Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

DEA Efficiency with Side Constraints Review Exercise 5.5. After looking at the analysis, your corporate client proposes a refinement. Since the corporation has emphasized market share in other divisions, the following constraint is suggested: the virtual Exercise :

Evaluating Restaurant Efficiency Celia's Tacqueria is a chain of five Mexican restaurants in Florida. A DEA evaluation is being conducted to make comparisons of the different locations. Input measures for the restaurants include weekly hours of operation, fulltime equivalent staff, and weekly supply expenses. Output measures of performance include average weekly contribution to profit, market share, and annual growth rate. Data for the input and output measures are shown in Table.

(a) Perform a DEA evaluation for this set of units, listing the efficiency and the virtual outputs for each of restaurants.

(b) For each of the inefficient units, find the reference set and calculate the inputs and outputs for a corresponding HCU.

Table . Inputs and Outputs for Five Restaurants

Restaurant

Input measures

Hours of operation

Fit
staff

Supplies
($)

Jacksonville

96

16

850

Daytona

110

22

1400

Gainesville

100

18

1200

Ocala

125

25

1500

Orlando

120

24

1600

 

Output measures

 

Weekly

% Market

% Growth

Restaurant

profit ($)

share

rate

Jacksonville

3800

25

8.0

Daytona

4600

32

8.5

Gainesville

4400

35

8.0

Ocala

6500

30

10.0

Orlando

6000

28

9.0

output for market share should be at least 150 percent of the virtual output from either profit or growth.

(a) With the side constraints added, calculate the efficiencies of the five restaurants.

(b) What are the advantages and disadvantages of using the side constraint?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91919228

Have any Question?


Related Questions in Management Information System

Question in roughly 200 words - explain what social

Question : In roughly 200 words - Explain what social engineering is, and discuss how organizations can recognize social engineering and reduce the risks associated with it. The response must be typed, single spaced, mus ...

Discussion 1 1why would someone shop on the internet buy an

Discussion 1: 1. Why would someone shop on the Internet? Buy an iPod? Eat at TGI Friday's frequently? 2. a. Why would someone else not make those purchases? 3. b. How would you choose one outlet, brand, or model over the ...

Linux is the best-known and most-utilized open source

Linux is the best-known and most-utilized open source operating framework. As an operating framework, Linux is programming that sits underneath the greater part of the other programming on a PC, getting demands from thos ...

Case study-assignment prepare an in-depth analysis of four

Case Study-Assignment Prepare an in-depth analysis of four case studies during the semester. Here are some guidelines: • This is an individual assessment, which is a part from your course score. It requires effort and cr ...

Dscussion ethics and information management using

Discussion: Ethics and Information Management Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please no ...

Quantum cryptographyafter reading and review sslides on

Quantum cryptography After reading and review sslides on chapter 10 and 11 - write a paper outlining a position on the use of Quantum cryptography. What problem is quantum cryptography solving? explain. Detail how quantu ...

Assignmentcontinuing with a company you selected in week

Assignment Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: Impacts of Performance Manag ...

Discussionsearch google scholar for a company school or

Discussion Search "google scholar" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to en ...

Designing team and team identitypart 1 think about how to

Designing Team and Team Identity Part 1: Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships. How would compose a team for completing a course/work ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As