489 research outputs found
Studies on Management of Emergency Service Systems
RĂSUMĂ: Forts des outils de la thĂ©orie des files dâattente, de la gĂ©omĂ©trie stochastique et des extensions
dĂ©veloppĂ©es en cours de route, nous prĂ©sentons des modĂšles descriptifs de systĂšmes de services dâurgence organisĂ©s en fonction du potentiel de limitation explicite des distances de dispatching avec une fidĂ©litĂ© accrue du modĂšle et une stratĂ©gie de dispatching pour atteindre des performances maximales avec des ressources limitĂ©es. En utilisant le terme «sauvegardes
partielles» pour faire rĂ©fĂ©rence Ă des rĂšgles dâexpĂ©dition avec des limites explicites sur les
distances dâexpĂ©dition, nous Ă©tendons dâabord le modĂšle classique de mise en file dâattente hypercube pour inclure des sauvegardes partielles avec des prioritĂ©s. La procĂ©dure Ă©tendue pourra reprĂ©senter les systĂšmes de services dâurgence dans lesquels le sous-ensemble de
serveurs pouvant ĂȘtre envoyĂ©s Ă une demande dâintervention dâurgence dĂ©pend de lâorigine et
du niveau de service demandĂ©. Cela permet de dĂ©velopper des modĂšles dâoptimisation dans lesquels le concepteur du systĂšme laisse le choix des unitĂ©s de rĂ©ponse pouvant ĂȘtre envoyĂ©es dans chaque zone de demande et peut ĂȘtre intĂ©grĂ© Ă lâespace de la solution avec dâautres
variables de dĂ©cision dâemplacement ou dâallocation. La nouvelle mĂ©thode descriptive et les modĂšles dâoptimisation sur lesquels reposent les plans de rĂ©partition et de rĂ©partition optimaux correspondants devraient indiscutablement amĂ©liorer les performances et mieux reflĂ©ter le comportement rĂ©el des rĂ©partiteurs lorsque la configuration instantanĂ©e du systĂšme constitue
un facteur majeur dans la prise de dĂ©cision. Par la suite, nous Ă©tendons notre analyse. des dĂ©ploiements statiques couverts par le premier modĂšle vers des systĂšmes Ă relocalisation dynamique. En faisant des hypothĂšses dâuniformitĂ© sur les origines des demandes de service et les emplacements des unitĂ©s dâintervention, nous dĂ©veloppons un cadre thĂ©orique pour une
Ă©valuation rapide et alĂ©atoire de la performance du systĂšme avec une politique de sauvegarde partielle donnĂ©e et des rĂ©sultats donnĂ©s spĂ©cifiĂ©s en fonction du temps de rĂ©ponse. Le modĂšle gĂ©nĂ©ral permet de rĂ©vĂ©ler tout potentiel thĂ©orique dâamĂ©lioration des performances du systĂšme en utilisant des stratĂ©gies de dispatching de secours partielles aux stratĂ©gies tactiques ou opĂ©rationnelles, sans connaĂźtre les dĂ©tails de la mĂ©thode de relocalisation dynamique utilisĂ©e ni mĂȘme de la distribution de la demande au-delĂ du taux total dâarrivĂ©e et de la densitĂ©. Nous prĂ©sentons des rĂ©sultats auxiliaires et des outils Ă lâappui de notre traitement
des systĂšmes de service dâurgence avec sauvegardes partielles, notamment des notes sur les distributions de distance avec des effets liĂ©s et quelques lois de conservation du dĂ©bit liĂ©es aux situations de file dâattente rencontrĂ©es dans le cadre de ce travail.----------ABSTRACT: Armed with tools in queuing theory, stochastic geometry, and extensions developed along
the way, we present descriptive models of emergency service systems organized around and emphasizing the potential of explicitly limiting dispatch distances in increasing model fidelity and as a dispatching strategy to achieve maximal performance with limited resources.
Borrowing the term âpartial backupsâ to refer to dispatch policies with explicit limits on the dispatch distances, we first extend the classic hypercube queuing model to incorporate partial backups with priorities. The extended procedure will be able to represent emergency service systems where the subset of servers that can be dispatched to a request for emergency intervention depend on the origin and level of service requested. This allows for development of optimization models where the choice of response units eligible for dispatch to each demand
zone is left to the system designer and can be integrated into the solution space along with other location or allocation decision variables. The new descriptive method and thus the optimization models built upon and the corresponding optimal location and dispatch plans, should arguably lead to better performance and better reflect the actual dispatchersâ behavior where the instantaneous system configuration constitutes a major factor in making
assignment decisions. We next extend our analysis of static deployments covered by the first model to systems
with dynamic relocation. Making uniformity assumptions on the origins of service requests and locations of the response units, we develop a theoretical framework for quick and dirty evaluation of the system performance with a given partial backup policy and a given outcome
specified as a function of response time. The general model, makes it possible to reveal any theoretical potential to improve system performance by employing partial backup dispatching strategies at tactical or operational, without knowing the details of the dynamic relocation method used or even the demand distribution beyond the total arrival rate and the density per area. Finally, auxiliary results and tools supporting our treatment of emergency service systems with partial backups are presented, which include notes on distance distributions with boundary effects and a few rate conservation laws related to the queuing situations we encountered in this work
Making Medical Records More Resilient
Hurricane Katrina showed that the current methods for handling medicalrecords are minimally resilient to large scale disasters. This research presents a preliminary model for measuring the resilience of medical records systemsagainst public policy goals and uses the model to illuminate the current state of medical record resilience. From this analysis, three recommendations for how to make medical records more resilient are presented.The recommendations are: 1) Federal and state governments should use the preliminary resiliencemodel introduced here as the basis for compliance requirements for electronicmedical record technical architectures. 2) Regional Health Information Organizations (RHIOs) should consideroffering services in disaster management to healthcare organizations. This willhelp RHIOs create sustainable business models. 3) Storage companies should consider developing distributed storagesolutions based on Distributed Hash Table (DHT) technology for medical recordstorage. Distributed storage would alleviate public concerns over privacy withcentralized storage of medical records. Empirical evidence is presenteddemonstrating the performance of DHT technology using a prototype medicalrecord system
Making medical records more resilient
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2007.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Includes bibliographical references (p. 72-77).Hurricane Katrina showed that the current methods for handling medical records are minimally resilient to large scale disasters. This research presents a preliminary model for measuring the resilience of medical records systems against public policy goals and uses the model to illuminate the current state of medical record resilience. From this analysis, three recommendations for how to make medical records more resilient are presented. The recommendations are: 1) Federal and state governments should use the preliminary resilience model introduced here as the basis for compliance requirements for electronic medical record technical architectures. 2) Regional Health Information Organizations (RHIOs) should consider offering services in disaster management to healthcare organizations. This will help RHIOs create sustainable business models. 3) Storage companies should consider developing distributed storage solutions based on Distributed Hash Table (DHT) technology for medical record storage. Distributed storage would alleviate public concerns over privacy with centralized storage of medical records. Empirical evidence is presented demonstrating the performance of DHT technology using a prototype medical record system.by Robert Rudin.S.M
Factors Affecting Perceptions of Cybersecurity Readiness Among Workgroup IT Managers
The last decade has seen a dramatic increase in the number, frequency, and scope of cyberattacks, both in the United States and abroad. This upward trend necessitates that a significant aspect of any organizationâs information systems strategy involves having a strong cybersecurity profile. Inherent in such a posture is the need to have IT managers who are experts in their field and who are willing and able to employ best practices and educate their users. Furthermore, IT managers need to have awareness of the technology landscape in and around their organizations. After many years of cybersecurity research, large corporations have come to implicitly understand these factors and, as such, have invested heavily in both technology and specialized personnel with the express aim of increasing their cybersecurity capabilities. However, large institutions are comprised of smaller organizational units, which are not always adequately considered when examining the cybersecurity profile of the organization. This oversight is particularly true of colleges and universities where IT managers who are not affiliated with the institutionâs central IT department employ their own information security strategies. Such strategies may or may not represent a threat to the institutionâs overall level of cybersecurity readiness. Therefore, this research examines the responses of workgroup IT managers who are employed at the school or department level at institutions of higher learning within the United States to determine their perceptions of their cybersecurity readiness. The conceptual model that is developed in this study is referred to as the Practice and Awareness Cybersecurity Readiness Model (PACRM). It examines the relationships between an IT managerâs perceived readiness to detect, prevent, and recover from a cyberattack, and four base factors. Among the factors studied are the managerâs previous level of experience in cybersecurity, the extent of the managerâs use of best practices, the managerâs awareness of the network infrastructure in and around the organizational unit, and the degree to which the managerâs supported user community is educated on topics related to information security. First, a survey instrument is proposed and validated. Then, a Confirmatory Factor Analysis (CFA) is conducted to examine the relationships between the observed variables and the underlying theoretical constructs. Finally, the model is tested using path analysis. The validated instrument will have obvious implications for both cybersecurity researchers and managers. Not only will it be available to other researchers, it will also provide a metric by which practitioners can gauge their perceptions of their cybersecurity readiness. In addition, if the underlying model is found to have been correctly specified, it will provide a theoretical foundation on which to base future research that is not dependent on threats and deterrents but rather on raising the self-efficacy of the human resource
Replication and fault-tolerance in real-time systems
PhD ThesisThe increased availability of sophisticated computer hardware and the corresponding
decrease in its cost has led to a widespread growth in the use of computer systems for realtime
plant and process control applications. Such applications typically place very high
demands upon computer control systems and the development of appropriate control
software for these application areas can present a number of problems not normally
encountered in other applications.
First of all, real-time applications must be correct in the time domain as well as the value
domain: returning results which are not only correct but also delivered on time. Further,
since the potential for catastrophic failures can be high in a process or plant control
environment, many real-time applications also have to meet high reliability requirements.
These requirements will typically be met by means of a combination of fault avoidance and
fault tolerance techniques.
This thesis is intended to address some of the problems encountered in the provision of fault
tolerance in real-time applications programs. Specifically,it considers the use of replication
to ensure the availability of services in real-time systems. In a real-time environment,
providing support for replicated services can introduce a number of problems. In particular,
the scope for non-deterministic behaviour in real-time applications can be quite large and
this can lead to difficultiesin maintainingconsistent internal states across the members of a
replica group. To tackle this problem, a model is proposed for fault tolerant real-time
objects which not only allows such objects to perform application specific recovery
operations and real-time processing activities such as event handling, but which also allows
objects to be replicated. The architectural support required for such replicated objects is
also discussed and, to conclude, the run-time overheads associated with the use of such
replicated services are considered.The Science and Engineering Research Council
Decision-Support Framework for Integrated Asset Management of Major Municipal Infrastructure
"Canada's municipal infrastructure is at risk." This was the key finding of Canadaâs first municipal infrastructure report card. Given the current state of risk for Canadian infrastructure, municipalities face challenging decisions for planning the integrated repair/renewal of road, water and sewer networks. Decision-making surrounding the assets in these networks requires data collection, analysis, the identification of decision variables and undertaking optimized decision-making processes. Currently there is a lack of tools available to simplify the decision making process for stakeholders.
The research objective is to establish a methodology and framework that facilitates decision-making processes used during corridor rehabilitation project planning. The proposed framework consists of three main models: (1) Risk assessment, (2) Performance evaluation and (3) Integrated decision support system (IDSS).
The risk model was developed using a mixed Delphi-Analytical Hierarchy Process approach. The impacts of four main consequences of failure with eighteen sub factors were considered. Road, water and sewer networks indices were amalgamated and grouped into an overall integrated risk index using K-means Clustering technique. The performance model considers nine factors that represent the asset performance. These factors were mapped using fuzzy logic technique to a Customer Driven Performance Measure (CDPM) index. The IDSS framework allows the setting of priorities for integrated corridor rehabilitation and implementing optimization via Integer Programming. Finally, these models were applied in a prototype tool using Visual Basic built on Microsoft Access, Excel and GIS platforms. A series of workshop interviews were conducted with various municipalities to collect the necessary information. Data provided by the City of Guelph was used in a case study in order to demonstrate the model features.
Results show that Pipe/road size and accessibility factors had the highest impact on the integrated risk index. The road roughness rating and watermain breaks results show the highest impact on the CDPM index. Optimization outcomes demonstrated that corridor rehabilitation alternatives resulted in a âmaximum risk reduced per dollar spentâ. The developed models can be used by researchers and practitioners (municipal engineers and consultants) in order to prioritize corridor rehabilitation projects thereby easing the challenge faced by stakeholders regarding the future of municipal infrastructure
National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook
The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers
Integrating external costs into water utility asset management : an application of the threshold break rate method
The goal of an asset management program is to minimize the life-cycle cost of water utility assets, while continuing to provide the service levels expected by utility customers. The life-cycle cost of an asset includes both the utilitys internal costs to maintain the asset, and external costs borne by customers, the community, and the environment when the asset fails. This project demonstrates how to integrate external costs into asset management through an application of the threshold break rate model, a pipe-replacement decision-model that minimizes the life-cycle cost of water mains. The model is employed to determine which six-inch-diameter steel water pipes in the Albuquerque Bernalillo County Water Utility Authority (ABCWUA) distribution system should be scheduled for replacement. The external costs of water outages, estimated through a choice-experiment survey of ABCWUA residential customers, are included in the model, and model outputs with and without external costs are compared. Assuming a 5% discount rate, 6% percent more pipes in the distribution system are recommended for replacement when external costs are taken into consideration. The threshold break rate model is appealing because it does not require estimation of future pipe-break rates, and it can be used even when a full history of pipe breaks is not available. However, data from the ABCWUA may not satisfy an underlying assumption of the model that the function representing the present worth of a pipe over time is unimodal
The applications of satellites to communications, navigation and surveillance for aircraft operating over the contiguous United States. Volume 1 - Technical report
Satellite applications to aircraft communications, navigation, and surveillance over US including synthesized satellite network and aircraft equipment for air traffic contro
- âŠ