Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Business

PDF

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao Nov 2007

Multi-Period Combinatorial Auction Mechanism For Distributed Resource Allocation And Scheduling, Hoong Chuin Lau, Shih-Fen Cheng, Thin Yin Leong, Jong Han Park, Zhengyi Zhao

Research Collection School Of Computing and Information Systems

We consider the problem of resource allocation and scheduling where information and decisions are decentralized, and our goal is to propose a market mechanism that allows resources from a central resource pool to be allocated to distributed decision makers (agents) that seek to optimize their respective scheduling goals. We propose a generic combinatorial auction mechanism that allows agents to competitively bid for the resources needed in a multi-period setting, regardless of the respective scheduling problem faced by the agent, and show how agents can design optimal bidding strategies to respond to price adjustment strategies from the auctioneer. We apply our …


Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng Nov 2007

Designing The Market Game For A Commodity Trading Simulation, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we propose to design a market game that (a) can be used in modeling and studying commodity trading scenarios, and (b) can be used in capturing human traders' behaviors. Specifically, we demonstrate the usefulness of this commodity trading game in a single-commodity futures trading scenario. A pilot experiment was run with a mixture of human traders and an autonomous agent that emulates the aggregatedmarket condition, with the assumption that this autonomous agent would hint each of its action through a public announcement. We show that the information collected from this simulation can be used to extract the …


The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau Nov 2007

The Price Of Stability In Selfish Scheduling Games, Lucas Agussurja, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

Game theory has gained popularity as an approach to analysing and understanding distributed systems with selfinterested agents. Central to game theory is the concept of Nash equilibrium as a stable state (solution) of the system, which comes with a price - the loss in efficiency. The quantification of the efficiency loss is one of the main research concerns. In this paper, we study the quality and computational characteristic of the best Nash equilibrium in two selfish scheduling models: the congestion model and the sequencing model. In particular, we present the following results: (1) In the congestion model: first, the best …


Semester Project For Engineering Management, Paul Savory Oct 2007

Semester Project For Engineering Management, Paul Savory

Industrial and Management Systems Engineering: Instructional Materials

This is the semester-project for my IMSE 405/805 course on Engineering Management at the University of Nebraska-Lincoln. This team-based project required students to develop an operational plan (facility layout, required staffing, company operating policies, company benefits program) for a specified product.


Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar Oct 2007

Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar

Engineering Management & Systems Engineering Theses & Dissertations

While making decisions under uncertainty, people are often unaware of the logical approach to form the decision process. It is assumed that collecting details, analyzing and evaluating data is enough to make 'proper' decisions. However, past research in the decision making arena has significantly validated that there exists a class of decision problems which is complex, ill-structured and not defined to the level where decision makers can draw logical conclusions based on existing traditional decision approaches. RDM (reverse decision making), one of the novel approaches of decision making under conditions of uncertainty, has shown potential towards addressing some of these …


Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou Sep 2007

Robust Local Search And Its Application To Generating Robust Schedules, Hoong Chuin Lau, Fei Xiao, Thomas Ou

Research Collection School Of Computing and Information Systems

In this paper, we propose an extended local search framework to solve combinatorial optimization problems with data uncertainty. Our approach represents a major departure from scenario-based or stochastic programming approaches often used to tackle uncertainty. Given a value 0 < ? 1, we are interested to know what the robust objective value is, i.e. the optimal value if we allow an chance of not meeting it, assuming that certain data values are defined on bounded random variables. We show how a standard local search or metaheuristic routine can be extended to efficiently construct a decision rule with such guarantee, albeit heuristically. We demonstrate its practical applicability on the Resource Constrained Project Scheduling Problem with minimal and maximal time lags (RCPSP/max) taking into consideration activity duration uncertainty. Experiments show that, partial order schedules can be constructed that are robust in our sense without the need for a large planned horizon (due date), which improves upon the work proposed by Policella et al. 2004.


Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen Aug 2007

Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen

World Maritime University Dissertations

No abstract provided.


Using Reconstructability Analysis For Input Variable Reduction: A Business Example, Stephen Shervais, Martin Zwick Aug 2007

Using Reconstructability Analysis For Input Variable Reduction: A Business Example, Stephen Shervais, Martin Zwick

Systems Science Faculty Publications and Presentations

We demonstrate the use of reconstructability analysis (RA) on the UCI Australian Credit dataset to reduce the number of input variables for two different analysis tools. Using 14 variables, an artificial neural net (NN) is able to predict whether or not credit was granted, with a 79.1% success rate. RA preprocessing allows us to reduce the number of independent variables from 14 to two different sets of three, which have success rates of 77.2% and 76.9% respectively. The difference between these rates and that of the 14-variable NN is not statistically significant. The three-variable rulesets given by RA achieve success …


Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau Jul 2007

Generating Job Schedules For Vessel Operations In A Container Terminal, Thin Yin Leong, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

No abstract provided.


Engineering Management And Industrial Engineering: Similarities And Differences, Cassandra C. Elrod, Ashley Rasnic, William Daughton Jun 2007

Engineering Management And Industrial Engineering: Similarities And Differences, Cassandra C. Elrod, Ashley Rasnic, William Daughton

Business and Information Technology Faculty Research & Creative Works

Engineering Management is a broad and diverse field of engineering, thereby making it difficult to define exactly what the degree encompasses. At the same time, the somewhat related degree of Industrial Engineering is better understood. Some universities offer a Bachelor of Science degree in Engineering Management with an emphasis in Industrial Engineering, while others offer a Bachelor of Science degree in Industrial Engineering with an emphasis in Engineering Management. In today's world of competitive academia, many wonder if these degree fields are similar enough to be used interchangeably or if there is a distinct difference separating the two degrees, making …


R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli May 2007

R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli

Nader Ale Ebrahim

Research and Development (R&D) management in Iran has faced many barriers and obstacles, in which R&D units are considered as the basic core of the product development and innovation. Due to structural shortcomings, a great number of organizations and industries have not yet been able to position themselves in the market. There are about 1141 R&D units throughout Iran, due to the geographical decentralization of these units this paper considers and analyzes the R&D case study in one of the provinces located in the north part of Iran, and the findings can be generalized to the other industrialized areas and …


2007 Survey Of Summer Sessions Students At The University Of Nebraska-Lincoln, Paul Savory Apr 2007

2007 Survey Of Summer Sessions Students At The University Of Nebraska-Lincoln, Paul Savory

Department of Industrial and Management Systems Engineering: Faculty Publications

During Summer 2007, UNL Summer Sessions (FlexEd) surveyed summer students to learn about their experience in taking a summer course(s). The survey results will offer confirmation of what we are doing well and will provide guidance on areas of improvement and better strategies for marketing UNL summer opportunities. A total of 227 students completed the survey. Fifteen summer classes were selected to complete a paper-based or electronic version of the survey. The classes were from three different summer sessions and used different delivery mechanisms (on-campus, studio, distance education).


An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp Apr 2007

An Exploratory Study Of Iso 9001:2000 Quality Management Systems Using The Iso/Iec 15504 Architecture, Paul Richard Shimp

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this paper is to provide an exploratory study on the implementation and issues regarding Quality Management Systems as defined by ISO 9001 :2000 using the architecture of ISO/IEC 15504. The recently published ISO/IEC 15504 series of standards provides a framework to assess processes and determine levels of capability. With the use of this framework, the study will focus on the assessment and identification of problem areas requiring focus for continual improvement within an ISO 9001 :2000 quality management system.

The structure of this paper is as follows: Section 1 provides a background discussion of ISO 9001 :2000. …


Determining Continual Improvement Process Methods Within Quality Management Systems, Diane M. Bové Jan 2007

Determining Continual Improvement Process Methods Within Quality Management Systems, Diane M. Bové

Theses

Institutionalized standards require organizations to actively define and implement quality management systems, which includes active participation in continual improvement efforts. Interpretations and practices vary on implementation methodology.

Traditional views of quality do not integrate the technical disciplines into a defined science which would support a standardized approach for continual improvement implementation.

In order to optimize improvement efforts, a conceptual hypothesis is proposed to integrate quality through combining and collaborating implementation efforts of engineering, control, assurance, improvement and costs. The purpose of this thesis is to establish a roadmap to assist in choosing effective quality improvement methodologies and toolsets that assist …


Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci Jan 2007

Internet Industry Competition Dynamics: Peering Limitations, Exposure, And Counter Strategies, Seungjae Shin, Jack E. Tucci

Journal of International Technology and Information Management

The Internet industry is vertically integrated with Internet Backbone Providers (IBPs) and Internet Service Providers (ISPs.) Although there are many ISPs and IBPs in each stream, both markets are considered independent oligopolies in that there are a few dominant competitors in each market. It is generally accepted that the Internet industry structure has evolved into a four-tier hierarchical structure. The synergistic and codependent nature of the Internet industry is the key element in understanding the competitive environment in which both IBP’s and ISP’s cooperate. Peering is an efficient way to exchange traffic freely within the access tier, nevertheless competitive constraints …


Enterprise Resource Planning (Erp): A Review Of The Literature, Young Moon Jan 2007

Enterprise Resource Planning (Erp): A Review Of The Literature, Young Moon

Mechanical and Aerospace Engineering - All Scholarship

This article is a review of work published in various journals on the topics of Enterprise Resource Planning (ERP) between January 2000 and May 2006. A total of 313 articles from 79 journals are reviewed. The article intends to serve three goals. First, it will be useful to researchers who are interested in understanding what kinds of questions have been addressed in the area of ERP. Second, the article will be a useful resource for searching for research topics. Third, it will serve as a comprehensive bibliography of the articles published during the period. The literature is analysed under six …


Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan Jan 2007

Improving The Judicial System To Handle Computer Crime, Gerald V. Post, Albert Kagan

Journal of International Technology and Information Management

This paper asked professionals in the legal system to evaluate the current state and effectiveness of laws to identify and deter computer crime. Responses were evaluated with a formal structural equation model. The results generally show that legal professionals believe potential jurors have minimal knowledge of computer crime issues. More importantly, they also believe that judges have little knowledge or experience. A similar lack of knowledge by defense attorneys indicates that it could be difficult for a person accused of computer related infractions to find adequate representation. On the other hand, more experienced participants do not believe computer laws present …


An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen Jan 2007

An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen

Journal of International Technology and Information Management

The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …


Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff Jan 2007

Internet Entrepreneurship And Economic Growth, Gerald V. Post, John F. Pfaff

Journal of International Technology and Information Management

This paper looks at national attempts to promote economic growth through the Internet. Growth can be driven through service exports or internally through increased service transactions and fostering entrepreneurship. India is often held as an example of service exports, but economic statistics show that India might not be a good example for other nations because net service trade is negative and wages have been economically distorted. Ultimately, developing nations need to find internal growth models. Internal growth could be driven though increased consumption due to improved information, or increased investment expenditures from infrastructure investments.


An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder Jan 2007

An Analysis Of The D Programming Language, Sumanth Yenduri, Louise Perkins, Md. Sarder

Journal of International Technology and Information Management

The C language and its derivatives have been some of the dominant higher-level languages used, and the maturity has stemmed several newer languages that, while still relatively young, possess the strength of decades of trials and experimentation with programming concepts. While C++ was a major step in the advancement from procedural to object-oriented programming (with a backbone of C), several problems existed that prompted the development of new languages. This paper focuses on one such language: D. D was designed as a potential successor to C++, supporting most features of C++’s class design and modifications intended to ease common program …


More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr Jan 2007

More Secure Passwords, Scott Magruder, Stanley X. Lewis Jr

Journal of International Technology and Information Management

Passwords are often the first line of defense against hackers trying to logon to a user’s account. Due to this, the password that a user selects for protection of their account is critical. These passwords must be “good” passwords that are not easily cracked. However, how does the network administrator enforce this? A simple change to the login process can make the passwords chosen by users much more secure. A description of this simple process is given in this paper. The normal login process is described. A description of the how hackers attempt to crack passwords is given. The simple …


Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma Jan 2007

Integrating It-Enabled Social Networks With Transaction Cost Economics And The Resource Based View Of The Firm, Ganesh D. Bhatt, Jatinder N. D. Gupta, Sushil K. Sharma

Journal of International Technology and Information Management

Prior research has mostly focused on transaction cost economics (TCE) to interpret the effect of information systems (IS) on organizational governance structures. A TCE based approach predicts that information technology (IT) will lead to increased use of electronic markets to coordinate economic transactions from electronic hierarchies. However, there is contradictory evidence in the literature regarding the rise and importance of cooperative relationships, joint ventures, and value-added partnerships integrated through information systems. To reconcile these contradictions, this paper analyzes the effect of IT on governance structures based on the TCE, social network theory, and the resource based view (RBV) of the …


In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen Jan 2007

In Search Of Factors To Online Game Addiction And Its Implications, Yangil Park, Jeng-Chung V. Chen

Journal of International Technology and Information Management

Research has explored online users who are hooked on Internet applications such as chat rooms, web surfing, and interactive games. Online game addiction is one of the problems arisen from the use of the Internet. This study is motivated by a causal connection found from previous research of computer game addiction. The study describes two typical types of online games and looks further into the causes of the addiction by using two main theories. We also propose research hypotheses and discuss possible implications of online game addiction.


The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht Jan 2007

The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht

Journal of International Technology and Information Management

Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …


A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier Jan 2007

A Framework And Guide For Understanding The Creation Of Consumer Trust, Joseph A. Cazier

Journal of International Technology and Information Management

This paper develops a framework and model for building trust by combining research on the creation of trust with the dimensions of trust: ability, benevolence and integrity. By combining these dimensions in a matrix with the types of trust production based on characteristics, process and institutions, the paper develops a robust 3 x 3 matrix with which to categorize and understand trust production. The framework is developed and analyzed in the light of literature on consumer trust. This framework can help researchers, practitioners and consumers understand trust creation and assist businesses in developing a comprehensive strategy for managing trust.


An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka Jan 2007

An Application Of The Deming Management Method For Information Technology Projects, Jack T. Marchewka

Journal of International Technology and Information Management

Although the ideas and teachings of W. Edwards Deming have been implemented in organizations world- wide for over the past 50 years, only three studies have empirically tested a theoretical model grounded in the Deming Management Method. These studies focused on the manufacturing and services area. Today, quality management continues to be an area of interest both in project management and software engineering. The focus of this study is to test the Deming Management Method in information technology (IT) projects. A survey of 63 IT professionals provides empirical support for the Deming Management Method and its application to IT projects. …


Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan Jan 2007

Social Network Enhanced Digital City Management And Innovation Success: A Prototype Design, Bih-Ru Lea, Wen-Bin Yu, Prashanth Kannan

Journal of International Technology and Information Management

Innovation is the process by which knowledge is transformed into products and services which in turn fuels economic development to create wealth and generates improvements in the standard of living. With the advance of technology, social networks that play a fundamental role as a medium for the spread of information, ideas, and influence among its members have taken a form of digital city to offer a range of online services, including access to social environments, community services, and e-commerce to its infohabitants. This study investigates how social network theories can be used to design and manage a web-based digital city …


Corporate Blogs Of 40 Fortune 500 Companies: Distribution, Categorization And Characteristics, Shaoyi He, Jake Zhu Jan 2007

Corporate Blogs Of 40 Fortune 500 Companies: Distribution, Categorization And Characteristics, Shaoyi He, Jake Zhu

Journal of International Technology and Information Management

This paper studies corporate blogs as virtual communities, focusing on the distribution, categorization and characteristics of 40 Fortune 500 Companies’ blogs. Firstly, the 40 corporate blogs were classified by industries to see which industries are active advocates of corporate blogs. Secondly, the 40 corporate blogs were first grouped in direct competitor clusters and then categorized into four types of virtual communities: 1) Community of interest, 2) Goal-oriented community of interest, 3) Learner’s community, and 4) Community of practice. Thirdly, eight common elements were identified and compared for each of the 40 corporate blogs to find out their major characteristics. Finally, …


Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem Jan 2007

Project Management Practices In The Information Technology Departments Of Various Size Institutions Of Higher Education, Charles R. Johnston, David C. Wierschem

Journal of International Technology and Information Management

The demand for information technology at institutions of higher education is increasing at a rapid pace. It is fueled by student, faculty, and administrative needs. This paper examines project management practices at these institutions with respect to the sizes of the institutions. Survey results indicate an emphasis on operational concerns at small and medium size institutions when selecting IT projects. The prominence of the role of project manager and adoption of formal PM tools/techniques by IT departments generally increase with the sizes of the institutions. The importance of having a project plan is recognized by all sizes of institutions of …


Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams Jan 2007

Discovering Software Reliability Patterns Based On Multiple Software Projects, Yi Liu, Gerald Adkins, Jeng-Foung Yao, Gita Williams

Journal of International Technology and Information Management

Discovering patterns that indicate software reliability provides valuable information to software project managers. Software Quality Classification (SQC) modeling is a methodology that can be used to discover reliability patterns of large software projects. However, the patterns found by SQC modeling may not be accurate and robust owing to insufficient information used in the training process. This study compares two genetic programming-based SQC models using different volumes of data. These data were extracted from seven different NASA software projects. The results demonstrate that combining data from different projects can produce more accurate and reliable patterns.