Search results
11 – 20 of 47Gang Li, Yi Lin, Shouyang Wang and Hong Yan
Although a lot of attention has been paid to demand information sharing in the recent decade, few studies look at the value of supply information sharing. The purpose of this…
Abstract
Purpose
Although a lot of attention has been paid to demand information sharing in the recent decade, few studies look at the value of supply information sharing. The purpose of this paper is to address the importance of timely supply information sharing to the supply chain management under disruption is addressed.
Design/methodology/approach
By introducing a Directed Acyclic Supply Network (DASN) model and an Impact Network (INet) model, the impact of a disruption on the performance of the supply chain is quantified. A comprehensive algorithm is developed to calculate the time and cost impact of the disruption. Insights about the value of timely supply information sharing are further discussed, based on quantitative relationships of material flows. Finally, an application of the above model in a main manufacturer of China is introduced. It is then compared to its performance in the case of timely supply information sharing with cases where information is not shared or is shared late.
Findings
By timely sharing of supply information, firms at downstream stages can alert a disruption at an upstream stage, derive the correct early warning time, and make proper decisions to offset the impact of the disruption. Information sharing therefore enhances the agility of firms while improving the stability and performance of the whole supply chain.
Research limitations/implications
This paper only considers the time and cost impact from a single source of disruption. Further work may investigate other disruptions, which may arise from multiple sources.
Practical implications
This paper provides an effective method to quantify the impact of a disruption. The method has been successfully applied in a supply chain management information system.
Originality/value
This paper is among the initial studies of understanding and quantifying the value of supply information sharing. The work indicates the importance of timely supply information sharing to improve the performance of a supply chain.
Details
Keywords
Evidence suggests that, in the presence of imperfect market institutions, individuals devote resources to the establishment of reliable connections to attenuate the frictions that…
Abstract
Evidence suggests that, in the presence of imperfect market institutions, individuals devote resources to the establishment of reliable connections to attenuate the frictions that reduce trading and insurance opportunities. In this chapter, the author surveys the relevant literature on strategic formation of networks and use it to study this particular economic situation. A simple model is built to show that the investment in strong ties often, though not always, produces stable configurations that manage to improve upon the imperfections of market institutions.
Imaduddin Sahabat, Tumpak Silalahi, Ratih Indrastuti and Marizsa Herlina
The financial turbulence resulting from the global financial crisis sparked the interest in improving understanding of financial risks. The transmission of financial institution…
Abstract
Purpose
The financial turbulence resulting from the global financial crisis sparked the interest in improving understanding of financial risks. The transmission of financial institution failures can be determined from the prevailing network structures between banks. The purpose of this study is to identify relationship between payment system network characteristics and financial system condition.
Design/methodology/approach
The characteristics of the interbank network structure in the payment system are identified using a graph theory and the relationship between the network characteristics of interbank transactions in the payment system and financial system stability is examined using a vector auto regression model.
Findings
This study shows that the connectedness of large-value payment transaction is more segmented compared to that of retail value payments. A significant relationship is observed between the characteristics of the network and the large-value payment transactions.
Research limitations/implications
This study found the connectedness of large-value transactions is more segmented when compared to retail-value transactions. It also shows a causal effect of the network characteristic on the financial system stability.
Originality/value
Unlike existing studies, this study considers both the connectedness in large-value transactions and retail-value transactions.
Details
Keywords
A. Kaveh and M. Shahrouzi
The generality of the genetic search in the light of proper coding schemes, together with its non‐gradient‐based search, has made it popular for many discrete problems including…
Abstract
Purpose
The generality of the genetic search in the light of proper coding schemes, together with its non‐gradient‐based search, has made it popular for many discrete problems including structural optimization. However, the required computational effort increases as the cardinality of the search space and the number of design variables increase. Memetic algorithms are formal attempts to reduce such a drawback for real‐world problems incorporating some kind of problem‐specific information. This paper aims to address this issue.
Design/methodology/approach
In this paper both Lamarckian and Baldwinian approaches for meme evolution are implemented using the power of graph theory in topology assessment. For this purpose, the concept of load path connectivity in frame bracing layouts is introduced and utilized by the proposed graph theoretical algorithms. As an additional search refinement tool, a dynamic mutation band control is recommended. In each case, the results are studied via a set of ultimate design family rather than one pseudo optimum. The method is further tested using a number of steel frame examples and its efficiency is compared with conventional genetic search.
Findings
Here, the problem of bracing layout optimization in steel frames is studied utilizing a number of topological guidelines.
Originality/value
The method of this paper attempts to reduce the computational effort for optimal design of real‐world problems incorporating some kind of problem‐specific information.
Details
Keywords
This study explores the characteristics of high-speed rail (HSR) and air transportation networks in China based on the weighted complex network approach. Previous related studies…
Abstract
This study explores the characteristics of high-speed rail (HSR) and air transportation networks in China based on the weighted complex network approach. Previous related studies have largely implemented unweighted (binary) network analysis, or have constructed a weighted network, limited by unweighted centrality measures. This study applies weighted centrality measures (mean association [MA], triangle betweenness centrality [TBC], and weighted harmonic centrality [WHC]) to represent traffic dynamics in HSR and air transportation weighted networks, where nodes represent cities and links represent passenger traffic. The spatial distribution of centrality results is visualized by using ArcGIS 10.2. Moreover, we analyze the network robustness of HSR, air transportation, and multimodal networks by measuring weighted efficiency (WE) subjected to the highest weighted centrality node attacks. In the HSR network, centrality results show that cities with a higher MA are concentrated in the Yangtze River Delta and the Pearl River Delta; cities with a higher TBC are mostly provincial capitals or regional centers; and cities with a higher WHC are grouped in eastern and central regions. Furthermore, spatial differentiation of centrality results is found between HSR and air transportation networks. There is a little bit of difference in eastern cities; cities in the central region have complementary roles in HSR and air transportation networks, but air transport is still dominant in western cities. The robustness analysis results show that the multimodal network, which includes both airports and high-speed rail stations, has the best connectivity and shows robustness.
Details
Keywords
Anish Khobragade, Shashikant Ghumbre and Vinod Pachghare
MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity…
Abstract
Purpose
MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.
Design/methodology/approach
D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.
Findings
Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.
Research limitations/implications
Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.
Practical implications
Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the characteristics and objectives of the system or network.
Originality/value
The representation learning approach helps to reduce incompleteness using a link prediction that infers possible missing facts by using the existing entities and relations of D3FEND.
Details
Keywords
This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities…
Abstract
Purpose
This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities are connected in determining tourist consumption as well as the organization of destination supply.
Design/methodology/approach
The author developed a network formation mechanism to create edges between nodes based on the joint probability of a pair of activities undertaken by tourists at a destination. By adjusting network sparsity, the author created an ensemble of four topologically similar networks for empirical testing. The author used tourist activity data of Hong Kong inbound tourists to test the network model.
Findings
The author found a robust hub–periphery topological structure of the tourist activity network. In addition, the network is featured by high clustering, short diameter and positive correlations between four node centralities, namely, degree, closeness, betweenness and eigenvector centralities. The author also generated the k-cores of the networks to further unravel the structure of hub nodes. The author found that the k-cores are dominated by tourist activities related to shopping or sightseeing, suggesting the high complementarity of these activities.
Research limitations/implications
This study provides a different lens through which tourist consumption can be understood from a macroscopic angle by examining network topology and from a microscopic angle by examining node centralities.
Originality/value
To the best of the author’s knowledge, this is the first study attempting to model tourist activity and consumption in a network and explore the properties of the network. Not only has this study provided a new real-world network for network research, but it has also suggested an innovative modeling approach for tourist behavior research.
Details
Keywords
Fei-Fei Cheng, Yu-Wen Huang, Der-Chian Tsaih and Chin-Shan Wu
The purpose of this paper is to examine the evolution of collaboration among researchers in Library Hi Tech based on the co-authorship network analysis.
Abstract
Purpose
The purpose of this paper is to examine the evolution of collaboration among researchers in Library Hi Tech based on the co-authorship network analysis.
Design/methodology/approach
The Library Hi Tech publications were retrieved from Web of Science database between 2006 and 2017. Social network analysis based on co-authorship was analyzed by using BibExcel software and a visual knowledge map was generated by Pajek. Three important social capital indicators: degree centrality, closeness centrality and betweenness centrality were calculated to indicate the co-authorship. Cohesive subgroup analysis which includes components and k-core was then applied to show the connectivity of co-authorship network of Library Hi Tech.
Findings
The results indicated that around 42 percent of the articles were written by single author, while an increasing trend of multi-authored articles suggesting the collaboration among researchers in librarian research field becomes popular. Furthermore, the social network analysis identified authorship network with three core authors – Markey, K., Fourie, I. and Li, X. Finally, six core subgroups each included six or seven tightly connected researchers were also identified.
Originality/value
This study contributed to the existing literature by revealing the co-authorship network in librarian research field. Key researchers in the major subgroup were identified. This is one of the limited studies that describe the collaboration network among authors from different perspectives showing a more comprehensive co-authorship network.
Details
Keywords
With the prosperity of grey extension models, the form and structure of grey forecasting models tend to be complicated. How to select the appropriate model structure according to…
Abstract
Purpose
With the prosperity of grey extension models, the form and structure of grey forecasting models tend to be complicated. How to select the appropriate model structure according to the data characteristics has become an important topic. The purpose of this paper is to design a structure selection method for the grey multivariate model.
Design/methodology/approach
The linear correction term is introduced into the grey model, then the nonhomogeneous grey multivariable model with convolution integral [NGMC(1,N)] is proposed. Then, by incorporating the least absolute shrinkage and selection operator (LASSO), the model parameters are compressed and estimated based on the least angle regression (LARS) algorithm.
Findings
By adjusting the values of the parameters, the NGMC(1,N) model can derive various structures of grey models, which shows the structural adaptability of the NGMC(1,N) model. Based on the geometric interpretation of the LASSO method, the structure selection of the grey model can be transformed into sparse parameter estimation, and the structure selection can be realized by LASSO estimation.
Practical implications
This paper not only provides an effective method to identify the key factors of the agricultural drought vulnerability, but also presents a practical model to predict the agricultural drought vulnerability.
Originality/value
Based on the LASSO method, a structure selection algorithm for the NGMC(1,N) model is designed, and the structure selection method is applied to the vulnerability prediction of agricultural drought in Puyang City, Henan Province.
Details
Keywords
Wei Xing, Marios D. Dikaiakos, Hua Yang, Angelos Sphyris and George Eftichidis
This paper aims to describe the main challenges of identifying and accessing useful information and knowledge about natural hazards and disasters results. The paper presents a…
Abstract
Purpose
This paper aims to describe the main challenges of identifying and accessing useful information and knowledge about natural hazards and disasters results. The paper presents a grid‐based digital library system designed to address the challenges.
Design/methodology/approach
The need to organize and publish metadata about European research results in the field of natural disasters has been met with the help of two innovative technologies: the Open Grid Service Architecture (OGSA) and the Resource Description Framework (RDF). OGSA provides a common platform for sharing distributed metadata securely. RDF facilitates the creation and exchange of metadata.
Findings
Using grid technology allows the RDF metadata of European research results in the field of natural disasters to be shared securely and effectively in a heterogeneous network environment.
Originality/value
A metadata approach is proposed for the extraction of the metadata, and their distribution to third parties in batch, and their sharing with other applications can be a quickly process. Furthermore, a method is set out to describe metadata in a common and open format, which can become a widely accepted standard; the existence of a common standard enables the metadata storage in different platforms while supporting the capability of distributed queries across different metadata databases, the integration of metadata extracted from different sources, etc. It can be used for the general‐purpose search engines.
Details