首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 983 毫秒
1.
Jing Chen  Hui ZhangYing Sun 《Omega》2012,40(5):571-583
We examine a manufacturer's pricing strategies in a dual-channel supply chain, in which the manufacturer is a Stackelberg leader and the retailer is a follower. We show the conditions under which the manufacturer and the retailer both prefer a dual-channel supply chain. We examine the coordination schemes for a dual-channel supply chain and find that a manufacturer's contract with a wholesale price and a price for the direct channel can coordinate the dual-channel supply channel, benefiting the retailer but not the manufacturer. We illustrate how such a contract with a complementary agreement, such as a two-part tariff or a profit-sharing agreement, can coordinate the dual-channel supply chain and enable both the manufacturer and the retailer to be a win-win.  相似文献   

2.
3.
The author demonstrates basing on a case study, that the development of a consultation system is a process that requires time and patience of everyone involved. Not a fast decided definition of a consultation method with the corresponding setting is the first step but a clarification of the request. That is what the author is pleading for a phase of detailed analysis with the potential client.  相似文献   

4.
Siegrist M  Keller C 《Risk analysis》2011,31(11):1762-1769
Currently, there is no mandatory labeling for products containing synthetic nanoparticles. The public as well as other stakeholders have positive views about mandatory labeling. However, little is known how such a label influences the risk and benefit perception of a product. Consumers may infer that a label is a signal that there are risks associated with this technology. Data were collected in a survey experiment (N= 1,382). Participants were randomly assigned to one of six conditions. The control group received a picture of a sunscreen container without a label. One experimental group received a picture of a sunscreen container with a label. The other groups received, in addition to the sunscreen container with a label, some risk or benefit information. Results suggest that labeling of products may reduce consumers' benefit perception and increase risk perception. Labeling nanotechnology consumer products may change the public perception of the products. Respondents may have relied on the affect heuristic for assessing the risks and benefits of the sunscreen.  相似文献   

5.
生产函数与成本函数的关系研究   总被引:6,自引:1,他引:6  
本文给出了生产函数与成本函数之间的一般关系,并证明齐次生产函数与齐次成本函数之间存在着一种齐次对应关系:齐次生产函数在厂商的成本最小化决策下必然产生齐次的成本函数且齐次成本函数必然产生对应于齐次的生产函数。  相似文献   

6.
Most models of investor behavior assume a time-state independent utility function and result in a deterministic solution where a given set of inputs uniquely specifies the decision. In contrast, a state preference model using a time-state dependent utility function is derived in this paper. The model allows the investment choice decision to be analyzed in a game theoretic context. The general solution is a mixed strategy which allows for a probabilistic interpretation of the decision. The approach presented in this paper can accommodate anomalies such as intransitivity of preference and satisficing as rational behavior. An example of a possible implementation is given along with interpretations of the outcomes.  相似文献   

7.
Every adult can eliminate the risk of losing control of personal health decisions and financial resources by having a last will and testament, health proxy, power of attorney, and living trust. Yet evidence suggests that less than a majority of adult Americans have these documents. We surveyed 900 adult Americans (25 plus years old) to determine what factors predict the possession of these risk-reducing documents. In total, 46% had a living will and testament, 32% a durable power of attorney, 30% a health proxy, and 18% a living trust. Events that prompt people with wealth to secure these documents, such as increasing age, getting married, having children, and experiencing a life-threatening event were the strongest predictors of having a will. These were also among the strongest predictors of having a health proxy, along with a personal history of being proactive, and a family history that fostered trust of attorneys. Affluence, age, and education were the strongest predictors of having a living trust, and the strongest correlate of having a durable power of attorney was having faced a life-threatening event, positive experiences with attorneys, and higher educational achievement.  相似文献   

8.
This paper describes a global job shop scheduling procedure that uses a genetic algorithm to find a good schedule. Unlike previously considered algorithms, this procedure has been implemented in the scheduling system for a manufacturing facility and has led to improved scheduling. This facility is a semiconductor test area. The test area is a job shop and has sequence-dependent setup times at some operations. The concern of management is to meet their customer due dates and to increase throughput. This requires the coordination of many resources, a task beyond the ability of simple dispatching rules. We discuss a centralized procedure that can find a good schedule through the use of a detailed scheduling model and a genetic algorithm that searches over combinations of dispatching rules. We discuss our effort in developing a system that models the shop, creates schedules for the test area personnel, and makes a number of contributions to test area management.  相似文献   

9.
A dominating set of a graph is a set of vertices such that every vertex not in the set is adjacent to a vertex in the set, while a paired-dominating set of a graph is a set of vertices such that every vertex is adjacent to a vertex in the set and the subgraph induced by the set contains a perfect matching. In this paper, we provide a constructive characterization of graphs whose vertex set can be partitioned into a dominating set and a paired-dominating set.  相似文献   

10.
《Long Range Planning》2023,56(1):102249
How a successful business model (BM) is designed is a key question in the business model innovation (BMI) literature. Delving on the shared concept of BM as a configuration of components and interdependencies, we take a cognitive perspective to study the conceptual combination as a central process in BMI. We investigate the complexity of conceiving a new BM configuration, through a longitudinal study of the emergence of “The Huffington Post” which combined newspaper and blog in a disruptive and successful BM. With our research we theoretically frame the dynamic interplay between the three cognitive mechanisms of conceptual combination and the system of interdependent components of an emerging BM. Our findings unveil how the overall process unfolds and specifically delves into the dynamic iteration of composing and experimenting with the new configuration until the overall coherence is reached. Hence, we advance the literature by showing how the conceptual combination of a new BM is a complex effort and comprises some iterative cycles, vital to reach a coherent configuration which could secure a superior performance.  相似文献   

11.
Moshe Friedman 《Omega》1975,3(6):751-755
The objective of this article is to give a concise report on a project to achieve an optimal operation of a public transportation network by the application of modern mathematical programming methods and computing techniques. The paper delineates the formulation of a mathematical model of a general public transportation network, and sketches a procedure to determine the buses' departure times so as to optimize a desired performance index; specifically, the average waiting time of passengers.  相似文献   

12.
The author describes a position of a supervisor in a clinical institution, which he would have rejected some years ago??to adopt a management role as supervisor and to act mainly in the role of a supervisor. But the recent experiences have shown, that this may be possible and successful. This is illustrated by a case study.  相似文献   

13.
The no-wait job shop problem (NWJS-R) considered here is a version of the job shop scheduling problem where, for any two operations of a job, a fixed time lag between their starting times is prescribed. Also, sequence-dependent set-up times between consecutive operations on a machine can be present. The problem consists in finding a schedule that minimizes a general regular objective function. We study the so-called optimal job insertion problem in the NWJS-R and prove that this problem is solvable in polynomial time by a very efficient algorithm, generalizing a result we obtained in the case of a makespan objective. We then propose a large neighborhood local search method for the NWJS-R based on the optimal job insertion algorithm and present extensive numerical results that compare favorably with current benchmarks when available.  相似文献   

14.
To protect sensitive information in a cross tabulated table, it is acommon practice to suppress some of the cells. A linear combination of thesuppressed cells is called a linear invariant if it has a unique feasible value.Intuitively, the information contained in a linear invariant is not protectedbecause its value can be uniquely determined. Using a decomposition approach,this paper establishes a fundamental correspondence between linear invariantsof a table and edge cuts of a graph induced from the table. Thiscorrespondence is employed to give a linear-time algorithm for finding animportant class of linear invariants called therow or column linear invariants. In subsequent papers, thiscorrespondence is used to solve via graph theoretic techniques a wide varietyof problems for protecting information in a table.  相似文献   

15.
The purpose of this paper is to establish a framework for assessing the progress and outcome of a manufacturer’s transformation towards becoming a provider of ‘advanced services’ – a complex bundling of products and services, whereby manufacturers offer capabilities and outcomes instead of products alone. ‘Advanced services’ represent the most complex offering in the current servitization trend amongst manufacturers. However, current performance measures lack the breadth and focus to assess progress or outcomes, and so support research and practice of organisational transformation efforts required. To address this gap the paper investigates how a manufacturer’s efforts to become an ‘advanced services’ provider can be comprehensively measured, and develops a framework for assessing the transformation journey towards becoming an ‘advanced services’ provider. The research method is based on (1) a systematic literature review process to create a comprehensive set of service-related performance measures that are available to assess a manufacturer’s servitization efforts, followed by (2) an engagement with an expert panel to synthesise the identified measures and create a set of ‘advanced services’ performance measures. The proposed framework is presented as a scorecard that can be used in practice to assess the progress and outcome of a manufacturer’s transformation towards becoming a provider of ‘advanced services’.  相似文献   

16.
基于内容分析法的电子商务模式分类研究   总被引:1,自引:0,他引:1  
随着全球电子商务的蓬勃发展,商务模式作为描述企业如何创造价值的概念成为一个热门研究领域。然而,在电子商务模式分类这一基本问题上还未形成共识,人们依据不同分类标准建立了不同的电子商务模式分类框架。本研究对CNKI中文期刊全文数据库中篇名或摘要包含电子商务模式的文献中的商务模式分类标准及类别进行内容分析,结果表明出现频次较高的分类标准依次为交易主体、交互模式和价值链整合、价值链中的位置和盈利方式、市场主导力量和新旧经济5种,并且交互模式和价值链整合、新旧经济以及价值链中的位置和盈利方式这3种标准随时间推移所占比例逐渐上升,表明主流分类标准越来越关注于价值的创造方式和创造过程,这一趋势与电子商务模式定义所揭示的价值创造本质及其发展趋势是一致的。同时,分类体系的多样性也影响了人们对电子商务模式的理解和沟通,未来研究需要提出基于价值主张的更为通用和全面的分类体系来指导商务模式创新实践。  相似文献   

17.
Risk Analysis of Terrorist Attacks   总被引:1,自引:0,他引:1  
A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed-site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based on event tree models of the site/security configuration. This calculation incorporates a realistic engagement model (in the event a guard force engages the terrorists prior to completion of their objective) and information on barrier penetration times (for example, distribution of the time to defeat a chain link fence or vault door, traverse an open area, and so forth). Two security analyses are described to illustrate the methodology. One example considers a terrorist attack on a convoy transporting a missile from a storage to a launch facility. The second example involves an attack on a munitions storage facility.  相似文献   

18.
This paper investigates inventory‐rationing policies of interest to firms operating in a direct market channel. We model a single product with two demand classes, where one class requests a lower order fulfillment lead time but pays a higher price. Demand for each class follows a Poisson process. Inventory is fed by a production system with exponentially distributed build times. We study rationing policies in which the firm either blocks or backlogs orders for the lower priority customers when inventory drops below a certain level. We compare the performance of these rationing policies with a pure first‐come, first‐serve policy under various scenarios for customer response to delay: lost sales, backlog, and a combination of lost sales and backlog.  相似文献   

19.
The climacteric period — a time of professional change. Career coaching with a 50 years old womanThe climacteric period are valid as a time of great changes and often also represent a neworientation in professional life. In a career coaching with a 50 year old teacher and therapist, it was a question of a professional decision-making: returning in the teacher profession or developing her therapeutic career. In the course of common work and a created future-panorama her following professional way was more visible, which also considered her age and her reducing capability.  相似文献   

20.
The single machine scheduling with resource constraint is a nonlinear combinatorial optimization problem in cloud computing applications. Given a set of jobs and certain resource, the problem is to find a permutation of jobs and a distribution of resource to optimize certain objective function. The processing time of each job is a nonlinear function with respect to the resource assigned to it. In this paper, we propose a naive algorithm and study a subproblem in the algorithm that suppose the permutation of jobs is also given, how to find a resource distribution to minimize the total weighted flow time. We found a polynomial-time optimal solution for a special case and an approximation solution in general case.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号