2018
DOI: 10.1016/j.promfg.2018.10.093
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Kanban Framework for Service Operations Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 38 publications
0
16
0
Order By: Relevance
“…Cyber risk can be defined as a function of 3 parameters: (i) Impact expresses the level of damage that a given risk may cause; (ii) Threat expresses whether or not a given risk can occur; (iii) Vulnerability expresses whether or not existing information security measures are effective [3,4]. New technological advances in every sectors, such as cloud manufacturing [5], industry 4.0 [6] and realtime service composition [7] has opened a new horizon into the cyber world with a new type of risk that was unknown beforehand.…”
Section: Risk Managementmentioning
confidence: 99%
“…Cyber risk can be defined as a function of 3 parameters: (i) Impact expresses the level of damage that a given risk may cause; (ii) Threat expresses whether or not a given risk can occur; (iii) Vulnerability expresses whether or not existing information security measures are effective [3,4]. New technological advances in every sectors, such as cloud manufacturing [5], industry 4.0 [6] and realtime service composition [7] has opened a new horizon into the cyber world with a new type of risk that was unknown beforehand.…”
Section: Risk Managementmentioning
confidence: 99%
“…Through equations (12)(13)(14) below, alpha, beta, and delta estimate the position of the prey, and other wolves update their positions randomly about the prey [25].…”
Section: Huntingmentioning
confidence: 99%
“…Solving a combinatorial optimization problem is very different from solving a problem with a continuous solution space. In a continuous search space, the search agents of GWO are able to update their position vectors according to the hunting process mimicked by equations (12)(13)(14). In a discrete space, however, the position of wolves cannot be updated likewise, since the position vectors can only take on discrete values.…”
Section: Embedded Evolutionary Operatorsmentioning
confidence: 99%
See 1 more Smart Citation
“…Applications such as Kanban and Six Sigma, which are used to increase productivity in production processes, are now combined with technology and contribute to the development and change of the enterprise. The concepts and applications that can be considered as old are brought to the top with new technological developments [1,2]. The most important effects of Industry 4.0 are the use of technology, production of big data architecture, and analysis of these data.…”
Section: Introductionmentioning
confidence: 99%