• Title/Summary/Keyword: hierarchical management

Search Result 1,495, Processing Time 0.032 seconds

The Study of Criteria Weight for Taiwan National Quality Award by Fuzzy Hierarchical Analysis

  • Li, Shao-Chang;Fu, Hsin-Pin
    • International Journal of Quality Innovation
    • /
    • v.7 no.2
    • /
    • pp.83-96
    • /
    • 2006
  • In this paper, fuzzy hierarchical analysis (FHA) is used to explore the process by which the criteria weights of the Taiwan National Quality Award (TNQA) are assigned by TNQA committee members. Each member is allowed to employ fuzzy scales in place of exact scales. Each pairwise comparison of criteria is made through a questionnaire from each TNQA committee member. The membership function of trapezoidal fuzzy numbers is introduced to specify TNQA committee members' intentions. After FHA, the reasonable range of each criterion weight of TNQA is determined. The current criteria weights of TNQA are properly verified.

VISUALIZATION OF HIGHWAY PROJECT BIDS USING TREEMAPS

  • Min Peng;William J. O'Brien;James T. O'Connor
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.1036-1041
    • /
    • 2005
  • Treemaps, a space filling visualization technique, displays a massive data set of hierarchical data interactively on a single computer screen by mapping it to a matrix of rectangles. It allows users to visually inspect and manipulate data to find new relationships or discrepancies that are to difficult to find using traditional techniques. This paper applies treemaps to the evaluation of highway project bids, which contain hundreds or thousands of elements arranged in a hierarchical structure. Through a case study, treemaps are shown to be a potentially effective tool for bid evaluation by both contractors and State or Federal highway officials.

  • PDF

Implementation and Performance Evaluation of a Firm's Green Supply Chain Management under Uncertainty

  • Lin, Yuanhsu;Tseng, Ming-Lang;Chiu, Anthony S.F.;Wang, Ray
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.1
    • /
    • pp.15-28
    • /
    • 2014
  • Evaluation of the implementation and performance of a firm's green supply chain management (GSCM) is an ongoing process. Balanced scorecard is a multi-criteria evaluation concept that highlights implementation and performance measures. The literature on the framework is abundant literature but scarce on how to build a hierarchical framework under uncertainty with dependence relations. Hence, this study proposes a hybrid approach, which includes applied interpretive structural modeling to build a hierarchical structure and uses the analytic network process to analyze the dependence relations. Additionally, this study applies the fuzzy set theory to determine linguistic preferences. Twenty dependence criteria are evaluated for a GSCM implemented firm in Taiwan. The result shows that the financial aspect and life cycle assessment are the most important performance and weighted criteria.

An Application of Cognitive Task Analysis for the Evaluation of Human Performance on Inspection Tasks (인지적 작업분석에 의한 검사작업의 인간 수행도 분석)

  • Lee, Sang-Do;Kwack, Hyo-Yean
    • Journal of Korean Society for Quality Management
    • /
    • v.23 no.3
    • /
    • pp.69-83
    • /
    • 1995
  • In a large number of literature on of inspection tasks, one of the most consistent findings is the existence of large and consistent differences among inspectors. It is possible that the individual difference is described by the difference of cognitive skills, because cognitive skills are required more than manual skills in inspection tasks. Therefore, a set of cognitive factors in human information processing may underly human performance in inspection tasks. In this study, a cognitive skill was described as the relative importance of the cognitive factors involved. A hierarchical task analysis and a fuzzy hierarchical analysis were used to represent how the importance of cognitive factors contribute to inspection performance. An experiment was conducted using the computer simulations of PCB inspection tasks. The results revealed that the subject group with better performance showed the importance weights of cognitive factors in the following rank; (attention, perception, judgement, classification, recognition)<(detection)$\ll$(memory). The results of the experiment can serve as a selection criterion for efficient inspection performance and the information of skilled learning for an inspection training program. The usefullness of a hierarchical task analysis and a fuzzy hierarchical task analysis for the analysis of cognitive tasks are also confirmed.

  • PDF

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

  • Xueyan Liu;Ruirui Sun;Linpeng Li;Wenjing Li;Tao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2550-2572
    • /
    • 2023
  • Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a wide range of people involved, a large number of data collected, strong requirements for information disclosure and high timeliness of data processing; 2) the epidemiological survey data need to be disclosed at different institutions and the use of data has different permission requirements. As a result, it easily causes personal privacy disclosure. Therefore, traditional access control technologies are unsuitable for the privacy protection of epidemiological survey data. In view of these situations, we propose a black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. Firstly, a black box-assisted multi-attribute authority management mechanism without a trusted center is established to avoid authority deception. Meanwhile, the establishment of a master key-free system not only reduces the storage load but also prevents the risk of master key disclosure. Secondly, a sensitivity classification method is proposed according to the confidentiality degree of the institution to which the data belong and the importance of the data properties to set fine-grained access permission. Thirdly, a hierarchical authorization algorithm combined with data sensitivity and hierarchical attribute-based encryption (ABE) technology is proposed to achieve hierarchical access control of epidemiological survey data. Efficiency analysis and experiments show that the scheme meets the security requirements of privacy protection and key management in epidemiological survey.

Risk Evaluation Based on the Hierarchical Time Delay Model in FMEA (FMEA에서 계층적 시간 지연 모형에 근거한 위험평가)

  • Jang, Hyeon Ae;Lee, Min Koo;Hong, Sung Hoon;Kwon, Hyuck Moo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.2
    • /
    • pp.373-388
    • /
    • 2016
  • Purpose: This paper suggests a hierarchical time delay model to evaluate failure risks in FMEA(failure modes and effects analysis). In place of the conventional RPN(risk priority number), a more reasonable and objective risk metric is proposed under hierarchical failure cause structure considering time delay between a failure mode and its causes. Methods: The structure of failure modes and their corresponding causes are analyzed together with the time gaps between occurrences of causes and failures. Assuming the severity of a failure depends on the length of the delayed time for corrective action, a severity model is developed. Using the expected severity, a risk priority metric is defined. Results: For linear and quadratic types of severity, nice forms of expected severity are derived and a meaningful metric for risk evaluation is defined. Conclusion: The suggested REM(risk evaluation metric) provides a more reasonable and objective risk measure than the conventional RPN for FMEA.

(Performance Evaluation of Proxy-based Mobile Agent Model for Hierarchical Management Domains) (계층형 관리 도메인을 위한 프록시 기반의 이동 에이전트 모델의 성능 평가)

  • 박상윤
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1049-1062
    • /
    • 2002
  • As the distributed resources in the networks have become increasingly popular, the accesses to these resources having been activated. Especially, the accesses to the distributed resources using the mobile agent technologies provide the mechanisms supporting mobility with mobile users as well as the dynamic accesses to the resources in the fixed networks. Proxy-based mobile agent model is defined as mobile agent network model which allocates the hierarchical domains to the distributed resources changed dynamically, assigns one proxy server for each domain, and promotes the management and the cooperation of the mobile agents. In this paper, we introduce the architecture and the execution scenario for proxy-based mobile agent model which is suitable for the hierarchical management domains. In simulation, we evaluate the proxy server's route optimization functionality and the performance reducing execution time of the mobile agents.

  • PDF

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

Validation and Modeling of Drivers and Barriers of Multivendor ATM Technology in India from Suppliers' Perspectives

  • Jyotiranjan Hota;Saboohi Nasim
    • Asia pacific journal of information systems
    • /
    • v.30 no.2
    • /
    • pp.374-396
    • /
    • 2020
  • The purpose of the paper is to apply Total Interpretive Structural Modeling (TISM) used to develop a hierarchy among the key drivers and barriers to multivendor ATM Technology adoption in India from the perspectives of suppliers. TISM approach is an extension of Warfield's (IEEE Transactions: System, Man & Cybernetics 4:405-17, 1974) Interpretive Structural Modeling(ISM) approach. Based on the literature, drivers and barriers for adoption of Multivendor ATM Technology are identified. TISM is used to develop a hierarchical model which states the interpretation of relationship among these drivers and barriers. Hierarchies of all relevant drivers and barriers are developed and significant interrelationship was found out. Implications for the researchers and Industry Practitioner are highlighted. For Researchers, TISM methodology facilitates to further carry out exploratory studies by identifying the factors in technology adoption domain and focus their interactions through hierarchical structures. For Practitioners with suppliers, a list of relevant barriers and drivers to adoption of this technology in India are indications to take a decision to adopt Multivendor ATM Technology in their respective suppliers. The proposed Model developed through qualitative Modeling technique has been accomplished from the perspectives of suppliers in India in the domain of multivendor ATM Technology for the first time in ATM Banking as a contribution to the Literature.

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications

  • Jeong, Dong-Won;Shin, Hee-Young;Baik, Doo-Kwon;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.5 no.1
    • /
    • pp.11-18
    • /
    • 2009
  • As well as providing various APIs for the development of inference engines and storage models, Jena is widely used in the development of systems or tools related with Web ontology management. However, Jena still has several problems with regard to the development of real applications, one of the most important being that its query processing performance is unacceptable. This paper proposes a storage model to improve the query processing performance of the original Jena storage. The proposed storage model semantically classifies OWL elements, and stores an ontology in separately classified tables according to the classification. In particular, the hierarchical knowledge is managed, which can make the processing performance of inferable queries enhanced and stores information. It enhances the query processing performance by using hierarchical knowledge. For this paper an experimental evaluation was conducted, the results of which showed that the proposed storage model provides a improved performance compared with Jena.