6,887 research outputs found

    A strategy for achieving manufacturing statistical process control within a highly complex aerospace environment

    Get PDF
    This paper presents a strategy to achieve process control and overcome the previously mentioned industry constraints by changing the company focus to the process as opposed to the product. The strategy strives to achieve process control by identifying and controlling the process parameters that influence process capability followed by the implementation of a process control framework that marries statistical methods with lean business process and change management principles. The reliability of the proposed strategy is appraised using case study methodology in a state of the art manufacturing facility on Multi-axis CNC machine tools

    Learning to Trust

    Get PDF
    Trust is full of puzzle and paradox.Trust is both rational and emotional. Trust can go beyond calculative self-interest, but has its limits.People may want to trust, while they may also feel threatened by it.If trust is not in place prior to a relationship, on the basis of institutions, prior experience, or reputation, it has to be built up, in specific relations.For that one needs to learn, in the sense of building empathy, and perhaps a certain degree of identification.In an attempt at a better understanding of the puzzles and processes of trust, this chapter applies the perspective of 'embodied cognition', and insights from mental 'framing' and decision heuristics from social psychology.learning;trust;institutions

    Barnes Hospital Bulletin

    Get PDF
    https://digitalcommons.wustl.edu/bjc_barnes_bulletin/1023/thumbnail.jp

    Trust, opportunism and governance

    Get PDF
    The paper considers a (static) portfolio system that satisfies adding-up contraints and the gross substitution theorem. The paper shows the relationship of the two conditions to the weak dominant diagonal property of the matrix of interest rate elasticities. This enables to investigate the impact of simultaneous changes in interest rates on the asset demands.

    A Systems Approach to Assurance of Safety, Security and Sustainability in Railways

    Get PDF

    Models, Techniques, and Metrics for Managing Risk in Software Engineering

    Get PDF
    The field of Software Engineering (SE) is the study of systematic and quantifiable approaches to software development, operation, and maintenance. This thesis presents a set of scalable and easily implemented techniques for quantifying and mitigating risks associated with the SE process. The thesis comprises six papers corresponding to SE knowledge areas such as software requirements, testing, and management. The techniques for risk management are drawn from stochastic modeling and operational research. The first two papers relate to software testing and maintenance. The first paper describes and validates novel iterative-unfolding technique for filtering a set of execution traces relevant to a specific task. The second paper analyzes and validates the applicability of some entropy measures to the trace classification described in the previous paper. The techniques in these two papers can speed up problem determination of defects encountered by customers, leading to improved organizational response and thus increased customer satisfaction and to easing of resource constraints. The third and fourth papers are applicable to maintenance, overall software quality and SE management. The third paper uses Extreme Value Theory and Queuing Theory tools to derive and validate metrics based on defect rediscovery data. The metrics can aid the allocation of resources to service and maintenance teams, highlight gaps in quality assurance processes, and help assess the risk of using a given software product. The fourth paper characterizes and validates a technique for automatic selection and prioritization of a minimal set of customers for profiling. The minimal set is obtained using Binary Integer Programming and prioritized using a greedy heuristic. Profiling the resulting customer set leads to enhanced comprehension of user behaviour, leading to improved test specifications and clearer quality assurance policies, hence reducing risks associated with unsatisfactory product quality. The fifth and sixth papers pertain to software requirements. The fifth paper both models the relation between requirements and their underlying assumptions and measures the risk associated with failure of the assumptions using Boolean networks and stochastic modeling. The sixth paper models the risk associated with injection of requirements late in development cycle with the help of stochastic processes

    Coercing Fluently: The Grammar of Coercion in the Twenty-first Century

    Get PDF
    To illustrate the logic and grammar of coercion, this analysis relies on decision-theory methods, such as game theory, that examine the strategic decision-making process in interactions with adversaries and partners. The intent here is not to offer predictive models of rational-actor behavior. Rather, the intent is to use game-theory and similar approaches to understand how coercion works better. This analysis considers competitive interactions between actors that have discrete and qualifiable, if not quantifiable, preferences and who behave rationally, though this analysis acknowledges the behavior that is considered rational is frequently informed by nonrational social, cultural, and psychological factors. Considering these competitive interactions allows one to identify “rules of thumb” that can orient and guide actors as they compete. This analysis emphasizes coercion does not depend simply on imposing costs; rather, it depends on placing adversaries in positions in which they must act and their most rational option is the one most beneficial to one’s own cause. To achieve this result, actors must carefully calibrate their demands to ensure their adversary’s cost of concession is as low as possible. To prevent challenges in the first place, actors should convince the adversary acting on a threat is one’s most rational response. If convincing the adversary is not possible, then one must find ways to decrease the value of the adversary’s challenge. When none of those options are possible, preparing for conflict is likely one’s rational option. This analysis then applies the rules of thumb to US relations with China, Russia, and Iran.https://press.armywarcollege.edu/monographs/1948/thumbnail.jp

    Forms, Sources and Processes of Trust

    Get PDF
    This chapter reviews some key points in the analysis of trust, based on Nooteboom (2002)i.The following questions are addressed.What can we have trust in?What is the relation between trust and control?What are the sources of trust? And what are its limits?By what process is trust built up and broken down?What are the psychological mechanisms involved?The chapter ends with an illustration of trust in the police.trust;social psychology;mental framing;relational signaling
    • 

    corecore