Search results for "Operations Research"
showing 10 items of 1297 documents
A Survey on Proxy Mobile IPv6 Handover
2016
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…
Epistemic uncertainty in fault tree analysis approached by the evidence theory
2012
Abstract Process plants may be subjected to dangerous events. Different methodologies are nowadays employed to identify failure events, that can lead to severe accidents, and to assess the relative probability of occurrence. As for rare events reliability data are generally poor, leading to a partial or incomplete knowledge of the process, the classical probabilistic approach can not be successfully used. Such an uncertainty, called epistemic uncertainty, can be treated by means of different methodologies, alternative to the probabilistic one. In this work, the Evidence Theory or Dempster–Shafer theory (DST) is proposed to deal with this kind of uncertainty. In particular, the classical Fau…
Public transportation and fear of crime at BRT Systems: Approaching to the case of Barranquilla (Colombia) through integrated choice and latent varia…
2021
Abstract Security perception and Fear of Crime (FoC) in urban scenarios have the potential to affect travel behavior, changing people’s travel choices and patterns. In this sense, the feeling of being “safe” or “at-risk” in public transportation not only depends on observable factors like illumination, travel companionship or transport crowding, but also on unobservable individual-specific latent attributes, among which fear of crime constitutes a major issue to consider in transport security policy-making. This study aimed to describe the relationships among sociodemographic features, travel situations, system-design features, and the Fear of Crime at three different locations (buses, bus …
Financing successful small business projects
2014
Purpose – The current credit rationing strongly influences the viability of SMEs innovation projects. In this context, the practice of screening borrowers by project success probability has become a paramount consideration for both lenders and firms. The aim of this paper is to test the screening role of loan contracts that consider collateral-interest margins simultaneously. Design/methodology/approach – This paper presents an empirical analysis that uses a unique data set composed of 323 bank loans granted by 28 banks to SMEs backed by a Spanish Mutual Guarantee Institution. Findings – The results show that appropriate combinations of collateral and interest rates can distinguish between…
Case Studies in Financial Optimization
2010
Operational and financial effectiveness of e-collaboration tools in supply chain integration
2004
This paper develops a comprehensive model of supply chain integration and uses it to analyze and assess the operational and financial effectiveness of different e-collaboration tools at various levels of supply chain integration. This model is also used to evaluate the importance of the sequence in which e-collaboration tools are adopted in supply chain integration. Computational results from a validated system dynamics simulation model with different implementation sequences of e-collaboration tools and different financial scenarios show that local financial constraints can also severely impact operational and financial performance of the entire supply chain. (C) 2003 Elsevier B.V. All rig…
A Stochastic Programming Model for the Optimal Issuance of Government Bonds
2010
Sovereign states issue fixed and floating securities to fund their public debt. The value of such portfolios strongly depends on the fluctuations of the term structure of interest rates. This is a typical example of planning under uncertainty, where decisions has to be drawn on the base of the key stochastic economic factors underneath the model.We propose a multistage stochastic programming model to select portfolios of bonds, where the aim of the decision maker is that of minimizing the cost of the decision process. At the same time, we bound the conditional Value-at-Risk, a measure of risk which accounts for the losses of the tail distribution. We build an efficient frontier to trade-off…
A Spatial Multilevel Analysis of Italian SMEs Productivity
2009
Abstract In this paper, we adapt multilevel analysis methods to investigate the spatial variability of SMEs' productivity across the Italian territory, and account for differences in the socio-economic context. Our results suggest that to properly capture the variability of the data, it is important to allow for both spatial mean and slope effects. Social decay has the expected negative impact. However, while this effect is larger on firms with smaller capital intensity, firms with higher capital intensity seem to be less affected by geography. Greater territorial heterogeneity emerges among those firms with lower capital to labour ratios. Une analyse spatiale a plusieurs niveaux de la prod…
Robotic assistance for industrial sanding with a smooth approach to the surface and boundary constraints
2021
[EN] Surface treatment operations, such as sanding, deburring, finishing, grinding, polishing, etc. are progressively becoming more automated using robotic systems. However, previous research in this field used a completely automatic operation of the robot system or considered a low degree of human-robot interaction. Therefore, to overcome this issue, this work develops a truly synergistic cooperation between the human operator and the robot system to get the best from both. In particular, in the application developed in this work the human operator provides flexibility, guiding the tool of the robot system to treat arbitrary regions of the workpiece surface; while the robot system provides…
UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems
2016
A work-based access control (WBAC) model is proposed by introducing the team role concept and modifying the user-role assignment model from a previous work. The main goals of WBAC are flexibility, easy manageability, security, as well as suitability to support cooperative work of dynamic teams in healthcare environments. One of the major challenges of WBAC regards authorization constraints in terms of organizational policies. In this article, we show how Unified Modeling Language (UML) and Object Constraints Language (OCL) are utilized to design and analyze the authorization constraints of WBAC in cooperative engagements with complex scenarios in the collaborative healthcare domain. We also…