Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 331 - 343 of 343

Full-Text Articles in Business

Using Fair Division Methods For Allocating Transportation Funds, Edith Montes Jan 2014

Using Fair Division Methods For Allocating Transportation Funds, Edith Montes

Open Access Theses & Dissertations

Current transportation funding allocation methods are very complex due to limited budgets and conflicting interests. In order to maintain an efficient infrastructure transportation system, agencies must balance the allocation of funds required either to increase the roadway capacity or to preserve the existing roads in service. Depending on the target objectives and specific constraints, the funding allocation process is approached using different methods. The funding allocation process is usually addressed using expert judgment which involves subjective criteria, weighted formulas with pre-established priorities, or a combination of both. However, formula-based funding allocation methods may lead to the public's disagreement if final …


Modular Design Of Physical Internet Transport, Handling And Packaging Containers, Benoit Montreuil, Eric Ballot, William Tremblay Jan 2014

Modular Design Of Physical Internet Transport, Handling And Packaging Containers, Benoit Montreuil, Eric Ballot, William Tremblay

13th IMHRC Proceedings (Cincinnati, Ohio. USA – 2014)

This paper proposes a three‐tier characterization of Physical Internet containers into transport, handling and packaging containers. It first provides an overview of goods encapsulation in the Physical Internet and of the generic characteristics of Physical Internet containers. Then it proceeds with an analysis of the current goods encapsulation practices. This leads to the introduction of the three tiers, with explicit description and analysis of containers of each tier. The paper provides a synthesis of the proposed transformation of goods encapsulation and highlights key research and innovation opportunities and challenges for both industry and academia.


Data Model And Software Tools For Modeling Picking Operations, Jeffrey S. Smith Jan 2014

Data Model And Software Tools For Modeling Picking Operations, Jeffrey S. Smith

13th IMHRC Proceedings (Cincinnati, Ohio. USA – 2014)

Presenter will provide.


Modeling And Optimization Of Radio Frequency Identification Networks For Inventory Management, Atipong Suriya, Jose D. Porter Jan 2014

Modeling And Optimization Of Radio Frequency Identification Networks For Inventory Management, Atipong Suriya, Jose D. Porter

13th IMHRC Proceedings (Cincinnati, Ohio. USA – 2014)

Stock loss and out-of-stocks are outcomes of poorly designed inventory management systems and can lead to significant revenue losses. Inventory management systems (IMSs) based on radio frequency identification (RFID) have the potential to minimize these losses if they are properly designed and deployed. However, the placement of RFID readers to support IMSs is often done on a trial and error basis which is time consuming and results in less than optimal coverage. A methodology to find the optimal location and number of RFID readers in a warehouse facility to ensure a desired level of radio frequency signal coverage was developed …


Robust Truckload Relay Network Design Under Demand Uncertainty, Hector A. Vergara, Zahra Mokhtari Jan 2014

Robust Truckload Relay Network Design Under Demand Uncertainty, Hector A. Vergara, Zahra Mokhtari

13th IMHRC Proceedings (Cincinnati, Ohio. USA – 2014)

This research addresses the issue of incorporating demand uncertainty in the strategic design of relay networks for truckload transportation. An existing composite variable mathematical model for the design of hybrid relay networks is extended by developing its robust counterpart. The proposed approach considers uncertainty in the number of truckloads to be dispatched between a pair of nodes in the network which is characterized by a symmetric interval around the expected demand value. A two-step heuristic approach is used to solve the robust model. Several numerical experiments are carried out to study the differences between the solutions obtained with the robust …


The Sky Is The Limit, Alexander Hayes Dec 2013

The Sky Is The Limit, Alexander Hayes

Alexander Hayes Mr.

IEEE Technology and Society Magazine Associate Editor Alexander Hayes interviewed Glass Explorer Cecilia Abadie on January 21, 2013. The complete Google Hangout interview is available for viewing on YouTube at http://goo.gl/YFFbxJ.


Tsu Faculty Research Interest Database, David Owerbach Dec 2013

Tsu Faculty Research Interest Database, David Owerbach

David Owerbach

The TSU faculty research interest database was constructed by the Office of Research and was last updated on November 20, 2014.


Tsu Faculty Publication Database, David Owerbach Dec 2013

Tsu Faculty Publication Database, David Owerbach

David Owerbach

THE TSU faculty publication database is for the years 2012-2014. The database was constructed by the Office of Research and was last updated on November 20, 2014.


Boundaries Of A Complex World, Isbn 978-3-662-49078-5 (2016), Andrei Ludu Dec 2013

Boundaries Of A Complex World, Isbn 978-3-662-49078-5 (2016), Andrei Ludu

Andrei Ludu

The book is available for purchase now, online or hard copy from
Springer-Verlag shop: http://www.springer.com/us/book/9783662490761
Amazon
Google books


Teaching Evaluation (Spring 2014), Hwee-Joo Kam Dec 2013

Teaching Evaluation (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.


Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula Dec 2013

Open Source Software To Enhance The Stem Learning Environment, Maurice E. Dawson Jr., Imad Al Saeed, Jorja Wright, Festus Onyegbula

Maurice Dawson

This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to …


The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette Dec 2013

The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette

Maurice Dawson

Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …


Student Feedback (Spring 2014), Hwee-Joo Kam Dec 2013

Student Feedback (Spring 2014), Hwee-Joo Kam

Hwee-Joo Kam

No abstract provided.