Search results

1 – 10 of 13
Article
Publication date: 1 January 2024

Masoud Parsi, Vahid Baradaran and Amir Hossein Hosseinian

The purpose of this study is to develop an integrated model for the stochastic multiproject scheduling and material ordering problems, where some of the prominent features of…

Abstract

Purpose

The purpose of this study is to develop an integrated model for the stochastic multiproject scheduling and material ordering problems, where some of the prominent features of offshore projects and their environmental-degrading effects have been embraced as well. The durations of activities are uncertain in this model. The developed formulation is tri-objective that seeks to minimize the expected time, total cost and CO2 emission of all projects.

Design/methodology/approach

A new version of the multiobjective multiagent optimization (MOMAO) algorithm has been proposed to solve the amalgamated model. To empower the MOMAO, various procedures of this algorithm have been modified based on the multiattribute utility theory (MAUT) technique. Along with the MOMAO, this study has employed four other meta-heuristic methodologies to solve the model as well.

Findings

The outputs of the MOMAO have been put to test against four other optimizers in terms of convergence, diversity, uniformity and computation times. The results of the Mean Ideal Distance (MID) metric have revealed that the MOMAO has strongly prevailed its rival optimizers. In terms of diversity of the acquired solutions, the MOMAO has ranked the first among all employed optimizers since this algorithm has offered the best solutions in 56.66 and 63.33% of the test problems regarding the diversification metric and hyper-volume metrics. Regarding the uniformity of results, which is measured through the spacing metric (SP), the MOMAO has presented the best SP values in more than 96% of the test problems. The MOMAO has needed more computation times in comparison to its rivals.

Practical implications

A real case study comprising two concurrent offshore projects has been offered. The proposed formulation and the MOMAO have been implemented for this case study, and their effectiveness has been appraised.

Originality/value

Very few studies have focused on presenting an integrated formulation for the stochastic multiproject scheduling and material ordering problems. The model embraces some of the characteristics of the offshore projects which have not been adequately studied in the literature. Limited capacities of the offshore platforms and cargo vessels have been embedded in the proposed model. The offshore platforms have spatial limitations in storing the required materials. The vessels are also capacitated and they also have limited shipment capacities. Some of the required materials need to be transported from the base to the offshore platform via a fleet of cargo vessels. The workforces and equipment can become idle on the offshore platform due to material shortage. Various offshore-related costs have been integrated as a minimization objective function in the model. The cargo vessels release CO2 detrimental emissions to the environment which are sought to be minimized in the developed formulation. To the best of the authors' knowledge, the MOMAO has not been sufficiently employed as a solution methodology for the stochastic multiproject scheduling and material ordering problems.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 9 April 2024

Alexander O. Smith, Jeff Hemsley and Zhasmina Y. Tacheva

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts…

Abstract

Purpose

Our purpose is to reconnect memetics to information, a persistent and unclear association. Information can contribute across a span of memetic research. Its obscurity restricts conversations about “information flow,” the connections between “form” and “content,” as well as many other topics. As information is involved in cultural activity, its clarification could focus memetic theories and applications.

Design/methodology/approach

Our design captures theoretical nuance in memetics by considering a long standing conceptual issue in memetics: information. A systematic review of memetics is provided by making use of the term information across literature. We additionally provide a citation analysis and close readings of what “information” means within the corpus.

Findings

Our initial corpus is narrowed to 128 pivotal memetic publications. From these publications, we provide a citation analysis of memetic studies. Theoretical directions of memetics in the informational context are outlined and developed. We outline two main discussion spaces, survey theoretical interests and describe where and when information is important to memetic discussion. We also find that there are continuities in goals which connect Dawkins’s meme with internet meme studies.

Originality/value

To our knowledge, this is the broadest, most inclusive review of memetics conducted, making use of a unique approach to studying information-oriented discourse across a corpus. In doing so, we provide information researchers areas in which they might contribute theoretical clarity in diverse memetic approaches. Additionally, we borrow the notion of “conceptual troublemakers” to contribute a corpus collection strategy which might be valuable for future literature reviews with conceptual difficulties arising from interdisciplinary study.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 28 February 2023

Lin-Lin Xie, Yajiao Chen, Sisi Wu, Rui-Dong Chang and Yilong Han

Project scheduling plays an essential role in the implementation of a project due to the limitation of resources in practical projects. However, the existing research tend to…

Abstract

Purpose

Project scheduling plays an essential role in the implementation of a project due to the limitation of resources in practical projects. However, the existing research tend to focus on finding suitable algorithms to solve various scheduling problems and fail to find the potential scheduling rules in these optimal or near-optimal solutions, that is, the possible intrinsic relationships between attributes related to the scheduling of activity sequences. Data mining (DM) is used to analyze and interpret data to obtain valuable information stored in large-scale data. The goal of this paper is to use DM to discover scheduling concepts and obtain a set of rules that approximate effective solutions to resource-constrained project scheduling problems. These rules do not require any search and simulation, which have extremely low time complexity and support real-time decision-making to improve planning/scheduling.

Design/methodology/approach

The resource-constrained project scheduling problem can be described as scheduling a group of interrelated activities to optimize the project completion time and other objectives while satisfying the activity priority relationship and resource constraints. This paper proposes a new approach to solve the resource-constrained project scheduling problem by combining DM technology and the genetic algorithm (GA). More specifically, the GA is used to generate various optimal project scheduling schemes, after that C4.5 decision tree (DT) is adopted to obtain valuable knowledge from these schemes for further predicting and solving new scheduling problems.

Findings

In this study, the authors use GA and DM technology to analyze and extract knowledge from a large number of scheduling schemes, and determine the scheduling rule set to minimize the completion time. In order to verify the application effect of the proposed DT classification model, the J30, J60 and J120 datasets in PSPLIB are used to test the validity of the scheduling rules. The results show that DT can readily duplicate the excellent performance of GA for scheduling problems of different scales. In addition, the DT prediction model developed in this study is applied to a high-rise residential project consisting of 117 activities. The results show that compared with the completion time obtained by GA, the DT model can realize rapid adjustment of project scheduling problem to deal with the dynamic environment interference. In a word, the data-based approach is feasible, practical and effective. It not only captures the knowledge contained in the known optimal scheduling schemes, but also helps to provide a flexible scheduling decision-making approach for project implementation.

Originality/value

This paper proposes a novel knowledge-based project scheduling approach. In previous studies, intelligent optimization algorithm is often used to solve the project scheduling problem. However, although these intelligent optimization algorithms can generate a set of effective solutions for problem instances, they are unable to explain the process of decision-making, nor can they identify the characteristics of good scheduling decisions generated by the optimization process. Moreover, their calculation is slow and complex, which is not suitable for planning and scheduling complex projects. In this study, the set of effective solutions of problem instances is taken as the training dataset of DM algorithm, and the extracted scheduling rules can provide the prediction and solution of new scheduling problems. The proposed method focuses on identifying the key parameters of a specific dynamic scheduling environment, which can not only reproduces the scheduling performance of the original algorithm well, but also has the ability to make decisions quickly under the dynamic interference construction scenario. It is helpful for project managers to implement quick decisions in response to construction emergencies, which is of great practical significance for improving the flexibility and efficiency of construction projects.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 26 September 2022

Christian Nnaemeka Egwim, Hafiz Alaka, Oluwapelumi Oluwaseun Egunjobi, Alvaro Gomes and Iosif Mporas

This study aims to compare and evaluate the application of commonly used machine learning (ML) algorithms used to develop models for assessing energy efficiency of buildings.

Abstract

Purpose

This study aims to compare and evaluate the application of commonly used machine learning (ML) algorithms used to develop models for assessing energy efficiency of buildings.

Design/methodology/approach

This study foremostly combined building energy efficiency ratings from several data sources and used them to create predictive models using a variety of ML methods. Secondly, to test the hypothesis of ensemble techniques, this study designed a hybrid stacking ensemble approach based on the best performing bagging and boosting ensemble methods generated from its predictive analytics.

Findings

Based on performance evaluation metrics scores, the extra trees model was shown to be the best predictive model. More importantly, this study demonstrated that the cumulative result of ensemble ML algorithms is usually always better in terms of predicted accuracy than a single method. Finally, it was discovered that stacking is a superior ensemble approach for analysing building energy efficiency than bagging and boosting.

Research limitations/implications

While the proposed contemporary method of analysis is assumed to be applicable in assessing energy efficiency of buildings within the sector, the unique data transformation used in this study may not, as typical of any data driven model, be transferable to the data from other regions other than the UK.

Practical implications

This study aids in the initial selection of appropriate and high-performing ML algorithms for future analysis. This study also assists building managers, residents, government agencies and other stakeholders in better understanding contributing factors and making better decisions about building energy performance. Furthermore, this study will assist the general public in proactively identifying buildings with high energy demands, potentially lowering energy costs by promoting avoidance behaviour and assisting government agencies in making informed decisions about energy tariffs when this novel model is integrated into an energy monitoring system.

Originality/value

This study fills a gap in the lack of a reason for selecting appropriate ML algorithms for assessing building energy efficiency. More importantly, this study demonstrated that the cumulative result of ensemble ML algorithms is usually always better in terms of predicted accuracy than a single method.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 12 June 2023

Sarasadat Alavi, Ali Bozorgi-Amiri and Seyed Mohammad Seyedhosseini

Fortification-interdiction models provide system designers with a broader perspective to identify and protect vital components. Based on this concept, the authors examine how…

Abstract

Purpose

Fortification-interdiction models provide system designers with a broader perspective to identify and protect vital components. Based on this concept, the authors examine how disruptions impact critical supply systems and propose the most effective protection strategies based on three levels of decision-makers. This paper aims to investigate location and fortification decisions at the first level. Moreover, a redesign problem is presented in the third level to locate backup facilities and reallocate undisrupted facilities following the realization of the disruptive agent decisions at the second level.

Design/methodology/approach

To address this problem, the authors develop a tri-level planner-attacker-defender optimization model. The model minimizes investment and demand satisfaction costs and alleviates maximal post-disruption costs. While decisions are decentralized at different levels, the authors develop an integrated solution algorithm to solve the model using the column-and-constraint generation (CCG) method.

Findings

The model and the solution approach are tested on a real supply system consisting of several hospitals and demand areas in a region in Iran. Results indicate that incorporating redesign decisions at the third level reduces maximum disruption costs.

Originality/value

The paper makes the following contributions: presenting a novel tri-level optimization model to formulate facility location and interdiction problems simultaneously, considering corrective measures at the third level to reconfigure the system after interdiction, creating a resilient supply system that can fulfill all demands after disruptions, employing a nested CCG method to solve the model.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 September 2023

Kip Errett Patterson

The purpose of this conceptual paper is to demonstrate how memes perpetuate trauma with a schematic. This conceptual paper uses the “begin with the end in mind” meme to format the…

Abstract

Purpose

The purpose of this conceptual paper is to demonstrate how memes perpetuate trauma with a schematic. This conceptual paper uses the “begin with the end in mind” meme to format the presentation of the necessary components for the schematic of how trauma persists across generations. It is the third paper in a series of applications of the recursive, test-operate-test schematic to the systemic effects of the information processes involved in trauma. The schematic presented permits evaluations of solutions to interrupt the generational trauma cycle.

Design/methodology/approach

The required schematic components are described. Trauma (actual or perceived threat to survival) will be briefly discussed. Evolutionary processes that create the psychophysiology necessary to support nominal social expectations (NSEs) memes and metaphors will be summarized. The development of NSEs will be discussed. Metaphors and memes necessary for the creation of the schematic and esoteric events at level Learning IV will be briefly described. Finally, Figure 3, which illustrates the maintenance of NSEs and attempts to prevent their violation, will be explained.

Findings

It is asserted that functional human social behavior requires NSEs. Trauma is found to persist through the presence of anti-nominal NSE memes that are transduced by the individual into anti-nominal metaphors, which then damage grid, place and dentate gyrus cell (GPDG) neurophysiology. The damaged neurocircuits allow the use of anti-nominal NSE metaphors within our individual neurophysiology. Furthermore, anti-NSE memes interfere with the self-organized criticalities (SOCs) of genetic-epigenetic processes necessary for the intergenerational transfer of functional social behavior. When anti-NSE nominal metaphors are transduced back into anti-NSEs, social niche memes, the trauma process is reiterated. Anti-NSE memes and metaphors are found to be inappropriate criteria central to the maintenance of persistent trauma. Therefore, anti-NSE memes have hijacked our epigenetics and our social niches. Solutions are available because during our evolution, the Homo clade developed esoteric capabilities and the ability to bring back what information we can from those encounters. This physiology operates around the 5HT2A neural receptors that process hallucinogens, such as psilocybin. Accessing this resource system, either through naturally occurring altered states of consciousness or through micro-dose pharmaceutical psilocybin and related neurotransmitters, produces a significant structural change in the GPDG system to reset the NSE system illustrated in the schematic to its nominal status so that we can maintain nominal NSE relationships within our meme niche(s).

Research limitations/implications

The source of persistent trauma in our social niche(s), the means by which the trauma is maintained and the means to mitigate and perhaps eliminate persistent trauma are identified. Based on these three conclusions, it is difficult to make decisions regarding corrective actions because of ubiquitous anti-NSE memes and because of the limitations of our ordinary consciousness.

Practical implications

If we wish to survive as a species, we will need to discover the criteria necessary to maintain our niche(s) congruent SOCs and use them instead of tyrannical memes described by Dawkins (1989) to make decisions about ourselves and our niche(s).

Social implications

Significant courage is required to identify the memes that maintain trauma because many of them are culturally sacred cows. Unfortunately, we have known since Bremner's (1995) MRI study of posttraumatic stress disorder that trauma causes brain damage. Fortunately, our NSE genes compel us to pursue restitution of the memes that maintain our trauma-inducing cultures.

Originality/value

Several original assertions are presented. While the Homo clade ancestors began the creation of the social niche(s) that led to Homo sapiens sapiens, it is asserted that the australopiths created the NSE memes which are the foundation behaviors that permit our social niche(s). Furthermore, NSEs were produced by enhanced intentionality skills and NSEs were created by both genetic and memetic processes. The evolution of intentionality-NSE neural networks is asserted as the source of intentional material manipulation. While anti-NSE memes are claimed as the source of persistent trauma, the practice of esoteric technologies is presented as a solution to persistent trauma.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 24 May 2023

Pinar Kocabey Ciftci and Zeynep Didem Unutmaz Durmusoglu

This article proposes a novel hybrid simulation model for understanding the complex tobacco use behavior.

Abstract

Purpose

This article proposes a novel hybrid simulation model for understanding the complex tobacco use behavior.

Design/methodology/approach

The model is developed by embedding the concept of the multistage learning-based fuzzy cognitive map (FCM) into the agent-based model (ABM) in order to benefit from advantageous of each methodology. The ABM is used to represent individual level behaviors while the FCM is used as a decision support mechanism for individuals. In this study, socio-demographic characteristics of individuals, tobacco control policies, and social network effect are taken into account to reflect the current tobacco use system of Turkey. The effects of plain package and COVID-19 on tobacco use behaviors of individuals are also searched under different scenarios.

Findings

The findings indicate that the proposed model provides promising results for representing the mental models of agents. Besides, the scenario analyses help to observe the possible reactions of people to new conditions according to characteristics.

Originality/value

The proposed method combined ABM and FCM with a multi-stage learning phases for modeling a complex and dynamic social problem as close as real life. It is expected to contribute for both ABM and tobacco use literature.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 19 June 2023

Sunil Kumar Jauhar, B. Ripon Chakma, Sachin S. Kamble and Amine Belhadi

As e-commerce has expanded rapidly, online shopping platforms have become widespread in India and throughout the world. Product return, which has a negative effect on the…

Abstract

Purpose

As e-commerce has expanded rapidly, online shopping platforms have become widespread in India and throughout the world. Product return, which has a negative effect on the E-Commerce Industry's economic and ecological sustainability, is one of the E-Commerce Industry's greatest challenges in light of the substantial increase in online transactions. The authors have analyzed the purchasing patterns of the customers to better comprehend their product purchase and return patterns.

Design/methodology/approach

The authors utilized digital transformation techniques-based recency, frequency and monetary models to better understand and segment potential customers in order to address personalized strategies to increase sales, and the authors performed seller clustering using k-means and hierarchical clustering to determine why some sellers have the most sales and what products they offer that entice customers to purchase.

Findings

The authors discovered, through the application of digital transformation models to customer segmentation, that over 61.15% of consumers are likely to purchase, loyal customers and utilize firm service, whereas approximately 35% of customers have either stopped purchasing or have relatively low spending. To retain these consumer segments, special consideration and an enticing offer are required. As the authors dug deeper into the seller clustering, we discovered that the maximum number of clusters is six, while certain clusters indicate that prompt delivery of the goods plays a crucial role in customer feedback and high sales volume.

Originality/value

This is one of the rare study that develops a seller segmentation strategy by utilizing digital transformation-based methods in order to achieve seller group division.

Details

Journal of Enterprise Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 14 November 2023

Libiao Bai, Mengqin Yang, Tong Pan and Yichen Sun

Selecting and scheduling optimal project portfolio simultaneously is a complex decision-making problem faced by organizations to realize the strategy. However, dynamic synergy…

Abstract

Purpose

Selecting and scheduling optimal project portfolio simultaneously is a complex decision-making problem faced by organizations to realize the strategy. However, dynamic synergy relationships among projects complicate this problem. This study aims at constructing a project portfolio selection and scheduling (PPSS) model while quantifying the dynamic synergetic effects to provide decision support for managing PPSS problems.

Design/methodology/approach

This study develops a mathematical model for PPSS with the objective of maximal project portfolio benefits (PPBs). To make the results align with the strategy, comprehensive PPBs are divided into financial and non-financial aspects based on the balanced scorecard. Then, synergy benefits evolve dynamically in the time horizon, and system dynamics is employed to quantify them. Lastly, a case example is conducted to verify the applicability of the proposed model.

Findings

The proposed model is an applicable model for PPSS while incorporating dynamic synergy. It can help project managers obtain the results that which project should be selected and when it should start while achieving optimal PPBs.

Originality/value

This study complements prior PPSS research in two aspects. First, financial and non-financial PPBs are designed as new criteria for PPSS, making the results follow the strategy. Second, this study illuminates the dynamic characteristic of synergy and quantifies the synergetic effect. The proposed model provides insights into managing a PPSS effectively.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 7 November 2023

Janine Arantes

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of…

Abstract

Purpose

The purpose of this scoping rapid review was to identify and analyse existing qualitative methodologies that have been used to investigate K-12 teachers' lived experiences of adult cyber abuse as a result of student content “going viral” to propose a novel methodological stance incorporating the Australian Online Safety Act 2021.

Design/methodology/approach

A search of Google Scholar was conducted using keywords and phrases related to cyber trauma, teachers, qualitative methods and the Online Safety Act. Inclusion criteria for the review were: (1) published in English, (2) focused on teachers' experiences of online abuse and cyberbullying associated with viral posts and (3) employed a qualitative inquiry methodology. Full-text articles were obtained for those that met the inclusion criteria. Data were extracted and analysed using a PRISMA flowchart and inductive thematic analysis.

Findings

This methodology is considered to be justified, as the eSafety Commissioner's Safety-by-Design principles do not have any legal or regulatory enforceability, whereas the Online Safety Act 2021 provides the Australian eSafety Commissioner an avenue to drive greater algorithmic transparency and accountability.

Research limitations/implications

The findings of this review informed the development of a novel methodological stance for investigating Australian teachers' lived experiences of adult cyber abuse associated with viral posts. It provides a methodological positioning to support trauma informed qualitative research into adult cyber abuse, informed by the work of the eSafety Commissioner and the Online Safety Act.

Originality/value

Cybertrauma is described as “any trauma that is a result of self- or, other-directed interaction with, mediated through, or from any electronic Internet/cyberspace ready device or machine learning algorithm, that results in impact now or the future” (Knibbs, 2021). It may result from the tracking of movement through various mobile phone features and applications such as location sharing, non-consensual monitoring of social media, and humiliation or punishment through the sharing of intimate images online, through to direct messages of abuse or threats of violence or humiliation. These actions are further perpetuated through automated searches, insights and recommendations on social media (i.e. engagement metrics promote memes, Facebook posts, Tweets, Tiktoks, Youtubes and so on). This is a novel methodology, as it not only considers direct cybertrauma but also automated forms of cybertrauma.

Details

Qualitative Research Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1443-9883

Keywords

1 – 10 of 13