期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Applying IT to Avoid Bullwhip Effect of Supply Chain
1
作者 Zhiyuan Zhao 《Chinese Business Review》 2005年第4期66-67,73,共3页
Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Inf... Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain. 展开更多
关键词 bullwhip effect supply chain Electronic Data Interchange(EDI) Information Technology (IT)
下载PDF
Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology
2
作者 Muhammad Imran Ghafoor Awad Bin Naeem +5 位作者 Biswaranjan Senapati Md.Sakiul Islam Sudman Satyabrata Pradhan Debabrata Das Friban Almeida Hesham A.Sakr 《Intelligent Automation & Soft Computing》 2024年第5期783-803,共21页
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful... The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model. 展开更多
关键词 Vehicle-to-vehicle vehicle-to-infrastructure internet of things block chain technology
下载PDF
Analysis on the Management of Suppliers' Purchasing Partnership 被引量:2
3
作者 Zhenzhu Zhang 《Chinese Business Review》 2005年第6期59-63,共5页
This paper is about the study of purchasing cooperation with the supplier. It is through expanding some courses including demand analysis, choosing supplier, founding cooperation relationship formally and strengthenin... This paper is about the study of purchasing cooperation with the supplier. It is through expanding some courses including demand analysis, choosing supplier, founding cooperation relationship formally and strengthening the cooperation, as well as several key questions, such as sourcing strategy, to estimate and select the supplier, authentication management, and purchase of technology. 展开更多
关键词 supply chain sourcing strategy strategic partnership purchase technology
下载PDF
Research on Model of Virtual Organization and Its Practice
4
作者 Shengfu Liu Guoxin Liu Yurong Zeng 《Chinese Business Review》 2004年第1期24-28,共5页
This paper discusses an organizational model to be used for both conventional and virtual organizations. The model deals with variable relationships within an organization and provides a framework for overall organiza... This paper discusses an organizational model to be used for both conventional and virtual organizations. The model deals with variable relationships within an organization and provides a framework for overall organizational design that may include relationship among different design variables and external relationship with environment. Based on the researches of virtual organization, this paper also illustrates the new model of organization in the real world such as Beijing 2008 Olympic games and Dongfeng Automobile group. 展开更多
关键词 business process information technology organizational model value chain virtual organization
下载PDF
FULL TIME-SPACE GOVERNANCE STRATEGY AND TECHNOLOGY FOR CROPLAND NON-POINT POLLUTION CONTROL IN CHINA
5
作者 Lihong XUE Jingjing DUAN +5 位作者 Pengfu HOU Shiying HE Yingliang YU Yanfang FENG Fuxing LIU Linzhang YANG 《Frontiers of Agricultural Science and Engineering》 CSCD 2023年第4期593-606,共14页
Ensuring food safety while reducing agricultural non-point source pollution is quite challenging,especially in developing and underdeveloped countries.Effective systematic strategies and comprehensive technologies nee... Ensuring food safety while reducing agricultural non-point source pollution is quite challenging,especially in developing and underdeveloped countries.Effective systematic strategies and comprehensive technologies need to be developed for agricultural non-point source pollution control at the watershed scale to improve surface water quality.In this review,a proposal is made for a full time-space governance strategy that prioritizes source management followed by endpoint water pollution control.The 4R chain technology system is specifically reviewed,including source reduction,process retention,nutrient reuse and water restoration.The 4R chain technology system with the full time-space governance strategy was applied at the scale of an administrative village and proved to be a feasible solution for reducing agricultural non-point source pollution in China.In the future,a monitoring system needs to be established to trace N and P transport.Additionally,new smart fertilizer and intelligent equipment need to be developed,and relevant governance standards and supportive policies need to be set to enhance the efficacy of agricultural non-point source pollution control. 展开更多
关键词 4R chain technology system agricultural non-point source pollution case study full time-space governance strategy
原文传递
Expanding the scope of application of user innovation theorydA case study of the civil-military integration project in China 被引量:6
6
作者 Jhony Choon Yeong Ng Karen Kai Wen Song Qingmei Tan 《International Journal of Innovation Studies》 2018年第1期33-41,共9页
The focus of scholars studying user innovation has been restricted to the interaction between companies and individual users,and how companies can unilaterally exploit values from the value chain between companies and... The focus of scholars studying user innovation has been restricted to the interaction between companies and individual users,and how companies can unilaterally exploit values from the value chain between companies and users.We argue that the value chain between the user and manufacturer should be a bilateral value chain in which both the user and manufacturer can conduct their own innovations and provide greater value to the whole value chain.In this paper,using examples from China's civil-military integration project,we took a step forward to apply the user innovation theory in the explanation of inter-sector technological value transfer.The main theoretical contribution of this paper is the expansion of the scope of application of the user innovation theory to inter-sector level research.Studying cases from China's civil-military integration project,we found that the concepts of user and innovator become blurred when we study the phenomenon across time.When we go beyond individual user and manufacturer and shift the focus of our discussion to the level of inter-sector technological value transfer,we will find that it is possible for organizational agents at large to be both users and innovators of technology. 展开更多
关键词 User innovation Civil-military integration technological value chain Military sector Civil sector
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部