Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Business

The Challenge Of Intervention To Monetarily Support Or Not Support The National Airline Carriers: A Case Of The Airline Industry In Eastern Europe, Dawna L. Rhoades, Tamilla Curtis Oct 2014

The Challenge Of Intervention To Monetarily Support Or Not Support The National Airline Carriers: A Case Of The Airline Industry In Eastern Europe, Dawna L. Rhoades, Tamilla Curtis

Dr. Tamilla Curtis

The airline industry has been considered a special case in national and international business virtually since its beginning. Because of this status, national governments have repeatedly intervened to support national carriers in order to prevent bankruptcy and failure. The nations of Eastern Europe are no exception to this rule and are currently considering additional intervention to support their carriers. This paper explores the rationale for intervention, particularly the suggested economic impact, using traffic and financial information from the Flightglobal database. The conclusion is that the case for intervention is weak at best and that the results may not justify the …


Urban Blue Space And "The Project Of The Century": Doing Justice On The Seattle Waterfront And For Local Residents, Anne Wessells Oct 2014

Urban Blue Space And "The Project Of The Century": Doing Justice On The Seattle Waterfront And For Local Residents, Anne Wessells

Anne Taufen

No abstract provided.


Exploiting Knowledge About Future Demands For Real-Time Vehicle Dispatching, Soumia Ichoua, Michel Gendreau, Jean Yves Potvin Sep 2014

Exploiting Knowledge About Future Demands For Real-Time Vehicle Dispatching, Soumia Ichoua, Michel Gendreau, Jean Yves Potvin

Soumia Ichoua

An important, but seldom investigated issue in the field of dynamic vehicle routing and dispatching is how to exploit information about future events to improve decision making. In this paper, we address this issue in a real-time setting with a strategy based on probabilistic knowledge about future request arrivals to better manage the fleet of vehicles. More precisely, the new strategy introduces dummy customers (representing forecasted requests) in vehicle routes to provide a good coverage of the territory. This strategy is assessed through computational experiments performed in a simulated environment.


Psum: Training In Google Glass And Android, Keith R. Macarthur, Sarah Greenstein, Ben Sawyer Jul 2014

Psum: Training In Google Glass And Android, Keith R. Macarthur, Sarah Greenstein, Ben Sawyer

Keith Reid MacArthur

Given the dynamic state of technology, people are compelled to learn new ways of interacting with their environment to develop new habits. Google Glass represents one such novel and emerging technology now available to the population. How long does it take to get comfortable with new technology, so that we can maintain our level of competency as before? The Minds in Technology/Machines in Thought (MIT2) Laboratory is evaluating Google Glass for driving research and is interested in the training time required for participants to become comfortable and competent with its use. To fulfill this goal of assessing adaptation, an exploratory …


Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson Jun 2014

Flipped Technological Training And Development Using Quality Systems Management In The Public Services Field, Dustin Bessette, Sharon Burton, Maurice Dawson

Maurice Dawson

Training and development is ideal for businesses process improvements in many public service fields. Education, development, and training tools are not new concepts, but are ideal, crucial, and responsive in the central utilization of employee training systems for public service fields. The need for public workforce has increased and demanded accelerated technological training and development process that have positive value and achievable gains. One method to surge this problem is to flip the technological training and development tools that have been issued and over used in the past. These tools not only hold back vicious potential from employees, but employees …


Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang Jun 2014

Direct Neighbor Search, Jilian Zhang, Kyriakos Mouratidis, Hwee Hwa Pang

Kyriakos MOURATIDIS

In this paper we study a novel query type, called direct neighbor query. Two objects in a dataset are direct neighbors (DNs) if a window selection may exclusively retrieve these two objects. Given a source object, a DN search computes all of its direct neighbors in the dataset. The DNs define a new type of affinity that differs from existing formulations (e.g., nearest neighbors, nearest surrounders, reverse nearest neighbors, etc.) and finds application in domains where user interests are expressed in the form of windows, i.e., multi-attribute range selections. Drawing on key properties of the DN relationship, we develop an …


Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau Jun 2014

Budgeted Personalized Incentive Approaches For Smoothing Congestion In Resource Networks, Pradeep Varakantham, Na Fu, William Yeoh, Shih-Fen Cheng, Hoong Chuin Lau

Shih-Fen CHENG

Congestion occurs when there is competition for resources by sel sh agents. In this paper, we are concerned with smoothing out congestion in a network of resources by using personalized well-timed in- centives that are subject to budget constraints. To that end, we provide: (i) a mathematical formulation that computes equilibrium for the re- source sharing congestion game with incentives and budget constraints; (ii) an integrated approach that scales to larger problems by exploiting the factored network structure and approximating the attained equilib- rium; (iii) an iterative best response algorithm for solving the uncon- strained version (no budget) of the …


A Multi-Objective Memetic Algorithm For Vehicle Resource Allocation In Sustainable Transportation Planning, Hoong Chuin Lau, Lucas Agussurja, Shih-Fen Cheng, Pang Jin Tan Jun 2014

A Multi-Objective Memetic Algorithm For Vehicle Resource Allocation In Sustainable Transportation Planning, Hoong Chuin Lau, Lucas Agussurja, Shih-Fen Cheng, Pang Jin Tan

Shih-Fen CHENG

Sustainable supply chain management has been an increasingly important topic of research in recent years. At the strategic level, there are computational models which study supply and distribution networks with environmental considerations. At the operational level, there are, for example, routing and scheduling models which are constrained by carbon emissions. Our paper explores work in tactical planning with regards to vehicle resource allocation from distribution centers to customer locations in a multi-echelon logistics network. We formulate the bi-objective optimization problem exactly and design a memetic algorithm to efficiently derive an approximate Pareto front. We illustrate the applicability of our approach …


An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham Jun 2014

An Agent-Based Simulation Approach To Experience Management In Theme Parks, Shih-Fen Cheng, Larry Junjie Lin, Jiali Du, Hoong Chuin Lau, Pradeep Reddy Varakantham

Shih-Fen CHENG

In this paper, we illustrate how massive agent-based simulation can be used to investigate an exciting new application domain of experience management in theme parks, which covers topics like congestion control, incentive design, and revenue management. Since all visitors are heterogeneous and self-interested, we argue that a high-quality agent-based simulation is necessary for studying various problems related to experience management. As in most agent-base simulations, a sound understanding of micro-level behaviors is essential to construct high-quality models. To achieve this, we designed and conducted a first-of-its-kind real-world experiment that helps us understand how typical visitors behave in a theme-park environment. …


Interacting Knapsack Problem In Designing Resource Bundles, Truong Huy D. Nguyen, Pradeep Reddy Varakantham, Hoong Chuin Lau, Shih-Fen Cheng Jun 2014

Interacting Knapsack Problem In Designing Resource Bundles, Truong Huy D. Nguyen, Pradeep Reddy Varakantham, Hoong Chuin Lau, Shih-Fen Cheng

Shih-Fen CHENG

In many real-life businesses, the service provider/seller keeps a log of the visitors’ behavior as a way to assess the efficiency of the current business/operation model and find room for improvement. For example, by tracking when visitors entering attractions in a theme park, theme park owners can detect when and where congestion may occur, thus having contingency plans to reroute the visitors accordingly. Similarly, a Cable TV service provider can track channel switching events at each household to identify uninteresting channels. Subsequently, the repertoire of channels up for subscription can evolve over time to better serve the entertainment demand of …


Why The Cyber Bill Matters, Jan Kallberg Jun 2014

Why The Cyber Bill Matters, Jan Kallberg

Jan Kallberg

The separation between private sphere and the federal government matters more than we might think. The bill will create a funnel for industries, enterprises, local government, and state agencies to share information with the federal government. The bill separates the federal government and these other entities – by a traditional but validated approach – by the surrender to federal government for protection by bargaining away the “right” to self-protection. It is important because the federal government will maintain its legitimacy and authority over defending the nation – and by doing so we avoid a chaotic cyber environment where everyone is …


Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang Jun 2014

Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang

Reza Vaezi

The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …


Falha Na Defesa Cibernética: As Consequências Ambientais De Ações Hostis, Jan Kallberg, Rosemary Burk Feb 2014

Falha Na Defesa Cibernética: As Consequências Ambientais De Ações Hostis, Jan Kallberg, Rosemary Burk

Jan Kallberg

Falha na Defesa Cibernética: As Consequências Ambientais de Ações Hostis. Jan Kallberg e Rosemary A. Burk; Neste artigo, apresentamos um argumento claro de que a guerra cibernética pode infligir danos contínuos à sociedade visada, além da destruição de uma rede de computadores específica. As consequências ambientais de longo prazo de uma derrota em uma guerra cibernética e de uma falha na defesa cibernética nacional não têm sido devidamente consideradas.


La Defensa Cibernética Fallida: Las Consecuencias Ambientales De Actos Hostiles., Jan Kallberg, Rosemary Burk Feb 2014

La Defensa Cibernética Fallida: Las Consecuencias Ambientales De Actos Hostiles., Jan Kallberg, Rosemary Burk

Jan Kallberg

UNA DEFENSA CIBERNÉTICA fallida puede tener efectos más generales que los tratados anteriormente en debates sobre las futuras consecuencias de un ataque cibernético. La necesidad de una defensa cibernética para proteger el ambiente no ha recibido la debida atención como un asunto de seguridad nacional. Los países adversarios secretamente buscan métodos para perjudicar y dañar a Estados Unidos mediante un conflicto cibernético futuro.


Transport Replacement And Sustainability Aspects Associated With Additive Manufacturing, Marcus R. Wigan Jan 2014

Transport Replacement And Sustainability Aspects Associated With Additive Manufacturing, Marcus R. Wigan

Marcus R Wigan

Additive manufacturing has a range of characteristics that suggest enhancements to sustainability should be possible. The nature of the process influences not only how products can be made, but also how they can be delivered. Logistics and the global supply chain are central aspects to manufacturing, and considerable attention is being paid to making the supply chain more sustainable. This often makes sound economic sense without any consideration of the environmental benefits, as this usually delivers energy reductions and reduced reworking or redelivery. Additive manufacturing has also secured increasing attention from a sustainability standpoint, but this has in the main …


Tsu Faculty Research Interest Database, David Owerbach Dec 2013

Tsu Faculty Research Interest Database, David Owerbach

David Owerbach

The TSU faculty research interest database was constructed by the Office of Research and was last updated on November 20, 2014.


Tsu Faculty Publication Database, David Owerbach Dec 2013

Tsu Faculty Publication Database, David Owerbach

David Owerbach

THE TSU faculty publication database is for the years 2012-2014. The database was constructed by the Office of Research and was last updated on November 20, 2014.


Boundaries Of A Complex World, Isbn 978-3-662-49078-5 (2016), Andrei Ludu Dec 2013

Boundaries Of A Complex World, Isbn 978-3-662-49078-5 (2016), Andrei Ludu

Andrei Ludu

The book is available for purchase now, online or hard copy from
Springer-Verlag shop: http://www.springer.com/us/book/9783662490761
Amazon
Google books


Teaching Evaluation (Spring 2014), Hwee-Joo Kam Dec 2013

Teaching Evaluation (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Student Feedback (Spring 2014), Hwee-Joo Kam Dec 2013

Student Feedback (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.