Search results for "Information Systems."

showing 10 items of 1545 documents

Shelf life-based inventory management policy for RF monitored warehouse

2018

Post-harvest losses of perishable products strongly depend on inefficiencies of the entire supply chain. In particular, these inefficiencies can be reduced by optimizing the warehouse management, taking into account the remaining shelf life of the product, and matching it to the requirements of the subsequent part of the handling chain. The replacement of First In First Out picking rule with Last Shelf Life First Out policy has been proved to improve the overall performance of the supply chain. The practicability of such approach is related to the possibility of monitoring the deterioration rate of the products and of predicting the residual shelf-life, that is mainly influenced by harvesti…

021103 operations research05 social sciences0211 other engineering and technologies02 engineering and technologyInventory management policy shelf life RF technologyInventory management policy; shelf life; RF technologyShelf lifeIndustrial and Manufacturing EngineeringManagement Information SystemsWarehouseInventory managementManagement of Technology and Innovation0502 economics and businessSettore ING-IND/17 - Impianti Industriali MeccaniciOperations managementBusinessElectrical and Electronic Engineering050203 business & management
researchProduct

Conditional Versus Joint Probability Assessments

1984

AbstractThe assessment of conditional and / or joint probabilities of events that constitute scenarios is necessary for sound planning, forecasting, and decision making. The assessment process is complex and subtle, and various difficulties are encountered in the elicitation of such probabilities such as, implicit violations ofthe probability calculus and some meaningfjilness conditions. The necessary and sufficient as well as meaningfulness conditions that the elicited information on conditional and joint probabilities must satisfy are evaluated against actual assessments empirically. A high frequency of violation of these conditions was observed in assessing both conditional and joint pro…

021103 operations researchChain rule (probability)Process (engineering)Posterior probability0211 other engineering and technologies02 engineering and technologyComputer Science ApplicationsJoint probability distributionConsistency (statistics)Signal ProcessingStatistics0202 electrical engineering electronic engineering information engineeringEconometricsProbability calculus020201 artificial intelligence & image processingInformation SystemsMathematicsINFOR: Information Systems and Operational Research
researchProduct

Aesthetic considerations for the min-max K-Windy Rural Postman Problem

2017

[EN] The aesthetic quality of routes is a feature of route planning that is of practical importance, but receives relatively little attention in the literature. Several practitioners have pointed out that the visual appeal of a proposed set of routes can have a strong influence on the willingness of a client to accept or reject a specific routing plan. While some work has analyzed algorithmic performance relative to traditional min-sum or min-max objective functions and aesthetic objective functions, we are not aware of any work that has considered a multi-objective approach. This work considers a multi-objective variant of the Min-Max K-Vehicles Windy Rural Postman Problem, discusses sever…

021103 operations researchComputer Networks and Communications0211 other engineering and technologiesMin-Max objective02 engineering and technologyMulti-Objective problemsCombinatoricsArc routing problemsAesthetic objectiveHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMATEMATICA APLICADAHumanitiesSoftwareInformation SystemsMathematicsNetworks
researchProduct

Applying System Dynamics Modelling to Strategic Management: A Literature Review

2016

System dynamics (SD) has been proved to be a useful methodology to support both understanding and learning processes of complex systems and phenomena. Since its origin, SD has been successfully applied to many different fields of studies (e.g. climate change, physics, engineering, environmental sciences, economics, management, etc.). Among these, strategic management (SM) has a particular relevance as testified by several streams of research that originate from the combination between SD modelling and SM. The aim of this paper is to explore and discuss the theoretical and empirical development of SD in the SM field through a systematic analysis of the literature in order to highlight the ma…

021103 operations researchInformation Systems and ManagementComputer scienceManagement scienceStrategy and Management05 social sciences0211 other engineering and technologiesComplex systemGeneral Social Sciences02 engineering and technologyField (computer science)System dynamics0502 economics and businessStrategic managementRelevance (information retrieval)050203 business & managementSystems Research and Behavioral Science
researchProduct

Stabilized branch-and-price algorithms for vector packing problems

2018

Abstract This paper considers packing and cutting problems in which a packing/cutting pattern is constrained independently in two or more dimensions. Examples are restrictions with respect to weight, length, and value. We present branch-and-price algorithms to solve these vector packing problems (VPPs) exactly. The underlying column-generation procedure uses an extended master program that is stabilized by (deep) dual-optimal inequalities. While some inequalities are added to the master program right from the beginning (static version), other violated dual-optimal inequalities are added dynamically. The column-generation subproblem is a multidimensional knapsack problem, either binary, boun…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceComputer scienceBranch and price0211 other engineering and technologiesProcess (computing)02 engineering and technologyManagement Science and Operations ResearchResolution (logic)Industrial and Manufacturing EngineeringKnapsack problemModeling and SimulationBounded functionShortest path problem0202 electrical engineering electronic engineering information engineeringBenchmark (computing)020201 artificial intelligence & image processingAlgorithmEuropean Journal of Operational Research
researchProduct

The minimum mean cycle-canceling algorithm for linear programs

2022

Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceLinear programmingDegenerate energy levels0211 other engineering and technologiesPhase (waves)0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchResidualFlow network01 natural sciencesIndustrial and Manufacturing EngineeringDual (category theory)010201 computation theory & mathematicsModeling and SimulationCoefficient matrixRowAlgorithmMathematicsEuropean Journal of Operational Research
researchProduct

Cybersecurity in Europe

2021

Information security is increasingly necessary between citizens and public services. In a nearby environment, such as cities, there are digital services and infrastructures that help improve our quality of life. Secure access to services must be regulated and offer trust to the user. Initiatives like the Regulation from European Union, (EU) N° 910/2014 of the European Parliament and the Council intend to favour solutions for problems like interoperability and cybersecurity. In this chapter, two European countries are considered so that implementations of the electronic identification, authentication, and trust services are presented and discussed. The main contribution is a description of r…

021110 strategic defence & security studiesAuthenticationIdentification (information)Computer science020204 information systems0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering02 engineering and technologyComputer securitycomputer.software_genrecomputer
researchProduct

Digital Volunteers in Disaster Response: Accessibility Challenges

2019

The emergence of the Digital Humanitarian Volunteer (DHV) movements when disaster strikes have drawn the attention of researchers and practitioners in the emergency management and humanitarian domain. While there are established players in this rapidly developing field, there are still unresolved challenges, including accessibility of their digital tools and platforms. The purposes of this paper are twofold. First, it describes the background, impact and future potential of the DHV movement, and discusses the importance of universal design for the digital tools and platforms used for crowdsourcing of crisis information. Second, this paper shows how lack of concern for universal design and a…

021110 strategic defence & security studiesEmergency managementCrisis mappingbusiness.industryComputer scienceInternet privacy0211 other engineering and technologies02 engineering and technologyAccessibilityDisaster responseCrisis mappingCrowdsourcingField (computer science)Digital humanitarian volunteersDomain (software engineering)020204 information systems0202 electrical engineering electronic engineering information engineeringCrowdsourcingSituational ethicsbusiness
researchProduct

How Critical Infrastructure Orients International Relief in Cascading Disasters

2016

Critical infrastructure and facilities are central assets in modern societies, but their impact on international disaster relief remains mostly associated with logistics challenges. The emerging literature on cascading disasters suggests the need to integrate the nonlinearity of events in the analyses. This article investigates three case studies: the 2002 floods in the Czech Republic, Hurricane Katrina in 2005 and the 2011 Tohoku earthquake, tsunami and Fukushima meltdown in Japan. We explore how the failure of critical infrastructure can orient international disaster relief by shifting its priorities during the response. We argue that critical infrastructure can influence aid request and …

021110 strategic defence & security studiesEngineering010504 meteorology & atmospheric sciencesEmergency managementbusiness.industry0211 other engineering and technologies02 engineering and technologyManagement Monitoring Policy and LawComputer securitycomputer.software_genre01 natural sciencesCritical infrastructureManagement Information SystemsHurricane katrinabusinesscomputerEnvironmental planning0105 earth and related environmental sciencesJournal of Contingencies and Crisis Management
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct