A Hybrid Approach for Critical Technology Identification

Article Preview

Abstract:

There have been attempts to indentify critical technology from many alternative technologies. Accordingly, we can form an R&D policy effectively if we can forecast central technologies. Multi-criteria decision-making method and Centrality Analysis have been applied to the problem. However, these two approaches have some limitations. This study proposes a hybrid approach to identify critical technologies in a technology network which take full advantage of experts’ experience in technology field and relationship between technologies at the same time. Fuzzy comprehensive evaluation and Centrality Analysis of node are used in the approach. A case study on hypothetical critical technology identification problem is used to illustrate the proposed approach.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2438-2443

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chulhyun Kim, Hyeonju Seol: The 9th International Conference on Electronic Business(Macau, November 30 - December 4, 2009). p.689.

Google Scholar

[2] Hakyeon Lee, Chulhyun Kim, Hyunmyung Cho, Yongtae Park: Expert Systems with Applications, Vol. 36 (2009) No. 1, p.894.

Google Scholar

[3] M. Lamb, M.J. Gregory: International Conference on Management of Engineering and Technology (Portland, Ore, 1997). p.206.

Google Scholar

[4] Y.G. Lee, Y.I. Song: Technovation, Vol. 27 (2007) No. 1, p.57.

Google Scholar

[5] Information on http: /www. foresight-platform. eu.

Google Scholar

[6] Information on http: /www. unido. org.

Google Scholar

[7] Yu-Lung Hsu, Cheng-Haw Lee, V.B. Kreng: Expert Systems with Applications, Vol. 37 (2010), p.419.

Google Scholar

[8] Information on http: /www. whitehouse. gov.

Google Scholar

[9] Daniel. R. Georidiadis, Thomas A. Mazzuchi, Shahram Sarkanil: System Engineering, Vol. 16 (2013), p.287.

Google Scholar

[10] Zhigang Jiang, Hua Zhang, John W. Sutherland: Journal of Cleaner Production, Vol. 19 (2011), p. (1939).

Google Scholar

[11] Sunghae Jun: International Conferences, ASEA and DRBC(Jeju island, Korea, November/December , 2012). Vol. 1, p.1.

Google Scholar

[12] Sunghae Jun: International Conferences, ASEA and DRBC(Jeju island, Korea, November/December , 2012). Vol. 1, p.28.

Google Scholar

[13] Juneseuk Shin, Yongtae Park: Information Economics and Policy, Vol. 19 (2007) No. 2, p.249.

Google Scholar

[14] Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, Robert J. Kauffman: Inf Technol Manage , Vol. 8 (2007), p.185.

Google Scholar

[15] Tugrul U. Daim, Guillermo Rueda, Hilary Martin, Pisek Gerdsir: Technology Forecasting, Vol. 73 (2006) No. 8, p.981.

Google Scholar

[16] Information on http: /link. springer. com.

Google Scholar

[17] Yoon, B., & Park, Y: Journal of High Technology, Vol. 15 (2003) No. 1, p.37.

Google Scholar

[18] Linton C. Freeman: Social Networks, Vol. 1(1978), p.215.

Google Scholar

[19] Chunyan Shao: International Business Research, Vol. 2(2009) No. 1, p.210.

Google Scholar

[20] L. Ma, Y. Liu, X. P. Zhou: International Journal of Engineering, Science and Technology, Vol. 2 (2010) No. 7, p.123.

Google Scholar

[21] Andrea Landherr, Bettina Friedl, Julia Heidemann: Business & Information Systems Engineering, Vol. 2 (2010) No. 6, p.371.

Google Scholar

[22] Information on http: /www. researchgate. net.

Google Scholar

[23] Information on http: /faculty. ucr. edu.

Google Scholar