939 resultados para Network business
Resumo:
Purpose: This paper aims to improve understanding of how to manage global network operations from an engineering perspective. Design/methodology/approach: This research adopted a theory building approach based on case studies. Grounded in the existing literature, the theoretical framework was refined and enriched through nine in-depth case studies in the industry sectors of aerospace, automotives, defence and electrics and electronics. Findings: This paper demonstrates the main value creation mechanisms of global network operations along the engineering value chain. Typical organisational features to support the value creation mechanisms are captured, and the key issues in engineering network design and operations are presented with an overall framework. Practical implications: Evidenced by a series of pilot applications, outputs of this research can help companies to improve the performance of their current engineering networks and design new engineering networks to better support their global businesses and customers in a systematic way. Originality/value: Issues about the design and operations of global engineering networks (GEN) are poorly understood in the existing literature in contrast to their apparent importance in value creation and realisation. To address this knowledge gap, this paper introduces the concept of engineering value chain to highlight the potential of a value chain approach to the exploration of engineering activities in a complex business context. At the same time, it develops an overall framework for managing GEN along the engineering value chain. This improves our understanding of engineering in industrial value chains and extends the theoretical understanding of GEN through integrating the engineering network theories and the value chain concepts. © Emerald Group Publishing Limited.
Resumo:
This paper presents a novel way to speed up the evaluation time of a boosting classifier. We make a shallow (flat) network deep (hierarchical) by growing a tree from decision regions of a given boosting classifier. The tree provides many short paths for speeding up while preserving the reasonably smooth decision regions of the boosting classifier for good generalisation. For converting a boosting classifier into a decision tree, we formulate a Boolean optimization problem, which has been previously studied for circuit design but limited to a small number of binary variables. In this work, a novel optimisation method is proposed for, firstly, several tens of variables i.e. weak-learners of a boosting classifier, and then any larger number of weak-learners by using a two-stage cascade. Experiments on the synthetic and face image data sets show that the obtained tree achieves a significant speed up both over a standard boosting classifier and the Fast-exit-a previously described method for speeding-up boosting classification, at the same accuracy. The proposed method as a general meta-algorithm is also useful for a boosting cascade, where it speeds up individual stage classifiers by different gains. The proposed method is further demonstrated for fast-moving object tracking and segmentation problems. © 2011 Springer Science+Business Media, LLC.
Resumo:
Purpose: Although business models that deliver sustainability are increasingly popular in the literature, few tools that assist in sustainable business modelling have been identified. This paper investigates how businesses might create balanced social, environmental and economic value through integrating sustainability more fully into the core of their business. A value mapping tool is developed to help firms create value propositions better suited for sustainability. Design/methodology/approach: In addition to a literature review, six sustainable companies were interviewed to understand their approaches to business modelling, using a case study approach. Building on the literature and practice, a tool was developed which was pilot tested through use in a workshop. The resulting improved tool and process was subsequently refined through use in 13 workshops. Findings: A novel value mapping tool was developed to support sustainable business modelling, which introduces three forms of value (value captured, missed/destroyed or wasted, and opportunity) and four major stakeholder groups (environment, society, customer, and network actors). Practical implications: This tool intends to support business modelling for sustainability by assisting firms in better understanding their overall value proposition, both positive and negative, for all relevant stakeholders in the value network. Originality/value: The tool adopts a multiple stakeholder view of value, a network rather than firm centric perspective, and introduces a novel way of conceptualising value that specifically introduces value destroyed or wasted/ missed, in addition to the current value proposition and new opportunities for value creation. © Emerald Group Publishing Limited.
Resumo:
This thesis presents research theorising the use of social network sites (SNS) for the consumption of cultural goods. SNS are Internet-based applications that enable people to connect, interact, discover, and share user-generated content. They have transformed communication practices and are facilitating users to present their identity online through the disclosure of information on a profile. SNS are especially effective for propagating content far and wide within a network of connections. Cultural goods constitute hedonic experiential goods with cultural, artistic, and entertainment value, such as music, books, films, and fashion. Their consumption is culturally dependant and they have unique characteristics that distinguish them from utilitarian products. The way in which users express their identity on SNS is through the sharing of cultural interests and tastes. This makes cultural good consumption vulnerable to the exchange of content and ideas that occurs across an expansive network of connections within these social systems. This study proposes the lens of affordances to theorise the use of social network sites for the consumption of cultural goods. Qualitative case study research using two phases of data collection is proposed in the application of affordances to the research topic. The interaction between task, technology, and user characteristics is investigated by examining each characteristic in detail, before investigating the actual interaction between the user and the artifact for a particular purpose. The study contributes to knowledge by (i) improving our understanding of the affordances of social network sites for the consumption of cultural goods, (ii) demonstrating the role of task, technology and user characteristics in mediating user behaviour for user-artifact interactions, (iii) explaining the technical features and user activities important to the process of consuming cultural goods using social network sites, and (iv) theorising the consumption of cultural goods using SNS by presenting a theoretical research model which identifies empirical indicators of model constructs and maps out affordance dependencies and hierarchies. The study also provides a systematic research process for applying the concept of affordances to the study of system use.
Resumo:
A higher order version of the Hopfield neural network is presented which will perform a simple vector quantisation or clustering function. This model requires no penalty terms to impose constraints in the Hopfield energy, in contrast to the usual one where the energy involves only terms quadratic in the state vector. The energy function is shown to have no local minima within the unit hypercube of the state vector so the network only converges to valid final states. Optimisation trials show that the network can consistently find optimal clusterings for small, trial problems and near optimal ones for a large data set consisting of the intensity values from the digitised, grey-level image.
Resumo:
Based on the IMP research tradition this paper regards relationships and networks as key issues in the product development and supply management agenda. Within business networks, co-development is only possible to be analysed when emphasis is placed on interdependences and interactive relationships. Co-development usually implies close relationships that allow companies to rely on each other's resources. Close relationships imply interdependences, which may improve companies' technical and product development. By looking at the actual interactions - between a UK company and its Chinese suppliers - that led to an innovative solution and a successful product launch, evolving relationship patterns are identified and analysed in a case study. Both the literature review and case study findings highlight the importance of the 'guanxi' concept (meaning interpersonal relationships in Mandarin) when analysing business-to-business networks in China. Hence, it is suggested that guanxi-based thinking and acting should be incorporated into the interaction model when considering business networking that embrace China. 'Guanxi' broadens the validity of the interaction model, in terms of geographical proximity, and deepens its theoretical base. The case study provides valuable insights for supply management under a product development context in China. In practice, the main point of interest is that Chinese suppliers are important 'resource' providers as well as 'network' providers. Hence, it is suggested that guanxi practice should be reflected into theoretical developments.
Resumo:
Recent research in industrial organisation has investigated the essential place that middlemen have in the networks that make up our global economy. In this paper we attempt to understand how such middlemen compete with each other through a game theoretic analysis using novel techniques from decision-making under ambiguity.
We model a purposely abstract and reduced model of one middleman who provides a two-sided platform, mediating surplus-creating interactions between two users. The middleman evaluates uncertain outcomes under positional ambiguity, taking into account the possibility of the emergence of an alternative middleman offering intermediary services to the two users.
Surprisingly, we find many situations in which the middleman will purposely extract maximal gains from her position. Only if there is relatively low probability of devastating loss of business under competition, the middleman will adopt a more competitive attitude and extract less from her position.
Resumo:
Ancillary services represent a good business opportunity that must be considered by market players. This paper presents a new methodology for ancillary services market dispatch. The method considers the bids submitted to the market and includes a market clearing mechanism based on deterministic optimization. An Artificial Neural Network is used for day-ahead prediction of Regulation Down, regulation-up, Spin Reserve and Non-Spin Reserve requirements. Two test cases based on California Independent System Operator data concerning dispatch of Regulation Down, Regulation Up, Spin Reserve and Non-Spin Reserve services are included in this paper to illustrate the application of the proposed method: (1) dispatch considering simple bids; (2) dispatch considering complex bids.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
In this thesis, I focus on supply chain risk related ambiguity, which represents the ambiguities firms exhibit in recognizing, assessing, and responding to supply chain disruptions. I, primarily, argue that ambiguities associated with recognizing and responding to supply chain risk are information gathering and processing problems. Guided by the theoretical perspective of bounded rationality, I propose a typology of supply chain risk related ambiguity with four distinct dimensions. I, also, argue that the major contributor to risk related ambiguity is often the environment, specifically the web of suppliers. Hence, I focus on the characteristics of these supplier networks to examine the sources of ambiguity. I define three distinct elements of network embeddedness – relational, structural, and positional embeddedness – and argue that the ambiguity faced by a firm in appropriately identifying the nature or impacts of major disruptions is a function of these network properties. Based on a survey of large North American manufacturing firms, I found that the extent of the relational ties a firm has and its position in the network are significantly related to supply chain risk related ambiguity. However, this study did not provide any significant support for the hypothesized relationship between structural embeddedness and ambiguity. My research contributes towards the study of supply chain disruptions by using the idea of bounded rationality to understand supply chain risk related ambiguity and by providing evidence that the structure of supply chain networks influences the organizational understanding of and responses to supply chain disruptions.
Resumo:
The evolution of the drug trafficking network –so-called– ‘Cartel del Norte del Valle’, is studied using network analysis methods. We found that the average length between any pair of its members was bounded by 4 –an attribute of smallworld networks. In this tightly connected network, informational shocks induce fear and the unleashing of searches of threatening nodes, using available paths. Lethal violence ensues in clusters of increasing sizes that fragment the network, without compromising, however, the survival of the largest component, which proved to be resilient to massive violence. In spite of a success from the point of view of head counting, the US’ socialization program for drug traffickers did not effectively change the cyclical dynamics of the drug dealing business: war survivors took over what was left from the old network initiating a new cycle of business and violence.
Resumo:
Purpose - The purpose of this paper is to provide a quantitative multicriteria decision-making approach to knowledge management in construction entrepreneurship education by means of an analytic knowledge network process (KANP) Design/methodology/approach- The KANP approach in the study integrates a standard industrial classification with the analytic network process (ANP). For the construction entrepreneurship education, a decision-making model named KANP.CEEM is built to apply the KANP method in the evaluation of teaching cases to facilitate the case method, which is widely adopted in entrepreneurship education at business schools. Findings- The study finds that there are eight clusters and 178 nodes in the KANP.CEEM model, and experimental research on the evaluation of teaching cases discloses that the KANP method is effective in conducting knowledge management to the entrepreneurship education. Research limitations/implications- As an experimental research, this paper ignores the concordance between a selected standard classification and others, which perhaps limits the usefulness of KANP.CEEM model elsewhere. Practical implications- As the KANP.CEEM model is built based on the standard classification codes and the embedded ANP, it is thus expected that the model has a wide potential in evaluating knowledge-based teaching materials for any education purpose with a background from the construction industry, and can be used by both faculty and students. Originality/value- This paper fulfils a knowledge management need and offers a practical tool for an academic starting out on the development of knowledge-based teaching cases and other teaching materials or for a student going through the case studies and other learning materials.
Resumo:
The deployment of Quality of Service (QoS) techniques involves careful analysis of area including: those business requirements; corporate strategy; and technical implementation process, which can lead to conflict or contradiction between those goals of various user groups involved in that policy definition. In addition long-term change management provides a challenge as these implementations typically require a high-skill set and experience level, which expose organisations to effects such as “hyperthymestria” [1] and “The Seven Sins of Memory”, defined by Schacter and discussed further within this paper. It is proposed that, given the information embedded within the packets of IP traffic, an opportunity exists to augment the traffic management with a machine-learning agent-based mechanism. This paper describes the process by which current policies are defined and that research required to support the development of an application which enables adaptive intelligent Quality of Service controls to augment or replace those policy-based mechanisms currently in use.