SEARCH CONTENT

You are looking at 1 - 10 of 798 items :

  • Business Computing x
Clear All
Techniques in Engineering Sciences
Modeling and Innovative Research Frameworks
Series: De Gruyter STEM

Abstract

This paper gives a methodology to estimate the generalized costs of end-consumers visiting any retailer. The attractiveness and utility of retailers for end-consumers have been calculated based on their possible generalized costs according to their choice. According to the developed model, analysis of the consumer market visiting all shops in the described zone has been made. Research provides explanation of generalized costs of end-consumers. Generally, the utility function of end-consumers visiting retailers depends on the price and non-price factors. The regression models describing the time spent on transit to a retailer and inside of it provide monetary assessment of costs associated with the purchase process. The monetary level of fatigue was evaluated using the calories spent during the purchase process. The attractiveness of the retailer in an urban zone was assessed as an inverse function of the generalized costs.

Analytics Techniques in Data Mining, Deep Learning and Natural Language Processing
With UML and BPIM using Java and JavaScript

Abstract

In the present article, we deal with a generalization of the logistic function. Starting from the Riccati differential equation with constant coefficients, we find its analytical form and describe basic properties. Then we use the generalized logistic function for modeling some economic phenomena.

Abstract

Aims: To develop an immaturity model for the assessment of logistic processes that can assess the practices that describe the level of criticality, which maturity models do not evaluate, of these processes. Originality: Application of the little-known variation of maturity models and immaturity models in business logistic processes. Research method: The research is conducted from a literature review primarily with terms such as immaturity models and process immaturity. As literature is poor, it is supported by the maturity models developed by various authors in multiple domains. Main findings: As a result, an immaturity model is obtained for the assessment of the main logistic processes of manufacturing companies. Likewise, the evaluation and the experiences collected from its application in a company of a case study are obtained. Implications for theory and practice: The studies about immaturity of processes are few. The model is designed for manufacturing companies whose logistics management differs from service companies.

Abstract

The article discusses the issues of the critical infrastructure security management from the perspective of entities responsible for its security and development of an integral model of critical infrastructure security, and shows the methodology of situational management of critical infrastructure safety. Proposed solutions are used for CI mapping, enabling the generation of adverse event scenarios, estimation of the risks dependent on the considered CI, and determination of decision problem, indicating a set of protection activities for elimination or reduction of the risk in the security threshold.

Abstract

Among the many factors that cause project delays or cancellations are disruptions, that is, unforeseen events occurring during the implementation of a project, which postpone or interrupt the performance of project activities. Examples of disruptions include employee absenteeism, addition of new activities, and others. One way to deal with this type of events is to predict potential disruptions and prepare redundant resources to be used should a disruption occur (proactive approach). The focus of the present paper are human resources, in particular redundant project team competence frameworks, which allow to continue work on a project in the event of a disruption. Previous studies on planning competence frameworks regard insensitivity (robustness) to one type of disruption, caused by employee absenteeism (an absence of one, two, or three employees). The goal of this article is to present a proactive procedure that allows to seek competence frameworks robust to two types of disruptions: absence of one employee and addition of new activities not included in the project plan. Examples are provided to illustrate how the proposed approach can be used in practice.