Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,027 Hits in 6.5 sec

Modeling supplier risks using Bayesian networks

Archie Lockamy, Kevin McCormack
2012 Industrial management & data systems  
The purpose of this paper is to present a methodology for modeling and evaluating risk profiles in supply chains via Bayesian networks.  ...  Research limitations/implications -A limitation to the use of Bayesian networks to model supply chain risks is the proper identification of risk events and risk categories that can impact a supply chain  ...  This article builds on the aforementioned literature by introducing a methodology for modeling and evaluating risks in supply chains through the creation of supplier risk profiles using Bayesian networks  ... 
doi:10.1108/02635571211204317 fatcat:43opjjocrjbbjp224ivkfumv7i

Editorial

Khairy Kobbacy, Sunil Vadera
2008 Journal of the Operational Research Society  
The paper begins by surveying the factors that affect trust and then proposes a measure of trust based on the key factors.  ...  Pearson, in his paper on process control in supply chain networks and push-pull strategies, addresses the situation where changes in demand and supply levels trigger changes in variability.  ... 
doi:10.1057/palgrave.jors.2602563 fatcat:7heal7o7afcjlbrstikc42cf5u

Supply Chain Trust Evaluation Model Based on Improved Chain Iteration Method

Hongqiang Jiao, Wanning Ding, Xinxin Wang
2021 Journal of Information Processing Systems  
The improved global trust evaluation method based on chain iteration is more flexible and practical, hence, it can more accurately evaluate supply chain trust.  ...  First, this paper analyzes the background and significance of supply chain trust research, analyzes and expounds on the qualitative and quantitative methods of supply chain trust evaluation, and summarizes  ...  Kaihara [11] formally described trust transfer, reasoning, and fusion using Bayesian probability and statistics, and showed the evolution process of supply chain trust based on game theory.  ... 
doi:10.3745/jips.04.0203 dblp:journals/jips/JiaoDW21 fatcat:64otpsxo6nbm5lmivj3drs4ksq

High value information for managers in organisations

Ammuthavali Ramasamy, Nor'ashikin Ali
2021 Electronic Journal of Computer Science and Information Technology  
The Bayesian Theorem and information characteristics are used to offer a framework for evaluating information.  ...  This study examines the topic of information overload, the definition of information value, and associated research on the value of information in many fields to resolve this issue.  ...  The VOI computation can be based on the information characteristics. The Bayesian model is used to model the information.  ... 
doi:10.52650/ejcsit.v7i1.110 fatcat:kzugmh2g7zfsjf2dcyks6qry3y

Bayesian Network-Based Risk Prediction in Virtual Organizations [chapter]

Hamideh Afsarmanesh, Mahdieh Shadi
2015 IFIP Advances in Information and Communication Technology  
For tasks that involve several partners, a Bayesian network is created during the VO's operation phase, and used for measuring their failure probabilities.  ...  In this paper, as the base for discovery of potential task failures, past performance and record of previous sub-tasks' fulfillment of each partner (so-called agent) is considered for appraisal of its  ...  In supply chains, every organization is one member in the chain, thus knowing about and dependent on two other organizations, which appear before and after it in the chain.  ... 
doi:10.1007/978-3-319-24141-8_4 fatcat:f5k5iiaojfd2hflaqukipet7bu

Whole cycle disruption analysis of petroleum supply chain (PSC) based on UASNs monitoring

Hui Hu, Keqi Chen, Jing He, Lingbo Du
2019 EURASIP Journal on Wireless Communications and Networking  
This paper proposes a whole cycle analysis method of supply chain disruption based on underwater acoustic sensor networks (UASNs).  ...  At the same time, based on the monitoring data via UASNs, the DA-NET model of the petroleum supply chain (PSC) system is built and the impact of the disruption on PSC operation is analyzed quantitatively  ...  At present, the research mainly focuses on the evolution and evaluation of supply chain disruptions, supply chain contract, network planning, etc., and there is still a lack of research on the interaction  ... 
doi:10.1186/s13638-019-1426-0 fatcat:rfj4t2jiezeanld7px7rkxarpa

Cognitive Identity Management: Synthetic Data, Risk and Trust

S. Yanushkevich, A. Stoica, P. Shmerko, W. Howells, K. Crockett, R. Guest
2020 2020 International Joint Conference on Neural Networks (IJCNN)  
This paper is dedicated to understanding the potential impact of synthetic data on the cognitive checkpoint performance, and risk and trust prediction.  ...  Synthetic, or artificial data is used in security applications such as protection of sensitive information, prediction of rare events, and training neural networks.  ...  The following similarities enables this bridging: (a) The multi-echelon supply chain is similar to the multi-state identity management process; (b) Performance evaluation is based on probabilistic R&T  ... 
doi:10.1109/ijcnn48605.2020.9207385 dblp:conf/ijcnn/YanushkevichSSH20 fatcat:zogkameyzvbxpkppq446pmq6gy

Zero Trust for Cyber Resilience [article]

Yunfei Ge, Quanyan Zhu
2023 arXiv   pre-print
Two key elements of the zero-trust engine are trust evaluation (TE) and policy engine (PE).  ...  This chapter draws attention to the cyber resilience within the zero-trust model. We introduce the evolution from traditional perimeter-based security to zero trust and discuss their difference.  ...  It is important to provide a trust inference model to find a reliable recommendation that could improve trust evaluation accuracy. • Supply Chain.  ... 
arXiv:2312.02882v1 fatcat:ygrlyfdomzgrdb22nie6adxp44

Assessing and Selecting Sustainable and Resilient Suppliers in Agri-Food Supply Chains Using Artificial Intelligence: A Short Review [chapter]

Antonio Zavala-Alcívar, María-José Verdecho, Juan-José Alfaro-Saiz
2020 IFIP Advances in Information and Communication Technology  
The supplier evaluation and selection process is critical to increase the sustainability and resilience of the agri-food supply chain.  ...  The objective of this article is to analyze articles that address the selection of suppliers in agrifood supply chains that pursue to increase their sustainability and resilience by using artificial intelligence  ...  Acknowledgements Authors of this publication acknowledge the contribution of the Project 691249, RUC-APS "Enhancing and implementing Knowledge based ICT solutions within high Risk and Uncertain Conditions  ... 
doi:10.1007/978-3-030-62412-5_41 fatcat:xrdeqkq4uvdivcxsg6h2p2oo4q

Survey of Trust Models in Different Network Domains

Mohammad Momani, Subhash Challa
2010 International Journal of Ad Hoc, Sensor and Ubiquitous Computing  
The methodologies used to model trust and their references are presented.  ...  A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests  ...  Wang and Vassileva in [67] [68] [69] modelled trust using Bayesian networks based on the quality of services provided by agents.  ... 
doi:10.5121/ijasuc.2010.1301 fatcat:ohc7chbkfnhnvm4cftchq3b7be

2020 Index IEEE Transactions on Engineering Management Vol. 67

2020 IEEE transactions on engineering management  
Dowd, Z., +, TEM Feb. 2020 42-53 Product Deterioration Based Demand Forecasting and Service Supply Model for MRO Service Chain.  ...  ., +, TEM Aug. 2020 614-630 Demand forecasting Product Deterioration Based Demand Forecasting and Service Supply Model for MRO Service Chain.  ... 
doi:10.1109/tem.2020.3039440 fatcat:3iwcpdzopnaixfohkkxtgycz7y

Assessing Eco-Friendly Marketing Approaches in India's Agri-Food Sector Through Sustainability Metric

Kirandeep Kaur, Jaspreet Singh
2023 European Economic Letters (EEL)  
Subsequently, the Bayesian Network Analysis provided insights into the interdependencies between various strategies and their impact on sustainability goals.  ...  To address this, we employed the Modified Delphi Technique, coupled with a novel Bayesian Network Analysis.  ...  Detailed transparency in Stressed on consumer Sustainability Transparent supply supply chains, with real- Blockchain for supply chain trust through Advocate, chains; Consumer time tracking; Interactive  ... 
doi:10.52783/eel.v13i5.802 fatcat:h7gypcuujbcvvfn2rkdjp6aq4q

Survey of trust models in different network domains [article]

Mohammad Momani, Subhash Challa
2010 arXiv   pre-print
The methodologies used to model trust and their references are presented.  ...  A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests  ...  Wang and Vassileva in [67] [68] [69] modelled trust using Bayesian networks based on the quality of services provided by agents.  ... 
arXiv:1010.0168v1 fatcat:ygatwov3efby3ovr7am5xfleam

RIoTS: Risk Analysis of IoT Supply Chain Threats [article]

Timothy Kieras and Muhammad Junaid Farooq and Quanyan Zhu
2019 arXiv   pre-print
We also analyze the impact of grouping within suppliers that may pose hidden risks to the systems from malicious supply chain actors.  ...  Securing the supply chain of information and communications technology (ICT) has recently emerged as a critical concern for national security and integrity.  ...  Supply chain risk modeling comprises three areas of concern, each of which can be modeled as a network: attack steps, supply chains, and component relationships.  ... 
arXiv:1911.12862v1 fatcat:gss36kyrrvcgvk4dcfghd7sssq

High value information in engineering organisations

Yuyang Zhao, L.C.M. Tang, M.J. Darlington, S.A. Austin, S.J. Culley
2008 International Journal of Information Management  
Then a "characteristic" based framework of information evaluation is introduced using the key characteristics identified from related work as an example.  ...  A Bayesian Network diagram method is introduced to the framework to build the linkage between the characteristics and information value in order to quantitatively calculate the quality and value of information  ...  The linkage among them is based on Bayesian Network, which is introduced in the next section.  ... 
doi:10.1016/j.ijinfomgt.2007.09.007 fatcat:qzhfirmwk5g6no2coxl56fxmfu
« Previous Showing results 1 — 15 out of 6,027 results