Dissertations / Theses on the topic 'Systems Theory of Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Systems Theory of Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fan, Terence P. "Market-based airport demand management : theory, model and applications." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/44611.
Full textIncludes bibliographical references (p. 119-123).
The ever-increasing demand for access to the world's major commercial airports combined with capacity constraints at many of these airports have led to increasing air traffic congestion. In particular, the scarcity of airside (take-off and landing) capacity at these airports has not been appropriately priced, leading to excessive demand as in the Tragedy of the Commons. Congestion pricing, as a classical economic approach to the efficient allocation of constrained transportation infrastructure capacity, has a long history of theoretical development. However, its application in the airport setting must deal with a set of important differences from the classical urban roadway setting. These differences have eluded the attention of researchers until very recently. They stem from the following set of complications: i) the peak and off-peak periods at congested airports are often less distinguishable than in the urban transport context; ii) airlines are a dominant intermediary between an airport's capacity and passengers as the end-users of that capacity; and iii) airlines operate groups of flights, as distinct from the atomistic behaviour of individual commuters. To address these complications, an analytical model is developed to explore the impact of congestion pricing at airports and understand potential airline responses under a range of assumptions about the market's structure. Through a set of numerical experiments, carried out with the help of a probabilistic queuing model, we compare the economic benefits resulting from adopting fine versus coarse congestion tolls for the cases of markets with symmetric and asymmetric carriers. Given sustained demand for access to an airport and reasonably elastic responses in terms of frequency adjustments,
(cont.) the benefits to carriers of instituting congestion pricing generally exceed the amount of tolls collected. While a system of fine or graduated tolls is suited for all airports, systems of coarse or uniform tolls, which can be implemented more easily, are applicable only at airports with fairly symmetric carriers that hold approximately equal frequency shares. In addition to congestion pricing, slot lease auctions can also be an effective means for promoting an economically efficient use of scarce airport capacity. In practice, the impact of slot lease auctions is similar to that of coarse tolling. Slot auctions are therefore applicable, in pure form, at airports with symmetric carriers. At these airports, a market-based demand management policy can comprise both congestion pricing and slot lease auctions. With respect to implementation, simultaneously ascending auctions recently used in the context of allocating electromagnetic spectra can be appropriately adopted to airports. A lump-sum subsidy can be used to promote specific socially desirable goals in the allocation of scarce airport capacity. Several airport authorities around the world, currently using purely administrative or hybrid forms of demand management, have developed sophisticated techniques for defining and managing their constrained airport capacity. Some of these techniques can be useful in developing market-based demand management policies. As an interesting case study, the experience of New York's LaGuardia Airport (LGA) ...
by Terence Ping-Ching Fan.
Ph.D.in Transportation Systems and Policy Analysis
Guo, Lan. "Self-determination theory of motivation and performance management systems." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Fall2007/l_guo_080307.pdf.
Full textOswald, W. Andrew (William Andrew). "Understanding technology development processes theory & practice." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/90699.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 75-77).
Technology development is hard for management to understand and hard for practitioners to explain, however it is an essential component of innovation. While there are standard and predictable processes for product development, many of these techniques don't apply well to technology development. Are there common processes for technology development that can make it predictable, or is it unpredictable like basic research and invention? In this thesis, after building a foundation by looking at product development processes, I survey some of the literature on technology development processes and compare them to a handful of case studies from a variety of industries. I then summarize the observations from the cases and build a generic model for technology development that can be used to provide insights into how to monitor and manage technology projects. One of the observations from the product development literature is that looping and iteration is problematic for establishing accurate schedules which becomes one of the fundamental disconnects between management and engineering. Technologists rely heavily on iteration as a tool for gaining knowledge and combined with other risks, technology development may appear "out of control". To mitigate these risks, technologists have developed a variety of approaches including: building a series of prototypes of increasing fidelity and using them as a form of communication, simultaneously developing multiple technologies as a hedge against failure or predicting and developing technologies they think will be needed outside of formal channels. Finally, I use my model to provide some insights as to how management can understand technology development projects. This gives technologists and non-technical managers a common ground for communication.
by W. Andrew Oswald.
S.M. in Engineering and Management
Ladd, Dana Forrest. "Extending Two-Dimensional Knowledge Management System Theory with Organizational Activity Systems' Workflow Dynamics." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/3305.
Full textCorner, Ian. "Customer relationship management systems : the development of implementation meso-theory." Thesis, Open University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412396.
Full textHaustein, E. "Management control systems in innovation companies : a contingency theory study." Thesis, University of the West of England, Bristol, 2014. http://eprints.uwe.ac.uk/23122/.
Full textMagalhaes, Rodrigo Manuel. "The organizational implementation of information systems : towards a new theory." Thesis, London School of Economics and Political Science (University of London), 1999. http://etheses.lse.ac.uk/284/.
Full textGraham, Judson L. (Judson Lawrence) 1968. "Application of theory of constraints and process control theory to multi-stage manufacturing systems." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9992.
Full textIncludes bibliographical references (p. 105).
by Judson L. Graham.
M.S.
Simpson, Mark Aloysius. "Complexity Theory of Leadership and Management Information." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6121.
Full textDang, Yan. "Theory-Informed Design and Evaluation of Web-Based Knowledge Management Systems." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/145434.
Full textWilkinson, C. "Towards a theory of management control systems : A case study approach." Thesis, Lancaster University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374662.
Full textSourak, Nesrin. "An investigation into Destination Management Systems website evaluation theory and practice." Thesis, Queen Margaret University, 2015. https://eresearch.qmu.ac.uk/handle/20.500.12289/7316.
Full textBurgess, Scott S. "A Systems Theory Approach for Studying Safety Management Systems for Operations of Small Helicopter Organizations." Thesis, Northcentral University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10169559.
Full textImplementation of safety management systems (SMS) in small helicopter entities is not widespread and the variation in different types of missions (segments) in the helicopter industry make this situation very complex. In 2005, industry, government and manufacturers identified as the International Helicopter Safety Team (IHST) set out to reduce the global helicopter accident rates, and SMS implementation was one strategy. What was missing was measuring the effectiveness of SMS as related to incident or accidents (IA), or the relationship of these on operational effectiveness (OE). Small helicopter entities are the most numerous organizations but experience the most IA in this high-risk sector of aviation, and the existence of SMS in these entities is not regulated. Implementing SMS could have a positive effect on OE and IA and this non-experimental study contained a systems theory framework using structural equation modeling (SEM) in a partially mediated model to determine the relationships between three variables. Further, these results support industry initiatives to target the small helicopter segment. This model could also be useful in promoting SMS implementation by justifying the positive effects of SMS integration, and to address the influence of SMS across the industry. Participants included crewmembers of small helicopter entities in the United States. A total of 205 participants were gathered to participate in the study. The findings of the study indicated that (a) safety management systems can predict incidents and accidents; (b) incidents and accidents mediate the relationship between SMS and OE; and (c) incidents and accidents predict operational effectiveness. Future researchers may expand the results of this study by performing aviation-safety-specific research and by identifying operational benefits of the systems approach.
Robinson, Stuart Gordon. "Applying social capital theory to the management of IT outsourcing." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/25848.
Full textKhan, Sheroz. "Coordinated protection and control in power systems : an expert system approach to interlocking management." Thesis, University of Strathclyde, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338913.
Full textComstock, Mica. "Production systems for mass customization : bridging theory and practice /." Linköping : Univ, 2004. http://www.bibl.liu.se/liupubl/disp/disp2004/tek894s.pdf.
Full textLudlow, Brian Alan. "Information systems strategy - theory and practice within a multi-divisional organisation." Thesis, Henley Business School, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.232937.
Full textYan, Kwan-shing. "Management science : quenes in cinemas /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18024646.
Full textBalthazard, Pierre Andre. "Influence allocation methods in group support systems." Diss., The University of Arizona, 1993. http://hdl.handle.net/10150/186584.
Full textMignot, Helen Rosemary 1966. "Impact of output management within management control systems on performance in Victorian government departments." Monash University, Dept. of Accounting and Finance, 2002. http://arrow.monash.edu.au/hdl/1959.1/7903.
Full textBetancourt, Carlos. "An Information Systems Design Theory Proposal for Knowledge Management Systems : A Business-to-Customer System in a Swedish Textile Agency." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6281.
Full textKnowledge has become one of the most important assets for companies nowadays. Knowledge Management (KM) uses organizational knowledge as a resource to make companies more competitive. Knowledge Management Systems (KMS) are gaining popularity, however, the failure rate remains high, with many projects not achieving their goals or being shut down early. KMS are often underestimated and treated as normal systems. IS practices do not cover certain aspects specific to KMS, aspects that do not show in other IS (e.g. socio-cultural issues). There are many studies concerning the KMS failures but they just focus on the symptoms and do not provide a solution to the problem. The goal of this master’s dissertation is to generate a preventive tool that will help the KM field. With The experience gained by working in a real KMS project within a textile agency in Sweden and relevant literature, an Information Systems Design Theory (ISDT) for KMS was developed. As some authors suggest, KM needs an ISDT of it’s own. An ISDT will guide practitioners through the process by restricting practices and features of the system to a more effective set. It will also encourage the academia to work on this theory for its improvement, completion, and validation
Capozzi, Brian Joseph. "Evolution-based path planning and management for autonomous vehicles /." Thesis, Connect to this title online; UW restricted, 2001. http://hdl.handle.net/1773/10001.
Full textLindskog, Magnus. "On systems thinking in logistics management - A critical perspective." Doctoral thesis, Linköpings universitet, Kommunikations- och transportsystem, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-77119.
Full textMarticello, Daniel Nicholas Jr. "Complexity within the Air Force acquisition system gaining insight from a theory of collapse." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/70825.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 122-129).
Joseph Tainter's theory of societal collapse is applied in an examination of the U.S. Air Force's aircraft acquisition system in order to gain insight into the enterprise's lagging performance. Theories of collapse at both the societal level and the organizational level are reviewed. Tainter's interrelationship between increasing system complexity and diminishing marginal returns is highlighted as especially relevant to the performance of the Air Force aircraft acquisition enterprise. Using Tainter's theory as a framework, evidence is gathered leading to the conclusions that the Air Force aircraft acquisition enterprise is highly complex and as a result is experiencing diminishing marginal returns. Tainter's framework is then also used to explain why past attempts to reform the enterprise have fallen short of their goals. Previous reform efforts, in the form of reorganizations and senior leader initiatives, have been ineffectual beyond the short term because they fail to reduce the underlying level of complexity within the enterprise. The use of workarounds by stakeholders within the enterprise are shown to be efforts to increase marginal returns and avoid overcomplexity. The primary implication of viewing the Air Force aircraft acquisition enterprise through the lens of Tainter's theory of collapse is that in order to be effective, any effort undertaken to improve the performance of the enterprise must reduce the overall level of complexity within the system. Additional insights include the use of current workarounds as leading indicators of complexity or overly burdensome processes. Lastly, senior acquisition leaders should be prepared should a collapse of the enterprise occur. A vision of a much less complex enterprise should be advocated.
by Daniel Nicholas Marticello Jr.
S.M.in Engineering and Management
Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Beals, Michael J. "An application of systems theory in a local congregational setting." Theological Research Exchange Network (TREN), 1990. http://www.tren.com.
Full textOrtegoÌn, Monroy MariÌa Carolina. "An explanation of chaos and complexity theory in management from a critical systems thinking perspective." Thesis, University of Lincoln, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269786.
Full text何劍強 and Kim-keung Ho. "Development of multi-perspective, systems-based frameworks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31234872.
Full textHo, Kim-keung. "Development of multi-perspective, systems-based frameworks /." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18061655.
Full textMyers, Barry L. "Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4302/.
Full textHe, Youbiao. "The Energy Management of Next-generation Microgrid Systems." University of Akron / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=akron1500907510831555.
Full textMenich, Ronald Paul. "Resource allocation in parallel processing systems." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/28049.
Full textUribe, Jaime Trevino. "Design procedures for "pull" production systems." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/31063.
Full textYaraghi, Niam. "Critical Success Factors for Risk Management Systems." Thesis, KTH, Mechanics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-11784.
Full textDespite the existence of extensive literature regarding risk management, there still seems to be lack of knowledge in identification of Critical Success Factors (CSFs) in this area. In this research Grounded Theory is implemented to identify CSFs in Risk Management Systems (RMS). Factor analysis and one-sample t-test are then used to refine and rank the CSFs based on the results of a survey which has been performed among Risk Management practitioners in various types of Swedish corporations. CSFs are defined from three different perspectives: (a) the factors that have influence on the inclination and readiness of corporation for implementing RMS. (b) the factors that are important during the design and implementation of RMS in corporation and can significantly affect the success of RMS design and implementation and (c) the factors that are crucially important to successfully run, maintain and administrate RMS after the closure of the project of RMS design and Implementation.
This systematic approach towards understanding the taxonomy of the success dimension in RMS is important for re-enforcing effective risk management practices.
Rogers, Athena Anne. "Towards the 'Shift-free Integration' of hard and soft systems approaches with an application to the management of non-specialist language learning." Thesis, Liverpool John Moores University, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343203.
Full textEspinosa, Jennifer Anne. "Understanding the Complexity of Product Returns Management: A Complex Adaptive Systems Theory Perspective." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6233.
Full textJesser, Peter Stewart. "SYSTEM THEORY: APPLICATIONS IN HUMAN RESOURCE MANAGEMENT." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/291981.
Full textAbdel-Kader, Magdy G. "Evaluating investment decisions in advanced manufacturing systems : a fuzzy set theory approach." Thesis, University of the West of England, Bristol, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362552.
Full textGordon, John L. "Investigation into the application of artificial intelligence to small building management." Thesis, Liverpool John Moores University, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.304515.
Full textDucklow, Patrick J. "Coaching church leaders in conflict resolving strategies using family systems theory." Online full text .pdf document, available to Fuller patrons only, 2002. http://www.tren.com.
Full textPratt, Jonathan Gordon MacLeod. "'Falling behind': a grounded theory of uncritical decision making." Electronic version, 2007. http://hdl.handle.net/2100/619.
Full textThis study investigated how selected Australian universities evaluated and adopted various learning management systems in their teaching and learning programs, given claims of uncritical evaluation, problems and cautions in the Australian (1998: 13; Brabazon, 2002; Yetton, Forster, Hewson, Hughes, Johnston, Nightingale, Page-Hanify, Vitale and Wills, 1997) and North American (Berg, 2002; Noble, 1998b) higher education literatures. Ironically, universities charge large amounts of money teaching their students to develop competence in critical analysis, yet some studies have claimed that they were deficient in critically analysing their own decisions (Brabazon, 2002; Yetton et al., 1997). This important question has received little attention in the higher education literature, despite the high visibility and costs of these decisions. Although limited theoretical explanations have been proposed by various researchers, such as Yetton et al. (1997) and Brabazon (2002), these matters have not been the subject of published empirical research to date. A grounded theory methodological framework, validated by the insights of institutional theory, was employed throughout to promote broader sociological explanations than other studies constrained by functionalist theoretical frameworks (Yetton et al., 1997). Qualitative case studies utilising semi-structured interviews and document analysis were conducted at three Australian universities. The findings of this analysis were written up in three case study narratives and an analytic cross-case analysis. Semi-structured interviews and document analysis at the field level were undertaken as an additional source of data to verify emergent grounded theory. A grounded theory of uncritical decision making (Figure 57) was ultimately developed in response to this study’s research problem. The core category around which this model was developed (‘falling behind’) appeared in all three cases, in interviews with experts from the Australian higher education sector, and was also found in both the Australian and overseas higher education literatures. This grounded theory also represents a minor contribution to the institutional theory literature as a new institutional change process model which links the activities of key individuals with broader field developments, and integrates the constructive and reproductive assumptions of old and new institutional theory.
Walsh, John Nicholas. "A practice-based approach to examining knowledge management repository use." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/5171.
Full textLouw, Louis. "Protective capacity and time buffer design in theory of constraints controlled discrete flow production systems." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/49782.
Full textENGLISH ABSTRACT: To maximise the throughput of a production system the capacity constrained resource needs to be protected from variation and uncertainty. In the Theory of Constraints philosophy such protection is provided by means of time buffers and protective capacity. Time buffers are protective time that is allowed in the production schedule to buffer against disruptions, whereas protective capacity is defined as a given amount of extra capacity at non-constraints above the system constraint's capacity. In this research an analytical procedure was developed to more accurately determine the required time buffer lengths. This procedure uses an open queuing network modelling approach where workstations are modelled as GIIG/m queues. A simulation experiment was performed to evaluate the time buffer estimation procedure on the operations of an actual fifteen station flow shop. The results from the study suggest that the analytical procedure is sufficiently accurate to provide an initial quick estimate of the needed time buffer lengths at the design stage of the line. This dissertation also investigated the effect of protective capacity levels at a secondary constraint resource as well as at the other non-constraint resources on the mean flow time, the bottleneck probability of the primary constraint resource, as well as the output of flow production systems using simulation models and ANOV A. Two different types of flow production systems were investigated: (1) a flow shop with a fixed number of stations and unlimited queue or buffer space between stations, and (2) an assembly line where a total work content is distributed among stations in a certain fashion and the number of stations are not fixed. The experimental studies show that flow shop performance in the form of flow time and line output is not that much influenced by low protective capacity levels at the secondary constraint resource. Low protective capacity levels at a single station however can significantly reduce the bottleneck probability for the primary constraint resource when it is located before and relatively close or near to the primary constraint in the process flow, or after but relatively far from the primary constraint. An after-far secondary constraint location also causes slightly longer job flow times, and should therefore be avoided if possible. The research further shows that quite high protective capacity levels at the nonconstraint resources are needed to ensure a more stable and therefore manageable primary constraint. However low average levels of protective capacity at non-constraint resources are sufficient to ensure that the maximum designed output level as determined by the utilisation of the primary constraint resource is obtained. The results for the assembly line experiment showed that an unbalanced line configuration where less work is assigned to the non-constraint stations than to the primary constraint station (but nonconstraint stations have an equal work content) can lead to significant reductions in the mean flow time while maintaining the same line output, without resulting in too many additional stations. Low protective capacity levels in the range of 2% to 5% are sufficient to cause substantial improvements in flow time without resulting in too many additional stations in the line.
AFRIKAANSE OPSOMMING: Om die finale uitset van 'n produksiestelsel te maksimeer is dit noodsaaklik dat die bottelnek beskerm word teen fluktuasies en onderbrekings. In die "Theory of Constraints" filosofie word van twee soorte beskermingsmeganismes gebruik gemaak: tydbuffers en beskermende kapasiteit. Tydbuffers is beskermende tyd wat in die produksieskedule gevoeg word om sodoende die bottelnek teen onderbrekings te beskerm, terwyl beskermende kapasiteit ekstra produksiekapasiteit relatief tot die bottelnek se kapasiteit is wat by nie-bottelnekke gevoeg word. In hierdie navorsing IS 'n analitiese prosedure ontwikkel om meer akkurate berekenings van tydbuffergroottes te verkry in produksiestelsels wat volgens 'n "Theory of Constraints" filosofie bestuur word. Die prosedure maak gebruik van oop toustaan netwerk modellering waar werkstasies gemodelleer word as GIIG/m toue. Die analitiese prosedure is ge-evalueer met 'n simulasie eksperiment op 'n werklike vyftien stasie vloeiwinkel. Die resultate dui aan dat die analitiese prosedure akkuraat genoeg is om vinnig aanvanklike beramings vir die benodigde tydbuffergroottes tydens die ontwerpsfase van die produksiestelsel te verskaf. Verder is ook ondersoek ingestel na die effek van beskermende kapasiteitsvlakke by die sekondêre bottelnek asook die ander nie-bottelnekke op die gemiddelde deurvloeityd, die totale uitset, asook die bottelnek waarskynlikheid vir die primêre bottelnek in vloei produksiestelsels deur gebruik te maak van simulasie modelle en ANOVA. Twee verskillende tipes vloei produksiestelsels is ondersoek: (1) 'n vloeiwinkel met 'n vaste aantal stasies en 'n onbeperkte buffer spasie tussen stasies, en (2) 'n monteerlyn waar 'n totale werksinhoud op 'n bepaalde wyse onder stasies verdeel moet word en die aantal stasies nie vas is nie. Die eksperimentele studies dui aan dat die deurvloeitye en totale uitset van 'n vloeiwinkel me noemenswaardig beïnvloed word deur lae beskermende kapasiteitsvlakke by die sekondêre bottelnek nie. Hierdie maatstawwe word meer beïnvloed word deur die gemiddelde beskermende kapasiteitsvlakke by al die nie-bottelnekke. Lae beskermende kapasiteit by 'n enkele werkstasie kan egter die bottelnek waarskynlikheid vir die primêre bottelnek aansienlik verlaag indien dit voor en relatief na aan die primêre bottelnek in die prosesvloei geleë is, of na, maar relatief ver, vanaf die primêre bottelnek. 'n Sekondêre bottelnek ligging na maar relatief ver vanaf die primêre bottelnek in die prosesvloei veroorsaak ook langer deurvloeitye, en moet dus vermy word. Verder dui die navorsing aan dat redelike hoë gemiddelde beskermende kapasiteit by nie-bottelnekke benodig word om 'n meer stabiele primêre bottelnek te verseker. In vloeiwinkels met lae vlakke van variasie en onderbrekings is egter lae gemiddelde vlakke van beskermende kapasiteit by nie-bottelnekke voldoende om te verseker dat die maksimum ontwerpte uitset soos bepaal deur die benutting van die primêre bottelnek behaal word. Die resultate vir die monteerlyn eksperiment dui aan dat 'n ongebalanseerde lynkonfigurasie waar minder werk aan die nie-bottelnek stasies as aan die primêre bottelnek stasie toegeken word (maar niebottelnek stasies het 'n gelyke werksinhoud), aansienlike verlagings in deurvloeityd teweeg kan bring terwyl dieselfde lyn uitset behou word. Dit is moontlik sonder te veel addisionele stasies in die lyn. Die eksperimentele resultate dui aan dat lae beskermende kapasiteitsvlakke van tussen 2% tot 5% voldoende is om beduidende verlagings in deurvloeityd teweeg te bring sonder te veel addisionele stasies.
Laepple, Eberhard Sebastian. "Exploring project collaboration systems in the building industry." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4360.
Full textBrook, Phillip, University of Western Sydney, College of Law and Business, and School of Marketing and International Business. "Constituents and their expectation : towards a critical-pragmatic theory of information systems project management." THESIS_CLAB_MIB_Brook_P.xml, 2004. http://handle.uws.edu.au:8081/1959.7/791.
Full textDoctor of Philosophy (PhD)
Brook, Phillip William James. "Constituents and their expectation towards a critical-pragmatic theory of information systems project management /." View thesis, 2004. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20040709.092524/index.html.
Full textFleming, Randall. "A Grounded Theory of Emergent Leadership in Nonhierarchical Virtual Teams." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6017.
Full textMilliner, Lloyd A., and n/a. "Systems Thinking and Strategic Decision-Making: A Consideration of Chaos Theory." Griffith University. Griffith Business School, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070212.162743.
Full textLiang, Chao Dandekar Kapil. "A game-theoretic approach to power management in MIMO-OFDM ad hoc networks /." Philadelphia, Pa. : Drexel University, 2006. http://hdl.handle.net/1860/1298.
Full textAl-Shishtawy, Ahmad. "Self-Management for Large-Scale Distributed Systems." Doctoral thesis, KTH, Programvaruteknik och Datorsystem, SCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101661.
Full textQC 20120831