Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 3 of 3
Full-Text Articles in Engineering
The Sustainability Of Lean Manufacturing As A Competitive Advantage, Louis G. Jones
The Sustainability Of Lean Manufacturing As A Competitive Advantage, Louis G. Jones
Theses and Dissertations
Since the early 1990s lean manufacturing has been employed by companies looking to reduce costs, increase efficiencies and improve quality. Academic studies of the financial benefits of lean manufacturing are mixed in their results, where some show benefit and others do not. The objective of the current work was to confirm a financial benefit of lean manufacturing, while also establishing whether such a financial advantage was sustainable. Financial data was collected for a large number of companies in the manufacturing sector, over the period from 1990 to 2010. The data were used to show correlation between inventory turns and return …
Lean Manufacturing As A Source Of Competitive Advantage, Ryan Scott Williams
Lean Manufacturing As A Source Of Competitive Advantage, Ryan Scott Williams
Theses and Dissertations
The productivity advances generated from lean manufacturing are self-evident. Plants that adopt lean are more capable of achieving high levels of quality, shorter lead times, and less waste in the system. While it seems logical that higher levels of productivity and quality, as is common in lean companies, should result in positive financial performance, the research community has failed to establish the financial profitability of lean. Those researchers who have studied the financial returns issue report varying results. The goal of this research was to determine if a connection exists between lean and financial success and to discover why so …
Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare
Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare
Electronic Theses and Dissertations
The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some …