scispace - formally typeset
Search or ask a question
JournalISSN: 1748-1252

International Journal of Enterprise Network Management 

Inderscience Publishers
About: International Journal of Enterprise Network Management is an academic journal published by Inderscience Publishers. The journal publishes majorly in the area(s): Computer science & Supply chain. It has an ISSN identifier of 1748-1252. Over the lifetime, 207 publications have been published receiving 891 citations. The journal is also known as: Enterprise network management & IJENM.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a methodology is proposed that allows one to articulate the complex relationship between Lean principles and their overall environmental impacts for specific processes, and a case study illustrates the application of the methodology to the metal cutting industry using single and/or multipoint cutting.
Abstract: Literature provides numerous examples of the effectiveness of Lean operations (Lean) in increasing the competitive posture of manufacturers. However, less obvious is the impact of Lean on the environmental performance of the manufacturer. A methodology is proposed that allows one to articulate the complex relationship between Lean principles and their overall environmental impacts for specific processes. A case study illustrates the application of the methodology to the metal cutting industry using single and/or multipoint cutting.

84 citations

Journal ArticleDOI
TL;DR: In this paper, an extended tool of DEA, namely cross efficiency evaluation method, was used to measure the performance of the nations in the Summer Olympic Games of Sydney 2000, and the average cross efficiencies were calculated and were compared to those originated from the radial efficiency method and other previous works.
Abstract: In this paper, an extended tool of DEA, namely cross efficiency evaluation method, was used to measure the performance of the nations in the Summer Olympic Games of Sydney 2000. The model in the paper considered two inputs (GNP per capita and population) and a single output (the weighted sum of amounts of medals won). The advantages of the proposed model rest on the fact that it provides for a unique ranking of the participants and eliminates the unrealistic weight schemes without requiring the elicitation of extra weight restrictions. The average cross efficiencies were calculated and were compared to those originated from the radial efficiency method and other previous works. Also, cluster analysis technique was used to select the more appropriate targets for poorly performing countries to use as benchmarks.

34 citations

Journal ArticleDOI
TL;DR: In this article, the authors identify critical issues that would contribute to effective performance of Information System (IS) management in Indian SMEs sector and present the four important issues in IS management, IS strategy, competitive priorities, benefits observed/perceived by effective management of IS function and barriers observed in implementing IS management practices.
Abstract: To improve overall business performance and the more and more use of Information Technology (IT) have forced Small- and Medium-Sized Enterprises (SMEs) to design and deploy effective strategy for management of Information system (IS) function and follow proper IS-related practices. SMEs with limited resources may be able to deploy IS for their normal operations, but may not be able to manage the IS functions or follow IS practices properly. This study aims to identify critical issues that would contribute to effective performance of the IS management in Indian SMEs sector. On the basis of the four case studies from diverse SMEs from three different states of western India, this paper presents the four important issues in IS management – IS strategy, competitive priorities, benefits observed/perceived by effective management of IS function and barriers observed in implementing IS management practices. On the basis of the analysis of the case studies, several propositions as recommendations such as the role of top management, use of IT tools, investment in IT, supply chain linkages and work culture for an effective IS management in Indian SMEs have been discussed.

30 citations

Journal ArticleDOI
TL;DR: In this article, a Radio Frequency Identification (RFID-)based Decision Support System (RDSS) is proposed for shop floor management to keep track of resources, monitor the throughput rate and make instant decisions for problem solving.
Abstract: In the past, it was difficult to have a clear picture of the present status of production in shop floor. Many enterprises have adopted bar-code-based Shop Floor Control Systems (SFCSs) for monitoring the production status. However, the deficiency of such systems is that immediate situation cannot be reflected easily. As a result, planned production schedules cannot be fulfilled due to frequent job interruptions caused by machine breakdowns or a shortage of materials. In this paper, a Radio Frequency Identification- (RFID-)based Decision Support System (RDSS) is proposed for the shop floor management to keep track of resources, monitor the throughput rate and make instant decisions for problem solving. The proposed system integrates the technologies of RFID and Rule-Based Reasoning (RBR) with production mathematical algorithm to help monitor shop floor operations. Through pilot running of RDSS in the ABC Limited, a significant improvement in terms of shop floor responsiveness was achieved.

22 citations

Journal ArticleDOI
TL;DR: The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources.
Abstract: Wireless mobile networks consist of autonomous with a limited battery life; there are many challenges in identifying false data. False data is generally detected and dropped by the sink, but the false data travelling in the network causes a lot of battery wastage. The work presented in this paper concerns about filtering the false data in the routing nodes before it reaches the sink and saves the resources. The proposed solution involves using advanced encryption standard (AES) by deploying keys to the mobile ad hoc nodes when the network is first deployed. The data is verified by usage of message authentication code. Location and the time stamp of the forwarding nodes is monitored to detect unusual activity by the forwarding nodes.

20 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20248
202322
202243
20212
20202
201915