首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
SWOT analysis for safer carriage of bulk liquid chemicals in tankers   总被引:2,自引:0,他引:2  
The application of strengths, weaknesses, opportunities and threats (SWOT) analysis to formulation of strategy concerned with the safe carriage of bulk liquid chemicals in maritime tankers was examined in this study. A qualitative investigation using SWOT analysis has been implemented successfully for ships that are designed to carry liquid chemicals in bulk. The originality of this study lies in the use of SWOT analysis as a management tool to formulate strategic action plans for ship management companies, ship masters and officers for the carriage of dangerous goods in bulk. With this transportation-based SWOT analysis, efforts were made to explore the ways and means of converting possible threats into opportunities, and changing weaknesses into strengths; and strategic plans of action were developed for safer tanker operation.  相似文献   

2.
文章通过采用SWOT分析法,研究了开展广东省RFID产业标准体系建设的优势、劣势、机遇及威胁,建立了SWOT分析矩阵表,从而为后续RFID产业标准化发展提供指导,为其他省市乃至国家RFID产业标准建设提供示范。  相似文献   

3.
Blockchain, a peer-to-peer, controlled, distributed database structure, has the potential to profoundly affect current business transactions in the construction industry through smart contracts, cryptocurrencies, and reliable asset tracking. The construction industry is often criticized for being slow in embracing emerging techno-logies and not effectively diffusing them through its supply chains. Often, the extensive fragmentation, traditional procurement structures, destructive competition, lack of collaboration and transparency, low-profit margins, and human resources are shown as the main culprits for this. As blockchain technology makes its presence felt strongly in many other industries like finance and banking, this study investigates the preparation of construction supply chains for blockchain technology through an explorative analysis. Empirical data for the study were collected through semi-structured interviews with 17 subject experts. Alongside presenting a strengths, weaknesses, opportunities, and threats analysis (SWOT), the study exhibits the requirements for and steps toward a construction supply structure facilitated by blockchain technology.  相似文献   

4.
Traditional Indian agri-fresh food supply chain (AFSC) is unorganized and controlled by a large number of intermediaries, causing it to be unsustainable from the farmer (low profitability) to the customer (not getting quality product even after paying a high price). The purpose of this paper is to propose novel strategies for designing a sustainable Indian AFSC. Authors identify shortcomings as well as strengths, weaknesses, opportunities and threats (SWOT) of the Indian agriculture system through the literature survey. To improve overall performance of this chain, authors have developed eighty strategies by incorporating SWOT into TOWS (threat, opportunity, weakness and strength) matrix. They define four key objectives to mitigate the afore-mentioned problems. In this paper, twelve strategies are shortlisted from existing ones on the basis of fulfilling a maximum number of objectives. The shortlisting of strategies is further verified by evaluating strategies using performance measures (PMs) in sustainability dimensions, which revealed that the twelve chosen strategies dominate over other strategies. The shortlisted strategies are mainly focused on improving the economic dimension of AFSC by satisfying maximum number of objectives and PMs. The chosen strategies pledge for the optimum and most feasible ones to be recommended for managers/researchers towards redesigning the AFSC. The proposed viable strategies are expected to reform the conventional Indian AFSC by designing sustainable supply chain (SSC). The outcomes of this work will provide clear guidelines for researchers and policy makers to make sustainable agriculture.  相似文献   

5.
A new approach in fault tree quantitative analysis, based essentially on the recursive evaluation of time-averaged reliability parameters associated with a fault tree, is presented. The methodology is a complete one covering the following problems: the evaluation of averaged unavailabilities or unreliabilities, failure and repair rates and failure and repair intensities associated with the basic events involved in a fault tree, the evaluation of unavailability or unreliability, occurrence rates and occurrence intensities associated with the top event of a fault tree, evaluation of the importance and sensitivity associated with basic events, and implicants according to different definitions. At this stage in the development of the methodology the common cause failures are not considered. Although in practice the presented algorithms have shown, in the cases of large fault trees, difficulties related to the computing speed and memory capabilities of present personal computers, the methodology remains valuable, at least by the new theoretical results.  相似文献   

6.
The objective of this paper is to propose a cluster analysis methodology for measuring the performance of research activities in terms of productivity, visibility, quality, prestige and international collaboration. The proposed methodology is based on bibliometric techniques and permits a robust multi-dimensional cluster analysis at different levels. The main goal is to form different clusters, maximizing within-cluster homogeneity and between-cluster heterogeneity. The cluster analysis methodology has been applied to the Spanish public universities and their academic staff in the computer science area. Results show that Spanish public universities fall into four different clusters, whereas academic staff belong into six different clusters. Each cluster is interpreted as providing a characterization of research activity by universities and academic staff, identifying both their strengths and weaknesses. The resulting clusters could have potential implications on research policy, proposing collaborations and alliances among universities, supporting institutions in the processes of strategic planning, and verifying the effectiveness of research policies, among others.  相似文献   

7.
The quantification of a fault tree is difficult without an exact probability value for all of the basic events of the tree. To overcome this difficulty in this paper, we propose a methodology which employs ‘hybrid data’ as a tool to analyse the fault tree. The proposed methodology estimates the failure probability of basic events using the statistical analysis of field recorded failures. Under these circumstances, where there is an absence of past failure records, the method follows a fuzzy set based theoretical evaluation based on the subjective judgement of experts for the failure interval. The proposed methodology has been applied to a conveyor system. The results of the analysis reveal the effectiveness of the proposed methodology and the instrumental role played by the experience of experts in providing reliability oriented information. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

8.
Fault tree analysis is often used to assess risks within industrial systems. The technique is commonly used although there are associated limitations in terms of accuracy and efficiency when dealing with large fault tree structures. The most recent approach to aid the analysis of the fault tree diagram is the Binary Decision Diagram (BDD) methodology. To utilise the technique the fault tree structure needs to be converted into the BDD format. Converting the fault tree requires the basic events of the tree to be placed in an ordering. The ordering of the basic events is critical to the resulting size of the BDD, and ultimately affects the performance and benefits of this technique. A number of heuristic approaches have been developed to produce an optimal ordering permutation for a specific tree. These heuristic approaches do not always yield a minimal BDD structure for all trees. This paper looks at a heuristic that is based on the structural importance measure of each basic event. Comparing the resulting size of the BDD with the smallest generated from a set of six alternative ordering heuristics, this new structural heuristic produced a BDD of smaller or equal dimension on 77% of trials.  相似文献   

9.
Text mining applied to patent mapping: a practical business case   总被引:1,自引:0,他引:1  
Professional patent searchers are traditionally rather suspicious of the alleged “black box” effect inherently attached to intelligent software engines relying upon linguistic technologies for patent analysis and mapping. In this article, the authors propose that such prejudices can be overcome by setting a realistic business objective while experimenting with these new linguistic tools, as well as by applying serious methodology for validating the results of the analysis. The strengths and weaknesses of a particular text mining tool are assessed with reference to a practical business case in the field of packaging technology, and a comparison of the outcome of such an analysis with a traditional one, carried out using conventional patent classifications, is also described.  相似文献   

10.
The purpose of the present study is developing technology transfer (TT) strategies in the automotive industry by integrating SWOT and AHP models. The statistical population of this research includes experts in technology transfer within the automobile industry, development and renovation organizations, and presidential office of technology. A total of 70 individuals were selected to participate. An open-ended questionnaire was designed for this study to determine the strengths, weaknesses, opportunities and threats (SWOT) in technology transfer in the automobile industry. After analyzing information using the SWOT approach, 6 appropriate strategies were formulated. These strategies were ranked by AHP (analytic hierarchy process) method from first to third. They showed that extending interaction with knowledge-based companies, education and research centers, weighing (0/308), and paying attention to the training of human resources suitable to the required technologies weighing (0/254) and paying attention to environmental issues and sustainable development weighing (0/163).  相似文献   

11.
马婷婷 《包装工程》2022,43(6):313-321
目的 山西文化是中国文化的重要组成部分。随着经济的快速发展,更高层次的消费结构与多样化的需求模式是我国文化创新方面急需解决的难题。方法 通过剖析山西非遗文化文创产品处境,进一步阐述山西省对非遗文化创意产业中所实行的产品创新设计方法,通过服务设计的要素和过程进行设计。以建立kano模型,了解用户对产品的要求和产品功能带给用户的体验感来分析非物质文化遗产的传承。运用SWOT分析法,明确服务设计的优势(Strength)、劣势(Weakness)、机会(Opportunity)、威胁(Threat),也有利于带动创新产业的发展,提高经济效益。通过深化改革山西的非遗文化产业,更加有助于推动山西的非遗产品走向更远的市场。结论 对“山西故事”文化创意产品开发提供理论层面的支持,在服务设计视角下对山西非遗文化的传承提供了新的实现路径。  相似文献   

12.
The main goal of this review paper is to analyze the total frequency of the core damage of the Iranian Heavy Water Research Reactor (IHWRR) compared with standard criteria and to determine the strengths and the weaknesses of the reactor safety systems towards improving its design and operation. The PSA has been considered for full-power state of the reactor and this article represents a level-1 PSA analysis using System Analysis Programs for Hands-On Integrated Reliability Evaluations (SAPHIRE) software. It is specifically designed to permit a listing of the potential accident sequences, compute their frequencies of occurrence and assign each sequence to a consequence. The method used for modeling the systems and accident sequences, is Large Fault Tree/Small Event Tree method. This PSA level-1 for IHWRR indicates that, based on conservative assumptions, the total frequency of accidents that would lead to core damage from internal initiating events is 4.44E−05 per year of reactor operation.  相似文献   

13.
P. Jacquot 《Strain》2008,44(1):57-69
Abstract:  With its nearly 40 years of existence, speckle interferometry (SI) has become a complete technique, widely used in many branches of experimental mechanics. It is thus a challenging task to try to summarise in a couple of pages its principal characteristics from both theoretical and practical points of view. Admittedly, even though this goal is not met here, it appeared worth attempting to provide the photomechanics community with a discussion of the ins and outs of the technique. The necessity of a vocabulary free of ambiguity was a prerequisite, and hence the first section is a plea for a clearer definition of the discipline. Moreover, this section offers the opportunity to re-examine the basic aspects of SI. Then, the main features of the method are briefly considered following a strengths, weaknesses, opportunities and threats (SWOT) analysis. Endowed with a lot of specific advantages, compared with other whole-field methods, SI can play an increasing role in photomechanics.  相似文献   

14.
This paper presents a vital area identification method based on the current probabilistic safety assessment (PSA) techniques. The vital area identification method in this paper is focused on core melt rather than radioactive material release. Furthermore, it describes a conceptual framework with which the risk from sabotage-induced events could be assessed.Location minimal cut sets (MCSs) are evaluated after developing a core melt location fault tree (LFT). LFT is a fault tree whose basic events are sabotage-induced damages on the locations within which various safety-related components are located. The core melt LFT is constructed by combining all sequence LFTs of various event trees with OR gates. Each sequence LFT is constructed by combining the initiating event LFT and the mitigating event LFTs with an AND gate. The vital area could be identified by using the location importance measures on the core melt location MCSs. An application was made to a typical 1000 MWe pressurized water reactor power plant located at the Korean seashore.The methodology suggested in the present paper is believed to be very consistent and most complete in identifying the vital areas in a nuclear power plant because it is based on the well-proven PSA technology.  相似文献   

15.
Abstract

Return on investment (ROI) calculations are common tools used by pharmaceutical and biotechnology companies in evaluating product returns, guiding decisions on further product development or terminating programs prior to company losses. ROI calculations compare the estimated profits from a product to the investments necessary to get the product developed, approved and marketed. Risk factors are incorporated into the ROI, which consider multiple factors including competitor products and market demand. ROI calculations enables a company to set and apply metrics for the evaluation of projects that can be applied consistently, across a portfolio, and goes beyond simple profitability assessments. When coupled with additional financial tools and strategic evaluations such as strengths, weaknesses, opportunities and threats (SWOT) analysis, ROI can provide invaluable and comparable insight into the value of potential projects and products. Here, we present a framework for executing ROI calculations to enable investment or termination decisions for research and development projects. This is augmented with insight on how to apply the framework to academic, government and NGO evaluations where ‘profits’ are not always measured in purely economic terms. Implementing ROI in the evaluation process facilitates go/no go decisions and the comparison of projects using a simple, consistent financial approach.  相似文献   

16.
Defect rates in the range of 10 parts per million, unimaginable a few years ago, have become the standard of world-class quality. To reduce defects, companies are aggressively implementing various quality methodologies, such as statistical quality control,1,2 Motorola's six sigma3 or Shingo's pokayoke.4,5 Although each quality methodology reduces defects, selection has been based on an intuitive sense without understanding their relative effectiveness in each application. A missing link in developing superior defect reduction strategies has been a lack of a general defect model that clarifies the unique focus of each method. Toward the goal of efficient defect reduction, we have developed an event tree which addresses a broad spectrum of quality factors and two defect sources, namely mistakes and variation. The quality control tree (QCT) predictions are more consistent with production experience than those obtained by the other methodologies considered independently. The QCT demonstrates that world-class defect rates cannot be achieved through focusing on a single defect source or quality control factor, a common weakness of many methodologies. We have shown that the most efficient defect reduction strategy depend on the relative strengths and weaknesses of each organization. The QCT can help each organization identify the most promising defect reduction opportunities for achieving its goals.  相似文献   

17.
The study presents a time-series analysis of field-standardized average impact of Italian research compared to the world average. The approach is purely bibliometric, based on census of the full scientific production from all Italian public research organizations active in 2001–2006 (hard sciences only). The analysis is conducted both at sectorial level (aggregated, by scientific discipline and for single fields within disciplines) and at organizational level (by type of organization and for single organizations). The essence of the methodology should be replicable in all other national contexts. Its offers support to policy-makers and administrators for strategic analysis aimed at identifying strengths and weaknesses of national research systems and institutions.  相似文献   

18.
The reliability performance of a system is frequently a function of component failures of which some are independent whilst others are interdependent. It is possible to represent the system failure logic in a fault tree diagram, however only the sections containing independent events can be assessed using the conventional fault tree analysis methodology. The analysis of the dependent sections will require a Markov analysis. Since the efficiency of the Markov analysis largely depends on the size of the established Markov model, the key is to extract from the fault tree the smallest sections which contain dependencies. This paper proposes a method aimed at establishing the smallest Markov model for the dependencies contained within the fault tree.  相似文献   

19.
There are different business processes in each organisation. Each business process utilises some resources to perform its related activities, produces specified outputs (products/services) and reaches organisational goals. In this paper, an approach is presented to assess the ability of business processes to utilise resources. To apply the presented framework, a manufacturing firm in the automotive industry was selected. Initially, four main business process groups were chosen for the assessment. Then, 15 processes of the four determined process groups and resources utilised by each process were identified. All of the recognised 19 resources were classified into six major categories, including physical, relational, organisational, informational, human and legal resources. Afterward, a hierarchical top-down analysis was performed to determine the ability of process groups and processes to utilise resource categories and resources. The results of the analysis show which resources have been strongly/weakly utilised by which business processes. In other words, by applying the suggested framework, it is possible to accurately identify the strengths and weaknesses of the resource utilisation. Therefore, the company can focus on weaknesses, prioritise them and develop improvement actions to increase the ability to utilise resources in the specified areas.  相似文献   

20.
Software assurance is an important part of the software development process to reduce risks and ensure that the software is dependable and trustworthy. Software defects and weaknesses can often lead to software errors and failures and to exploitation by malicious users. Testing, certification and accreditation have been traditionally used in the software assurance process to attempt to improve software trustworthiness.In this paper, we examine a methodology known as a structured assurance model, which has been widely used for assuring system safety, for its potential application to software assurance. We describe the structured assurance model and examine its application and use for software assurance. We identify strengths and weaknesses of this approach and suggest areas for further investigation and testing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号