The rapid growth in consumer adoption of wearable devices has garnered the attention of both prac... more The rapid growth in consumer adoption of wearable devices has garnered the attention of both practitioners and academia. Competition in the wearable device market is both substantial and complicated. In this study, we investigate the impact of network externality on wearable device competition in a two-dimensional product differentiation model. We consider a market that has a broad array of products (horizontal differentiation) and various quality levels (vertical differentiation). We study two types of network externalities according to the product compatibility in two types of market structures. Our model indicates that firm profits are decreased by network externalities in horizontal dominance. Network externality also increases (decreases) the higher-quality (lower-quality) firm's profit in vertical dominance. Moreover, firms should ensure that their products are incompatible with those of rivals when network externality is large, and they should release compatible products when network externality is small in horizontal dominance. Firms should always ensure that their products are compatible with those of competitors in vertical dominance.
Users' privacy on social network sites is one of the most important and urgent issues in both ind... more Users' privacy on social network sites is one of the most important and urgent issues in both industry and academic fields. This paper is intended to investigate the effect of users' demographics, social network site experience, personal social network size, and blogging productivity on privacy disclosure behaviors by analyzing the data collected from social network sites. Based on two privacy sensitivity levels of disclosed information, the textual information of a user's blog postings can be converted into a 4-tuple to represent their privacy disclosure patterns, containing disclosing breadth and depth, and frequencies of high and low sensitive disclosures. The collections of a user's privacy disclosure patterns in social network sites can well reflect the user's privacy disclosure behaviors. Applying the general linear modeling approach to the blogging data converted with the coding scheme, we find that males and females have significantly differentiated privacy disclosure patterns in the dimensions of disclosing breadth and depth. In addition, age has negative and significant relationships with disclosing breadth, disclosing depth, and high sensitive disclosure. We also find that none of social network site experience, personal social network size, and blog length is significantly related to users' privacy disclosure patterns, while blog number always has positive associations with privacy disclosure patterns.
SUMMARY The researchers used data collected from ex-perts, consultants, and business staffers to ... more SUMMARY The researchers used data collected from ex-perts, consultants, and business staffers to identify important aspects related to venturing into cyber-commerce. We identified three pri-mary areas important to E-business activities: (1) Fundamental Requisites of Cyber-Com-merce, (2) Fundamental Business Operations within Cyberspace, and (3) Important Legal Is-sues within Cyber-Commerce.We suggest thatresearchers use the preliminary results discov-ered here as the basis for further investigation regarding E-business ventures. We also suggest that practitioners can use the results foundhere to help them prepare, adopt, and institu-tionalize the changes that E-business ventures bring to business organizations. Although the results here are still unproven, these results should provide some help for practitioners who will not w ait for mor e proven results r elat-ed to the three primary areas identified here.This research project provides preliminary results regarding the requisites fo...
To cope with the challenge of data scarcity in creditworthiness analysis for e-financing business... more To cope with the challenge of data scarcity in creditworthiness analysis for e-financing business, this paper proposes a cross-business analysis approach based on the assumption of behavior consistency for client in different e-commerce environments. By this approach we can analyze individuals’ creditworthiness by associating financial data on lending platforms and cross-business non-financial data on social media. We conceived three creditworthiness assessment models, and conduct the experimental study on Ant Financial Co-Creation Data Platform. The results verify that our cross-business creditworthiness analysis approach is effective.
Lecture Notes in Business Information Processing, 2012
With advancements made to the Internet, a considerable increase in the number and types of produc... more With advancements made to the Internet, a considerable increase in the number and types of products available online has come. Yet, the large amount of online consumer reviews may present an obstacle to potential buyers. This study proposes a four-dimensional book evaluation system for use by leading online booksellers, thereby enabling potential buyers to form decisions based on differentiated criteria. This book evaluation system was empirically examined by employing a text mining approach and multivariate regression model. The findings here-in may aid in improving the understanding of the construction of online product evaluation systems.
It is clear from recent history that companies who benefit most in e-commerce (EC) business activ... more It is clear from recent history that companies who benefit most in e-commerce (EC) business activities are those who either provide a fundamental e-commerce service or brick-n-mortar companies who approach e-commerce more judiciously. Already successful in conducting business in standard ways, these brick-n-mortar companies approach EC with the
This paper is intended to analyze the interrelationship between the textual comment and the itemi... more This paper is intended to analyze the interrelationship between the textual comment and the itemized rating in consumers' online feedback, and to study differentiations among diversified segments of consumers who leave the feedback. The data were collected from both an international top tourism service website which operates hotel booking services internationally and offers online hotel reputation feedback services, and its China host website. Based on the coded comments and itemized ratings from the dataset, our study shows that different customer segments demonstrate varied interrelationship behavioral patterns, and factors like satisfaction and contextual backgrounds will matter. The findings from this research may help hotels to develop varied marketing strategies for different segment of customers, and help online reputation sites to improve their services by distinguishing dissimilar behavioral patterns in different customer segments.
Purpose– User-generated content (UGC), i.e. the feedback from consumers in the electronic market,... more Purpose– User-generated content (UGC), i.e. the feedback from consumers in the electronic market, including structured and unstructured types, has become increasingly important in improving online businesses. However, the ambiguity and heterogeneity, and even the conflict between the two types of UGC, require a better understanding from the perspective of human cognitive psychology. By using online feedback on hotel services, the purpose of this paper is to explore the effects of satisfaction level, opinion dispersion and cultural context background on the interrelationship between structured and unstructured UGC.Design/methodology/approach– Natural language processing techniques – specifically, topic classification and sentiment analysis on the sentence level – are adopted to retrieve consumer sentiment polarity on five attributes relative to itemized ratings. Canonical correlation analyses are conducted to empirically validate the interplay between structured and unstructured UGC ...
... Experimental system design The experimental system is a web-based application with three modu... more ... Experimental system design The experimental system is a web-based application with three modules: 1) Front ... this experimental economy.1 The research model suggests that the proposed relationships are based on features ... Fraud rate 2204 0.0161 0.0137 0.0148 0.0147 0.001 ...
... [7] A. Susarla, A. Barua, and AB Whinston, “Understanding the Service Component of Applicatio... more ... [7] A. Susarla, A. Barua, and AB Whinston, “Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction with ASP Services,” MIS Quarterly (27:1), March 2003, pp.91-123. [8] A. Tamhankar, and S. Ram, "Database Fragmentation ...
In recent years, pattern password has been widely used for user authentication on smartphones and... more In recent years, pattern password has been widely used for user authentication on smartphones and other mobile devices in addition to the traditional password protection approach. However, pattern password authentication mechanism is incapable of protecting users from losses when a user\u27s login credential information is stolen. We propose an identity verification scheme based on user’s touching behaviors when inputting a pattern password on the smartphone screen. By exploiting the biometrical features, such as position, pressure, size, and time when a user inputs a pattern password to a smartphone, the proposed user verification mechanism can validate whether the user is the true owner of the smartphone. We adopted fuzzy logic, artificial neural network, and support vector machine, to build classifiers, using the behavioral data collected from 10 users. The experimental results show that all the three algorithms have significant recognition capacity, and the fuzzy logic algorithm...
This paper presents an overview of the history of e-government in China, clarifies the conceptual... more This paper presents an overview of the history of e-government in China, clarifies the conceptual vagueness of e-government, and explains the current situations with a model for understanding the status of e-government in China.
Currently, the predominant pricing plan for the search engine (SE) advertising services in a prop... more Currently, the predominant pricing plan for the search engine (SE) advertising services in a proprietary electronic market is a flat fee (FF) pricing. These services have faced the challenge of customer attrition recently since FF pricing results in the inequality of service surplus among subscribers. A more sustainable and profitable pricing model would be to distinguish advertising resources by providing an additional usage-based pricing for certain user groups to transfer the service surplus among subscribers. We conceive a hybrid model integrating Pay-Per-Click (PPC) pricing into FF pricing. This proposed scheme can offer an incentive-compatible mechanism to attract more subscribers by relieving the inequity of service surplus, and eventually result in the increasing revenue of service providers.
Online reviews are an important asset for users who are deciding to buy a product, see a movie, o... more Online reviews are an important asset for users who are deciding to buy a product, see a movie, or go to a restaurant and for managers who are making business decisions. The reviews from e-commerce websites are usually attached to ratings, which facilitates learning from the reviews by users. However, many reviews that spread across forums or social media are written in plain text, which is not rated, and these reviews are called non-rated reviews in this paper. From the perspective of sentiment analysis at the aspects level, this study develops a predictive framework for calculating ratings for non-rated reviews. The idea behind the framework began with an observation: the sentiment of an aspect is determined by its context; the rating of the review depends on the sentiment of the aspects and the number of positive and negative aspects in the review. Viewing term pairs that co-occur with aspects as their context, we conceived of a variant of a Conditional Random Field model, called SentiCRF, for generating term pairs and calculating their sentiment scores from a training set. Then, we developed a cumulative logit model that uses aspects and their sentiments in a review to predict the ratings of the review. In addition, we met the challenge of class imbalance when calculating the sentiment scores of term pairs. We also conceived of a heuristic re-sampling algorithm to tackle class imbalance. Experiments were conducted on the Yelp dataset, and their results demonstrate that the predictive framework is feasible and effective at predicting the ratings of reviews. Published by Elsevier Inc.
1 Zhangxi Lin is an assistant professor in the area of information system and quantitative scienc... more 1 Zhangxi Lin is an assistant professor in the area of information system and quantitative sciences, Texas Tech University. 2 Gary Anderson is the CTO for IMW. 3 TJ Anderson is the CEO for IMW.
In this paper, we propose a banyan-tree topology for the wireless coverage along the road or rail... more In this paper, we propose a banyan-tree topology for the wireless coverage along the road or railway, which is characterized as a zonal network. Theoretical analysis and numerical studies show that the proposed banyan-tree topology is appropriate for the zonal network with the Wireless Mesh Network (WMN) technology, which is feasible to deploy and has the enhanced robust, improved bandwidth with this topology.
Multimedia applications bring demands on broadband real-time data transfer, which needs resource ... more Multimedia applications bring demands on broadband real-time data transfer, which needs resource reservation protocol (RSVP) helps to satisfy. However, handover processes bring delay, and existing authentication mechanism makes it further worse. Based on Pareto distribution patterns of mobile station communication traffic, proposed a trust transfer mechanism to execute pre-anticipated trust transfer and shorten the delay. It means that the dominant minority correspondent nodes designed in the VIP address books are informed about trust context messages, such as the information of handover, AAA, QoS, before anticipated handover. With the trust transfer mechanism, the simplification can be made to the authentication mechanism, which divides trust handover sequencing into several paralleled parts and budges some steps between stations. Thereby cut processes on each node by processes simultaneously carrying. Simulation with a modified NS2 platform showed that when time setforward equals ...
Objective To observe the effect of allopurinol or benzbromarone on lowering blood uric acid level... more Objective To observe the effect of allopurinol or benzbromarone on lowering blood uric acid level to delay the progression of diabetic renal failures.Methods 140 diabetic patients with mild hyperuricemia were randomly divided into treatment group(72 cases) and control group(68 cases).The patients in the treatment group were treated with allopurinol or benzbromarone to control their uric acid to the normal range.The same drug treatment was used in chronic renal failure in the two groups.Observation period was 24 months to compare the differences of patients with chronic renal failure in two groups.The endpoint was that serum creatinine doubled the baseline into the end-stage renal disease(dialysis or serum creatinine 707 μmmol/L) and all-cause mortality.Results The patients had elevated blood urea nitrogen and creatinine levels,but the treatment group had a lower increasing degree of urea nitrogen and creatinine than that in the control group(t=2.22,p0.01 and t=3.35,p0.05).In treatment group,16 patients reached end point,while in the control group,36 patients reached end point.The end point events in the treatment group were lower than those in the control group(22.9% vs 51.4%.χ2=5.011,p=0.023).Conclusion Lowering serum uric acid in patients with diabetic nephropathy can significantly delay the progress of renal failures,which indicates that we should reduce the blood uric acid to normal levels as soon as possible.
International Journal of Electronic Business, 2012
Modern competition requires quick response from the supply chain. Supply chain process reengineer... more Modern competition requires quick response from the supply chain. Supply chain process reengineering is becoming more and more important. However, ways to manage and optimise supply chain processes are still a big challenge to most companies. In this research, a knowledge-based system is proposed for supply chain process modelling, reuse, and redesign. It uses grammatical modelling method to build supply chain process models. Furthermore, it can transform graphic supply chain process models to well-structured XML data based on the corresponding process definition language. Therefore, supply chain processes can be stored, searched, and evaluated in the system. Additionally, a case of a sample supply chain process is built in the system to demonstrate the operation of the system.
The rapid growth in consumer adoption of wearable devices has garnered the attention of both prac... more The rapid growth in consumer adoption of wearable devices has garnered the attention of both practitioners and academia. Competition in the wearable device market is both substantial and complicated. In this study, we investigate the impact of network externality on wearable device competition in a two-dimensional product differentiation model. We consider a market that has a broad array of products (horizontal differentiation) and various quality levels (vertical differentiation). We study two types of network externalities according to the product compatibility in two types of market structures. Our model indicates that firm profits are decreased by network externalities in horizontal dominance. Network externality also increases (decreases) the higher-quality (lower-quality) firm's profit in vertical dominance. Moreover, firms should ensure that their products are incompatible with those of rivals when network externality is large, and they should release compatible products when network externality is small in horizontal dominance. Firms should always ensure that their products are compatible with those of competitors in vertical dominance.
Users' privacy on social network sites is one of the most important and urgent issues in both ind... more Users' privacy on social network sites is one of the most important and urgent issues in both industry and academic fields. This paper is intended to investigate the effect of users' demographics, social network site experience, personal social network size, and blogging productivity on privacy disclosure behaviors by analyzing the data collected from social network sites. Based on two privacy sensitivity levels of disclosed information, the textual information of a user's blog postings can be converted into a 4-tuple to represent their privacy disclosure patterns, containing disclosing breadth and depth, and frequencies of high and low sensitive disclosures. The collections of a user's privacy disclosure patterns in social network sites can well reflect the user's privacy disclosure behaviors. Applying the general linear modeling approach to the blogging data converted with the coding scheme, we find that males and females have significantly differentiated privacy disclosure patterns in the dimensions of disclosing breadth and depth. In addition, age has negative and significant relationships with disclosing breadth, disclosing depth, and high sensitive disclosure. We also find that none of social network site experience, personal social network size, and blog length is significantly related to users' privacy disclosure patterns, while blog number always has positive associations with privacy disclosure patterns.
SUMMARY The researchers used data collected from ex-perts, consultants, and business staffers to ... more SUMMARY The researchers used data collected from ex-perts, consultants, and business staffers to identify important aspects related to venturing into cyber-commerce. We identified three pri-mary areas important to E-business activities: (1) Fundamental Requisites of Cyber-Com-merce, (2) Fundamental Business Operations within Cyberspace, and (3) Important Legal Is-sues within Cyber-Commerce.We suggest thatresearchers use the preliminary results discov-ered here as the basis for further investigation regarding E-business ventures. We also suggest that practitioners can use the results foundhere to help them prepare, adopt, and institu-tionalize the changes that E-business ventures bring to business organizations. Although the results here are still unproven, these results should provide some help for practitioners who will not w ait for mor e proven results r elat-ed to the three primary areas identified here.This research project provides preliminary results regarding the requisites fo...
To cope with the challenge of data scarcity in creditworthiness analysis for e-financing business... more To cope with the challenge of data scarcity in creditworthiness analysis for e-financing business, this paper proposes a cross-business analysis approach based on the assumption of behavior consistency for client in different e-commerce environments. By this approach we can analyze individuals’ creditworthiness by associating financial data on lending platforms and cross-business non-financial data on social media. We conceived three creditworthiness assessment models, and conduct the experimental study on Ant Financial Co-Creation Data Platform. The results verify that our cross-business creditworthiness analysis approach is effective.
Lecture Notes in Business Information Processing, 2012
With advancements made to the Internet, a considerable increase in the number and types of produc... more With advancements made to the Internet, a considerable increase in the number and types of products available online has come. Yet, the large amount of online consumer reviews may present an obstacle to potential buyers. This study proposes a four-dimensional book evaluation system for use by leading online booksellers, thereby enabling potential buyers to form decisions based on differentiated criteria. This book evaluation system was empirically examined by employing a text mining approach and multivariate regression model. The findings here-in may aid in improving the understanding of the construction of online product evaluation systems.
It is clear from recent history that companies who benefit most in e-commerce (EC) business activ... more It is clear from recent history that companies who benefit most in e-commerce (EC) business activities are those who either provide a fundamental e-commerce service or brick-n-mortar companies who approach e-commerce more judiciously. Already successful in conducting business in standard ways, these brick-n-mortar companies approach EC with the
This paper is intended to analyze the interrelationship between the textual comment and the itemi... more This paper is intended to analyze the interrelationship between the textual comment and the itemized rating in consumers' online feedback, and to study differentiations among diversified segments of consumers who leave the feedback. The data were collected from both an international top tourism service website which operates hotel booking services internationally and offers online hotel reputation feedback services, and its China host website. Based on the coded comments and itemized ratings from the dataset, our study shows that different customer segments demonstrate varied interrelationship behavioral patterns, and factors like satisfaction and contextual backgrounds will matter. The findings from this research may help hotels to develop varied marketing strategies for different segment of customers, and help online reputation sites to improve their services by distinguishing dissimilar behavioral patterns in different customer segments.
Purpose– User-generated content (UGC), i.e. the feedback from consumers in the electronic market,... more Purpose– User-generated content (UGC), i.e. the feedback from consumers in the electronic market, including structured and unstructured types, has become increasingly important in improving online businesses. However, the ambiguity and heterogeneity, and even the conflict between the two types of UGC, require a better understanding from the perspective of human cognitive psychology. By using online feedback on hotel services, the purpose of this paper is to explore the effects of satisfaction level, opinion dispersion and cultural context background on the interrelationship between structured and unstructured UGC.Design/methodology/approach– Natural language processing techniques – specifically, topic classification and sentiment analysis on the sentence level – are adopted to retrieve consumer sentiment polarity on five attributes relative to itemized ratings. Canonical correlation analyses are conducted to empirically validate the interplay between structured and unstructured UGC ...
... Experimental system design The experimental system is a web-based application with three modu... more ... Experimental system design The experimental system is a web-based application with three modules: 1) Front ... this experimental economy.1 The research model suggests that the proposed relationships are based on features ... Fraud rate 2204 0.0161 0.0137 0.0148 0.0147 0.001 ...
... [7] A. Susarla, A. Barua, and AB Whinston, “Understanding the Service Component of Applicatio... more ... [7] A. Susarla, A. Barua, and AB Whinston, “Understanding the Service Component of Application Service Provision: An Empirical Analysis of Satisfaction with ASP Services,” MIS Quarterly (27:1), March 2003, pp.91-123. [8] A. Tamhankar, and S. Ram, "Database Fragmentation ...
In recent years, pattern password has been widely used for user authentication on smartphones and... more In recent years, pattern password has been widely used for user authentication on smartphones and other mobile devices in addition to the traditional password protection approach. However, pattern password authentication mechanism is incapable of protecting users from losses when a user\u27s login credential information is stolen. We propose an identity verification scheme based on user’s touching behaviors when inputting a pattern password on the smartphone screen. By exploiting the biometrical features, such as position, pressure, size, and time when a user inputs a pattern password to a smartphone, the proposed user verification mechanism can validate whether the user is the true owner of the smartphone. We adopted fuzzy logic, artificial neural network, and support vector machine, to build classifiers, using the behavioral data collected from 10 users. The experimental results show that all the three algorithms have significant recognition capacity, and the fuzzy logic algorithm...
This paper presents an overview of the history of e-government in China, clarifies the conceptual... more This paper presents an overview of the history of e-government in China, clarifies the conceptual vagueness of e-government, and explains the current situations with a model for understanding the status of e-government in China.
Currently, the predominant pricing plan for the search engine (SE) advertising services in a prop... more Currently, the predominant pricing plan for the search engine (SE) advertising services in a proprietary electronic market is a flat fee (FF) pricing. These services have faced the challenge of customer attrition recently since FF pricing results in the inequality of service surplus among subscribers. A more sustainable and profitable pricing model would be to distinguish advertising resources by providing an additional usage-based pricing for certain user groups to transfer the service surplus among subscribers. We conceive a hybrid model integrating Pay-Per-Click (PPC) pricing into FF pricing. This proposed scheme can offer an incentive-compatible mechanism to attract more subscribers by relieving the inequity of service surplus, and eventually result in the increasing revenue of service providers.
Online reviews are an important asset for users who are deciding to buy a product, see a movie, o... more Online reviews are an important asset for users who are deciding to buy a product, see a movie, or go to a restaurant and for managers who are making business decisions. The reviews from e-commerce websites are usually attached to ratings, which facilitates learning from the reviews by users. However, many reviews that spread across forums or social media are written in plain text, which is not rated, and these reviews are called non-rated reviews in this paper. From the perspective of sentiment analysis at the aspects level, this study develops a predictive framework for calculating ratings for non-rated reviews. The idea behind the framework began with an observation: the sentiment of an aspect is determined by its context; the rating of the review depends on the sentiment of the aspects and the number of positive and negative aspects in the review. Viewing term pairs that co-occur with aspects as their context, we conceived of a variant of a Conditional Random Field model, called SentiCRF, for generating term pairs and calculating their sentiment scores from a training set. Then, we developed a cumulative logit model that uses aspects and their sentiments in a review to predict the ratings of the review. In addition, we met the challenge of class imbalance when calculating the sentiment scores of term pairs. We also conceived of a heuristic re-sampling algorithm to tackle class imbalance. Experiments were conducted on the Yelp dataset, and their results demonstrate that the predictive framework is feasible and effective at predicting the ratings of reviews. Published by Elsevier Inc.
1 Zhangxi Lin is an assistant professor in the area of information system and quantitative scienc... more 1 Zhangxi Lin is an assistant professor in the area of information system and quantitative sciences, Texas Tech University. 2 Gary Anderson is the CTO for IMW. 3 TJ Anderson is the CEO for IMW.
In this paper, we propose a banyan-tree topology for the wireless coverage along the road or rail... more In this paper, we propose a banyan-tree topology for the wireless coverage along the road or railway, which is characterized as a zonal network. Theoretical analysis and numerical studies show that the proposed banyan-tree topology is appropriate for the zonal network with the Wireless Mesh Network (WMN) technology, which is feasible to deploy and has the enhanced robust, improved bandwidth with this topology.
Multimedia applications bring demands on broadband real-time data transfer, which needs resource ... more Multimedia applications bring demands on broadband real-time data transfer, which needs resource reservation protocol (RSVP) helps to satisfy. However, handover processes bring delay, and existing authentication mechanism makes it further worse. Based on Pareto distribution patterns of mobile station communication traffic, proposed a trust transfer mechanism to execute pre-anticipated trust transfer and shorten the delay. It means that the dominant minority correspondent nodes designed in the VIP address books are informed about trust context messages, such as the information of handover, AAA, QoS, before anticipated handover. With the trust transfer mechanism, the simplification can be made to the authentication mechanism, which divides trust handover sequencing into several paralleled parts and budges some steps between stations. Thereby cut processes on each node by processes simultaneously carrying. Simulation with a modified NS2 platform showed that when time setforward equals ...
Objective To observe the effect of allopurinol or benzbromarone on lowering blood uric acid level... more Objective To observe the effect of allopurinol or benzbromarone on lowering blood uric acid level to delay the progression of diabetic renal failures.Methods 140 diabetic patients with mild hyperuricemia were randomly divided into treatment group(72 cases) and control group(68 cases).The patients in the treatment group were treated with allopurinol or benzbromarone to control their uric acid to the normal range.The same drug treatment was used in chronic renal failure in the two groups.Observation period was 24 months to compare the differences of patients with chronic renal failure in two groups.The endpoint was that serum creatinine doubled the baseline into the end-stage renal disease(dialysis or serum creatinine 707 μmmol/L) and all-cause mortality.Results The patients had elevated blood urea nitrogen and creatinine levels,but the treatment group had a lower increasing degree of urea nitrogen and creatinine than that in the control group(t=2.22,p0.01 and t=3.35,p0.05).In treatment group,16 patients reached end point,while in the control group,36 patients reached end point.The end point events in the treatment group were lower than those in the control group(22.9% vs 51.4%.χ2=5.011,p=0.023).Conclusion Lowering serum uric acid in patients with diabetic nephropathy can significantly delay the progress of renal failures,which indicates that we should reduce the blood uric acid to normal levels as soon as possible.
International Journal of Electronic Business, 2012
Modern competition requires quick response from the supply chain. Supply chain process reengineer... more Modern competition requires quick response from the supply chain. Supply chain process reengineering is becoming more and more important. However, ways to manage and optimise supply chain processes are still a big challenge to most companies. In this research, a knowledge-based system is proposed for supply chain process modelling, reuse, and redesign. It uses grammatical modelling method to build supply chain process models. Furthermore, it can transform graphic supply chain process models to well-structured XML data based on the corresponding process definition language. Therefore, supply chain processes can be stored, searched, and evaluated in the system. Additionally, a case of a sample supply chain process is built in the system to demonstrate the operation of the system.
Uploads
Papers by Zhangxi Lin