumo:
An experimental investigation of a turbine stage featuring very high end wall angles is presented. The initial turbine design did not achieve a satisfactory performance and the difference between the design predictions and the test results was traced to a large separated region on the rear suction-surface. To improve the agreement between computational fluid dynamics (CFD) and experiment, it was found necessary to modify the turbulence modeling employed. The modified CFD code was then used to redesign the vane, and the changes made are described. When tested, the performance of the redesigned vane was found to have much closer agreement with the predictions than the initial vane. Finally, the flowfield and performance of the redesigned stage are compared to a similar turbine, designed to perform the same duty, which lies in an annulus of moderate end wall angles. A reduction in stage efficiency of at least 2.4% was estimated for the very high end wall angle design. © 2014 by ASME.
Resumo:
This paper studies the Front End of Eco-Innovation (FEEI), the initial phase of the eco-innovation process. Incorporating environmental concerns at the front-end of innovation is important, as product parameters are still flexible. This paper investigates the FEEI for 42 small and medium sized eco-innovators in the Netherlands by using a survey. The results show that SMEs embrace informal, systematic, and open innovation approaches at the FEEI. Teams appear to be multidisciplinary, and creativity and environmental knowledge are essential. Experimentation played a significant role at the FEEI. The paper concludes with recommendations for future research and implications for managers. © 2013 Elsevier B.V.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.