The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, BBS (Bulletin Board System) has been used widely as online space to exchange information. It has a lot of useful information including users' real voice such as review of new product, event information, and so on. However, sufficiently efficient functions for information search are not yet available to everyday users. BBS articles posted by general public have a lot of colloquial expressions...
This paper addresses a search problem of inputs to target outputs on qualitative and quantitative hybrid simulation. The hybrid simulation can simulate qualitative factors in business quantitatively using Monte Carlo simulation that executes simulations repeatedly using random numbers. Because of using not equation but random numbers, it is difficult to search inputs deriving target outputs that a...
A build-to-order (BTO) manufacturing system is excellent for enabling short delivery time with product variety; however, it is difficult to control inventory, and an unbalance of parts consumption causes the problems of stock-out or surplus parts. This study focuses on a stock reduction method for BTO products to flow surplus parts out to the market using sale by recommendation. The method is based...
This paper addresses a new approach to find business risk factors based on business scenarios derived from qualitative-quantitative hybrid simulation. To investigate business risk factors under uncertain business environment, cause-effect interpretation of business factors along with time is significant for decision-makers. Business factors are represented either qualitatively or quantitatively. Our...
Through the analysis of Rayleigh model, an explanation model on the quality effect of peer reviews is constructed. The review activities are evaluated by the defect removal rate at each phase. We made Hypotheses on how these measurements are related to the product quality. These Hypotheses are verified through regression analysis of actual project data and concrete calculation formulae are obtained...
We propose several pre-allocation size adjusting methods that can prevent the file fragmentation of files at arbitrary sizes depending on the growing file size. The proposed methods use small-size pre-allocation when the size of a growing file is relatively small and a large-size pre-allocation when the size of a growing file is large. We confirmed that the proposed methods effectively prevent not...
Information on the Internet has been increased extremely because of CGM (consumer generated media). However, such information sent by ordinary users is not managed systematically, so utilizing it is difficult especially for the beginners. To solve this issue, by identifying relationships between different information, a system should present related information for the users simultaneously. Although...
To build a cooperative logistics network covering multiple enterprises, a planning method that can build a long-distance transportation network is required. Many strict constraints are imposed on this type of problem. To solve these strict-constraint problems, a selfish-constraint-satisfaction type genetic algorithm (GA) is proposed. Moreover, a constraint pre-checking method is also applied. Our...
The use of the RFID tag in the entire supply chain including different organizations is reviewed. The problems of the RFID tag usage in supply chain involving various organizations are examined through field trial applications. Then, it concludes that the use of the secure RFID tag is effective to solve the problems, with the illustration of application examples.
We propose a simulation method on qualitative and quantitative hybrid model. In order to evaluate factors of a model with qualitative causal relations, we introduce a statistical approach based on propagation and combination of effects of factors by Monte Carlo simulation. In propagating an effect, we divide a range of a quantitative factor by landmarks and decide an effect to a destination node based...
Almost all companies are now utilizing computer networks to support a speedier and more effective in-house information-sharing and communication. However, existing systems are unable to support to enhance communications between users. Therefore, in our research, we implemented an in-house communication support system that integrates the "information propagation model" and "discussion...
We describe an optimal path design for a GMPLS network that uses the Lagrangian relaxation method, which can estimate the lower bounds of the solution to a problem. This feature helps the designer of the problem to take the accuracy of the solution obtained by the calculation into consideration when he makes a decision to assign the solution to a real network in critical situations. A formulation...
It is important to analyze existing products of competitors when a product planner develops new products. In this research, we proposed a method of extracting product trend keywords from press releases to support product strategy analysis. In order to extract keywords from press releases, we utilize expression phrases which are defined as description patterns. A description pattern enables extracting...
To verify business strategies, it is essential to extract and analyze business information. The amount of business information is so enormous that it is time-consuming for an analyst to extract and analyze. Thus, we propose a support tool for verifying business strategies using SWOT analysis. This tool supports the extraction of factors for analysis. However, the information includes unnecessary factors,...
This paper proposes a support system for analyzing answers to open-ended questions supplied by mobile game users as content replies when they unsubscribe the services. The answers include useful, unexpected opinions (atypical opinions) and expected opinions (typical opinions). It is inefficient to read them all during analysis. Therefore, we propose a support system for analysis of questionnaire data...
Service oriented architecture (SOA) is attended as a design framework for realizing rapid and low-cost system development, easily modified system, and total system quality. SOA is mainly applied to business information systems using Web services standards and technologies, and is rapidly becoming a standard approach for enterprise IT systems. In industrial systems, SOA has been successfully applied...
We propose an effective construction technology of the beef traceability system that conforms to the law relating to special BSE countermeasures to trace, track and indicate the history of beef products. This system makes it possible to share background information on beef between enterprises from producers to retailers by using Web EDI technology. The beef traceability system was implemented in September...
In distributed industrial control systems, functions of control units differ slightly although they seem to be identical. Functions change when hardware is replaced or when the function itself is upgraded. If the standard system is generated by merging the differences and is installed then to each control unit, control units become different with maintenance being carried out in each control unit...
The target of this research is a job shop problem with group constraints where jobs are grouped and processed together. This problem is evaluated using the average manufacturing time needed for the completion of all jobs, the number of group changes, and the number of line rests. It is a large-scale combinatorial problem where about 2000 jobs are processed. Our research group has proposed a scheduling...
Many kinds of devices are now installed in train cars. The bandwidths on train networks are also becoming very large and computerized systems are able to dynamically adjust themselves to changes in the cars' structure. We propose a new software framework for management machines used in trains that improves flexibility, scalability and productivity. It features two hierarchical layers in which the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.