How 3D Virtual Prototyping Can Compress New Product Development

By Steve Tracey📧 and Kusumal Ruamsook📧 

In Supply Chain Xchange, June 7, 2024.

Contemporary supply chains have become more comprehensive as a result of economic globalization, and increased product and service complexity driven by ever-increasing consumer demand and expectations. Rising against this backdrop is the importance of supply chain compression. Literally defined as “the act of making something smaller or shorter,” compression can be a useful strategy for supply chain management (SCM) that potentially generates competitive advantages for companies. While compression-based exploits can be pursued across supply chain processes, doing so in the new product development (NPD) stage can provide a great opportunity to realize the value of compression strategies. Developing new products can often be time-consuming and resource intensive. By introducing 3D virtual prototyping and extended reality technologies, companies can make their new product development process more efficient, agile, and interactive.

View the full article from the publisher web site here.

Related CSCR White Paper:

Read “Remastering Supply Chain Compression in Virtual 3D: Exploring the Potentials of 3D Virtual Technology Applications” here.

Remastering Supply Chain Compression in Virtual 3D: Exploring the Potentials of 3D Virtual Technology Applications

By Steve Tracey📧 and Kusumal Ruamsook📧 

White paper, February 2023

Contemporary supply chains have become more comprehensive as a result of economic globalization, and increased product and service complexity driven by ever-increasing consumer demand and expectations. Rising against this backdrop is the importance of supply chain compression. While compression-based exploits can be pursued across supply chain processes, doing so in the new product development (NPD) stage can provide a great opportunity to realize the value of compression strategies. An emerging trend in the strive for rapid innovation is the transition from traditional innovation models that were local, physical, sequential, and product-centric to one that is more global, more virtual, more concurrent and iterate, and more customer- and experience-centric.  Under the new paradigm, 3D virtual prototyping (VP) technologies—enhanced by the advancement of extended reality (XR) techniques that includes virtual reality (VR), augmented reality (AR), and mixed reality (MR)—have garnered attention in various industries for their potentials to enable NPD compressions. Despite its promises, VP technology applications under the new NPD model are still nascent and the technology itself continues to evolve.  To offer a better understanding in this area, this white paper introduces the concept of supply chain compression (SCC), provides an overview of the fundamental differences between conventional and new concurrent NPD models, and discusses potential applications of XR-enhanced VP techniques in NPD activities and resulting compression-induced business values.

View full paper here.


Suggested citation

Tracey, Steve, and Kusumal Ruamsook. 2023. “Remastering Supply Chain Compression in Virtual 3D: Exploring the Potentials of 3D Virtual Technology Applications.” White paper, Center for Supply Chain Research® (CSCR®), The Pennsylvania State University.

Catching the Blockchain Wave for Procurement Applications

By Steve Tracey📧Kusumal Ruamsook📧 and Henry Ines

In CSCMP’s Supply Chain Quarterly, Quarter 3, 2022.

Enterprises are increasingly realizing the ability of digital technologies to create a competitive advantage in the procurement function. To date, digital technologies like analytics, artificial intelligence, and robotics process automation have been widely deployed in various procurement domains. Now, a much-hyped newcomer, blockchain, is swiftly gathering momentum. Blockchain has advanced significantly since its early application as the underlying technology of Bitcoin, expanding its field of possible applications. In particular, its ability to enable transparency, traceability, operational efficiency, and trust among users could potentially disrupt procurement operations. Supply chain executives cannot afford to ignore this promising, but yet-to-mature technology. However, blockchain’s novelty and dynamic innovations can make it hard to grasp how this evolving technology could be applied in the real world. To help procurement organizations catch the wave of blockchain technology, this article examines blockchain applications in digital procurement. It highlights areas of applicability and discusses how different blockchain utilities can be advantageously harnessed across procurement processes.

View the full article from the publisher web site here.

Related CSCR White Papers:

Read “Blockchain Fundamentals and Enterprise Applications [Full Paper: Parts 1 and 2]” here.

Read “Blockchain Fundamentals and Enterprise Applications [Part 1]” here.

Blockchain Fundamentals and Enterprise Applications [Full Paper: Parts 1 and 2]

By Steve Tracey📧 and Kusumal Ruamsook📧

White paper, Parts 1 and 2, August 2022

Motivated by one of CSCR® recent collaborative research initiatives with GoChain as our highly regarded partner in the enterprise and government blockchain solutions, CSCR® developed a two-part white paper that explores blockchain technology and its enterprise applications.  Given the novelty of the technology, this full white paper, a consolidation of its two parts, explores blockchain technology from various perspectives—ranging from a bird-eye view, an evolutionary view, a “light” technical view, to an enterprise applications view.  With this white paper, the authors hope to bring researchers and business readers up to speed on the essential foundations about blockchain technology and its state of play in enterprise applications.  We hope that interested readers find the information herein a helpful starting point in the journey to bridge the boundaries between the prospects and beneficial realization of this promising technology.

View full paper here.


Suggested citation

Tracey, Steve, and Kusumal Ruamsook. 2022. “Blockchain Fundementals and Enterprise Applications.” White paper, Parts 1 and 2, Center for Supply Chain Research® (CSCR®), The Pennsylvania State University.

Artificial Intelligence and Machine Learning: Making Practical Use of a Growing Technology

By Benjamin Wackerman, supervised by Robert A. Novack📧 (Thesis Supervisor) and John C. Spychalski📧 (Honors Advisor) (2022)

Artificial intelligence (AI) and machine learning (ML) are relevant technologies that have been a topic of conversation in the business field for several years. Many strides have been made to introduce these technologies into the consumer experience and the everyday lives of the modern American. With the current supply chain limitations causing issues for firms across the world, more companies are looking to find practical uses of AI and ML that will increase supply chain efficiency and decrease costs. This thesis looks to gain a better understanding of the history and principles of AI and ML while also highlighting specific examples of use cases within firms’ supply chains. With the prevalence of research into AI and ML, a major portion of this paper contains a literature review of documents concerning the progress of AI and ML as well as examples of companies that have relevant use cases for these technologies. After an extensive literature review, this thesis contains an analysis of several conducted interviews with supply chain professionals who have considerable experience working in AI and ML. These interviews helped gain insight into real-world experiences with AI and ML in supply chain and the risks that had to be mitigated to successfully transition a process with these systems.

Access the paper at Electronic Theses for Schreyer Honors College (ETDA) website here.

Bitcoin Price Forecasting: A Perspective of Underlying Blockchain Transactions

By H. Guo, D. Zhang, S. Liu📧, Lei Wang📧, and Y. Ding

In Decision Support Systems, 2021, 151:113650. https://doi.org/10.1016/j.dss.2021.113650

Cryptocurrency price forecasting plays an important role in financial markets. Traditional approaches face two challenges: (1) it is difficult to ascertain the influential factors related to price forecasting; and (2) due to the 24/7 trading policy, cryptocurrencies’ prices face very large fluctuations, thus weakening the forecasting power of traditional models. To address these issues, we focus on Bitcoin and identify the influential factors related to its price forecasting from the perspective of underlying blockchain transactions. We then propose a price forecasting model WT-CATCN, which leverages Wavelet Transform (WT) and Casual Multi-Head Attention (CA) Temporal Convolutional Network (TCN), to forecast cryptocurrency prices. Our model can capture important positions of input sequences and model the correlations among different data features. Using real-world Bitcoin trading data, we test and compare WT-CATCN with other state-of-the-art price forecasting models. The experiment results show that our model improves the price forecasting performance by 25%.

Keywords: Cryptocurrency; Blockchain; Bitcoin; Price forecasting; Deep learning

Blockchain Fundamentals and Enterprise Applications [Part 1]

By Steve Tracey📧 and Kusumal Ruamsook📧

White paper, Part 1, November 2021

Motivated by one of CSCR® recent collaborative research initiatives with GoChain as our highly regarded partner in the enterprise and government blockchain solutions, CSCR® developed a two-part white paper that explores blockchain technology and its enterprise applications.  Given the novelty of the technology, Part 1 of the paper explores blockchain technology from various perspectives—ranging from a bird-eye view, an evolutionary view, to a “light” technical view.  With this white paper, the authors hope to bring researchers and business readers up to speed on the essential foundations about blockchain technology, and pave a background understanding for Part 2 of the paper which will investigate its applications in supply chain management.

View full paper here.


Suggested citation

Tracey, Steve, and Kusumal Ruamsook. 2021. “Blockchain Fundementals and Enterprise Applications.” White paper, Part 1, Center for Supply Chain Research® (CSCR®), The Pennsylvania State University.

Towards Robust Monitoring of Malicious Outbreak

By S. Tang, S. Liu📧, X. Han, and Y. Qiao

In INFORMS Journal on Computing, 2021. 34 (2): 1257–1271. https://doi.org/10.1287/ijoc.2021.1077

Recently, diffusion processes in social networks have attracted increasing attention within computer science, marketing science, social sciences, and political science. Although the majority of existing works focus on maximizing the reach of desirable diffusion processes, we are interested in deploying a group of monitors to detect malicious diffusion processes such as the spread of computer worms. In this work, we introduce and study the (𝛼,𝛽)(α,β)-Monitoring Game} on networks. Our game is composed of two parties an attacker and a defender. The attacker can launch an attack by distributing a limited number of seeds (i.e., virus) to the network. Under our (𝛼,𝛽)(α,β)-Monitoring Game, we say an attack is successful if and only if the following two conditions are satisfied: (1) the outbreak/propagation reaches at least α individuals without intervention, and (2) it has not been detected before reaching β individuals. Typically, we require that β is no larger than α in order to compensate the reaction delays after the outbreak has been detected. On the other end, the defender’s ultimate goal is to deploy a set of monitors in the network that can minimize attacker’s success ratio in the worst-case. (We also extend the basic model by considering a noisy diffusion model, where the propagation probabilities on each edge could vary within an interval.) Our work is built upon recent work in security games, our adversarial setting provides robust solutions in practice. Summary of Contribution: Although the diffusion processes in social networks have been extensively studied, most existing works aim at maximizing the reach of desirable diffusion processes. We are interested in deploying a group of monitors to detect malicious diffusion processes, such as the spread of computer worms. To capture the impact of model uncertainty, we consider a noisy diffusion model in which the propagation probabilities on each edge could vary within an interval. Our work is built upon recent work in security games; our adversarial setting leads to robust solutions in practice.

Keywords: Robust monitoring; Diffusion dynamics; Security game; Double oracle

A Hierarchical 3D-motion Learning Framework for Animal Spontaneous Behavior Mapping

By K. Huang, Y. Han, K. Chen, H. Pan, G. Zhao, W. Yi, X. Li, S. Liu📧, P. Wei, and Liping Wang

In Nature Communications, 2021, 12, 2784. https://doi.org/10.1038/s41467-021-22970-y

Animal behavior usually has a hierarchical structure and dynamics. Therefore, to understand how the neural system coordinates with behaviors, neuroscientists need a quantitative description of the hierarchical dynamics of different behaviors. However, the recent end-to-end machine-learning-based methods for behavior analysis mostly focus on recognizing behavioral identities on a static timescale or based on limited observations. These approaches usually lose rich dynamic information on cross-scale behaviors. Here, inspired by the natural structure of animal behaviors, we address this challenge by proposing a parallel and multi-layered framework to learn the hierarchical dynamics and generate an objective metric to map the behavior into the feature space. In addition, we characterize the animal 3D kinematics with our low-cost and efficient multi-view 3D animal motion-capture system. Finally, we demonstrate that this framework can monitor spontaneous behavior and automatically identify the behavioral phenotypes of the transgenic animal disease model. The extensive experiment results suggest that our framework has a wide range of applications, including animal disease model phenotyping and the relationships modeling between the neural circuits and behavior.

Keywords: Hierarchical dynamics; Animal behavior; 3D motion-capture system

Impact of Gamification on Perceptions of Word-of-Mouth Contributors and Actions of Word-of-Mouth Consumers

By Lei Wang📧, K. Gunasti, R. Shankar, J. Pancras, and R. Gopal

In MIS Quarterly, 2020, 44 (4): 1987–2011. DOI: 10.25300/MISQ/2020/13726

Gamification has been shown to encourage contributions of user-generated reviews (word-of-mouth, WOM) in various domains, including travel and leisure related platforms (Foursquare, TripAdvisor), e-commerce (Amazon), and auctions (eBay). WOM contributors write reviews about products/services provided by business venues and WOM consumers read reviews and use them to form attitudes and make purchase decisions. Gamification elements such as points and badges, awarded to WOM contributors for various reasons, and displayed to WOM consumers, have a dual role in WOM context. First, points awarded for user contributions help motivate WOM contributors to increase their participation. Second, badges awarded to users for visiting business venues signal prior experience or competence, and they help determine how WOM consumers perceive WOM contributors and form their judgments based on the reviews. While the first role of gamification (i.e., motivating users) has been widely studied, the impact of WOM presented along with gamification elements on the perceptions and behavior of the target audience, WOM consumers, has not been examined. This is important to businesses that are looking to attract customers. Drawing on social psychology literature, we show that gamification symbols signaling experience that accompanies WOM leads to perceptions of positive WOM contributors as more competent. This leads to important changes in behavioral outcomes such as willingness to visit/buy and willingness to recommend the reviewed outlets.

Keywords: Gamification; Word-of-mouth; Badge; Competence