首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到11条相似文献,搜索用时 0 毫秒
1.
Identifying, and eventually eliminating throughput bottlenecks, is a key means to increase throughput and productivity in production systems. In the real world, however, eliminating throughput bottlenecks is a challenge. This is due to the landscape of complex factory dynamics, with several hundred machines operating at any given time. Academic researchers have tried to develop tools to help identify and eliminate throughput bottlenecks. Historically, research efforts have focused on developing analytical and discrete event simulation modelling approaches to identify throughput bottlenecks in production systems. However, with the rise of industrial digitalisation and artificial intelligence (AI), academic researchers explored different ways in which AI might be used to eliminate throughput bottlenecks, based on the vast amounts of digital shop floor data. By conducting a systematic literature review, this paper aims to present state-of-the-art research efforts into the use of AI for throughput bottleneck analysis. To make the work of the academic AI solutions more accessible to practitioners, the research efforts are classified into four categories: (1) identify, (2) diagnose, (3) predict and (4) prescribe. This was inspired by real-world throughput bottleneck management practice. The categories, identify and diagnose focus on analysing historical throughput bottlenecks, whereas predict and prescribe focus on analysing future throughput bottlenecks. This paper also provides future research topics and practical recommendations which may help to further push the boundaries of the theoretical and practical use of AI in throughput bottleneck analysis.  相似文献   

2.
ContextThe software architecture of a system is the result of a set of architectural decisions. The topic of architectural decisions in software engineering has received significant attention in recent years. However, no systematic overview exists on the state of research on architectural decisions.ObjectiveThe goal of this study is to provide a systematic overview of the state of research on architectural decisions. Such an overview helps researchers reflect on previous research and plan future research. Furthermore, such an overview helps practitioners understand the state of research, and how research results can help practitioners in their architectural decision-making.MethodWe conducted a systematic mapping study, covering studies published between January 2002 and January 2012. We defined six research questions. We queried six reference databases and obtained an initial result set of 28,895 papers. We followed a search and filtering process that resulted in 144 relevant papers.ResultsAfter classifying the 144 relevant papers for each research question, we found that current research focuses on documenting architectural decisions. We found that only several studies describe architectural decisions from the industry. We identified potential future research topics: domain-specific architectural decisions (such as mobile), achieving specific quality attributes (such as reliability or scalability), uncertainty in decision-making, and group architectural decisions. Regarding empirical evaluations of the papers, around half of the papers use systematic empirical evaluation approaches (such as surveys, or case studies). Still, few papers on architectural decisions use experiments.ConclusionOur study confirms the increasing interest in the topic of architectural decisions. This study helps the community reflect on the past ten years of research on architectural decisions. Researchers are offered a number of promising future research directions, while practitioners learn what existing papers offer.  相似文献   

3.
ContextSecurity in Process-Aware Information Systems (PAIS) has gained increased attention in current research and practice. However, a common understanding and agreement on security is still missing. In addition, the proliferation of literature makes it cumbersome to overlook and determine state of the art and further to identify research challenges and gaps. In summary, a comprehensive and systematic overview of state of the art in research and practice in the area of security in PAIS is missing.ObjectiveThis paper investigates research on security in PAIS and aims at establishing a common understanding of terminology in this context. Further it investigates which security controls are currently applied in PAIS.MethodA systematic literature review is conducted in order to classify and define security and security controls in PAIS. From initially 424 papers, we selected in total 275 publications that related to security and PAIS between 1993 and 2012. Furthermore, we analyzed and categorized the papers using a systematic mapping approach which resulted into 5 categories and 12 security controls.ResultsIn literature, security in PAIS often centers on specific (security) aspects such as security policies, security requirements, authorization and access control mechanisms, or inter-organizational scenarios. In addition, we identified 12 security controls in the area of security concepts, authorization and access control, applications, verification, and failure handling in PAIS. Based on the results, open research challenges and gaps are identified and discussed with respect to possible solutions.ConclusionThis survey provides a comprehensive review of current security practice in PAIS and shows that security in PAIS is a challenging interdisciplinary research field that assembles research methods and principles from security and PAIS. We show that state of the art provides a rich set of methods such as access control models but still several open research challenges remain.  相似文献   

4.
Electronic Markets - The healthcare industry has been slow to adopt new technologies and practices. However, digital and data-enabled innovations diffuse the market, and the COVID-19 pandemic has...  相似文献   

5.
In current large-scale distributed key–value stores, the tail latency of the hundreds of key–value access operations generated by an end-user request determines the response time of this request. Therefore, this tail latency has great impacts on the user experience and revenue. Replica selection algorithms, which select the best replica server for the service of each key–value access operation as much as possible, is the key to cut the tail latency of these key–value access operations. This paper summarizes current replica selection algorithms, including both the algorithms employed by current key–value stores and the classic algorithms of other similar systems. These algorithms are classified into three categories: information-agnostic, client-independence and feedback, according to their demanded information. As a step further, simulation-based performance analysis of these algorithms is conducted. The result brings us the insights that the response time (RPT) is useful to measure the service rate, but will lead to the herd behaviors. Moreover, the number of outstanding key–value access operations (OSKs) is helpful to both the selection of the fastest replica server and the avoidance of herd behaviors. Based on these insights, we design the L2 algorithm by assembling the basic ideas of the Least OSK algorithm and the Least RPT algorithm. The L2 algorithm is much simpler than the recently proposed C3 algorithm and has a similar best performance with C3 as confirmed by the simulation and experimental results.  相似文献   

6.
Pricing and inventory control in a competing environment, as separate entities, have attracted much attention from academics and practitioners. However, integrating these decisions in a competitive setting has not been significantly analyzed by academics, but is of great significance to practitioners. In this study, the joint decision on price and inventory control of a deterioration product is investigated in a duopoly setting. We consider two competing supply chains, each consisting of one manufacturer and one retailer. Each manufacturer, as the leader of their supply chain determines the wholesale price to maximize their profit, while the retailer as the follower should determine the retail price and inventory cycle to maximize his or her profit. Using a game theoretic approach, we formulate in-chain, and chain-to-chain competition as a bi-level programming problem, and analyze Stackelberg–Nash equilibrium of the problem. Furthermore, two versions of a nested algorithm are proposed to obtain the equilibrium. Both versions employ a modified threshold-accepting (TA) algorithm to solve the first level of the problem. However, while the first version utilizes the modified TA algorithm to deal with the second level of the problem, the second version applies a differential evolution (DE) approach. Eventually, a numerical study is carried out not only to compare two developed versions of the algorithm, but also to implement the sensitivity analysis of main parameters. Based on numerical experiments, although the accuracy of both versions of algorithm are alike, using TA is more computationally efficient than using DE. Furthermore, despite the permissibility of partial backlogging, it has never occurred in equilibrium points due to in-chain and chain-to-chain competition.  相似文献   

7.
8.
Demand and lead time uncertainties have significant effects on supply chain behaviour. In this paper, we present a single-product three-level multi-period supply chain with uncertain demands and lead times by using robust techniques to study the managerial insights of the supply chain inventory system under uncertainty. We formulate this problem as a robust mixed-integer linear program with minimised expected cost and total cost variation to determine the optimal (s, S) values of the inventory parameters. Several numerical studies are performed to investigate the supply chain behaviour. Useful guidelines for the design of a robust supply chain are also provided. Results show that the order variance and the expected cost in a supply chain significantly increase when the manufacturer’s review period is an integer ratio of the distributor’s and the retailer’s review periods.  相似文献   

9.
Venous thromboembolism (VTE) and arterial ischemic stroke (AIS) are increasingly-recognized health conditions in children, with both acute and chronic sequelae. Risk factors for, and pathogenesis of, VTE are readily related to three principal factors, consisting of venous stasis, endothelial damage, and the hypercoagulable state (i.e. thrombophilia), termed the triad of Virchow. In children, greater than 90% of VTE are provoked by an overt clinical risk factor, the most common of which is a central venous catheter. Risk factors for childhood-onset (beyond the neonatal period) AIS include sickle cell disease, infection, cerebral arteriopathy, and congenital cardiac disease. In perinatal AIS, risk factors are less well-defined, and have been hypothesized to include maternal-fetal conditions. While some acquired and inherited thrombophilias have been associated with increased risk of incident and/or recurrent VTE and AIS, knowledge of other diagnostic and prognostic biomarkers of VTE/AIS in children remains quite limited. To date, very few published studies have employed plasma mass spectrometry-based “omics” approaches (proteomics, lipidomics or metabolomics). Ongoing and future research efforts involving multicenter prospective study-derived plasma biobanks in pediatric VTE (such as the Kids-DOTT trial) and AIS (including VIPS) along with new multi-omics-compatible sample processing methods offer fertile opportunities for discovery and validation of both novel risk factors and prognostic markers, with great potential to achieve improved prognostic stratification in these diseases.  相似文献   

10.
Although e-commerce adoption and customers’ initial purchasing behavior have been well studied in the literature, repeat purchase intention and its antecedents remain understudied. This study proposes a model to understand the extent to which trust mediates the effects of vendor-specific factors on customers’ intention to repurchase from an online vendor. The model was tested and validated in two different country settings. We found that trust fully mediates the relationships between perceived reputation, perceived capability of order fulfillment, and repurchasing intention, and partially mediates the relationship between perceived website quality and repurchasing intention in both countries. Moreover, multi-group analysis reveals no significant between-country differences of the model with regards to the antecedents and outcomes of trust, except the effect of reputation on trust. Academic and practical implications and future research are discussed.  相似文献   

11.
Champions are commonly suggested as a means of promoting the adoption of information systems. Since there are many different definitions of the concepts of champion and champion behaviour in the literature, practitioners and researchers may be confused about how to exactly use these concepts. A qualitative analysis of a single case study in a Swedish health-care organisation enabled us to explain how different champion behaviours relate to each other and how multiple champions interact. Combining our rich case observations with an analysis of champion literature reveals how champion behaviours form a coherent and meaningful whole in which networks of different types of champions at different levels in an organisation utilise their network of relations, their knowledge of the organisation and their insight into strategic decision-making politics to time and orchestrate the framing of innovations and the involvement of the right people. In conclusion, championing is a complex performance of contextually dependent collective social interaction, varying over time, rather than a heroic act of one individual promoting an idea. Future studies need to focus more on how the relations between different champions and their behaviours develop across innovations and over time, in order to develop a richer understanding of championing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号