You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Second International Workshop on Data Engineering Issues in E-Commerce and Services, DEECS 2006 held in San Francisco, California, June 2006. The book presents 15 revised full papers and 8 revised short papers organized in topical sections on e-commerce services, business processes and services, data and knowledge engineering, business models and analysis, Web services, and e-commerce systems.
A business organization, like a human body, is only as effective as its various processes. Pretty obvious, right? Yet, as V. Daniel Hunt demonstrates in this groundbreaking book, the failure to appreciate this obvious fact is the reason most reengineering schemes fail. Managers whose job it is to improve company performance, like physicians who work to improve patient health, must develop a clear picture of how each process fits into the overall organizational structure; how it ought to function; and how well it is performing at any given moment; before they can form a diagnosis or devise a treatment strategy. Fortunately, a powerful new analytical tool that has emerged in recent years helps...
Computer simulation can save time, resources, money and risk in manufacturing. The focus of this manual and CD-ROM is to assist individuals in organisations who need to apply simulation to projects before committing resources and time.
A roadmap to consistent, high-quality service for anyorganization A service is typically something created to serve a payingcustomer, whether internal or external. Some services consist ofseveral processes linked together while others consist of a singleprocess. This book introduces Design for Six Sigma (DFSS), aneasy-to-master, yet highly effective data-driven method thatprevents defects in any type of service process. The particularfocus of this publication is service DFSS, which leads to what theauthors term "a whole quality business," one that takes a proactivestance and gets things right the first time. Not only does thewhole quality business produce a high-quality product and offerhigh...
Simulation and molding are efficient techniques that can aid the city and regional planners and engineers in optimizing the operation of urban systems such as traffic light control, highway toll automation, consensus building, public safety, and environmental protection. When modeling transportation systems such as freeway systems, arterial or downtown grid systems, the city planner and engineer is concerned with capturing the varied interactions between drivers, automobiles, and the infrastructure. Modeling and simulation are used to effectively optimize the design and operation of all of these urban systems. It is possible that in an urban simulation community workshop, citizens can work i...
Over the period of last two decades, there has been significant resurgence in solid-state fermentation due to the numerous benefits it offers, especially in the engineering and environmental aspects. SSF has shown much promise in the development of several bioprocesses and products. This resurgence gained further momentum during the last 5-6 years with the developments in fundamental and applied aspects. A good deal of information has been generated in published literature and patented information. Several commercial ventures have come up based on SSF in different parts of the world. The contents are organized into four parts: Part 1 deals with the General and Fundamentals aspects of SSF; Part 2 deals with the production of bulk chemicals and products such as enzymes, organic acids, spores and mushrooms in SSF; Part 3 is on the use of SSF for specialty chemicals such as gibberellic acid, antibiotics and other pharmaceutically valuable secondary metabolites, pigments, and aroma compounds; Part 4 deals with the use of SSF miscellaneous application such as SSF for food and feed applications, agro-industrial residues as substrates in SSF and the production of silage and vermicompost.
Waste-eliminating, performance-improvement weapons Discover the best ways to overcome todayÆs most stubborn business issues: waste of resources, personnel, and opportunity. Performance Improvement Methods, by H. James Harrington and Kenneth C. Lomax, details the 85 most effective performance-enhancing weapons you can use to get the most from the least, and get the jump on your competitors. You'll learn about activity-based costing...design of experiments...failure mode and effect analysis...matrix data analysis...process benchmarking, redesign,and reengineering...QFD...simulation modeling...the six-sigma system...value-added analysis...and all the other strategies performance experts have identified as the best ways to promote efficiency and productivity, and maximize opportunities in every arena. This book/CD-ROM package gives you ready-to-download sample forms, agreements and analyses, plus exercises, games,definitions, case histories and more that help you put these creative and efficient tools to work.
Supply chain security encompasses measures preventing theft, smuggling, and sabotage through heightened awareness, enhanced visibility, and increased transparency. This necessitates the adoption of a security-by-design paradigm to achieve effective and efficient security measures, yielding additional benefits such as diminished supply chain costs. Given their vulnerability, transportation and logistics service providers play a pivotal role in supply chain security. This thesis leverages systems security engineering and security-by-design to provide a methodology for designing and evaluating security measures for physical transport goods. It formulates nine principles that define security-by-design and establishes a supply chain security framework. An adaptation of the TOGAF architecture development facilitates the creation of secure-by-design enterprise architectures. Security measures are documented using security-enhanced processes based on BPMN. This enables an analysis and compliance assessment to ascertain the alignment of security with business objectives and the adequate implementation of requirements. The culmination of these efforts is exemplified through a case study.