2022
DOI: 10.1111/exsy.12967
|View full text |Cite
|
Sign up to set email alerts
|

Exploring knowledge benchmarking using time‐series directional distance functions and bibliometrics

Abstract: For strategic reasons, benchmarking best practices from efficient competitors is not usual in many data envelopment analysis (DEA) applications. Even for industries composed of multiple branches, providing information about efficient practices for their peers can jeopardize results for those branches if they compete for market, resources or recognition by the central administration. In this work, a time-series adaptation for the DEA directional model is proposed as an alternative for coping with this problem.T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 58 publications
(81 reference statements)
0
3
0
Order By: Relevance
“…The basic process is illustrated in Figure 3, and further details are presented in the following Sections (Sections 3.2-3.6). The citation structure not only involves the citation cascades but also includes vari-ous forms like main path analysis [43], the max-min method to identify core nodes in the network [44,45], and others. These technologies, especially their combination with intelligence algorithms like deep learning and machine learning, are potential methods for future studies.…”
Section: Overviews Of the Research Processsmentioning
confidence: 99%
“…The basic process is illustrated in Figure 3, and further details are presented in the following Sections (Sections 3.2-3.6). The citation structure not only involves the citation cascades but also includes vari-ous forms like main path analysis [43], the max-min method to identify core nodes in the network [44,45], and others. These technologies, especially their combination with intelligence algorithms like deep learning and machine learning, are potential methods for future studies.…”
Section: Overviews Of the Research Processsmentioning
confidence: 99%
“…Such functionality can also be extended to other applications not related to bibliometric analysis. For instance, Nepomuceno et al (2023a) applied the co-occurrence analysis to interviews conducted in a bank institution to define the most relevant month-based strategies for that service unit. Each strategy defined by each employee became a keyword that composed a network with multiple interactions to support decision-making.…”
Section: Vosviewermentioning
confidence: 99%
“…The first problems associated with the data and IoT devices include constraint capabilities, intermittent loss of connection, and deployment hazards [14]. Other problems come from smart things, such as node failure, faulty nodes, data loss, network congestion, architectural flaws, and so on [15]. A third-world problem is one created by humans and launched into the deployment field to gain some benefit; examples are side-channel attacks, node capture attacks, sensor impersonation, stolen verifier attacks, Sybil attacks, etc.…”
Section: Introductionmentioning
confidence: 99%