83,811 research outputs found

    Analyzing the Effects of Tactical Dependence for Business Process Reengineering and Optimization

    Get PDF
    Implementing business and manufacturing process reengineering is challenging and poses major issues. The dependence issues between process functions during the implementation phase are the main reason for the high failure rate of process reengineering. The incompetence in identifying the dependence makes existing business process reengineering approaches static for modern business and manufacturing process structures. This paper has implemented a new process reengineering approach called the Khanā€“Hassanā€“Butt (KHB) methodology that incorporates the process interdependence algorithm to identify the dependence issues. The KHB method is a hybrid process reengineering approach to identify dependence issues before implementing changes; thus significantly reducing the failure rate of implementing business process reengineering. The KHB method has been implemented in a Bangladesh fabric manufacturing facility. The mapping and verification of the process have been completed using the WITNESS Horizon 22.5 simulation package. The case study has investigated the fabric production process and identified the dependence issues between each function and suggested changes to optimize the process. The outcome has shown significant improvement in production output and process efficienc

    Towards an Entropy-based Analysis of Log Variability

    Get PDF
    Rules, decisions, and workflows are intertwined components depicting the overall process. So far imperative workflow modelling languages have played the major role for the description and analysis of business processes. Despite their undoubted efficacy in representing sequential executions, they hide circumstantial information leading to the enactment of activities, and obscure the rationale behind the verification of requirements, dependencies, and goals. This workshop aimed at providing a platform for the discussion and introduction of new ideas related to the development of a holistic approach that encompasses all those aspects. The objective was to extend the reach of the business process management audience towards the decisions and rules community and increase the integration between different imperative, declarative and hybrid modelling perspectives. Out of the high-quality submitted manuscripts, three papers were accepted for publication, with an acceptance rate of 50%. They contributed to foster a fruitful discussion among the participants about the respective impact and the interplay of decision perspective and the process perspective

    Quantitative Verification: Formal Guarantees for Timeliness, Reliability and Performance

    Get PDF
    Computerised systems appear in almost all aspects of our daily lives, often in safety-critical scenarios such as embedded control systems in cars and aircraft or medical devices such as pacemakers and sensors. We are thus increasingly reliant on these systems working correctly, despite often operating in unpredictable or unreliable environments. Designers of such devices need ways to guarantee that they will operate in a reliable and efficient manner. Quantitative verification is a technique for analysing quantitative aspects of a system's design, such as timeliness, reliability or performance. It applies formal methods, based on a rigorous analysis of a mathematical model of the system, to automatically prove certain precisely specified properties, e.g. ``the airbag will always deploy within 20 milliseconds after a crash'' or ``the probability of both sensors failing simultaneously is less than 0.001''. The ability to formally guarantee quantitative properties of this kind is beneficial across a wide range of application domains. For example, in safety-critical systems, it may be essential to establish credible bounds on the probability with which certain failures or combinations of failures can occur. In embedded control systems, it is often important to comply with strict constraints on timing or resources. More generally, being able to derive guarantees on precisely specified levels of performance or efficiency is a valuable tool in the design of, for example, wireless networking protocols, robotic systems or power management algorithms, to name but a few. This report gives a short introduction to quantitative verification, focusing in particular on a widely used technique called model checking, and its generalisation to the analysis of quantitative aspects of a system such as timing, probabilistic behaviour or resource usage. The intended audience is industrial designers and developers of systems such as those highlighted above who could benefit from the application of quantitative verification,but lack expertise in formal verification or modelling

    Marginal abatement cost curves (MACCs): important approaches to obtain (firm and sector) greenhouse gases (GHGs) reduction

    Get PDF
    The study aims to identify appropriate methods that can help organisations to reduce energy use and emissions by using an effective concept of sustainability. In different countries, estimates of marginal abatement costs for reducing GHG emissions have been widely used. Around the world, many researchers have focused on MACCs and reported different results. This may due to different assumptions used which in turn lead to uncertainty and inaccuracy. Under these circumstances, much attention has been paid to the need for the role of MACC in providing reliable information to decision makers and various stakeholders. By reviewing the literature, this paper has analysed MACCs in terms of the role of different approaches to MACCs, representations of MACCs, MACC applications, pricing carbon, verification, and sectors analysis for energy and emissions projections. This paper concludes that MACCs should depend on actual data to provide more reliable information that may assist (firms and sectors) stockholders to determine what appropriate method for reducing emission

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    Protecting Workersā€™ Rights Worldwide: 2010 Annual Report January 1, 2010-December 31, 2010

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2010_AnnualReport.pdf: 134 downloads, before Oct. 1, 2020

    A formal verification framework and associated tools for enterprise modeling : application to UEML

    Get PDF
    The aim of this paper is to propose and apply a verification and validation approach to Enterprise Modeling that enables the user to improve the relevance and correctness, the suitability and coherence of a model by using properties specification and formal proof of properties
    • ā€¦
    corecore