11 |
A case study of operational performance of a build-operate-transfer municipal waste incinerator in Luchao, Chiayi CountyChang, Ming-jer 03 September 2004 (has links)
Abstract
Over the last decade, business and industry in Taiwan have been growing rapidly, but increasing amount of the wastes has relatively been created by people for various reasons. Thus, with the rapid growth of the wastes and the snowballing difficulty of getting place for landfill, incineration without doubt has become the way that wears best to solve such annoyed problem. Furthermore, the issue of waste disposal is now the most important problem to cope with for our government.
Owing to the shortage of budget, our government allowed the private sectors to invest in the BOT projects of incinerator to meet and satisfy the growing needs of handling the increasing amount of garbage.
According to the result of our research, the BOT projects operated by private companies are very successful, and receive positive responses in terms of reducing the expenses and costs, compared to our government¡¦s factories. It would be a new direction or choice in waste disposal, and would be create much profit for people and government.
Keyword¡GBOT¡Boperate model¡Bperformance evaluation
|
12 |
The Performance Evaluation of the National Tax Administration in Taiwan¡XThe Research of Data Envelopment AnalysisWang, Tsung-Fu 27 July 2001 (has links)
Abstract
Performance is not only the common goal for enterprises to achieve but also the direction for governments to administer. So is it for the financial organization. In this study, we focus on the economic point of view, accompanied by resource management. We evaluate the performance of 81 branch offices in The National Tax Administration on the data concerning personnel affairs (2000y), expenditure (2000y), business (2000y), and tax revenues (1997-2000) by means of Farrell¡¦s evaluation theory and Data Envelopment Analysis.
Here are my conclusions:
1. Resource management
1.1 Overall efficiency in some of the offices is not good. That is because of the lacking of tax source, improper scale, and resource not appropriately allocated. Thus, input surplus and output shortage happen.
1.2 Inefficiency in the usage of resource is because the relative long-term optimal scale is too small, and the usage of resource is unable to reach Parto Optimality.
1.3 Inefficiency in the allocation of resource is because the internal management is not suitable, and the external environment and organization structure cause the problem.
2. Differences in efficiency
2.1 Offices of a large scale are more efficient than those of small ones.
2.2 Offices of large amount of work are more efficient than those of small ones.
2.3 Offices in northern area in Taiwan are more efficient than those in other areas.
2.4 Offices in Taipei City and Kaohsiung City are more efficient than those in other cities.
3. Applications for evaluation in this study
3.1 We have constructed a basic model for the financial authority to evaluate performance of the National Tax Administration and its branch offices.
3.2 The relative efficiency value we have in this study can help the branch offices realize their strength and weakness in their tax collection.
3.3 The relative efficiency value is able to provide the National Tax Administration as a reference to apportion the yearly tax revenue target and to adjust resource allocation efficiently among the branch offices.
|
13 |
On the Performance of Fast Context Switch for MinixARMLin, Cheng-chi 14 January 2009 (has links)
The methods of improving the cache performance are multiform and advanced of
nowadays. We are concerned about the cache and TLB utility. To reduce the context switch
cost on system, we utilize an address-space switching hardware of ARMS3C2410 processor
to realize the fast address switching mechanism. The Fast Context Switch can help to improve
cache and TLB utility and performance.
Fast Context Switch is a method that can help to improve the cache performance. The
key feature of Fast Context Switch is without any cache and TLB flush on process context
switching. To implement Fast Context Switch, we address the different processes to different
address space by process ID. When context switch occurs, we can just change the working
space without the cache and TLB flush.
This thesis emphasizes on the performance measure for improvement on the cache
and TLB. We use a high dependable microkernel architecture for message passing between
processes, this microkernel called MinixARM. Rely on the microkernel, we can more easily
understand and analyze the system performance and additional cost of the cache scheme. We
provide more complete performance tests by benchmarks, fast context switch can increase the
system performance about 65% at most.
|
14 |
An evaluation of the value of security in the international marine supply chainLoke, Wai Leng 05 1900 (has links)
Since the events of 9/11, there has been tremendous amount of renewed interests in the study of trade security. There has been an influx of security regulations and the private sector has been trying to keep pace in complying with them. However, due to the public externalities of security improvements and the lack of quantified and proven benefits, the private sector is struggling to establish business cases for their security initiatives.
There is very little quantitative research in this area. Using exploratory factor analysis (EFA) and structural equation modeling (SEM), this study serves to fill this gap by introducing a statistical way of analysing and understanding the complex relationships amongst security effort, its motivators and performance and traditional supply chain performance (SCP). This study also proposes an evaluation framework for security efforts.
EFA results show that security is a dimension of SCP. This means that organizations have all along been measuring an aspect of their operations that relates to security. As such, organizations should not perceive the current heightened interests in security as throwing them off-balance. In evaluating security efforts, organizations should select key performance indicators (KPIs) that represent each of the four areas of information, cargo, people and cost.
SEM results show that organizations undertake security efforts as a result of both perceived security benefits and perceived collateral benefits, with perceived security benefits carrying a greater weight in the decision-making process. Results also show that organizations are implementing security initiatives out-of-compliance i.e. implementing initiatives that they perceive as not having significant impacts on security and SCP.
In view of the positive relationships among perceived security impact, security effort and security performance, there is further imperative for an objective method for evaluating security efforts to prevent effort justification behaviour in determining the effectiveness of the same. Results also show that organizations perceive an improved performance in security leads to an overall improvement in SCP. However, as with other supply chain strategies, there are tradeoffs and not all aspects of SCP are impacted in the same way. Time, responsiveness and efficiency for instance are negatively impacted while reliability is positively impacted.
|
15 |
Advancing beyond regularity : developments in value for money methods at the national audit office 1984-1999Lonsdale, Jeremy Stephen John January 2000 (has links)
This thesis examines the development of value for money (VFM) audit methods used by the National Audit Office (NAO) and considers what factors have influenced the identified changes. It also considers how developments compare with those elsewhere in Europe. The thesis is based on examination of more than 300 NAO reports, interviews with senior staff, focus groups, a thorough review of relevant literature, and comparisons with four other state audit offices. The thesis argues that VFM audit has developed into a strong form of evaluative activity, despite a number of constraints. The NAO enjoys a unique combination of the statutory power to initiate wide-ranging reviews; the right to demand documents and gain access to people; and the existence of a powerful parliamentary committee to review its work and ensure a government response to reports. Additionally, during the 1980s and 1990s, the NAO developed its VFM work, and in particular, the methods used, to become a more robust discipline. Although document review and interviews form the basis of much of the work, other methods have been added to the core repertoire, in particular, questionnaires. In addition, a broader range of methods has been used on occasions, from focus groups to systems dynamics. These developments are explained in terms of a response to broader changes in the administrative environment, in particular, new public management reforms. These have increased interest in public sector performance, enhanced the quality of information available, and given greater emphasis to service quality. Consequently, the NAO has sought to demonstrate it can 'add value' and encourage beneficial improvements to public services. Developments in methods are seen as one important way of doing this. The thesis places developments in the context of the growth of evaluative activities in the UK, whilst emphasising the particular focus of VFM work on accountability, and its links with financial audit.
|
16 |
Greek university libraries in the European context : a comparative evaluationZachos, Georgios January 1994 (has links)
The aim of this study is to provide a comprehensive examination of university libraries in Greece seen in the European context. To this end, the thesis: i. discusses the context in which Greek university libraries have developed and the challenges they face; ii. examines the factors that affect their operation and development; iii. assesses their role in university education in supporting the informational, educational and research needs of the academic community; iv. compares their position with similar libraries in other member states of the European Union and in Scandinavia; v. suggests actions needed in order that university libraries in Greece should develop further and play their role better. In this study a standard model for university libraries is developed and performance indicators and methodologies which are proper for this model are used. University libraries are examined as open, dynamic, multi-goal seeking and purposeful systems. They consist of resources which are transformed into outputs for the benefit of their users. Inputs, outputs and outcomes can be measured in a greater or less accuracy but measurement itself is meaningful only if it is placed in some kind of context. University libraries operate within a given environment. They receive their inputs from this environment, and their outputs are used by people or other systems in the environment. They are also constrained by factors in this environment such as the social, economic, educational, technological, etc. In this study not only the performance indicators themselves but also the relationships between them that are indicative of performance were analysed. The main findings of the study are related to the environment within which Greek University Libraries operate, the organisational structures, and administrative practices applied, issues concerning staff and the way they affect library development, the provision of library material, the organisation of technical services, and the reader services that are provided. Library performance is assessed in a number of ways. The indicators produced and comparisons with the state of development of university libraries in other European countries show that Greek University libraries fall behind them in terms of almost all indicators used. It appears that Greek University libraries are weak in meeting the needs of their users in both education and research.
|
17 |
An evaluation of the value of security in the international marine supply chainLoke, Wai Leng 05 1900 (has links)
Since the events of 9/11, there has been tremendous amount of renewed interests in the study of trade security. There has been an influx of security regulations and the private sector has been trying to keep pace in complying with them. However, due to the public externalities of security improvements and the lack of quantified and proven benefits, the private sector is struggling to establish business cases for their security initiatives.
There is very little quantitative research in this area. Using exploratory factor analysis (EFA) and structural equation modeling (SEM), this study serves to fill this gap by introducing a statistical way of analysing and understanding the complex relationships amongst security effort, its motivators and performance and traditional supply chain performance (SCP). This study also proposes an evaluation framework for security efforts.
EFA results show that security is a dimension of SCP. This means that organizations have all along been measuring an aspect of their operations that relates to security. As such, organizations should not perceive the current heightened interests in security as throwing them off-balance. In evaluating security efforts, organizations should select key performance indicators (KPIs) that represent each of the four areas of information, cargo, people and cost.
SEM results show that organizations undertake security efforts as a result of both perceived security benefits and perceived collateral benefits, with perceived security benefits carrying a greater weight in the decision-making process. Results also show that organizations are implementing security initiatives out-of-compliance i.e. implementing initiatives that they perceive as not having significant impacts on security and SCP.
In view of the positive relationships among perceived security impact, security effort and security performance, there is further imperative for an objective method for evaluating security efforts to prevent effort justification behaviour in determining the effectiveness of the same. Results also show that organizations perceive an improved performance in security leads to an overall improvement in SCP. However, as with other supply chain strategies, there are tradeoffs and not all aspects of SCP are impacted in the same way. Time, responsiveness and efficiency for instance are negatively impacted while reliability is positively impacted.
|
18 |
An evaluation of the value of security in the international marine supply chainLoke, Wai Leng 05 1900 (has links)
Since the events of 9/11, there has been tremendous amount of renewed interests in the study of trade security. There has been an influx of security regulations and the private sector has been trying to keep pace in complying with them. However, due to the public externalities of security improvements and the lack of quantified and proven benefits, the private sector is struggling to establish business cases for their security initiatives.
There is very little quantitative research in this area. Using exploratory factor analysis (EFA) and structural equation modeling (SEM), this study serves to fill this gap by introducing a statistical way of analysing and understanding the complex relationships amongst security effort, its motivators and performance and traditional supply chain performance (SCP). This study also proposes an evaluation framework for security efforts.
EFA results show that security is a dimension of SCP. This means that organizations have all along been measuring an aspect of their operations that relates to security. As such, organizations should not perceive the current heightened interests in security as throwing them off-balance. In evaluating security efforts, organizations should select key performance indicators (KPIs) that represent each of the four areas of information, cargo, people and cost.
SEM results show that organizations undertake security efforts as a result of both perceived security benefits and perceived collateral benefits, with perceived security benefits carrying a greater weight in the decision-making process. Results also show that organizations are implementing security initiatives out-of-compliance i.e. implementing initiatives that they perceive as not having significant impacts on security and SCP.
In view of the positive relationships among perceived security impact, security effort and security performance, there is further imperative for an objective method for evaluating security efforts to prevent effort justification behaviour in determining the effectiveness of the same. Results also show that organizations perceive an improved performance in security leads to an overall improvement in SCP. However, as with other supply chain strategies, there are tradeoffs and not all aspects of SCP are impacted in the same way. Time, responsiveness and efficiency for instance are negatively impacted while reliability is positively impacted. / Business, Sauder School of / Operations and Logistics (OPLOG), Division of / Graduate
|
19 |
A Comparative Study of Principal Performance Evaluation in the Commonwealth of VirginiaToler, Benita Burke 01 December 2006 (has links)
The No Child Left Behind Act (NCLB) makes unprecedented demands on states, school districts, and schools to raise academic achievement and to improve low-achieving schools. Many believe that schools are only as good as the principal leading the school. There is evidence that the format and processes used in principal evaluation often vary from one state to another, and even among school districts within a state. The purpose of this study is to examine the status of principal performance evaluation in the Commonwealth of Virginia. The study reviews and compares all school divisions' descriptions of principal evaluation systems, information collection strategies, and schedules for information collection and evaluation of principals.
The primary purpose of this study was to describe the evaluation process for principals in the Commonwealth of Virginia. An attempt was made to (1) find out what procedures school divisions used to evaluate principal performance, (2) determine how the evaluation process varied by divisions type (i.e., suburban, urban, and rural), size and location, (3) find out the structures in place for high-performing principals to share effective practices, (4) determine the strategies used to support principals who are evaluated as needing improvement, (5) analyze documents that cover policies and procedures governing principal evaluation, and (6) to present a summary and analysis of data with implications for further research.
This study was conducted first by analyzing a questionnaire regarding assessment practices currently being used by school divisions received from 91 school divisions; second, by examining the principal evaluation documents returned by 61 of the responding school divisions in Virginia; and third, by gathering data on how principals are recognized for outstanding performance, or supported if they need improvement. The demographics of school divisions represent 1,407 principals and 812,211 students. An extensive review of literature was conducted to explore principal evaluation and its effect on the quality of education in the Commonwealth of Virginia. The information accumulated through the literature review, the questionnaire data and the document analysis resulted in findings that profile a comprehensive view of the status of principal evaluation in the Commonwealth of Virginia.
The findings of the study indicated that there is agreement among researchers and policymakers that an evaluation process must be in place in order to have effective principals and thus effective schools. The data in this study showed that more than half of respondents (67%)had procedures in place for regularly reviewing and revising principal evaluation procedures. However, 33% of school divisions did not have procedures in place. This is a sizable number, and a matter of concern, since principal evaluation has been mandated by the Commonwealth of Virginia since 1972. / Ed. D.
|
20 |
Cognitions of performance appraisal system effectiveness: a repertory grid approachWright, Robert Phillip. January 2000 (has links)
published_or_final_version / Business / Doctoral / Doctor of Philosophy
|
Page generated in 0.1236 seconds