274
Views
6
CrossRef citations to date
0
Altmetric
Articles

Risk-based analysis of manufacturing systems

Pages 7089-7103 | Received 18 Feb 2017, Accepted 24 Jan 2019, Published online: 18 Feb 2019

References

  • Arena, M., M. Arnaboldi, and G. Azzone. 2010. “The Organizational Dynamics of Enterprise Risk Management.” Accounting, Organizations and Society 35: 659–675. doi: 10.1016/j.aos.2010.07.003
  • Artzner, P., F. Delbaen, J.-M. Eber, and D. Heath. 1999. “Coherent Measures of Risk.” Mathematical Finance 9 (3): 203–228. doi: 10.1111/1467-9965.00068
  • Beck, C. 2009. “Generalised Information and Entropy Measures in Physics.” Contemporary Physics 50 (4): 495–510. doi: 10.1080/00107510902823517
  • Bromiley, P., M. McShane, A. Nair, and E. Rustambekov. 2015. “Enterprise Risk Management: Review, Critique, and Research Directions.” Long Range Planning 48 (4): 265–276. doi: 10.1016/j.lrp.2014.07.005
  • Burman, M., S. B. Gershwin, and C. Suyematsu. 1998. “Hewlett-Packard Uses Operations Research to Improve the Design of a Printer Production Line.” Interfaces 28 (1): 24–36. doi: 10.1287/inte.28.1.24
  • Choi, Y., X. Ye, L. Zhao, and A. Luo. 2016. “Optimizing Enterprise Risk Management: A Literature Review and Critical Analysis of the Work of Wu and Olson.” Annals of Operations Research 237 (1): 281–300. doi: 10.1007/s10479-015-1789-5
  • Cohen, J. W. 1976. On Regenerative Processes in Queueing Theory. Berlin: Springer.
  • Curry, G., and R. Feldman. 2011. Manufacturing Systems Analysis and Design. 2nd ed. New York: Springer.
  • Dickinson, G. 2001. “Enterprise Risk Management: Its Origins and Conceptual Foundation.” Geneva Papers on Risk and Insurance - Issues and Practice 26 (3): 360–366. doi: 10.1111/1468-0440.00121
  • Esmaeilian, B., S. Behdad, and B. Wang. 2016. “The Evolution and Future of Manufacturing: A Review.” Journal of Manufacturing Systems 39: 79–100. doi: 10.1016/j.jmsy.2016.03.001
  • Feng, S. C., and E. Y. Song. 2003. “A Manufacturing Process Information Model for Design and Process Planning Integration.” Journal of Manufacturing Systems 22 (1): 1–15. doi: 10.1016/S0278-6125(03)90001-X
  • Gell-Mann, M., and C. Tsallis. 2004. Nonextensive Entropy Interdisciplinary Applications. New York: Oxford University Press.
  • Gibbs, J. W. 1878. “On the Equilibrium of Heterogeneous Substances.” American Journal of Science s3–16 (3): 441–458. doi: 10.2475/ajs.s3-16.96.441
  • Gross, D., J. Shortle, J. Thompson, and C. Harris. 2008. Fundamentals of Queueing Theory. 4th ed. New York: John Wiley & Sons.
  • Guiasu, S. 1986. “Maximum Entropy Condition in Queueing Theory.” Journal of the Operational Research Society 37: 293–301. doi: 10.1057/jors.1986.47
  • Hoyt, R. E., and A. P. Liebenberg. 2011. “The Value of Enterprise Risk Management.” Journal of Risk and Insurance 78: 795–822. doi: 10.1111/j.1539-6975.2011.01413.x
  • Iversen, V. B. 2015. Teletraffic Engineering and Network Planning. 382 pp. Lyngby: Technical University of Denmark.
  • Jamshidi, A., D. Ait-kadi, A. Ruiz, and M. L. Rebaiaia. 2018. “Dynamic Risk Assessment of Complex Systems Using FCM.” International Journal of Production Research 56 (3): 1070–1088. doi: 10.1080/00207543.2017.1370148
  • Karmeshu. 2003. Entropy Measures, Maximum Entropy Principle and Emerging Applications. New York: Springer.
  • Krokhmal, P., M. Zabarankin, and S. Uryasev. 2011. “Modeling and Optimization of Risk.” Surveys in Operations Research and Management Science 16 (2): 49–66. doi: 10.1016/j.sorms.2010.08.001
  • Lazov, I. 2016. “A Methodology for Information and Capacity Analysis of Broadband Wireless Access Systems.” Telecommunication Systems 63 (2): 127–139. doi: 10.1007/s11235-015-0104-8
  • Lazov, I. 2017a. “Entropy Analysis of Broadband Wireless Access Systems.” IEEE Systems Journal 11 (4): 2366–2373. doi: 10.1109/JSYST.2015.2456941
  • Lazov, I. 2017b. “Information Analysis of Queueing Systems.” International Journal of General Systems 46 (6): 616–639. doi: 10.1080/03081079.2017.1323892
  • Lazov, I. 2017c. “Profit Management of car Rental Companies.” European Journal of Operational Research 258 (1): 307–314. doi: 10.1016/j.ejor.2016.08.064
  • Lazov, I. 2017d. “An Uncertainty Quantification Methodology for Broadband Wireless Access Systems.” Pervasive and Mobile Computing 42: 151–165. doi: 10.1016/j.pmcj.2017.10.002
  • Lazov, I. 2018. “A Methodology for Revenue Analysis of Parking Lots.” Networks and Spatial Economics. doi:10.1007/s11067-018-9418-x.
  • Lazov, P., and I. Lazov. 2014. “A General Methodology for Population Analysis.” Physica A: Statistical Mechanics and its Applications 415: 557–594. doi: 10.1016/j.physa.2014.08.031
  • Negahban, A., and J. Smith. 2014. “Simulation for Manufacturing System Design and Operation: Literature Review and Analysis.” Journal of Manufacturing Systems 33 (2): 241–261. doi: 10.1016/j.jmsy.2013.12.007
  • Ocampo, L., J. G. Masbad, V. M. Noel, and R. S. Omega. 2016. “Supply-side Inoperability Input–Output Model (SIIM) for Risk Analysis in Manufacturing Systems.” Journal of Manufacturing Systems 41: 76–85. doi: 10.1016/j.jmsy.2016.07.005
  • Önder, Ş, and H. Ergin. 2012. “Determiners of Enterprise Risk Management Applications in Turkey: An Empirical Study with Logistic Regression Model on the Companies Included in ISE (Istanbul Stock Exchange).” Business and Economic Horizons 7: 19–26. doi: 10.15208/beh.2012.2
  • Rausand, M. 2011. Risk Assessment: Theory, Methods, and Applications. Hoboken, NJ: John Wiley & Sons.
  • Rockafellar, R. T., S. Uryasev, and M. Zabarankin. 2006. “Generalized Deviations in Risk Analysis.” Finance and Stochastics 10: 51–74. doi: 10.1007/s00780-005-0165-8
  • Ruszczyński, A., and A. Shapiro. 2006. “Optimization of Convex Risk Functions.” Mathematics of Operations Research 31: 433–452. doi: 10.1287/moor.1050.0186
  • Shannon, C. E. 1948. “A Mathematical Theory of Communication.” Bell System Technical Journal 27: 379–423, 623–656. doi: 10.1002/j.1538-7305.1948.tb01338.x
  • Smith, N. 2003. Appraisal, Risk and Uncertainty. London: ICE Publishing.
  • Thompson, R. M. 2013. “A Conceptual Framework of Potential Conflicts with the Role of the Internal Auditor in Enterprise Risk Management.” Accounting and Finance Research 2: 65–77. doi: 10.5430/afr.v2n3p65
  • Touchette, H., and S. Lloyd. 2004. “Information-theoretic Approach to the Study of Control Systems.” Physica A: Statistical Mechanics and its Applications 331 (1–2): 140–172. doi: 10.1016/j.physa.2003.09.007
  • Visvanadham, N., and Y. Naraha. 1992. Performance Modeling of Automated Manufacturing Systems. Englewood Cliffs, NJ: Prentice-Hall.
  • Wallstrom, B. 1964. “A Distribution Model for Telephone Traffic with Varying Call Intensity, Including Overflow Traffic.” Ericsson Technics 2: 183–202.
  • Wu, D., and D. L. Olson. 2013. “Computational Simulation and Risk Analysis: An Introduction of State of the art Research.” Mathematical and Computer Modelling 58: 1581–1587. doi: 10.1016/j.mcm.2013.07.004
  • Wu, D., D. L. Olson, and A. Dolgui. 2015. “Decision Making in Enterprise Risk Management: A Review and Introduction to Special Issue.” Omega 57 (Part A): 1–4. doi: 10.1016/j.omega.2015.04.011
  • Zeng, R., S. Liu, and Z. Fang. 2014. “Maximum Entropy Virtual Manufacturing System Design Based on Poor Information of Small Sample.” The Journal of Grey System 26 (2): 103–111.
  • Zhang, Z. 2012. “Manufacturing Complexity and its Measurement Based on Entropy Models.” The International Journal of Advanced Manufacturing Technology 62 (9–12): 867–873. doi: 10.1007/s00170-011-3872-7
  • Zhou, M. C., and K. Venkatesh. 1999. Modeling, Simulation and Control of Flexible Manufacturing Systems: A Petri Net Approach. 428 pp. Singapore: World Scientific Publishing.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.