location analysis
Recently Published Documents


TOTAL DOCUMENTS

399
(FIVE YEARS 65)

H-INDEX

35
(FIVE YEARS 3)

2021 ◽  
Vol 11 (1) ◽  
pp. 5
Author(s):  
Maryam Khairunissa ◽  
Hyunsoo Lee

The location analysis of logistics distribution centers is one of the most critical issues in large-scale supply chains. While a number of algorithms and applications have been provided for this end, comparatively fewer investigations have been made into the integration of geographical information. This study proposes logistic distribution center location analysis that considers current geographic and embedded information gathered from a geographic information system (GIS). After reviewing the GIS, the decision variables and parameters are estimated using spatial analysis. These variables and parameters are utilized during mathematical problem-based analysis stage. While a number of existing algorithms have been proposed, this study applies a hybrid metaheuristic algorithm integrating particle swarm optimization (PSO) and genetic algorithm (GA). Using the proposed method, a more realistic mathematical model is established and solved for accurate analysis of logistics performance. To demonstrate the effectiveness of the proposed method, Korea Post distribution centers were considered in South Korea. Through tests with several real-world scenarios, it is proven experimentally that the proposed solution is more effective than existing PSO variations.


2021 ◽  
Author(s):  
Ozgur Turetken

Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make the main IT facilities vulnerable to disruption (i.e. man-made or natural disasters) are likely to impact the redundant (back-up facilities as well. This complicates the process of selecting redundant facility location(s). The problem is essentially a multi-criteria decision problem, and can be addressed using the location analysis techniques that have been used in other domains in the past. Meanwhile, what make this context somewhat unique are the decision criteria and the rather subjective nature of the decision process. This paper provides a simple decision model for the problem, and illustrates the model with a case where relevant decision criteria are identified and the solution is obtained using a mix of objective and subjective decision techniques. We believe the paper is valuable because it presents an actionable methodology for practitioners involved in BCP. <br>


2021 ◽  
Author(s):  
Ozgur Turetken

Building redundant capacity into an organization’s information technology (IT) infrastructure is a standard part of business continuity planning (BCP). Traditionally, cost concerns have dominated the decision of where to locate the redundant facilities. However; recently managers are becoming more aware of the fact that the very issues that make the main IT facilities vulnerable to disruption (i.e. man-made or natural disasters) are likely to impact the redundant (back-up facilities as well. This complicates the process of selecting redundant facility location(s). The problem is essentially a multi-criteria decision problem, and can be addressed using the location analysis techniques that have been used in other domains in the past. Meanwhile, what make this context somewhat unique are the decision criteria and the rather subjective nature of the decision process. This paper provides a simple decision model for the problem, and illustrates the model with a case where relevant decision criteria are identified and the solution is obtained using a mix of objective and subjective decision techniques. We believe the paper is valuable because it presents an actionable methodology for practitioners involved in BCP. <br>


2021 ◽  
Author(s):  
C Pallavi ◽  
Girija R ◽  
Vedhapriyavadhana R ◽  
Barnali Dey ◽  
Rajiv Vincent

Online financial transactions play a crucial role in today’s economy. It becomes an unavoidable part of the business and global activities. Transaction fraud executes thoughtful intimidations to e-commerce spending. Now-a-days, the online contract or business is fetching additional sound by knowing the types of online transaction frauds associated with, these are raising which disturbs the currency accompanying business. It has the capability to confine and encumber the contract accomplished by the intruder from an honest consumer’s credit card information. In order to avoid such a problem, the proposed system is established transaction limit for the customers. Efficient data is only considered for detecting fraudulent user action and it happens only at the time of registration. Transaction which is happening for any individual is not at all known to any FDS (Fraud Detection System) consecutively at the bank which mainly issues credit cards to customers. To speak out this problem, BLA (Behaviour and Location Analysis) is executed. The FDS tracks at a credit card provided by bank. All the inbound business is directed to the FDS aimed at confirmation, authentication and verification. FDS catches the card particulars and matter to confirm that the operation is fake or genuine. The pick-up merchandises are unknown to Fraud Detection System. If the transaction is assumed to be fraud, then the corresponding bank declines it. In order to verify the individuality, uniqueness or originality, it uses spending patterns and geographical area. In case, if any suspicious pattern is identified or detected, the FDS system needs verification. The information which is already registered by the user, the system identifies infrequent outlines in the disbursement method. After three invalid attempts, the system will hinder the user. In this proposed system, most of the algorithms are checked and investigated for online financial fraud detection techniques.


Sign in / Sign up

Export Citation Format

Share Document