Search results

1 – 10 of 14
Article
Publication date: 23 August 2022

Namal Bandaranayake, Senevi Kiridena and Asela K. Kulatunga

Achieving swift and even flow of cargo through the border, the ultimate objective of cross-border logistics (CBL) requires the close coordination and collaboration of a multitude…

Abstract

Purpose

Achieving swift and even flow of cargo through the border, the ultimate objective of cross-border logistics (CBL) requires the close coordination and collaboration of a multitude of stakeholders, as well as optimally configured systems. To achieve and sustain competitiveness in a dynamic international trade environment, CBL processes must undergo periodic analysis, improvement and optimization. This study aims to develop a modelling framework to capture CBL processes for analysis and improvement.

Design/methodology/approach

Relying on the extant literature, a meta-model is developed incorporating significant perspectives required to model CBL processes. Popular process modelling notations are evaluated against the meta-model and their ease of comprehension is also evaluated. The selected notation through evalution is augmented with addendums for a comprehensive depiction of CBL processes.

Findings

The capacity of role activity diagrams (RADs) to depict all perspectives, including interactions in a single diagram, makes them particularly suitable for modelling CBL processes. RADs have been complemented with physical flow diagrams and methods to capture temporal dimension, enabling a comprehensive view of CBL processes laying the foundation for insightful analysis.

Research limitations/implications

The meta-model developed in this paper paves the way to develop an analysis framework which requires further research.

Originality/value

The lack of well-accepted modelling notations for studying CBL processes prompts researchers to search and adapt different formalisms. This study has filled this gap by proposing a comprehensive modelling framework able to capture CBL processes at different granularities in rich detail. Not only does the developed meta-model aid in selecting the notation, it is also useful in analysing the constituent elements of CBL processes.

Details

Journal of Global Operations and Strategic Sourcing, vol. 17 no. 2
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 October 2023

Renan Ribeiro Do Prado, Pedro Antonio Boareto, Joceir Chaves and Eduardo Alves Portela Santos

The aim of this paper is to explore the possibility of using the Define-Measure-Analyze-Improve-Control (DMAIC) cycle, process mining (PM) and multi-criteria decision methods in…

Abstract

Purpose

The aim of this paper is to explore the possibility of using the Define-Measure-Analyze-Improve-Control (DMAIC) cycle, process mining (PM) and multi-criteria decision methods in an integrated way so that these three elements combined result in a methodology called the Agile DMAIC cycle, which brings more agility and reliability in the execution of the Six Sigma process.

Design/methodology/approach

The approach taken by the authors in this study was to analyze the studies arising from this union of concepts and to focus on using PM tools where appropriate to accelerate the DMAIC cycle by improving the first two steps, and to test using the AHP as a decision-making process, to bring more excellent reliability in the definition of indicators.

Findings

It was indicated that there was a gain with acquiring indicators and process maps generated by PM. And through the AHP, there was a greater accuracy in determining the importance of the indicators.

Practical implications

Through the results and findings of this study, more organizations can understand the potential of integrating Six Sigma and PM. It was just developed for the first two steps of the DMAIC cycle, and it is also a replicable method for any Six Sigma project where data acquisition through mining is possible.

Originality/value

The authors develop a fully applicable and understandable methodology which can be replicated in other settings and expanded in future research.

Details

International Journal of Lean Six Sigma, vol. 15 no. 3
Type: Research Article
ISSN: 2040-4166

Keywords

Article
Publication date: 16 April 2024

Satyendra Kr Sharma, Rajkumar Sharma and Anil Jindal

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This…

Abstract

Purpose

Supply chain vulnerability (SCV) analysis is vital for manufacturers globally because it creates a pathway for building resilient supply chains in uncertain environments. This study aims to identify drivers of SCV in the Indian manufacturing sector.

Design/methodology/approach

Sixteen drivers were identified from the literature review and followed by expert interviews. Interpretive structural modeling was used to determine the hierarchical structural relationship among identified SCV factors.

Findings

It was found that risk is not a board room agenda. Misaligned performance measures with incentives and lack of risk dashboard are the causal factors of SCV. Supply chain security, centralized production and distribution and lack of trust in the supply chain were driven factors.

Originality/value

This provides new insights to assess and prioritize initiatives for supply chain sustainability in terms of continuing business operations. The structural model provides a systemic view of SCV and helps reduce vulnerability.

Details

Journal of Modelling in Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-5664

Keywords

Article
Publication date: 25 January 2024

Anil Kumar Inkulu and M.V.A. Raju Bahubalendruni

In the current era of Industry 4.0, the manufacturing industries are striving toward mass production with mass customization by considering human–robot collaboration. This study…

Abstract

Purpose

In the current era of Industry 4.0, the manufacturing industries are striving toward mass production with mass customization by considering human–robot collaboration. This study aims to propose the reconfiguration of assembly systems by incorporating multiple humans with robots using a human–robot task allocation (HRTA) to enhance productivity.

Design/methodology/approach

A human–robot task scheduling approach has been developed by considering task suitability, resource availability and resource selection through multicriteria optimization using the Linear Regression with Optimal Point and Minimum Distance Calculation algorithm. Using line-balancing techniques, the approach estimates the optimum number of resources required for assembly tasks operating by minimum idle time.

Findings

The task allocation schedule for a case study involving a punching press was solved using human–robot collaboration, and the approach incorporated the optimum number of appropriate resources to handle different types of proportion of resources.

Originality/value

This proposed work integrates the task allocation by human–robot collaboration and decrease the idle time of resource by integrating optimum number of resources.

Details

Robotic Intelligence and Automation, vol. 44 no. 1
Type: Research Article
ISSN: 2754-6969

Keywords

Article
Publication date: 24 August 2023

Alejandro Ramos-Soto, Angel Dacal-Nieto, Gonzalo Martín Alcrudo, Gabriel Mosquera and Juan José Areal

Process mining has emerged in the last decade as one of the most promising tools to discover and understand the actual execution of processes. This paper addresses the application…

Abstract

Purpose

Process mining has emerged in the last decade as one of the most promising tools to discover and understand the actual execution of processes. This paper addresses the application of process mining techniques to analyze the performance of automatic guided vehicles (AGVs) in one of the Body in White circuits of the factory that Stellantis has in Vigo, Spain.

Design/methodology/approach

Standard process mining discovery and conformance algorithms are applied to analyze the different AGV execution paths, their lead times, main sources and identify any unexpected potential situations, such as unexpected paths or loops.

Findings

Results show that this method provides very useful insights which are not evident for logistics technicians. Even with such automated devices, where the room for decreased efficiency can be apparently small, process mining shows there are cases where unexpected situations occur, leading to an increase in circuit times and different variants for the same route, which pave the road for an actual improvement in performance and efficiency.

Originality/value

This paper provides evidence of the usefulness of applying process mining in manufacturing processes. Practical applications of process mining have traditionally been focused on processes related to services and management, such as order to cash and purchase to pay in enterprise resource planning software. Despite its potential for use in industrial manufacturing, such contributions are scarce in the current state of the art and, as far as we are aware of, do not fully justify its application.

Details

Data Technologies and Applications, vol. 58 no. 2
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 17 November 2023

Ahmad Ebrahimi and Sara Mojtahedi

Warranty-based big data analysis has attracted a great deal of attention because of its key capabilities and role in improving product quality while minimizing costs. Information…

Abstract

Purpose

Warranty-based big data analysis has attracted a great deal of attention because of its key capabilities and role in improving product quality while minimizing costs. Information and details about particular parts (components) repair and replacement during the warranty term, usually stored in the after-sales service database, can be used to solve problems in a variety of sectors. Due to the small number of studies related to the complete analysis of parts failure patterns in the automotive industry in the literature, this paper focuses on discovering and assessing the impact of lesser-studied factors on the failure of auto parts in the warranty period from the after-sales data of an automotive manufacturer.

Design/methodology/approach

The interconnected method used in this study for analyzing failure patterns is formed by combining association rules (AR) mining and Bayesian networks (BNs).

Findings

This research utilized AR analysis to extract valuable information from warranty data, exploring the relationship between component failure, time and location. Additionally, BNs were employed to investigate other potential factors influencing component failure, which could not be identified using Association Rules alone. This approach provided a more comprehensive evaluation of the data and valuable insights for decision-making in relevant industries.

Originality/value

This study's findings are believed to be practical in achieving a better dissection and providing a comprehensive package that can be utilized to increase component quality and overcome cross-sectional solutions. The integration of these methods allowed for a wider exploration of potential factors influencing component failure, enhancing the validity and depth of the research findings.

Details

International Journal of Quality & Reliability Management, vol. 41 no. 4
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 5 April 2024

Alexander Conrad Culley

The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and…

Abstract

Purpose

The purpose of this paper is to scrutinise the effectiveness of four derivative exchanges’ enforcement efforts since 2007. These exchanges include the Commodity Exchange Inc. and ICE Futures US from the United States and ICE Futures Europe and the London Metal Exchange from the UK.

Design/methodology/approach

The paper examines 799 enforcement notices published by four exchanges through a behavioural science lens: HUMANS conceived by Hunt (2023) in Humanizing Rules: Bringing Behavioural Science to Ethics and Compliance.

Findings

The paper finds the effectiveness of the exchanges’ enforcement efforts to be a mixed picture as financial markets transition from the digital to artificial intelligence era. Humans remain a key cog in the wheel of market participants’ trading operations, albeit their roles have changed. Despite this, some elements of exchanges’ enforcement regimes have not kept pace with the move from floor to remote trading. However, in other respects, their efforts are or should be, effective, at least in behavioural terms.

Research limitations/implications

The paper’s findings are arguably limited to exchanges based in Anglophone jurisdictions. The information published by the exchanges is variable, making “like-for-like” comparisons difficult in some areas.

Practical implications

The paper makes several recommendations that, if adopted, could help exchanges to increase the potency of their enforcement programmes.

Originality/value

A key aim of the paper is to shift the lens through which the debate concerning the efficacy of exchange-level oversight is conducted. Hitherto, a legal lens has been used, whereas this paper uses a behavioural lens.

Details

Journal of Financial Regulation and Compliance, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1358-1988

Keywords

Article
Publication date: 26 April 2022

Elham Kariri and Kusum Yadav

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…

Abstract

Purpose

In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.

Design/methodology/approach

A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.

Findings

When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.

Originality/value

Additionally, it reduces the amount of routing overhead and the average end-to-end delay.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 April 2024

Maximilian Valta, Yannick Hildebrandt and Christian Maier

Technostress reduces employees' work performance and increases their turnover intentions, such that technostress harms organizations' success. This paper investigates how the…

Abstract

Purpose

Technostress reduces employees' work performance and increases their turnover intentions, such that technostress harms organizations' success. This paper investigates how the digital mindset of employees, reflecting their cognitive filter while using digital technologies, influences reactions to techno-stressors.

Design/methodology/approach

In this quantitative study, the authors conducted a survey among 151 employees who regularly use digital technologies and encounter various techno-stressors in their daily work. To build this research model and evaluate the influence of employees’ digital mindset on technostress, the authors followed arguments from the transactional model of stress. The authors evaluated our research model using the covariance-based structural equation model.

Findings

The study findings reveal that employees’ digital mindset influences technostress. Employees with high levels of digital mindset react with less adverse effects on perceived techno-stressors. Further, the authors find that employees with high levels of digital mindset perform well and are satisfied with their job. The authors contribute to technostress research by revealing that digital mindset buffers the adverse effects of techno-stressors. The authors also contribute to research on digital mindset by showing that it influences psychological and behavioral reactions to techno-stressors.

Originality/value

This study develops and empirically tests an integrated model of technostress to explain how digital mindset mitigates technostress. The study findings outline relevant research avenues for studies investigating employees’ characteristics and technostress.

Details

Internet Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of 14