期刊文献+
共找到82篇文章
< 1 2 5 >
每页显示 20 50 100
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
1
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
2
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
3
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
4
作者 Atif Ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
5
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
On Incentive and Coordination Mechanism of Service Outsourcing Based on Principal-Agent Theory and Blockchain Technology
6
作者 Chenglong Yan Xiao Wang +1 位作者 Xiaonan Zhang Ruzhi Xu 《Journal of Artificial Intelligence and Technology》 2023年第1期1-9,共9页
To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-... To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-agent framework,examines the dynamic game situation before the contract being signed,and develops four information models.The analysis reveals a Pareto improvement in the game’s Nash equilibrium when comparing the four models from the standpoint of the supply chain.In the complete information scenario,the service level of the service provider,the customer company’s incentive effectiveness,and the supply chain system’s ultimate profit are all maximized.Furthermore,a coordinating mechanism for disposable profit is built in this study.The paper then suggests a blockchain-based architecture for the service outsourcing process supervision and a distributed incentive mechanism under the coordination mechanism in response to the inadequacy of the principal-agent theory to address the information asymmetry problem and the moral hazard problem.The experiment’s end findings demonstrate that both parties can benefit from the coordination mechanism,and the application of blockchain technology can resolve these issues and effectively encourage service providers. 展开更多
关键词 service outsourcing coordination mechanism distributed incentive mechanism blockchain
下载PDF
Can harvest outsourcing services reduce field harvest losses of rice in China? 被引量:4
7
作者 QU Xue Daizo KOJIMA +2 位作者 Yukinaga NISHIHARA WU La-ping Mitsuyoshi ANDO 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第5期1396-1406,共11页
The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and ... The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting. 展开更多
关键词 rice harvest outsourcing service combine harvesting harvest loss RICE
下载PDF
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing 被引量:2
8
作者 Zhen Yang Yongfeng Huang +1 位作者 Xing Li Wenyu Wang 《Computers, Materials & Continua》 SCIE EI 2018年第7期1-17,共17页
To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on... To cope with privacy leakage caused by multimedia outsourcing and sharing,data provenance is used to analyze leaked multimedia and provide reactive accountability.Existing schemes of multimedia provenance are based on watermarking protocols.In an outsourcing scenario,existing schemes face two severe challenges:1)when data leakage occurs,there exists a probability that data provenance results can be repudiated,in which case data provenance tracking fails;and 2)when outsourced data are shared,data encryption transfer causes key management burden outside the schemes,and privacy leakage threatens users.In this paper,we propose a novel data provenance scheme with an improved LUT-based fingerprinting protocol,which integrates an asymmetric watermarking protocol,robust watermark algorithm and homomorphic encryption and digital signatures to achieve full non-repudiation provenance.We build an in-scheme stream cipher to protect outsourced multimedia data from privacy leakage and complicated key management.Our scheme is also lightweight and easy to deploy.Extensive security and performance analysis compares our scheme with the state of the art.The results show that our scheme has not only better provenance security and data confidentiality but also higher efficiency for multimedia outsourcing,sharing and provenance. 展开更多
关键词 Data provenance asymmetric fingerprint protocol digital watermarking multimedia outsourcing
下载PDF
Service outsourcing:A new way to shrink regional gaps 被引量:2
9
作者 刘志彪 《China Economist》 2009年第6期42-48,共7页
International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path... International outsourcing is an important way to realize intra-product division of labor. China's industrial upgrade and policy efforts directed at outsourcing are not entirely endogenous but have a dependent path prone to be captured and locked at the low end of the global value chain by developed countries at the chain's high end. In light of the stage and reality of China's economic development, we should not only upgrade manufacturing outsourcing but also grasp service outsourcing opportunities. We should implement a strategy of coordinated development of manufacturing and service outsourcing rather than hastily transforming China from a "factory of the world" into an "office of the world." Balancing services with manufacturing and linking the global value chain with the domestic value chain is the best tool to address the problem of China's uneven regional development and establish a multi-tiered modern industrial system. 展开更多
关键词 service outsourcing MANUFACTURING outsourcing INDUSTRIAL UPGRADE China’s ECONOMY
下载PDF
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
10
作者 Linjie Wang Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2022年第5期644-653,共10页
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving the speed of common connected objects in IoT.However,although it makes it easier for ubiquitous resource-constrained equipment that outsources computing tasks to achieve high-speed transmission services,security concerns,such as a lack of reliability and collusion attacks,still exist in the outsourcing computation.In this paper,we propose a reliable,anti-collusion outsourcing computation and verification protocol,which uses distributed storage solutions in response to the issue of centralized storage,leverages homomorphic encryption to deal with outsourcing computation and ensures data privacy.Moreover,we embed outsourcing computation results and a novel polynomial factorization algorithm into the smart contract of Ethereum,which not only enables the verification of the outsourcing result without a trusted third party but also resists collusion attacks.The results of the theoretical analysis and experimental performance evaluation demonstrate that the proposed protocol is secure,reliable,and more effective compared with state-of-the-art approaches. 展开更多
关键词 outsourcing computation Ethereum Smart contract Public verification Homomorphic encryption
下载PDF
A potential game-based outsourcing computation framework for multiple calculators
11
作者 Duo Zhang Youliang Tian Linjie Wang 《Digital Communications and Networks》 SCIE CSCD 2022年第5期654-663,共10页
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server.The traditional outsourcing computation model forbids communication be... Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server.The traditional outsourcing computation model forbids communication between players,but it has little effect.Based on the game theory,this paper establishes an outsourcing computation model which is more in line with the actual scene.Firstly,we construct a structural mapping relationship between security outsourcing computation and the optimization problem.Secondly,by designing the individual potential function and the global potential function,the individual goal is consistent with the global goal to ensure the correctness of the calculation results.Finally,in the information exchange environment between calculators,we construct a Zero-determinant strategy to ensure that the calculator chooses the strategy according to the predetermined target. 展开更多
关键词 outsourcing computation Game theory Potential function Zero-determinant strategy Information exchange
下载PDF
Scheduling and Outsourcing with Multiple Customers
12
作者 冯艳玲 张玉忠 贾国柱 《Chinese Quarterly Journal of Mathematics》 2015年第3期330-338,共9页
In this paper, we study a new scheduling and outsourcing model with multiple customers in which jobs can be processed by either in-house machine or outsourcing machine.All processed jobs have to be delivered in batche... In this paper, we study a new scheduling and outsourcing model with multiple customers in which jobs can be processed by either in-house machine or outsourcing machine.All processed jobs have to be delivered in batches to their respective customers and each shipment incurs a delivery cost as well as a fixed amount of time. We discuss three commonly used objective functions, analyze their complexity and solve them by dynamic programming algorithms. 展开更多
关键词 SCHEDULING outsourcing DYNAMIC PROGRAMMING MULTIPLE CUSTOMERS
下载PDF
Management and Control of Outsourcing in Dispersed Network Manufacturing Systems
13
作者 Rob Dekkers Luping Wang 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期249-,共1页
The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at t... The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems. 展开更多
关键词 Management and Control of outsourcing in Dispersed Network Manufacturing SYSTEMS
下载PDF
Why Your IT Outsourcing RFP Is Holding You Back
14
《机械设计与制造工程》 2012年第06X期56-56,共1页
If you’re looking for transformation or innovation from an outsourcing engagement, you might want to ditch the traditional request-for-proposal (RFP) process. That’s right—that decades-old, time-tested process used... If you’re looking for transformation or innovation from an outsourcing engagement, you might want to ditch the traditional request-for-proposal (RFP) process. That’s right—that decades-old, time-tested process used to gather bids from potential providers may be doing your IT outsourcing relationships a disservice, according to Tom Young, partner with outsourcing consultancy ISG. "RFPs by their very nature 展开更多
关键词 outsourcing outsourcing engagement REQUEST looking doing PARTNER gather CUSTOMERS proposal
下载PDF
The Present Situation of IT Outsourcing and Countermeasure
15
作者 Xinyuan Xi Yingyu Xu Hiroyushi Todo 《Journal of Software Engineering and Applications》 2013年第8期426-430,共5页
With the market competition intensifies, enterprises focusing on core business has become the most important rules of survival. Therefore, more and more enterprises adopt outsourcing as critical business initiatives d... With the market competition intensifies, enterprises focusing on core business has become the most important rules of survival. Therefore, more and more enterprises adopt outsourcing as critical business initiatives due to its effectively reduce costs, enhancing the core competitiveness of enterprises and other characteristics. Duroc, a famous American management scholars had predicted: “In ten to fifteen years within any business background to support not only to do the work of creating turnover should be outsourced.” Do what you do best (your core competency) and outsource the rest. It has become an irreversible trend. In this paper, we will introduce the business value of IT outsourcing, discuss IT outsourcing industry’s strengths and weaknesses, finally we will provide corresponding countermeasures based on the discussion. 展开更多
关键词 outsourcing IT MANAGEMENT COUNTERMEASURE
下载PDF
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing
16
作者 Leqi Jiang Zhangjie Fu 《Journal of Cyber Security》 2020年第1期49-61,共13页
Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA ... Genetic Algorithm(GA)has been widely used to solve various optimization problems.As the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the cloud server.However,the algorithm user would never want his data to be disclosed to cloud server.Thus,it is necessary for the user to encrypt the data before transmitting them to the server.But the user will encounter a new problem.The arithmetic operations we are familiar with cannot work directly in the ciphertext domain.In this paper,a privacy-preserving outsourced genetic algorithm is proposed.The user’s data are protected by homomorphic encryption algorithm which can support the operations in the encrypted domain.GA is elaborately adapted to search the optimal result over the encrypted data.The security analysis and experiment results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 Homomorphic encryption genetic algorithm outsourcing cloud computing
下载PDF
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits
17
作者 Fei Chen Yiliang Han +2 位作者 Di Jiang Xiaoce Li Xiaoyuan Yang 《国际计算机前沿大会会议论文集》 2016年第1期136-138,共3页
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computa... In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy attribute-based signcryption scheme which has less computation costs than existing similar schemes by utilizing secure outsourcing of scientific computation in cloud computing and eliminates overhead for users, the ciphertext is short, compact, the correctness of transformation algorithm is verifiable. The decrease of ciphertext is 17 %. Additionally, new scheme remits the key escrow problem and is proven selective security in the standard model, it could be verified publicly, applied in mobile devices. 展开更多
关键词 Social computing Public key CRYPTOSYSTEM ATTRIBUTE-BASED SIGNCRYPTION Outsourced computation MULTILINEAR MAPS Selective security
下载PDF
Cooperation and Contract Design in Project Management with Outsourcing
18
作者 Xiaoqiang Cai Nicholas G.Hall +1 位作者 Siyi Wang Feng Zhang 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2023年第1期34-70,共37页
We study a project management problem where the prime contractor needs to outsource tasks to subcontractors with the required resources.Successful execution of the project requires proper coordination among the subcon... We study a project management problem where the prime contractor needs to outsource tasks to subcontractors with the required resources.Successful execution of the project requires proper coordination among the subcontractors,as well as contract design by the prime contractor to incentivize the subcontractors.By modeling the subcontractors’coordination problem as a cooperative game,we develop a profit sharing scheme to facilitate the subcontractors’cooperation.We consider two contract designs for the prime contractor:a uniform contract across all subcontractors,and a nonuniform one that customizes incentives for each subcontractor.We propose efficient algorithms to solve the implicit optimization problems for optimal contract parameters.Computational experiments show that the pooling effect of subcontractors’cooperation mitigates the negative impact of poor estimates about the crashing cost and resource availability.We observe three unexpected results through the randomized computation experiments:(i)the subcontractors’profits may decrease if they provide false information;(ii)it is safer for the prime contractor to overestimate subcontractors’crashing costs than underestimate them;and(iii)uniform contracts deliver more project profit for the subcontractors in the coalitions. 展开更多
关键词 Project management with outsourcing SUBCONTRACTING cooperative game contract design
原文传递
Can whole steps of grain production be outsourced? Empirical analysis based on the three provinces of Jiangsu,Jilin,and Sichuan in China
19
作者 Jiacheng Liu Shengzhi Mao +1 位作者 Qiufen Zheng Zhigang Xu 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期336-347,共12页
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs... Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology. 展开更多
关键词 outsourcing services economy of scale technical conditions market scale
下载PDF
TWO-STAGE PRODUCTION SCHEDULING WITH AN OPTION OF OUTSOURCING FROM A REMOTE SUPPLIER 被引量:15
20
作者 Xiangtong QI 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2009年第1期1-15,共15页
This paper studies a two-stage production system with n job orders where each job needs two sequential operations. In addition to the two in-house production facilities, the manufacturer has another option of outsourc... This paper studies a two-stage production system with n job orders where each job needs two sequential operations. In addition to the two in-house production facilities, the manufacturer has another option of outsourcing some stage-one operations to a remote outside supplier. The jobs with their stage-one operations outsourced are subject to a batch transportation delay from the outside supplier before their respective stage-two operations can be started in-house. The problem is to design an integrated schedule that considers both the in-house production and the outsourcing with the aim of optimally balancing the outsourcing cost and the makespan. The problem is NP-hard. We have developed an optimal algorithm and a heuristic algorithm to solve the problem, and conducted computational experiments to validate our model and algorithms. Our modeling and algorithm framework can be extended to handle other more general cases such as when the outside supplier has a production facility with a different processing efficiency and when there are many outside suppliers on a spot market. 展开更多
关键词 outsourcing SCHEDULING algorithms
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部