Show simple item record

Network Migration Strategies: Evaluating Performance with Extensions of Data Envelopment Analysis.

dc.contributor.authorSutton, Warren Travisen_US
dc.date.accessioned2010-06-03T15:43:45Z
dc.date.availableNO_RESTRICTIONen_US
dc.date.available2010-06-03T15:43:45Z
dc.date.issued2010en_US
dc.date.submitteden_US
dc.identifier.urihttps://hdl.handle.net/2027.42/75909
dc.description.abstractIn the current economic climate, many companies are facing pressures to operate more efficiently resulting in frequent mergers, acquisitions, and reorganizations. This often necessitates a change in various network structures within these organizations, which leads to the guiding question of this study. How does an organization efficiently and effectively transition its network structures while making use of multiple performance measures? This dissertation seeks to develop models and algorithms, based on Data Envelopment Analysis (DEA), to analyze perturbations in real-world network topologies. The first part of this dissertation shows the historical development of DEA with an introduction of notation and extensions. The next chapter is a detailed study of US airport inefficiency, which answers the question: Is there a difference in the efficiency of hub and non-hub airports in the United States? After decomposing the efficiency into scale efficiency, mixed efficiency and pure technical efficiency, the Wilcoxon Rank Sum test is able to show that there are differences between hub and non-hub airports. The fourth section of the dissertation develops a theoretical model, the Inverse Range-based Directional Distance model (INVRDD-DEA), to address the presence of reverse quantities in DEA and yield shortest path projections. This model leads to the Fully Comprehensive RDD-DEA model that takes into account all sources of inefficiency. This model is then used to illustrate all sources of inefficiency in a greenhouse gas example. The final contribution of the dissertation is an exploration into the evolution of the operations research approach to the field of network science. The concept of re-engineering of networks, defined as the ability to optimize perturbations to existing networks based on several performance metrics, is used as a methodological model for typical types of changes that exist in cooperate networks. The critical factors for building an algorithm for modifying network topologies are identified and used to design a procedure for making changes in networks. Finally, an example of an ERP implementation is given to show the benefits of using DEA to make changes to existing network topologies.en_US
dc.format.extent1625118 bytes
dc.format.extent1373 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_USen_US
dc.subjectData Envelopment Analysisen_US
dc.subjectReverse Quantitiesen_US
dc.subjectNetwork Migrationen_US
dc.titleNetwork Migration Strategies: Evaluating Performance with Extensions of Data Envelopment Analysis.en_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineIndustrial & Operations Engineeringen_US
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studiesen_US
dc.contributor.committeememberSeiford, Lawrence M.en_US
dc.contributor.committeememberAdamic, Lada A.en_US
dc.contributor.committeememberAydin, Gokeren_US
dc.contributor.committeememberBaek, Seungkeeen_US
dc.subject.hlbsecondlevelIndustrial and Operations Engineeringen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/75909/1/wsutton_1.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.