2020
DOI: 10.1155/2020/7030642
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Risk and Expense Evaluation of Agility Supply Management of Machinery

Abstract: We provide a technical assessment and critique of the existing literature via highlighting problems associated with conceptualization and technical improvement of agility practices. By presenting a narrative evaluation of the technical review, we underscore the nature of the SC hazard in addition to agility practices and furnish a synthesis for future studies. The purpose is to examine the relationship between identifying and ranking the elements affecting supply management for SC agility in compressed natural… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 67 publications
0
13
0
Order By: Relevance
“…PUF based key sharing method uses one to one input output mapping with lookup tables. PUF keys can resist tampering attacks because an underlying Nano scale structural disorder [26][27][28]. PUF provides device dependent mapping unlike traditional security mechanism to store keys in EEPROM and SRAM.…”
Section: Machine Learning As a Solutionmentioning
confidence: 99%
“…PUF based key sharing method uses one to one input output mapping with lookup tables. PUF keys can resist tampering attacks because an underlying Nano scale structural disorder [26][27][28]. PUF provides device dependent mapping unlike traditional security mechanism to store keys in EEPROM and SRAM.…”
Section: Machine Learning As a Solutionmentioning
confidence: 99%
“…The Internet of Things (IoT) is globally expanding, providing diverse benefits in nearly every aspect of our lives. Unfortunately, the IoT is also accompanied by a large number of information security vulnerabilities and exploits [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…In the development of the wireless devices IT industry is at very high scale. All these sensing devices require energy which is supplied by the batteries [6][7][8][9][10][11]. These sensing devices are reliable for the months and years, but there batteries are not reliable for that time.…”
Section: Introductionmentioning
confidence: 99%