Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Business
System And Risk Analysis Of Cloud Manufacturing System, Trupti Narayan Rane
System And Risk Analysis Of Cloud Manufacturing System, Trupti Narayan Rane
Engineering Management & Systems Engineering Faculty Publications
The Cloud manufacturing(C-Mfg) system involves remote distributed manufacturing resources and capabilities collaborating as a single virtual entity. The system receives orders for custom products and provides manufacturing as a service to the end customers. The primary activities of the system, among others, are transaction control, resource allocation and monitoring, distributed manufacturing, quality control, and delivery of consignments to the customers. The actual manufacturing is done by a network of third-party partner manufacturers providing the services to end customers, helping them with cost reduction, shorter time-to-market, and enabling efficient collaboration between manufacturers in the CMfg network. This paper aims to deep …
Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit
Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit
Faculty Publications
Excerpt: Limited facilities operating and modernization budgets require organizations to carefully identify, prioritize and authorize projects to ensure allocated resources align with strategic objectives. Traditional facility prioritization methods using risk matrices can be improved to increase granularity in categorization and avoid mathematical error or human cognitive biases. These limitations restrict the utility of prioritizations and if erroneously used to select projects for funding, they can lead to wasted resources. This paper aims to propose a novel facility prioritization methodology that corrects these assessment design and implementation issues.
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Engineering Management & Systems Engineering Theses & Dissertations
The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …