33 resultados para correctional services


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Product/service-systems (PSS) are in effect an approach to designing integrated products and services with a focus on both customer and product life cycle activities. A range of service-oriented design strategies can be found in current literature, from product-oriented DfX approaches to more customer-oriented approaches, such as integrated solutions. In this article, design strategies related to different types of services are mapped. Case studies from two industrial companies are used to confront the existing literature in order to improve the understanding of how manufacturing companies may align their product and service development activities with their business strategies. © 2010.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Services based around complex engineering equipment and systems provide substantial challenges in both the long-term management of the equipment and the need for guaranteed delivery of the related service. One of the challenges for an organisation providing these services is the management of the information that is required to design, deliver and subsequently assess the success of the service. To assist in this process this paper develops a model for capturing, organising and assessing information requirements for these Complex Engineering Services in which information required to support key decisions in the life cycle of the service is identified. The model – referred to as The 12-Box Model for Service Information Requirements – is embedded in a three-phase procedure for providing an assessment of information requirements of a service contract which also provides insight into the capabilities of available information systems in supporting the contract. An illustrative example examining service information in an aircraft availability contract is used to demonstrate the use of the 12-Box Model and associated assessment procedure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: There is an increasing recognition that modelling and simulation can assist in the process of designing health care policies, strategies and operations. However, the current use is limited and answers to questions such as what methods to use and when remain somewhat underdeveloped. Aim. The aim of this study is to provide a mechanism for decision makers in health services planning and management to compare a broad range of modelling and simulation methods so that they can better select and use them or better commission relevant modelling and simulation work. Methods. This paper proposes a modelling and simulation method comparison and selection tool developed from a comprehensive literature review, the research team's extensive expertise and inputs from potential users. Twenty-eight different methods were identified, characterised by their relevance to different application areas, project life cycle stages, types of output and levels of insight, and four input resources required (time, money, knowledge and data). Results: The characterisation is presented in matrix forms to allow quick comparison and selection. This paper also highlights significant knowledge gaps in the existing literature when assessing the applicability of particular approaches to health services management, where modelling and simulation skills are scarce let alone money and time. Conclusions: A modelling and simulation method comparison and selection tool is developed to assist with the selection of methods appropriate to supporting specific decision making processes. In particular it addresses the issue of which method is most appropriate to which specific health services management problem, what the user might expect to be obtained from the method, and what is required to use the method. In summary, we believe the tool adds value to the scarce existing literature on methods comparison and selection. © 2011 Jun et al.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations-- for instance to do with building design, planning or vehicle standards--is likely to have a more immediate effect.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing 'raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many researchers and industry observers claim that electric vehicles (EV) and plug-in hybrid electric vehicles (PHEV) could provide vehicle-to-grid (V2G) bulk energy and ancillary services to an electricity network. This work quantified the impact on various battery characteristics whilst providing such services. The sensitivity of the impact of V2G services on battery degradation was assessed for EV and PHEV for different battery capacities, charging regimes, and battery depth of discharge. Battery degradation was found to be most dependent on energy throughput for both the EV and PHEV powertrains, but was most sensitive to charging regime (for EVs) and battery capacity (for PHEVs). When providing ancillary services, battery degradation in both powertrains was most sensitive to individual vehicle battery depth of discharge. Degradation arising from both bulk energy and ancillary services could be minimised by reducing the battery capacity of the vehicle, restricting the number of hours connected and reducing the depth of discharge of each vehicle for ancillary services. Regardless, best case minimum impacts of providing V2G services are severe such as to require multiple battery pack replacements over the vehicle lifetime. © 2013 Elsevier Ltd.