Reassembly classification selection method based on the Markov Chain

2018 ◽  
Vol 38 (4) ◽  
pp. 476-486 ◽  
Author(s):  
Maogen Ge ◽  
Jing Hu ◽  
Mingzhou Liu ◽  
Yuan Zhang

Purpose As the last link of product remanufacturing, reassembly process is of great importance in increasing the utilization of remanufactured parts as well as decreasing the production cost for remanufacturing enterprises. It is a common problem that a large amount of remanufactured part/reused part which past the dimension standard have been scrapped, which have increased the production cost of remanufacturing enterprises to a large extent. With the aim to improve the utilization of remanufacturing parts with qualified quality attributes but exceed dimension, the purpose of this paper is to put forward a reassembly classification selection method based on the Markov Chain. Design/methodology/approach To begin with, a classification standard of reassembly parts is proposed. With the thinking of traditional ABC analysis, a classification management method of reassembly parts for remanufactured engine is proposed. Then, a homogeneous Markov Chain of reassembly process is built after grading the matching dimension of reassembly parts with different variety. And the reassembly parts selection model is constructed based on the Markov Chain. Besides, the reassembly classification selection model and its flow chart are proposed by combining the researches above. Finally, the assembly process of remanufactured crankshaft is adopted as a representative example for illustrating the feasibility and the effectiveness of the method proposed. Findings The reassembly classification selection method based on the Markov Chain is an effective method in improving the utilization of remanufacturing parts/reused parts. The average utilization of remanufactured crankcase has increased from 35.7 to 80.1 per cent and the average utilization of reused crankcase has increased from 4.2 to 14 per cent as shown in the representative example. Originality/value The reassembly classification selection method based on the Markov Chain is of great importance in enhancing the economic benefit for remanufacturing enterprises by improving the utilization of remanufactured parts/reused parts.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tobias Filusch

Purpose This paper aims to introduce and tests models for point-in-time probability of default (PD) term structures as required by international accounting standards. Corresponding accounting standards prescribe that expected credit losses (ECLs) be recognized for the impairment of financial instruments, for which the probability of default strongly embodies the included default risk. This paper fills the research gap resulting from a lack of models that expand upon existing risk management techniques, link PD term structures of different risk classes and are compliant with accounting standards, e.g. offering the flexibility for business cycle-related variations. Design/methodology/approach The author modifies the non-homogeneous continuous-time Markov chain model (NHCTMCM) by Bluhm and Overbeck (2007a, 2007b) and introduces the generalized through-the-cycle model (GTTCM), which generalizes the homogeneous Markov chain approach to a point-in-time model. As part of the overall ECL estimation, an empirical study using Standard and Poor’s (S&P) transition data compares the performance of these models using the mean squared error. Findings The models can reflect observed PD term structures associated with different time periods. The modified NHCTMCM performs best at the expense of higher complexity and only its cumulative PD term structures can be transferred to valid ECL-relevant unconditional PD term structures. For direct calibration to these unconditional PD term structures, the GTTCM is only slightly worse. Moreover, it requires only half of the number of parameters that its competitor does. Both models are useful additions to the implementation of accounting regulations. Research limitations/implications The tests are only carried out for 15-year samples within a 35-year span of available S&P transition data. Furthermore, a point-in-time forecast of the PD term structure requires a link to the business cycle, which seems difficult to find, but is in principle necessary corresponding to the accounting requirements. Practical implications Research findings are useful for practitioners, who apply and develop the ECL models of financial accounting. Originality/value The innovative models expand upon the existing methodologies for assessing financial risks, motivated by the practical requirements of new financial accounting standards.


2016 ◽  
Vol 36 (2) ◽  
pp. 120-126 ◽  
Author(s):  
Nianyin Zeng ◽  
Hong Zhang ◽  
Yanping Chen ◽  
Binqiang Chen ◽  
Yurong Liu

Purpose This paper aims to present a novel particle swarm optimization (PSO) based on a non-homogeneous Markov chain and differential evolution (DE) for path planning of intelligent robot when having obstacles in the environment. Design/methodology/approach The three-dimensional path surface of the intelligent robot is decomposed into a two-dimensional plane and the height information in z axis. Then, the grid method is exploited for the environment modeling problem. After that, a recently proposed switching local evolutionary PSO (SLEPSO) based on non-homogeneous Markov chain and DE is analyzed for the path planning problem. The velocity updating equation of the presented SLEPSO algorithm jumps from one mode to another based on the non-homogeneous Markov chain, which can overcome the contradiction between local and global search. In addition, DE mutation and crossover operations can enhance the capability of finding a better global best particle in the PSO method. Findings Finally, the SLEPSO algorithm is successfully applied to the path planning in two different environments. Comparing with some well-known PSO algorithms, the experiment results show the feasibility and effectiveness of the presented method. Originality/value Therefore, this can provide a new method for the area of path planning of intelligent robot.


2017 ◽  
Vol 32 (2) ◽  
pp. 238-250 ◽  
Author(s):  
Elham Majd ◽  
Vimala Balakrishnan ◽  
Vahid Godazgar

Purpose This paper aims to enhance the successful interaction between buyers and suppliers who use intelligent agents by presenting a computational model to detect the most reliable supplier agent according to advice of an advisor agent. Design/methodology/approach In this case, the authors study the most representative models in agent environments. According to these analysis criteria, a computational model was presented to compute the reliability of supplier agents and then select the most reliable one. To evaluate the proposed method, the experimentation was carried out in two stages. First, the average accuracy of model in computing the reliability was evaluated by comparing a random selection method. Second, the performance of the model in detecting the most reliable supplier was evaluated in an agent environment by applying trust network game as a simulator. Findings The experimental results revealed that the proposed method can detect the most reliable supplier accurately in both consistent and oscillating agent environments. Originality/value The authors believe that the proposed model will be beneficial to enhance the fulfillment of purchasing between buyers and suppliers.


2019 ◽  
Vol 15 (4) ◽  
pp. 454-473 ◽  
Author(s):  
Tran Khanh Dang ◽  
Duc Minh Chau Pham ◽  
Duc Dan Ho

Purpose Data crawling in e-commerce for market research often come with the risk of poor authenticity due to modification attacks. The purpose of this paper is to propose a novel data authentication model for such systems. Design/methodology/approach The data modification problem requires careful examinations in which the data are re-collected to verify their reliability by overlapping the two datasets. This approach is to use different anomaly detection techniques to determine which data are potential for frauds and to be re-collected. The paper also proposes a data selection model using their weights of importance in addition to anomaly detection. The target is to significantly reduce the amount of data in need of verification, but still guarantee that they achieve their high authenticity. Empirical experiments are conducted with real-world datasets to evaluate the efficiency of the proposed scheme. Findings The authors examine several techniques for detecting anomalies in the data of users and products, which give the accuracy of 80 per cent approximately. The integration with the weight selection model is also proved to be able to detect more than 80 per cent of the existing fraudulent ones while being careful not to accidentally include ones which are not, especially when the proportion of frauds is high. Originality/value With the rapid development of e-commerce fields, fraud detection on their data, as well as in Web crawling systems is new and necessary for research. This paper contributes a novel approach in crawling systems data authentication problem which has not been studied much.


2015 ◽  
Vol 34 (1) ◽  
pp. 2-5 ◽  
Author(s):  
Julia Proctor

Purpose – This paper aims to examine demand-driven acquisition (DDA) models that require an initial or minimum investment through the University of Wyoming’s experience with Elsevier’s Evidence-Based Selection model. Design/methodology/approach – In an attempt to avoid title-by-title selection and a desire to explore an alternative to all or nothing e-book packages, the University of Wyoming Libraries (UWL) participated in Elsevier’s Evidence-Based Selection purchase model for 2011 and 2012 e-book content in the 2013 calendar year. After an initial investment, the library was given access to the content. At the end of one year, UWL was provided with use data for the content and could choose an amount of content to retain up to Elsevier’s established “access fee”. Findings – Many studies have shown that print monographs in academic libraries do not circulate in high volumes. The use data for the titles included in the Evidence-Based Selection model was congruous with studies of print monograph circulation. Through a review of the literature and an account of the UWL’ experience with Elsevier’s Evidence-Based Selection model, this paper advocates for libraries to exercise caution when considering a DDA model requiring an initial investment. Originality/value – DDA is a purchase model that is becoming immensely popular, and in some libraries, the primary mode of acquisition. The value of this paper lies in the examination of a DDA model of a major academic publisher and the account of one library’s experience with that model.


2016 ◽  
Vol 22 (4) ◽  
pp. 378-393 ◽  
Author(s):  
My Abdelbar Koussaimi ◽  
Driss Bouami ◽  
Saïd Elfezazi

Purpose Improvement maintenance’s aim is identifying and implementing improvement action on equipment in service. The purpose of this paper is to propose an approach based on downtime’s analysis to raise up equipment’s performance, such as reliability, maintainability, availability, and safety. Steps of this approach will be illustrated by industrial applications. Design/methodology/approach Furthermore, it proposes an approach based on a combination of several methods (FMECA, cause and effect diagrams, ABC analysis, 5W, RCA method, etc.). This approach is based on the downtime analysis and lead to improve maintenance’s performance and equipment’s reliability, maintainability, availability and safety. Those objectives have a strong correlation with the downtime. Findings This approach led to apply easily improvement maintenance by using known methods. In the industrial application, this approach helps the authors to choose the good solution with the better life durance. Practical implications After following the steps simulated by the proposed approach, actions and concrete measures will be deducted and illustrated by the industrial’s application. Originality/value At present, there is not an explicit improvement maintenance, to lead to specific maintenance actions on equipment in service, in order to improve the maintenance function goals.


2019 ◽  
Vol 22 (1) ◽  
pp. 5-8
Author(s):  
Ian Cummins

Purpose The purpose of this paper is to discuss the recent National Appropriate Adult Network (NAAN) report on the role of the appropriate adult. Design/methodology/approach This paper is based on the NAAN report and a review of relevant policy and research literature. Findings There to Help 2 highlights that there are still significant gaps in the provision of appropriate adult schemes across England and Wales. These gaps potentially place vulnerable adults at increased risk. Originality/value This paper is a review of recent research.


2019 ◽  
Vol 41 (4) ◽  
pp. 740-757 ◽  
Author(s):  
Sophie Hennekam ◽  
Subramaniam Ananthram ◽  
Steve McKenna

Purpose The purpose of this paper is to investigate how individuals perceive and react to the involuntary demotion of a co-worker in their organisation. Design/methodology/approach The authors draw on 46 semi-structured in-depth interviews (23 dyads) with co-workers of demoted individuals. Findings The findings suggest that an individual’s observation of the demotion of a co-worker has three stages: their perception of fairness, their emotional reaction and their behavioural reaction. The perception of fairness concerned issues of distributive, procedural, interpersonal and informational justice. The emotional responses identified were feelings of disappointment/disillusion, uncertainty, vulnerability and anger. Finally, the behavioural reactions triggered by their emotional responses included expressions of voice, loyalty, exit and adaptation. Originality/value Perceptions of (in)justice perpetrated on others stimulate emotional and behavioural responses, which impacts organisational functioning. Managers should therefore pay attention to the way a demotion is perceived, not only by those directly concerned, but also by co-workers as observers.


2019 ◽  
Vol 32 (4) ◽  
pp. 455-471
Author(s):  
Jorge Cruz-Cárdenas ◽  
Jorge Guadalupe-Lanas ◽  
Ekaterina Zabelina ◽  
Andrés Palacio-Fierro ◽  
Margarita Velín-Fárez ◽  
...  

Purpose The purpose of this paper is to understand in-depth how consumers create value in their lives using WhatsApp, the leading mobile instant messaging (MIM) application. Design/methodology/approach The study adopts the perspective of customer-dominant logic (CDL) and uses a qualitative multimethod design involving 3 focus groups and 25 subsequent in-depth interviews. The research setting was Ecuador, a Latin American country. Findings Analysis and interpretation of the participants’ stories made it possible to identify and understand the creation of four types of value: maintaining and strengthening relationships; improving role performance; emotional support; and entertainment and fun. In addition, the present study proposes a conceptual model of consumer value creation as it applies to MIM. Practical implications Understanding the way consumers create value in their lives using MIM is important not only for organizations that offer MIM applications, but also for those companies that develop other applications for mobile phones or for those who wish to use MIM as an electronic word-of-mouth vehicle. Originality/value The current study is one of the first to address the topic of consumer behavior in the use of technologies from the perspective of CDL; this perspective enables an integrated qualitative vision of value creation in which the consumer is the protagonist.


2019 ◽  
Vol 25 (3) ◽  
pp. 378-396 ◽  
Author(s):  
Arian Razmi-Farooji ◽  
Hanna Kropsu-Vehkaperä ◽  
Janne Härkönen ◽  
Harri Haapasalo

Purpose The purpose of this paper is twofold: first, to understand data management challenges in e-maintenance systems from a holistically viewpoint through summarizing the earlier scattered research in the field, and second, to present a conceptual approach for addressing these challenges in practice. Design/methodology/approach The study is realized as a combination of a literature review and by the means of analyzing the practices on an industry leader in manufacturing and maintenance services. Findings This research provides a general understanding over data management challenges in e-maintenance and summarizes their associated proposed solutions. In addition, this paper lists and exemplifies different types and sources of data which can be collected in e-maintenance, across different organizational levels. Analyzing the data management practices of an e-maintenance industry leader provides a conceptual approach to address identified challenges in practice. Research limitations/implications Since this paper is based on studying the practices of a single company, it might be limited to generalize the results. Future research topics can focus on each of mentioned data management challenges and also validate the applicability of presented model in other companies and industries. Practical implications Understanding the e-maintenance-related challenges helps maintenance managers and other involved stakeholders in e-maintenance systems to better solve the challenges. Originality/value The so-far literature on e-maintenance has been studied with narrow focus to data and data management in e-maintenance appears as one of the less studied topics in the literature. This research paper contributes to e-maintenance by highlighting the deficiencies of the discussion surrounding the perspectives of data management in e-maintenance by studying all common data management challenges and listing different types of data which need to be acquired in e-maintenance systems.


Sign in / Sign up

Export Citation Format

Share Document