• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 591
  • 37
  • 37
  • 33
  • 9
  • 8
  • 8
  • 5
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 794
  • 794
  • 309
  • 137
  • 134
  • 131
  • 111
  • 109
  • 91
  • 88
  • 72
  • 67
  • 67
  • 66
  • 66
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

Finished good sourcing decisions in the apparel industry after implementation of the Agreement on Textiles and Clothing

Glenn, Ann Richards, January 2006 (has links)
Thesis (Ph. D.)--Ohio State University, 2006. / Title from first page of PDF file. Includes bibliographical references (p. 117-125).
362

The effects of information sharing, organizational capability and relationship characteristics on outsourcing performance in the supply chain an empirical study /

Lewis, Angela (Tidwell). January 2006 (has links)
Thesis (Ph. D.)--Ohio State University, 2006. / Title from first page of PDF file. Includes bibliographical references (p. 113-123).
363

A customer responsive model for managing the clothing industry supply chain in China's Pearl River Delta

Yeung, Ho-wah, Alice. January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
364

Contributions in supply chain risk assessment and mitigation

Zhang, Yu 09 January 2013 (has links)
This dissertation develops contributions in the area of supply chain risk assessment and mitigation. In each of the three main chapters, we present and analyze a risk assessment or mitigation problem for supply chains. The first problem is to assess the impact of infrastructure disruptions on supply chain performance; the second problem is to develop an operational control approach to mitigate risks posed by uncertain events that disrupt network synchronization; and the third problem is to analyze the risk posed by an adversary seeking to use a supply chain as a weapon. Chapter II presents a methodology for assessing the excess supply chain costs that arise from a failure of or an attack on a critical supply chain infrastructure component. Different from many subjective risk assessment practices, our methodology provides a systematic approach to search for the most vulnerable supply chain components and measure the economic consequences of disruption. Modeling a supply chain using network flow models, we analyze the impact of disruption by linear programming theory, and propose an efficient assessment algorithm based on the dual network simplex method. Finally, a case study on the U.S. corn export supply chain is presented. Chapter III discusses the mitigation of risks created by transit time uncertainties in less-than-truckload (LTL) line-haul operations. Transit time uncertainty may undermine the performance of the load plan, which specifies the route for each shipment and is synchronized to reduce line-haul costs. In our study, risk assessment of a load plan is performed via a dispatch simulation under randomly generated travel time scenarios. The risk consequence is measured by the average excess operational cost, including transportation cost and handling cost. Compared to existing line-haul network models embedded within integer programming approaches for load plan optimization, the dispatch simulation can evaluate the performance of a load plan more realistically. In addition, a heuristic search algorithm based on "multi-tree pivots" is provided to obtain a cost-efficient load plan that is robust to transit time uncertainties. Chapter IV presents methodology to assess the consequence of risks which arise from the intentional contamination of a food supply chain. Different from many risk management practices, the source of risk in this problem is an intelligent adversary, e.g., a terrorist group, who intends to deliver chemical or biological toxins to consumers using the supply chain. First, a general modeling scheme based on state-space models is provided to describe the dissemination of toxin across consumed products in a food supply chain. Then, a case study based on a representative liquid egg supply chain is presented. Based on the system model, a risk assessment for different supply chain designs is performed by simulation. Moreover, an in-depth analysis is conducted to determine the worst-case consequence given an intelligent attack considering the operational characteristics of the system. The worst-case consequence tool developed is designed to be embedded within any risk assessment approach.
365

Evaluation of Supply Chain Strategies for Mass Customization

Su, Jack C. P. 12 July 2004 (has links)
Product proliferation is a common challenge for firms providing customized products. To cope with this challenge, firms usually incorporate strategies such as component commonality, postponement, and/or delayed differentiation in their supply chains. In this dissertation, we study the effectiveness of these strategies. First, we evaluate the inventory costs for various percentages of common component substitution. Second, we analyze the performance of two postponement strategies and their relationship with product proliferation. Third, we study the cost and benefits of implementing delayed differentiation in a make-to-order environment and provide insights for managers choosing where along the supply chain they should differentiate their products.
366

Constraint-based supply chain inventory deployment strategies

Stremler, David Jay. January 2001 (has links)
Thesis (M.S.)--Mississippi State University. Department of Industrial Engineering. / Title from title screen. Includes bibliographical references.
367

An integrated algorithm for distributed optimization in networked systems

Lu, Yapeng. January 2009 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2010. / Includes bibliographical references (leaves 93-103). Also available in print.
368

Mathematical models for minimizing customer response time in two echelon supply chain systems /

Lodree, Emmett January 2001 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 2001. / Typescript. Vita. Includes bibliographical references (leaves 296-306). Also available on the Internet.
369

Analysis of vendor managed consignment inventory systems

Ramrakhyani, Ravi Kumar. January 2009 (has links)
Thesis (M.S.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Systems Science and Industrial Enngineering, 2009. / Includes bibliographical references.
370

Dynamic admission and dispatching control of stochastic distribution systems /

Chen, Hairong. January 2003 (has links)
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003. / Includes bibliographical references (leaves 117-130). Also available in electronic version. Access restricted to campus users.

Page generated in 0.089 seconds