Search results
1 – 10 of over 117000Gives a bibliographical review of the finite element methods (FEMs) applied for the linear and nonlinear, static and dynamic analyses of basic structural elements from the…
Abstract
Gives a bibliographical review of the finite element methods (FEMs) applied for the linear and nonlinear, static and dynamic analyses of basic structural elements from the theoretical as well as practical points of view. The range of applications of FEMs in this area is wide and cannot be presented in a single paper; therefore aims to give the reader an encyclopaedic view on the subject. The bibliography at the end of the paper contains 2,025 references to papers, conference proceedings and theses/dissertations dealing with the analysis of beams, columns, rods, bars, cables, discs, blades, shafts, membranes, plates and shells that were published in 1992‐1995.
Details
Keywords
The megadimensional nature of the complex social systems of the twentieth century, and the increasing levels of interrelatedness, present the individual with a bewildering array…
Abstract
The megadimensional nature of the complex social systems of the twentieth century, and the increasing levels of interrelatedness, present the individual with a bewildering array of information sources and services.
Richard Baskerville, Eun Hee Park and Jongwoo Kim
The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the…
Abstract
Purpose
The purpose of this paper is to develop and evaluate an integrated computer abuse model that incorporates both organizational abuse settings and the psychological processes of the abuser.
Design/methodology/approach
The paper developed an emote opportunity (EO) model through a comprehensive literature review and conducted a case study to evaluate the explanatory and prescriptive usefulness of the model.
Findings
The EO model helps explain the interaction between organization-centric factors and individual-centric factors. It also helps explain how potential computer abusers elicit an emotion process component that ultimately contributes to computer abuse behaviors. The model connects both organizational external regulation processes and individual internal regulation processes to emote process components of potential abusers.
Research limitations/implications
The study considers only organizational computing resources as the target of computer abuse. The model is evaluated by historical data from a computer abuse case. Future research with contemporary empirical data would further evaluate these findings. Organizations should be aware of the opportunities they create for abuse and the emotional state-of-mind of potential abusers within organizations.
Practical implications
Organizations should take a holistic approach that incorporates personal emotions and organizational abuse opportunity settings to prevent computer abuse.
Originality/value
A multilevel, integrated EO model incorporating organizational environment and individual emotion processes provides an elaborated and holistic understanding of computer abuse. The model helps organizations consider the emotional state-of-mind of abusers as well as their organizational situation.
Details
Keywords
D. Walters and C.A Rands
Along with organisations in other fields, retailers have been using computers in management systems since the mid‐1960s and, in some cases, much earlier. Over this period, there…
Abstract
Along with organisations in other fields, retailers have been using computers in management systems since the mid‐1960s and, in some cases, much earlier. Over this period, there have been dramatic changes in the computer technology available for use by management, together with considerable accumulated experience in using them, particularly in retailing. However, this has, in many industries, been offset by an increase in the problems facing managers; in retailing, for instance, companies now have to face economies in which disposable incomes have been squeezed, whilst buying patterns are changing rapidly and becoming difficult to predict. A consequence of this is that to survive today retailers must be far better at product range planning, cash planning and control of capital than they needed to be in the 1960s. They may be helped in this by an increasing understanding of how to manage product range, cash flow or funds allocation problems, and also by the availability of more advanced computing facilities which allow managers to apply this understanding more effectively. These facilities vary from the range of computers on offer (mainframe to micros) to data flow networks, automated data input, visual display terminals and specialist soft‐ware for retail planning and control (e.g. distribution packages).
Michal Hanuliak and Ivan Hanuliak
This paper considers correction aspects of computer communication networks modelling with emphasis on their performance evaluation. In general, the problem is to achieve the…
Abstract
Purpose
This paper considers correction aspects of computer communication networks modelling with emphasis on their performance evaluation. In general, the problem is to achieve the highest possible performance given constraints on the system.
Design/methodology/approach
The paper reviews the application of the analytical methods, based on the queueing theory, to the computer communication systems and makes an extension of theory to the improvement of the developed analytical models. In this sense the paper describes the derivation of a correction factor for analytical models to study more precise their basic parameters (end‐to‐end delay, performance, etc.).
Finding
The contribution is in incorporating the derived correction factor to account for the real non‐exponential nature of the input to the transmission channels of computer communication systems. The produced results by corrected analytical model are compared with results previously reported in the literature to estimate the magnitude of improvement.
Practical implications
The improved analytical models were tested under various ranges of parameters, which influence the architecture of the computer communication networks and which are important for practical use.
Research limitations/implications
The rapid rate of growth of computer‐based communication systems (e.g. distributed computer networks, mobile data networks) has resulted in a renewed and intensive interest in this area. Efficient design of their service facilities leads to the sharing of resources among users. Such public shared networks are largely oversubscribed by independent users, which make random demands on the network resources. The optimal resource allocation to satisfy such demands and the proper settlement of contention when demands exceed the capacity of the resources, constitute the problem of being able to understand and to predict system behaviour.
Originality/value
To behaviour analysis we can use both analytical and simulation methods. Modelling and simulation are methods, which are commonly used by performance analysts to represent constraints and optimise performance. Principally the application of analytical queuing theory results belongs to the preferred method in comparison to the simulation method, because of their ability to analyse also very large networks.
Details
Keywords
Discusses computer modelling and simulation as a decision‐makingtechnique frequently used by all genres of manager in a wide range ofdisciplines and in all types of organizations…
Abstract
Discusses computer modelling and simulation as a decision‐making technique frequently used by all genres of manager in a wide range of disciplines and in all types of organizations. Suggests that for auditors to do an effective job – a competent, quality audit in a timely and efficient way – they must familiarize themselves with the technique, know how it is used in the decision process and be aware of its shortcomings. Explores the many ways computer modelling and simulation are used in the decision process and discusses how the technique was actually used to facilitate several audits. Describes the use of computer modelling and simulation during an audit to validate an auditee‐developed model, simulate the outcome of an auditee′s plans, test an auditee′s in‐place system and, finally, help enhance the credibility of auditor recommendations.
Details
Keywords
Index by subjects, compiled by K.G.B. Bakewell covering the following journals: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17; Property Management…
Abstract
Index by subjects, compiled by K.G.B. Bakewell covering the following journals: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17; Property Management Volumes 8‐17; Structural Survey Volumes 8‐17.
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐18; Journal of Property Investment & Finance Volumes 8‐18; Property Management Volumes 8‐18; Structural Survey Volumes 8‐18.
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17;…
Abstract
Compiled by K.G.B. Bakewell covering the following journals published by MCB University Press: Facilities Volumes 8‐17; Journal of Property Investment & Finance Volumes 8‐17; Property Management Volumes 8‐17; Structural Survey Volumes 8‐17.