Search results

11 – 20 of 47
Article
Publication date: 1 September 2006

Gang Li, Yi Lin, Shouyang Wang and Hong Yan

Although a lot of attention has been paid to demand information sharing in the recent decade, few studies look at the value of supply information sharing. The purpose of this…

4096

Abstract

Purpose

Although a lot of attention has been paid to demand information sharing in the recent decade, few studies look at the value of supply information sharing. The purpose of this paper is to address the importance of timely supply information sharing to the supply chain management under disruption is addressed.

Design/methodology/approach

By introducing a Directed Acyclic Supply Network (DASN) model and an Impact Network (INet) model, the impact of a disruption on the performance of the supply chain is quantified. A comprehensive algorithm is developed to calculate the time and cost impact of the disruption. Insights about the value of timely supply information sharing are further discussed, based on quantitative relationships of material flows. Finally, an application of the above model in a main manufacturer of China is introduced. It is then compared to its performance in the case of timely supply information sharing with cases where information is not shared or is shared late.

Findings

By timely sharing of supply information, firms at downstream stages can alert a disruption at an upstream stage, derive the correct early warning time, and make proper decisions to offset the impact of the disruption. Information sharing therefore enhances the agility of firms while improving the stability and performance of the whole supply chain.

Research limitations/implications

This paper only considers the time and cost impact from a single source of disruption. Further work may investigate other disruptions, which may arise from multiple sources.

Practical implications

This paper provides an effective method to quantify the impact of a disruption. The method has been successfully applied in a supply chain management information system.

Originality/value

This paper is among the initial studies of understanding and quantifying the value of supply information sharing. The work indicates the importance of timely supply information sharing to improve the performance of a supply chain.

Details

Supply Chain Management: An International Journal, vol. 11 no. 5
Type: Research Article
ISSN: 1359-8546

Keywords

Book part
Publication date: 19 October 2020

Áureo de Paula

Evidence suggests that, in the presence of imperfect market institutions, individuals devote resources to the establishment of reliable connections to attenuate the frictions that…

Abstract

Evidence suggests that, in the presence of imperfect market institutions, individuals devote resources to the establishment of reliable connections to attenuate the frictions that reduce trading and insurance opportunities. In this chapter, the author surveys the relevant literature on strategic formation of networks and use it to study this particular economic situation. A simple model is built to show that the investment in strong ties often, though not always, produces stable configurations that manage to improve upon the imperfections of market institutions.

Details

The Econometrics of Networks
Type: Book
ISBN: 978-1-83867-576-9

Keywords

Article
Publication date: 17 September 2019

Imaduddin Sahabat, Tumpak Silalahi, Ratih Indrastuti and Marizsa Herlina

The financial turbulence resulting from the global financial crisis sparked the interest in improving understanding of financial risks. The transmission of financial institution…

370

Abstract

Purpose

The financial turbulence resulting from the global financial crisis sparked the interest in improving understanding of financial risks. The transmission of financial institution failures can be determined from the prevailing network structures between banks. The purpose of this study is to identify relationship between payment system network characteristics and financial system condition.

Design/methodology/approach

The characteristics of the interbank network structure in the payment system are identified using a graph theory and the relationship between the network characteristics of interbank transactions in the payment system and financial system stability is examined using a vector auto regression model.

Findings

This study shows that the connectedness of large-value payment transaction is more segmented compared to that of retail value payments. A significant relationship is observed between the characteristics of the network and the large-value payment transactions.

Research limitations/implications

This study found the connectedness of large-value transactions is more segmented when compared to retail-value transactions. It also shows a causal effect of the network characteristic on the financial system stability.

Originality/value

Unlike existing studies, this study considers both the connectedness in large-value transactions and retail-value transactions.

Details

Studies in Economics and Finance, vol. 37 no. 1
Type: Research Article
ISSN: 1086-7376

Keywords

Article
Publication date: 4 January 2008

A. Kaveh and M. Shahrouzi

The generality of the genetic search in the light of proper coding schemes, together with its non‐gradient‐based search, has made it popular for many discrete problems including…

Abstract

Purpose

The generality of the genetic search in the light of proper coding schemes, together with its non‐gradient‐based search, has made it popular for many discrete problems including structural optimization. However, the required computational effort increases as the cardinality of the search space and the number of design variables increase. Memetic algorithms are formal attempts to reduce such a drawback for real‐world problems incorporating some kind of problem‐specific information. This paper aims to address this issue.

Design/methodology/approach

In this paper both Lamarckian and Baldwinian approaches for meme evolution are implemented using the power of graph theory in topology assessment. For this purpose, the concept of load path connectivity in frame bracing layouts is introduced and utilized by the proposed graph theoretical algorithms. As an additional search refinement tool, a dynamic mutation band control is recommended. In each case, the results are studied via a set of ultimate design family rather than one pseudo optimum. The method is further tested using a number of steel frame examples and its efficiency is compared with conventional genetic search.

Findings

Here, the problem of bracing layout optimization in steel frames is studied utilizing a number of topological guidelines.

Originality/value

The method of this paper attempts to reduce the computational effort for optimal design of real‐world problems incorporating some kind of problem‐specific information.

Details

Engineering Computations, vol. 25 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 30 June 2021

Qingyu Qi and Oh Kyoung Kwon

This study explores the characteristics of high-speed rail (HSR) and air transportation networks in China based on the weighted complex network approach. Previous related studies…

Abstract

This study explores the characteristics of high-speed rail (HSR) and air transportation networks in China based on the weighted complex network approach. Previous related studies have largely implemented unweighted (binary) network analysis, or have constructed a weighted network, limited by unweighted centrality measures. This study applies weighted centrality measures (mean association [MA], triangle betweenness centrality [TBC], and weighted harmonic centrality [WHC]) to represent traffic dynamics in HSR and air transportation weighted networks, where nodes represent cities and links represent passenger traffic. The spatial distribution of centrality results is visualized by using ArcGIS 10.2. Moreover, we analyze the network robustness of HSR, air transportation, and multimodal networks by measuring weighted efficiency (WE) subjected to the highest weighted centrality node attacks. In the HSR network, centrality results show that cities with a higher MA are concentrated in the Yangtze River Delta and the Pearl River Delta; cities with a higher TBC are mostly provincial capitals or regional centers; and cities with a higher WHC are grouped in eastern and central regions. Furthermore, spatial differentiation of centrality results is found between HSR and air transportation networks. There is a little bit of difference in eastern cities; cities in the central region have complementary roles in HSR and air transportation networks, but air transport is still dominant in western cities. The robustness analysis results show that the multimodal network, which includes both airports and high-speed rail stations, has the best connectivity and shows robustness.

Details

Journal of International Logistics and Trade, vol. 19 no. 2
Type: Research Article
ISSN: 1738-2122

Keywords

Article
Publication date: 16 August 2023

Anish Khobragade, Shashikant Ghumbre and Vinod Pachghare

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity…

Abstract

Purpose

MITRE and the National Security Agency cooperatively developed and maintained a D3FEND knowledge graph (KG). It provides concepts as an entity from the cybersecurity countermeasure domain, such as dynamic, emulated and file analysis. Those entities are linked by applying relationships such as analyze, may_contains and encrypt. A fundamental challenge for collaborative designers is to encode knowledge and efficiently interrelate the cyber-domain facts generated daily. However, the designers manually update the graph contents with new or missing facts to enrich the knowledge. This paper aims to propose an automated approach to predict the missing facts using the link prediction task, leveraging embedding as representation learning.

Design/methodology/approach

D3FEND is available in the resource description framework (RDF) format. In the preprocessing step, the facts in RDF format converted to subject–predicate–object triplet format contain 5,967 entities and 98 relationship types. Progressive distance-based, bilinear and convolutional embedding models are applied to learn the embeddings of entities and relations. This study presents a link prediction task to infer missing facts using learned embeddings.

Findings

Experimental results show that the translational model performs well on high-rank results, whereas the bilinear model is superior in capturing the latent semantics of complex relationship types. However, the convolutional model outperforms 44% of the true facts and achieves a 3% improvement in results compared to other models.

Research limitations/implications

Despite the success of embedding models to enrich D3FEND using link prediction under the supervised learning setup, it has some limitations, such as not capturing diversity and hierarchies of relations. The average node degree of D3FEND KG is 16.85, with 12% of entities having a node degree less than 2, especially there are many entities or relations with few or no observed links. This results in sparsity and data imbalance, which affect the model performance even after increasing the embedding vector size. Moreover, KG embedding models consider existing entities and relations and may not incorporate external or contextual information such as textual descriptions, temporal dynamics or domain knowledge, which can enhance the link prediction performance.

Practical implications

Link prediction in the D3FEND KG can benefit cybersecurity countermeasure strategies in several ways, such as it can help to identify gaps or weaknesses in the existing defensive methods and suggest possible ways to improve or augment them; it can help to compare and contrast different defensive methods and understand their trade-offs and synergies; it can help to discover novel or emerging defensive methods by inferring new relations from existing data or external sources; and it can help to generate recommendations or guidance for selecting or deploying appropriate defensive methods based on the characteristics and objectives of the system or network.

Originality/value

The representation learning approach helps to reduce incompleteness using a link prediction that infers possible missing facts by using the existing entities and relations of D3FEND.

Details

International Journal of Web Information Systems, vol. 19 no. 3/4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 19 December 2022

Yong Chen

This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities…

Abstract

Purpose

This study aims to model tourist activities in a network and explore the properties of the network. Such network enables the author to explain and quantify how tourist activities are connected in determining tourist consumption as well as the organization of destination supply.

Design/methodology/approach

The author developed a network formation mechanism to create edges between nodes based on the joint probability of a pair of activities undertaken by tourists at a destination. By adjusting network sparsity, the author created an ensemble of four topologically similar networks for empirical testing. The author used tourist activity data of Hong Kong inbound tourists to test the network model.

Findings

The author found a robust hub–periphery topological structure of the tourist activity network. In addition, the network is featured by high clustering, short diameter and positive correlations between four node centralities, namely, degree, closeness, betweenness and eigenvector centralities. The author also generated the k-cores of the networks to further unravel the structure of hub nodes. The author found that the k-cores are dominated by tourist activities related to shopping or sightseeing, suggesting the high complementarity of these activities.

Research limitations/implications

This study provides a different lens through which tourist consumption can be understood from a macroscopic angle by examining network topology and from a microscopic angle by examining node centralities.

Originality/value

To the best of the author’s knowledge, this is the first study attempting to model tourist activity and consumption in a network and explore the properties of the network. Not only has this study provided a new real-world network for network research, but it has also suggested an innovative modeling approach for tourist behavior research.

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 2
Type: Research Article
ISSN: 0959-6119

Keywords

Article
Publication date: 20 August 2018

Fei-Fei Cheng, Yu-Wen Huang, Der-Chian Tsaih and Chin-Shan Wu

The purpose of this paper is to examine the evolution of collaboration among researchers in Library Hi Tech based on the co-authorship network analysis.

2609

Abstract

Purpose

The purpose of this paper is to examine the evolution of collaboration among researchers in Library Hi Tech based on the co-authorship network analysis.

Design/methodology/approach

The Library Hi Tech publications were retrieved from Web of Science database between 2006 and 2017. Social network analysis based on co-authorship was analyzed by using BibExcel software and a visual knowledge map was generated by Pajek. Three important social capital indicators: degree centrality, closeness centrality and betweenness centrality were calculated to indicate the co-authorship. Cohesive subgroup analysis which includes components and k-core was then applied to show the connectivity of co-authorship network of Library Hi Tech.

Findings

The results indicated that around 42 percent of the articles were written by single author, while an increasing trend of multi-authored articles suggesting the collaboration among researchers in librarian research field becomes popular. Furthermore, the social network analysis identified authorship network with three core authors – Markey, K., Fourie, I. and Li, X. Finally, six core subgroups each included six or seven tightly connected researchers were also identified.

Originality/value

This study contributed to the existing literature by revealing the co-authorship network in librarian research field. Key researchers in the major subgroup were identified. This is one of the limited studies that describe the collaboration network among authors from different perspectives showing a more comprehensive co-authorship network.

Details

Library Hi Tech, vol. 37 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 20 September 2021

Dang Luo and Decai Sun

With the prosperity of grey extension models, the form and structure of grey forecasting models tend to be complicated. How to select the appropriate model structure according to…

Abstract

Purpose

With the prosperity of grey extension models, the form and structure of grey forecasting models tend to be complicated. How to select the appropriate model structure according to the data characteristics has become an important topic. The purpose of this paper is to design a structure selection method for the grey multivariate model.

Design/methodology/approach

The linear correction term is introduced into the grey model, then the nonhomogeneous grey multivariable model with convolution integral [NGMC(1,N)] is proposed. Then, by incorporating the least absolute shrinkage and selection operator (LASSO), the model parameters are compressed and estimated based on the least angle regression (LARS) algorithm.

Findings

By adjusting the values of the parameters, the NGMC(1,N) model can derive various structures of grey models, which shows the structural adaptability of the NGMC(1,N) model. Based on the geometric interpretation of the LASSO method, the structure selection of the grey model can be transformed into sparse parameter estimation, and the structure selection can be realized by LASSO estimation.

Practical implications

This paper not only provides an effective method to identify the key factors of the agricultural drought vulnerability, but also presents a practical model to predict the agricultural drought vulnerability.

Originality/value

Based on the LASSO method, a structure selection algorithm for the NGMC(1,N) model is designed, and the structure selection method is applied to the vulnerability prediction of agricultural drought in Puyang City, Henan Province.

Details

Grey Systems: Theory and Application, vol. 12 no. 2
Type: Research Article
ISSN: 2043-9377

Keywords

Article
Publication date: 1 May 2005

Wei Xing, Marios D. Dikaiakos, Hua Yang, Angelos Sphyris and George Eftichidis

This paper aims to describe the main challenges of identifying and accessing useful information and knowledge about natural hazards and disasters results. The paper presents a…

1204

Abstract

Purpose

This paper aims to describe the main challenges of identifying and accessing useful information and knowledge about natural hazards and disasters results. The paper presents a grid‐based digital library system designed to address the challenges.

Design/methodology/approach

The need to organize and publish metadata about European research results in the field of natural disasters has been met with the help of two innovative technologies: the Open Grid Service Architecture (OGSA) and the Resource Description Framework (RDF). OGSA provides a common platform for sharing distributed metadata securely. RDF facilitates the creation and exchange of metadata.

Findings

Using grid technology allows the RDF metadata of European research results in the field of natural disasters to be shared securely and effectively in a heterogeneous network environment.

Originality/value

A metadata approach is proposed for the extraction of the metadata, and their distribution to third parties in batch, and their sharing with other applications can be a quickly process. Furthermore, a method is set out to describe metadata in a common and open format, which can become a widely accepted standard; the existence of a common standard enables the metadata storage in different platforms while supporting the capability of distributed queries across different metadata databases, the integration of metadata extracted from different sources, etc. It can be used for the general‐purpose search engines.

Details

Library Management, vol. 26 no. 4/5
Type: Research Article
ISSN: 0143-5124

Keywords

11 – 20 of 47