Search results
1 – 10 of 47Jeremy B. Matson and Duncan C. McFarlane
Production responsiveness refers to the ability of a production system to achieve its operational goals in the presence of supplier, internal and customer disturbances, where…
Abstract
Production responsiveness refers to the ability of a production system to achieve its operational goals in the presence of supplier, internal and customer disturbances, where disturbances are those sources of change which occur independently of the system’s intentions. A set of audit tools for assessing the responsiveness of production operations is being prepared as part of an EPSRC funded investigation. These tools are based on the idea that the ability to respond is linked to: the nature of the disturbances or changes requiring a response; their impact on production goals; and the inherent response capabilities of the operation. These response capabilities include information gathering and processing (to detect disturbances and production conditions), decision processes (which initiate system responses to disturbances) and various types of process flexibilities and buffers (which provide the physical means of dealing with disturbances). The paper discusses concepts and issues associated with production responsiveness, describes the audit tools that have been developed and illustrates their use in the context of a steel manufacturing plant.
Details
Keywords
A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that…
Abstract
A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that contract. When such a repudiation has been accepted by the innocent party then a termination of employment takes place. Such termination does not constitute dismissal (see London v. James Laidlaw & Sons Ltd (1974) IRLR 136 and Gannon v. J. C. Firth (1976) IRLR 415 EAT).
Sudhir Rama Murthy, Thayla Tavares Sousa-Zomer, Tim Minshall, Chander Velu, Nikolai Kazantsev and Duncan McFarlane
Advancements in responsive manufacturing have been supporting companies over the last few decades. However, manufacturers now operate in a context of continuous uncertainty. This…
Abstract
Purpose
Advancements in responsive manufacturing have been supporting companies over the last few decades. However, manufacturers now operate in a context of continuous uncertainty. This research paper explores a mechanism where companies can “elastically” provision and deprovision their production capacity, to enable them in coping with repeated disruptions. Such a mechanism is facilitated by the imitability and substitutability of production resources.
Design/methodology/approach
An inductive study was conducted using Gioia methodology for this theory generation research. Respondents from 20 UK manufacturing companies across multiple industrial sectors reflected on their experience during COVID-19. Resource-based view and resource dependence theory were employed to analyse the manufacturers' use of internal and external production resources.
Findings
The study identifies elastic responses at four operational levels: production-line, factory, company and supply chain. Elastic responses that imposed variable-costs were particularly well-suited for coping with unforeseen disruptions. Further, the imitability and substitutability of manufacturers helped others produce alternate goods during the crisis.
Originality/value
While uniqueness of production capability helps manufacturers sustain competitive advantage against competitors during stable operations, imitability and substitutability are beneficial during a crisis. Successful manufacturing companies need to combine these two approaches to respond effectively to repeated disruptions in a context of ongoing uncertainties. The theoretical contribution is in characterising responsive manufacturing in terms of resource heterogeneity and resource homogeneity, with elastic resourcing as the underlying mechanism.
Details
Keywords
Han‐Pang Huang and Chih‐Peng Liu
The development of the combined voltage reference and temperature sensor is focused on the RFID applications. The passive RFID systems derive power in the tag solely from…
Abstract
Purpose
The development of the combined voltage reference and temperature sensor is focused on the RFID applications. The passive RFID systems derive power in the tag solely from rectifying the incident RF power. The dc power supply may be coupled with the RF signal, voltage drop, and noise. The voltage reference here is to provide a stable voltage for well‐biasing the internal analog circuitry. For the temperature sensing RFID applications, the combined device also gives a highly linear temperature sensor for wide‐temperature range measurements. Seeks to discuss this subject.
Design/methodology/approach
For voltage reference design, a self‐PTAT current is generated for compensating the diode‐connected NMOS transistor to achieve temperature‐stable voltage reference. Moreover, a temperature sensor with high linearity is developed by amplifying the linear portion and restricting the nonlinear part of temperature information.
Findings
Owing to better‐compensation, the voltage reference provides a stable voltage of 718.7±2.9 mV, and the temperature sensor has linearity over 99.8 percent for a wide‐temperature operation from −50 to 150°C.
Originality/value
Owing to the small size, 0.38 × 0.24 mm2, of the combined device, it can be embedded into a RFID tag without increasing the RFID size. The voltage reference can serve as a stable voltage for stabilizing the behavior of analog circuits of the tag, and the temperature sensor probes the environment temperature. Then the information will be delivered to the RFID reader by the tag.
Details
Keywords
I. INTRODUCTION This study attempts to extend and expand previous research conducted by the Department of Marketing at Strathclyde on the adoption and diffusion of industrial…
This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in…
Abstract
Purpose
This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in the database as well as in the input query images are “as is”, i.e. no standard data collection environment is available. The developed method can also be used in other biometric applications.
Design/methodology/approach
The specific method presented in this paper is called scale independent identification (SII). SII allows direct “comparison” between two images in terms of whether the two objects (e.g. faces) in the two images are the same object (i.e. the same individual). SII is developed by extensively using the matrix computation theory and in particular, the singular value decomposition theory.
Findings
It is found that almost all the existing methods in the literature or technologies in the market require that a normalization in scale be done before any identification processing. However, it is also found that normalization in scale not only adds additional processing complexity, but also may reduce the identification accuracy. In addition, it is difficult to anticipate an “optimal” scale in advance. The developed SII complements the existing methods in all these aspects.
Research limitations/implications
The only limitation which is also the limitation for many other biometric identification methods is that each object (e.g. individual in human face identification) must have a sufficient number of training samples collected before the method works well.
Practical implications
SII is particularly suitable in law enforcement and/or intelligence applications in which it is difficult or impossible to collect data in a standard, “clean” environment.
Originality/value
The SII method is new, and the paper should be interesting to researchers or engineers in this area, and should also be interesting to companies developing any biometrics‐based identification technologies as well as government agencies.
Details
Keywords
Chein‐I Chang and Mingkai Hsueh
The paper aims to characterize anomaly detection in hyperspectral imagery.
Abstract
Purpose
The paper aims to characterize anomaly detection in hyperspectral imagery.
Design/methodology/approach
This paper develops an adaptive causal anomaly detector (ACAD) to investigate several issues encountered in hyperspectral image analysis which have not been addressed in the past. It also designs extensive synthetic image‐based computer simulations and real image experiments to substantiate the work proposed in this paper.
Findings
This paper developed an ACAD and custom‐designed computer simulations and real image experiments to successfully address several issues in characterizing anomalies for detection, which are – first, how large size for a target to be considered as an anomaly? Second, how an anomaly responds to its proximity? Third, how sensitive for an anomaly to noise? Finally, how different anomalies to be detected? Additionally, it also demonstrated that the proposed ACAD can be implemented in real time processing and implementation.
Originality/value
This paper is the first work on investigation of several issues related to anomaly detection in hyperspectral imagery via extensive synthetic image‐based computer simulations and real image experiments. In addition, it also develops a new developed an ACAD to address these issues and substantiate its performance.
Details
Keywords
This paper discusses how corruption, in its various manifestations, has had — and continues to have — a very serious impact on the economic and political stability of the…
David Simplot‐Ryl, Ivan Stojmenovic, Aleksandar Micic and Amiya Nayak
Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID…
Abstract
Purpose
Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize the number of probes necessary for reading all the tags, assuming that the number of tags is known in advance.
Design/methodology/approach
Well known binary and n‐ary partitioning algorithms can be applied to solve the problem for the case of known number of tags. A new randomized hybrid tag identification protocol has been proposed, which combines the two partitioning algorithms into a more efficient one. The new scheme optimizes the binary partition protocol for small values of n (e.g. n=2, 3, 4). The hybrid scheme then applies n‐ary partition protocol on the whole set, followed by binary partition on the tags that caused collision.
Findings
It is analytically proved that the expected number of time slots in the hybrid algorithm with known number of users is less than 2.20 n. Performance of these algorithms was also evaluated experimentally, and an improvement from en to approximately 2.15 n was obtained.
Originality/value
The algorithm shown here is efficient both by theory and practice and outperforms existing ones.
Details