Search results

1 – 10 of 47
Article
Publication date: 1 August 1999

Jeremy B. Matson and Duncan C. McFarlane

Production responsiveness refers to the ability of a production system to achieve its operational goals in the presence of supplier, internal and customer disturbances, where…

4324

Abstract

Production responsiveness refers to the ability of a production system to achieve its operational goals in the presence of supplier, internal and customer disturbances, where disturbances are those sources of change which occur independently of the system’s intentions. A set of audit tools for assessing the responsiveness of production operations is being prepared as part of an EPSRC funded investigation. These tools are based on the idea that the ability to respond is linked to: the nature of the disturbances or changes requiring a response; their impact on production goals; and the inherent response capabilities of the operation. These response capabilities include information gathering and processing (to detect disturbances and production conditions), decision processes (which initiate system responses to disturbances) and various types of process flexibilities and buffers (which provide the physical means of dealing with disturbances). The paper discusses concepts and issues associated with production responsiveness, describes the audit tools that have been developed and illustrates their use in the context of a steel manufacturing plant.

Details

International Journal of Operations & Production Management, vol. 19 no. 8
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 1 January 1977

A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that…

2112

Abstract

A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that contract. When such a repudiation has been accepted by the innocent party then a termination of employment takes place. Such termination does not constitute dismissal (see London v. James Laidlaw & Sons Ltd (1974) IRLR 136 and Gannon v. J. C. Firth (1976) IRLR 415 EAT).

Details

Managerial Law, vol. 20 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 3 January 2024

Sudhir Rama Murthy, Thayla Tavares Sousa-Zomer, Tim Minshall, Chander Velu, Nikolai Kazantsev and Duncan McFarlane

Advancements in responsive manufacturing have been supporting companies over the last few decades. However, manufacturers now operate in a context of continuous uncertainty. This…

Abstract

Purpose

Advancements in responsive manufacturing have been supporting companies over the last few decades. However, manufacturers now operate in a context of continuous uncertainty. This research paper explores a mechanism where companies can “elastically” provision and deprovision their production capacity, to enable them in coping with repeated disruptions. Such a mechanism is facilitated by the imitability and substitutability of production resources.

Design/methodology/approach

An inductive study was conducted using Gioia methodology for this theory generation research. Respondents from 20 UK manufacturing companies across multiple industrial sectors reflected on their experience during COVID-19. Resource-based view and resource dependence theory were employed to analyse the manufacturers' use of internal and external production resources.

Findings

The study identifies elastic responses at four operational levels: production-line, factory, company and supply chain. Elastic responses that imposed variable-costs were particularly well-suited for coping with unforeseen disruptions. Further, the imitability and substitutability of manufacturers helped others produce alternate goods during the crisis.

Originality/value

While uniqueness of production capability helps manufacturers sustain competitive advantage against competitors during stable operations, imitability and substitutability are beneficial during a crisis. Successful manufacturing companies need to combine these two approaches to respond effectively to repeated disruptions in a context of ongoing uncertainties. The theoretical contribution is in characterising responsive manufacturing in terms of resource heterogeneity and resource homogeneity, with elastic resourcing as the underlying mechanism.

Details

International Journal of Operations & Production Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0144-3577

Keywords

Article
Publication date: 1 April 2006

Han‐Pang Huang and Chih‐Peng Liu

The development of the combined voltage reference and temperature sensor is focused on the RFID applications. The passive RFID systems derive power in the tag solely from…

535

Abstract

Purpose

The development of the combined voltage reference and temperature sensor is focused on the RFID applications. The passive RFID systems derive power in the tag solely from rectifying the incident RF power. The dc power supply may be coupled with the RF signal, voltage drop, and noise. The voltage reference here is to provide a stable voltage for well‐biasing the internal analog circuitry. For the temperature sensing RFID applications, the combined device also gives a highly linear temperature sensor for wide‐temperature range measurements. Seeks to discuss this subject.

Design/methodology/approach

For voltage reference design, a self‐PTAT current is generated for compensating the diode‐connected NMOS transistor to achieve temperature‐stable voltage reference. Moreover, a temperature sensor with high linearity is developed by amplifying the linear portion and restricting the nonlinear part of temperature information.

Findings

Owing to better‐compensation, the voltage reference provides a stable voltage of 718.7±2.9 mV, and the temperature sensor has linearity over 99.8 percent for a wide‐temperature operation from −50 to 150°C.

Originality/value

Owing to the small size, 0.38 × 0.24 mm2, of the combined device, it can be embedded into a RFID tag without increasing the RFID size. The voltage reference can serve as a stable voltage for stabilizing the behavior of analog circuits of the tag, and the temperature sensor probes the environment temperature. Then the information will be delivered to the RFID reader by the tag.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 March 1983

Anita M. Kennedy

I. INTRODUCTION This study attempts to extend and expand previous research conducted by the Department of Marketing at Strathclyde on the adoption and diffusion of industrial…

Abstract

I. INTRODUCTION This study attempts to extend and expand previous research conducted by the Department of Marketing at Strathclyde on the adoption and diffusion of industrial products.

Details

European Journal of Marketing, vol. 17 no. 3
Type: Research Article
ISSN: 0309-0566

Article
Publication date: 1 April 2006

Zhongfei (Mark) Zhang

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in…

Abstract

Purpose

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in the database as well as in the input query images are “as is”, i.e. no standard data collection environment is available. The developed method can also be used in other biometric applications.

Design/methodology/approach

The specific method presented in this paper is called scale independent identification (SII). SII allows direct “comparison” between two images in terms of whether the two objects (e.g. faces) in the two images are the same object (i.e. the same individual). SII is developed by extensively using the matrix computation theory and in particular, the singular value decomposition theory.

Findings

It is found that almost all the existing methods in the literature or technologies in the market require that a normalization in scale be done before any identification processing. However, it is also found that normalization in scale not only adds additional processing complexity, but also may reduce the identification accuracy. In addition, it is difficult to anticipate an “optimal” scale in advance. The developed SII complements the existing methods in all these aspects.

Research limitations/implications

The only limitation which is also the limitation for many other biometric identification methods is that each object (e.g. individual in human face identification) must have a sufficient number of training samples collected before the method works well.

Practical implications

SII is particularly suitable in law enforcement and/or intelligence applications in which it is difficult or impossible to collect data in a standard, “clean” environment.

Originality/value

The SII method is new, and the paper should be interesting to researchers or engineers in this area, and should also be interesting to companies developing any biometrics‐based identification technologies as well as government agencies.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 April 2006

Chein‐I Chang and Mingkai Hsueh

The paper aims to characterize anomaly detection in hyperspectral imagery.

Abstract

Purpose

The paper aims to characterize anomaly detection in hyperspectral imagery.

Design/methodology/approach

This paper develops an adaptive causal anomaly detector (ACAD) to investigate several issues encountered in hyperspectral image analysis which have not been addressed in the past. It also designs extensive synthetic image‐based computer simulations and real image experiments to substantiate the work proposed in this paper.

Findings

This paper developed an ACAD and custom‐designed computer simulations and real image experiments to successfully address several issues in characterizing anomalies for detection, which are – first, how large size for a target to be considered as an anomaly? Second, how an anomaly responds to its proximity? Third, how sensitive for an anomaly to noise? Finally, how different anomalies to be detected? Additionally, it also demonstrated that the proposed ACAD can be implemented in real time processing and implementation.

Originality/value

This paper is the first work on investigation of several issues related to anomaly detection in hyperspectral imagery via extensive synthetic image‐based computer simulations and real image experiments. In addition, it also develops a new developed an ACAD to address these issues and substantiate its performance.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 March 2001

John McFarlane

This paper discusses how corruption, in its various manifestations, has had — and continues to have — a very serious impact on the economic and political stability of the…

694

Abstract

This paper discusses how corruption, in its various manifestations, has had — and continues to have — a very serious impact on the economic and political stability of the Asia‐Pacific region.

Details

Journal of Financial Crime, vol. 9 no. 1
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 April 2006

David Simplot‐Ryl, Ivan Stojmenovic, Aleksandar Micic and Amiya Nayak

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID…

Abstract

Purpose

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize the number of probes necessary for reading all the tags, assuming that the number of tags is known in advance.

Design/methodology/approach

Well known binary and n‐ary partitioning algorithms can be applied to solve the problem for the case of known number of tags. A new randomized hybrid tag identification protocol has been proposed, which combines the two partitioning algorithms into a more efficient one. The new scheme optimizes the binary partition protocol for small values of n (e.g. n=2, 3, 4). The hybrid scheme then applies n‐ary partition protocol on the whole set, followed by binary partition on the tags that caused collision.

Findings

It is analytically proved that the expected number of time slots in the hybrid algorithm with known number of users is less than 2.20 n. Performance of these algorithms was also evaluated experimentally, and an improvement from en to approximately 2.15 n was obtained.

Originality/value

The algorithm shown here is efficient both by theory and practice and outperforms existing ones.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Book part
Publication date: 1 November 2016

Abstract

Details

Governing for the Future: Designing Democratic Institutions for a Better Tomorrow
Type: Book
ISBN: 978-1-78635-056-5

1 – 10 of 47