International Association of Engineers

Displaying 1-40 of 732 results

  • White Papers // Oct 2014

    Computing Interfaces for Everyone

    Companies, businesses and agencies rely on computing technology, taking advantage of its trends and benefits. Some categories of users - people with disabilities - have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing systems and companies still rely on assistive...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Efficient Certificateless One-Pass Key Agreement Protocols

    Key agreement is an essential component in any cryptosystem. In this paper, a new certificate-less two-party key agreement protocol is proposed. The protocol involves only one pass of exchanged messages, thus saving both time and bandwidth. The protocol provides implicit authentication of the identities of the two communicating parties. This...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Design of Customer-Oriented Cloud Products

    Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises and individual users to start from the small and increase resources only in case of service demand increase. The competitive environment of cloud service providers forces them to differentiate their products in terms of technical...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wireless Sensor Deployment Method on 3D Environments to Maximize Quality of Coverage and Quality of Network Connectivity

    Sensor deployment is one of the most important issues which affect the overall performance of a Wireless Sensor Network (WSN). It is a challenging task to optimally deploy a limited number of sensors on Three Dimensional (3D) environments to maximize Quality of Coverage (QoC) and Quality of Network connectivity (QoN)....

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Neural Network Random Error Prediction on Wireless Local Area Network and Application of One-Dimensional Multi Resolution Wavelet De-Noising Technique

    Self-similarity is a phenomenon known as a random error in a discrete system and considered as one of the major factors that constitute a delay on a network; it affects the overall stability or performance and reduces the capacity utilization of the network. In view of this, an ON/OFF traffic...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises

    Small and Medium Enterprises (SMEs) setup wireless networks in order to make the process of communicating and sharing resources easier. SMEs implement wireless networks, because it's easy, fast and cheaper to implement. However, with the rapid growth within the SMEs sector. SMEs tend to hire more employees when they grow...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Effect of Threshold Voltage on Cylindrical Surrounding Double-Gate MOSFET for Wireless Sensor for Wireless RF Switches

    Wireless Sensor Network (WSN) technologies have potential applications in communication, entertainment, travel, retail, industry, medicine, environment monitoring, scientific observation, field surveillance, structure monitoring and many other areas. The Cylindrical Surrounding Double-Gate (CSDG) Silicon On Insulator (SOI) MOSFET is a leading device for nanotechnology. This paper presents an effect of threshold...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Gateway Location Protocol for Mesh Networks

    Wireless Mesh Network (WMN) is a promising technology that can provide broadband Internet access. Traffic often routed in Wireless Mesh Backbone (WMB). This also extended to the mesh clients and the Internet and forward to then to mesh gateways. Strategically providing efficient and supervising of WMN is a tedious task...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

    Vehicular Ad-hoc NETworks (VANETs) is an important component within the Intelligent Transportation Systems (ITS) that have been part of global strategy and advanced applications. The aim is to provide innovative services relating to various modes of transportation and traffic management. These systems enable users to reach their destinations better, safer...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    FDTD Simulation of a Mobile Phone Operating Near a One Metal Cell

    In recent years mobile phones or smart phones have gained popularity because of its versatility: internet capabilities, navigation and cameras. Engineering research on the subject of wireless phones and Radio Frequency (RF) energy has been conducted worldwide for many years. This paper presents results of placing a one metal cell...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Mining Frequent Patterns in Software Risk Mitigation Factors: Frequent Pattern-Tree Algorithm Tracing

    Frequent-Pattern Tree (FP-Tree) algorithm plays a vital role in mining associations, patterns and other data mining related jobs. Currently a software risk mitigation intelligent decision network engine using rule based technique has been designed against software risk factors. A novel idea of finding the associations between different software risk mitigation...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Fingerprint Matching Using Features Mapping

    Fingerprint systems have been featuring prominently among Biometric identification systems for individuals. The dominance of fingerprint is been promoted through continuous emergence of different forms of Automated Fingerprint Identification Systems (AFIS). In the course of performing its assigned roles, an AFIS conducts several activities including fingerprint enrolment, creation of its...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Crop Production Recognize Frameworks using Mobile Enterprise Application

    In this paper, the authors propose an enterprise application framework using mobile that uses CBD (Component-Based Development) as development methodology and web services for information interchange in the RFID-based distributed computing environment for crop production in agricultural area. They tried to analyze the requirements of mobile applications architecture and mobile...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Software Architectural Design for Image Retrieval System Involving Data Streams and User Interactivity

    In the process of software development, the role played by the software architect is substantial. It is the software architect who splits the entire application into different components, understands the functions performed by each component and should possess sound knowledge on the interactions among these components. The software architect communicates...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Security Algorithm for Communication with Dynamic Routing

    The data transmission using cryptographic algorithm within multiple organization system with Randomizing delivery paths over wired and wireless networks has become the major issues for security of data communication over worldwide networks. This paper is to propose a dynamic routing with strong security. The strongest algorithm considered is Blow fish...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Review of Dynamic Spectrum Networks Using Cognitive Radio

    Future wireless networks are expected to be spectrum agile and use cognitive radio technologies. The spectrum regulatory committees have been taking measurable steps with regards to laying down the rules and implementing them, which will open the doors to dynamic spectrum network technologies based on cognitive radio. The usage of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Theoretical Aspects of Ultra Wide Band

    Ultra Wide Band (UWB) technology can provide alternative communication solutions within the unlicensed band. Despite many years of development and deployment, UWB and its applications have been underutilized within the communications industry. Some reasons for this lack of acceptance are industry preference for more established technologies and a lack of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Outdoor-to-Indoor Propagation Characteristics of 850 MHz and 1900 MHz Bands in Macro -Cellular Environments

    Building penetration loss at 850 MHz and 1900 MHz bands in suburban environment is measured. The measurements are conducted in real GSM networks. Four buildings are studied aiming to provide first-order statistics of the signal coverage inside buildings. Results show that the mean building penetration loss for the ground floor...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wavelet Based Indoor Prediction of Global System for Mobile Communication (GSM) Signal Strength Attenuation

    In this paper, the authors monitored GSM signal strength (power) in an indoor environment and measured samples of the GSM signal strength on a Mobile Equipment (ME). They also, used one-dimensional multilevel wavelet to predict the fading phenomenon of the GSM signal measured and neural network clustering to determine the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Centralized Multimodal Unified Authentication Platform for Web-based Application

    Identifying a user or in technical terms, authentication, is a key process that must be performed before a service can be rendered to a person through electronic means. Common practice for user authentication is to challenge user to present authentication credential, user who can present the valid credential is considered...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Bayesian Network Model for Risk Management in Cyber Situation

    The transformation in e-commerce with the advent of other internet based activities has increased the impact of cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Xen Web-based Terminal for Learning Virtualization and Cloud Computing Management

    In this paper, the authors propose a web-based terminal for teaching the cloud. This method allows students and trainees to learn managing the cloud in a useful and secure manner. This paper promotes an appreciate educational environment by enabling students to practice the knowledge practically, teaching them the ethics of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Parallel Authenticated Encryption Sharing Scheme Based on Cellular Automata

    Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple Secret Sharing Scheme (SSS) against adaptive chosen...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Subjective Assessment of Mobile Videos Quality for Long Term Evolution (LTE) Cellular Networks

    In this paper, the authors introduce a Mobile Video Quality Prediction (MVQP) project for Long Term Evolution (LTE). The MVQP aims to predict the quality of streaming video service over User Datagram Protocol (UDP) in LTE cellular networks. In this paper, 100 subjects evaluated video quality using smart phones based...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Object Manipulation Through Explicit Force Control Using Cooperative Mobile Multi-Robot Systems

    Transportation of objects by groups of mobile robots can be advantageous when an object is too large or heavy to be effectively manipulated by a single robot on its own. This paper proposes combining the cluster space control methodology with explicit force control to effectively and safely move such an...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Evaluating Protection of Computer Network in Education Sector

    The use of Information Technology (IT) in the higher education institutes was increased daily. Most of the literature mentioned that the ISO/IEC 27002:2005 is the most popular standard to follow in order to reach the best protection for computer Networks. A questionnaire was designed to determine the extent of satisfaction...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Problem Solving Hands-On Labware for Teaching Big Data Cybersecurity Analysis

    The rapid growth of big data analysis needs has resulted in a shortage of professionals in this area. Despite such great need, big data analytics and data science is not well represented in current academic programs. Although a few schools have offered new courses in this area but they all...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Distributed Versus Centralized Protection Schema for the Enterprise

    Entities in the enterprise are deployed with a standard configuration. Over time, patches, updates, new software versions, and mistakes or malicious activity all lead to deviations across the enterprise from this standard baseline. Malicious or unknown software on a system can cause harm or unexpected behavior. To mitigate these problems...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cryptography Based Authentication Methods

    In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Experimental Validation of Lafortune-Lecours Propagation Model at 1900 MHz

    With an ever increasing demand for cellular voice and data services, many of the cellular providers are finding deployment of the in-building infrastructure inevitable. The in-building deployments allow for further re-use of the allocated spectrum and hence, they provide one of the most effective ways for increasing the overall system...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    ITU-T Future Networks: A Step Towards Green Computing

    In the field of telecommunications, Information and Communication Technologies (ICTs) the United Nations specialized agency is termed as International Telecommunication Union (ITU) which is a standard. Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is identified to be responsible for studying technical, operation including tariff rates, grade...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Quality Measurement for Mobile Crop Production Management Applications

    Most ERP vendors proudly claim their solutions are available on mobile platforms, explaining that managers can access their ERP solution from their Smartphone's. The recent wave of Mobile-Enterprise Resource Planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. Mobile business boosting the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    An Alternative Approach for Investigating the Impact of Mobile Phone Technology on Speech

    Creating a database of mobile phone speech recordings is the first step to studying the impact of mobile phone networks on various speech applications. The conventional way of creating such a database involves transmitting speech between two mobile phone devices across an actual network. However, this can only encompasses a...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Multichannel User Interfaces Towards Crossover Inclusive Computing

    In this paper, the authors summarize the present methods available for providing user interfaces for disability applications. Section 508 of the Rehabilitation Act of 1973 has contributed to providing accommodation to people with disability, and is generally considered a step in the right direction. As many modalities of interaction have...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Verifying Software Change Requirements Through Conceptual Class Diagrams Comparison

    An existing software system sometimes needs to be redesigned to accommodate various change requirements. A system analyst gathers new user requirements to analyze software requirements and create a conceptual model of the new version of the system. While certain requirements of the existing software system should remain in the new...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Data Analysis and Prediction of Power Generated by Photovoltaic Systems

    The increasing demand for renewable energy from sources such as wind and solar has attracted the researchers to study the behavior and attributes of these energy resources in more depth. One of the important aspects of renewable energy resources is their uncertainty/unpredictability. To have a balance between the power demand...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Approach for Cluster Disjuncts Using Naive Bayes

    Data mining is the process of discovering hidden knowledge from the existing databases. In real-time applications, most often data sources are of imbalanced nature. The traditional algorithms used for knowledge discovery are bottle necked due to wide range of data sources availability. Class imbalance is a one of the problem...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    The Comparative Analysis Between Sensory and Cognitive in Online Customer Reviews of Baby Formula

    Based on a big data service platform for industry informatization, the authors made a comparative analysis between sensory and cognitive in online customer reviews of baby formula. Three aspects of the customer reviews are analyzed. In the first part, the descriptive analysis was conducted to evaluate the customer reviews propensity...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Prediction of Work Integrated Learning Placement Using Data Mining Algorithms

    Data mining in education is used to study data and discover new patterns that can be used for decision making. The classification algorithms are applied on educational data set for predicting work integrated learning placement based on student performance. J48, Bayes Net, Naive Bayes, Simple Cart, and REPTREE algorithms are...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cerebration of Privacy Preserving Data Mining Algorithms

    Recent advances in data intensive information processing systems is becoming increasingly important to make decisions in business organizations. Precious & sensitive knowledgeable patterns may reside in the process of business analysis. Recently privacy preserving data mining have acquired a great extent by data mining and Information security community researchers in...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    An Intelligent Fuzzy Neural Call Admission Control Mechanism for Guaranteed QoS in Heterogeneous Wireless Networks

    The Call Admission Control (CAC) is a Radio Resource Management (RRM) technique that plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications with diversified QoS requirements in Next Generation Wireless Networks (NGWN). This paper proposes an Analytical system model and the...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Data Load Impact on RFID Anti-Collision Protocols

    RFID anti-collision is one of the most important issues responsible for slow growth of the technology. Hence, there is an alarming need to study and analyze the existing anti-collision protocols in the light of their performance. The objective of this paper is focused around presenting the impact of data load...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Group-Based ICI Canceller Combined With Complex Sphere Decoding for Fast-Fading OFDM System

    The InterCarrier Interference (ICI) resulted from fast fading channel destroys the orthogonality of the Orthogonal Frequency-Division Multiplexing (OFDM) signal and deteriorates receiver performance. In this paper, the authors propose two-stage interference canceller, which combines Zero-Forcing (ZF) equalizer with complex sphere decoder in a group-based version, to tackle the severe ICI...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Architecture for 6LoWPAN Mobile Communicator System

    Wireless sensor network is one of the emerging technologies which will have impact on people daily life in near future. This paper presents a 6LoWPAN communicator, which is a mobile device system and responsible for bi-directional communication to retrieve sensor data and conFig sensor nodes. This paper discusses about the...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Addressing Method for the Components of On-Chip Communication

    In this paper, the authors propose a hierarchical addressing scheme for Network-on-Chip applications. This scheme will facilitate a user to transmit a lesser number of overhead bits while transmitting a message to some other user. The number of overhead bits required will be dependent on the distance (in terms of...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Fast Algorithm in ECC for Wireless Sensor Network

    Elliptic Curve Cryptography (ECC) has been attractive to the people who are working in the field of the network security due to its good potential for wireless sensor network security due to its smaller key size and its high strength of security. But there is a room to reduce the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Power Optimization in Ad Hoc Sensor Networks Using Clustering Approach

    Considering operational lifetime and load balancing as major constraints in the transmission of signals in the sensors of underwater ad hoc networks, the authors put forward in this paper a novel idea of using clustering approach to optimize the power consumption of the batteries in the sensors of the underwater...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    An Effective Approach to Improving Packet Delivery Fraction of Ad Hoc Network

    This paper addresses the subject of improving performance of an ad hoc network system suffering from high resource contention by improving its packet delivery fraction. The suggested system model assumes that nodes can be divided into two classes: the servers that provide services and the clients that request services provided...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Analysis and Simulation Routing Management MIRA (Minimum Interference Routing Algorithm) for Speedy Traffic on MPLS Network

    MPLS network as IP backbone has capacity constraint and routing mechanism constraint. The latest constraint, which based On Shortest Path First scheme (OSPF), results in best-shortest calculated path. This scheme produces resource with unfair consumed. Some subsets of network may get congested while others remain free. As a consequence, the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Comparing Wireless N (IEEE 802.11n) and Wireless G (IEEE 802.11g) Standards in Terms of Performance and Reliability

    After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Green Supplier Assessment in Environmentally Responsive Supply Chains through Analytical Network Process

    Suppliers' assessment is a critical function within supply chain management. Green supplier assessment is also necessary for sustainable supply chain management. This paper is to present a methodology to evaluate suppliers using portfolio analysis based on the Analytical Network Process (ANP) and environmental factors. Since environment protection has been concern...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Inventory Planning with Batch Ordering in Multi-Echelon Multi-Product Supply Chain by Queuing Approach

    In this paper, the authors apply queuing models for performance evaluation analysis in multi-product multi-echelon manufacturing supply chain network with batch ordering. The analysis is clubbed with an inventory optimization model, which can be used for designing inventory policies for each product. They consider a three-echelon supply chain: retailers, warehouses...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Optimization of a Dynamic Supply Chain Model with Budget Constraint

    In this paper, the authors present a new dynamic model in strategic and tactical planning in a multiple echelon multiple commodity production-distribution network and a solution procedure based on Lagrangian Relaxation (LR) approach. The proposed model considers different time resolutions for tactical and strategic decisions. Also expansion of supply chain...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Study on Coordination of Supply Chain with Combined Contracts

    In this paper, the authors investigate coordination of supply chain consisting of one manufacturer and one retailer facing consumer return and stochastic demand that is sensitive to both sales effort and retail price. When demand is influenced by both retail price and retail sales effort, coordination is challenging traditional contracts...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Uncertainty in Logistics Network Design: A Review

    Along the logistics network either horizontally or vertically, uncertainty can appear anywhere. At the beginning of the network, even the most reliable supplier could have a late delivery. At the end of the network, customer demand is always the most challenge problem. In the literature, uncertainty is from time to...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Using Postponement as a Rescheduling Strategy in the Supply Chain Management under Uncertain Demand Environment

    Addressing demand uncertainty is a research focus in supply chain management in recent years. In this paper, a new postponement strategy is applied. Postponement has been appreciated recently, especially in the manufacturing period of realizing mass customization. It has also been much used to respond to the demand uncertainty and...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    An RFID Case Study for Air Cargo Supply Chain Management

    Air freight is an important part of the global supply chain. In particular, various high-value electronic products need to be transported efficiently by air freight. Currently, many air freight forwarders still rely on manual operations to process air cargo. These manual operations may affect target service levels due to handling...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    A Queuing-Inventory Model in Multiproduct Supply Chains

    In this paper, the authors consider a supply chain that includes a manufacture which produces more than one product that is demanded by several retailers. After production, each all type of products is hold in separated warehouses. Each warehouse has different holding cost and each product has a different backorder...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Designing of Multi-Commodity, Multi Location Integrated Model for Effective Logistics Management

    Logistics has recently acquired great significance in industry, in part due to rapidly growing interest in supply chain management. One of the important open issues in logistics is the effective integration of logistical cost component such as transportation cost with facility location models. This paper significantly extends traditional facility location...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Comparative Study of AHP and ANP on Multi-Automotive Suppliers with Multi-Criteria

    Agility in supply chain management for automotive industries is important in order to supply the customer requirements at right time and making the supply chain capable to compete with internal and external competitors. This paper finds what the most agile automotive factory in supply chain is. Two approaches, namely, Analytical...

    Provided By International Association of Engineers

  • White Papers // Mar 2013

    Revenue Management in E-Commerce: A Case Study

    The price is one of the most important aspects of marketing activities. Establishing the appropriate price is the ultimate requirement for revenue maximization. Dynamic pricing, which is simply a price change whenever there is a change in demand or other parameters, could prove useful to determine the appropriate price. Dynamic...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Inventory Control for Stochastic Reverse Logistics with Product's Life Cycle

    In this paper, the authors investigate inventory control policies in a manufacturing/re-manufacturing system during the product life-cycle, which consists of four phases: introduction, growth, maturity and decline stages. Both demand rate and return rate of products are random variables with normal distribution and the mean of the distribution also varies...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    A Fuzzy Cognitive Map Approach for Modeling CPFR Supporting Factors

    Collaborative Planning, Forecasting and Replenishment (CPFR) coordinates the various supply chain management activities including production and purchase planning, demand forecasting and inventory replenishment between supply chain trading partners. This paper proposes a systematic way of analyzing CPFR supporting factors using Fuzzy Cognitive Map (FCM) approach. FCMs have proven particularly useful...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Analysis of the Sustainable Supply Chain Structure with Incomplete Preferences

    Integration of sustainable development in the business and supply chain is potentially a source of competitive differentiation for firms. Sustainable Supply Chain (SSC) management is the management of material, information and capital flows as well as cooperation among companies along the supply chain while taking goals from all three dimensions...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Data Mining Aided Proficient Approach for Optimal Inventory Control in Supply Chain Management

    Optimal inventory control is one of the significant tasks in supply chain management. The optimal inventory control methodologies intend to reduce the Supply Chain (SC) cost by controlling the inventory in an effective manner, such that, the SC members will not be affected by surplus as well as shortage of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Capturing the Process Efficiency and Congestion of Supply Chains

    In this paper, the authors examine the performance of supply chain in stages keeping the essence of processes that knits the stages of supply chain. By focusing on the process as the unit of analysis, the management of inter-organizational relations in a way which is generally known as network, on...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Decentralized Configuration, Pricing and Remanufacturing Decisions in a Multi-Level Green Supply Chain

    In this paper, the authors incorporate remanufacturing decisions with pricing and supplier and component selection decisions in a multi-level green supply chain with multiple suppliers, one single manufacturer and multiple retailers. The manufacturer purchases optional components of a certain functionality from their alternative suppliers or remanufacture from recycled components and...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Adaptive Genetic Algorithm for Fixed-Charge Transportation Problem

    Competitive global markets oblige the firms to reduce their overall costs while maintaining the same customer service level and this can be achieved just through a precise and efficient management of their supply chain network. The Fixed Charge Transportation Problem (FCTP) which is a more comprehensive type of Transportation Problem...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Modeling and Optimization of Generic Pull Supply Chain

    Now-a-days, pull system is widely used in many industries. In the recent decade, many users adopt pull system to supply chain and present preference of this system. In this paper, a general pull system for a stochastic supply chain process will be adapted along with optimizing a pull stochastic supply...

    Provided By International Association of Engineers

  • White Papers // Jul 2007

    Partner Selection and Production-Distribution Planning for Optimal Supply Chain Formation

    In this paper, the authors seek to develop an effective methodology to solve the partner selection and production-distribution planning problem that arises in the formation of an optimal supply chain. The methodology includes a mathematical model which describes the characteristics of the integrated supply chain and an efficient genetic search...

    Provided By International Association of Engineers

  • White Papers // Mar 2008

    Enhanced Data Models for Master and Transaction Data in ERP Systems - Unitary Structuring Approach

    In recent past, there seems to have an increased demand for improvements in current Enterprise Resource Planning (ERP) solutions. One potential area is enhancing existing master and transaction data models in ERP. This paper presents an integrated approach to represent both master and transaction data, which in turn helps improving...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    A 3-Tier Framework Web-based Document, Content and Enterprise Resource Management Systems

    The business world is tremendously changing with the myriad of activities to be carried out on a daily basis. This, thus inculminates in proliferation of high volumes of data which according to various observations and reports are growing at an alarming rate of 1000/0 every two years, which equivocally was...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Fuzzy Multi-criteria Method for Revaluation of ERP System Choices using Real Options

    Many corporate had implemented ERP (Enterprise Resource Planning) systems since mid-1990s. Some of them began late mid-2000s. ERP systems are newly well understood and confusion about these systems is becoming clear. In this paper, a corporate based on construction has many companies and much of them are using different ERP...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Aerospace-Academia: ERP-Communication Framework Strategy

    The advancement in management information systems and business intelligence has changed the dynamics of knowledge management. The integration of ERP (Enterprise Resource Planning) module for strategic-collaboration among industry-R&D departments with university-wide "Smart-campus" has further reiterated the target focused team environment coupled with value-based corporate-culture. The integration of academia R&D units...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    The ERP Project Risk Assessment - A case study

    Information and Communication (ICT) Technology related projects, such as Enterprise Resource Planning (ERP) projects have a high failure rate. Planned and systematically adopted risk management procedure is crucial to keep projects on time and within budget with all requirements fulfilled. In this paper, the authors have analyzed the critical risks...

    Provided By International Association of Engineers

  • White Papers // Jul 2013

    The Impact of Culture in Enterprise Resource Planning System Implementation

    The successful implementation of an Enterprise Resource Planning (ERP) system in any organization can be affected the culture within the organization, which could be a characteristic of the culture within a particular society. Implementing an Enterprise Resource Planning (ERP) system is a major cultural change for any organization. This paper...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    An AHP Approach to Evaluate Factors Affecting ERP Implementation Success

    In previous authors' researches a model aimed at providing IT management with an effective instrument to reduce the risk of failure of implementation process was presented. The model is based on the analysis of technical and organizational issues that may affect a successful implementation process. This model will be the...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Criteria Weighting and 4-P Planning in Marketing using Analytic Network Process

    The first of two major functions of the enterprises is producing goods and services and the second is selling them. The relationship between production and consumption shows that marketing plays an important role in enterprises. Now-a-days, the concept of marketing is customer oriented and aims to meet the needs and...

    Provided By International Association of Engineers