942 resultados para Human control model


Relevância:

90.00% 90.00%

Publicador:

Resumo:

The thesis deals with the background, development and description of a mathematical stock control methodology for use within an oil and chemical blending company, where demand and replenishment lead-times are generally non-stationary. The stock control model proper relies on, as input, adaptive forecasts of demand determined for an economical forecast/replenishment period precalculated on an individual stock-item basis. The control procedure is principally that of the continuous review, reorder level type, where the reorder level and reorder quantity 'float', that is, each changes in accordance with changes in demand. Two versions of the Methodology are presented; a cost minimisation version and a service level version. Realising the importance of demand forecasts, four recognised variations of the Trigg and Leach adaptive forecasting routine are examined. A fifth variation, developed, is proposed as part of the stock control methodology. The results of testing the cost minimisation version of the Methodology with historical data, by means of a computerised simulation, are presented together with a description of the simulation used. The performance of the Methodology is in addition compared favourably to a rule-of-thumb approach considered by the Company as an interim solution for reducing stack levels. The contribution of the work to the field of scientific stock control is felt to be significant for the following reasons:- (I) The Methodology is designed specifically for use with non-stationary demand and for this reason alone appears to be unique. (2) The Methodology is unique in its approach and the cost-minimisation version is shown to work successfully with the demand data presented. (3) The Methodology and the thesis as a whole fill an important gap between complex mathematical stock control theory and practical application. A brief description of a computerised order processing/stock monitoring system, designed and implemented as a pre-requisite for the Methodology's practical operation, is presented as an appendix.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern software systems are often large and complicated. To better understand, develop, and manage large software systems, researchers have studied software architectures that provide the top level overall structural design of software systems for the last decade. One major research focus on software architectures is formal architecture description languages, but most existing research focuses primarily on the descriptive capability and puts less emphasis on software architecture design methods and formal analysis techniques, which are necessary to develop correct software architecture design. ^ Refinement is a general approach of adding details to a software design. A formal refinement method can further ensure certain design properties. This dissertation proposes refinement methods, including a set of formal refinement patterns and complementary verification techniques, for software architecture design using Software Architecture Model (SAM), which was developed at Florida International University. First, a general guideline for software architecture design in SAM is proposed. Second, specification construction through property-preserving refinement patterns is discussed. The refinement patterns are categorized into connector refinement, component refinement and high-level Petri nets refinement. These three levels of refinement patterns are applicable to overall system interaction, architectural components, and underlying formal language, respectively. Third, verification after modeling as a complementary technique to specification refinement is discussed. Two formal verification tools, the Stanford Temporal Prover (STeP) and the Simple Promela Interpreter (SPIN), are adopted into SAM to develop the initial models. Fourth, formalization and refinement of security issues are studied. A method for security enforcement in SAM is proposed. The Role-Based Access Control model is formalized using predicate transition nets and Z notation. The patterns of enforcing access control and auditing are proposed. Finally, modeling and refining a life insurance system is used to demonstrate how to apply the refinement patterns for software architecture design using SAM and how to integrate the access control model. ^ The results of this dissertation demonstrate that a refinement method is an effective way to develop a high assurance system. The method developed in this dissertation extends existing work on modeling software architectures using SAM and makes SAM a more usable and valuable formal tool for software architecture design. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Access control (AC) limits access to the resources of a system only to authorized entities. Given that information systems today are increasingly interconnected, AC is extremely important. The implementation of an AC service is a complicated task. Yet the requirements to an AC service vary a lot. Accordingly, the design of an AC service should be flexible and extensible in order to save development effort and time. Unfortunately, with conventional object-oriented techniques, when an extension has not been anticipated at the design time, the modification incurred by the extension is often invasive. Invasive changes destroy design modularity, further deteriorate design extensibility, and even worse, they reduce product reliability. ^ A concern is crosscutting if it spans multiple object-oriented classes. It was identified that invasive changes were due to the crosscutting nature of most unplanned extensions. To overcome this problem, an aspect-oriented design approach for AC services was proposed, as aspect-oriented techniques could effectively encapsulate crosscutting concerns. The proposed approach was applied to develop an AC framework that supported role-based access control model. In the framework, the core role-based access control mechanism is given in an object-oriented design, while each extension is captured as an aspect. The resulting framework is well-modularized, flexible, and most importantly, supports noninvasive adaptation. ^ In addition, a process to formalize the aspect-oriented design was described. The purpose is to provide high assurance for AC services. Object-Z was used to specify the static structure and Predicate/Transition net was used to model the dynamic behavior. Object-Z was extended to facilitate specification in an aspect-oriented style. The process of formal modeling helps designers to enhance their understanding of the design, hence to detect problems. Furthermore, the specification can be mathematically verified. This provides confidence that the design is correct. It was illustrated through an example that the model was ready for formal analysis. ^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The main focus of this research is to design and develop a high performance linear actuator based on a four bar mechanism. The present work includes the detailed analysis (kinematics and dynamics), design, implementation and experimental validation of the newly designed actuator. High performance is characterized by the acceleration of the actuator end effector. The principle of the newly designed actuator is to network the four bar rhombus configuration (where some bars are extended to form an X shape) to attain high acceleration. Firstly, a detailed kinematic analysis of the actuator is presented and kinematic performance is evaluated through MATLAB simulations. A dynamic equation of the actuator is achieved by using the Lagrangian dynamic formulation. A SIMULINK control model of the actuator is developed using the dynamic equation. In addition, Bond Graph methodology is presented for the dynamic simulation. The Bond Graph model comprises individual component modeling of the actuator along with control. Required torque was simulated using the Bond Graph model. Results indicate that, high acceleration (around 20g) can be achieved with modest (3 N-m or less) torque input. A practical prototype of the actuator is designed using SOLIDWORKS and then produced to verify the proof of concept. The design goal was to achieve the peak acceleration of more than 10g at the middle point of the travel length, when the end effector travels the stroke length (around 1 m). The actuator is primarily designed to operate in standalone condition and later to use it in the 3RPR parallel robot. A DC motor is used to operate the actuator. A quadrature encoder is attached with the DC motor to control the end effector. The associated control scheme of the actuator is analyzed and integrated with the physical prototype. From standalone experimentation of the actuator, around 17g acceleration was achieved by the end effector (stroke length was 0.2m to 0.78m). Results indicate that the developed dynamic model results are in good agreement. Finally, a Design of Experiment (DOE) based statistical approach is also introduced to identify the parametric combination that yields the greatest performance. Data are collected by using the Bond Graph model. This approach is helpful in designing the actuator without much complexity.

Relevância:

90.00% 90.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

En el estudio que originó este artículo se elaboró una propuesta de mejora del sistema de inventarios para una comercializadora de alimentos en la ciudad de Santa Marta, a fin de lograr una reducción en los costos de inventario y un incremento en el beneficio económico de la organización, mediante la planificación y control de las compras y ventas de los productos. El proceso aplicado consiste en la clasificación de los productos manejados por la empresa con el método ABC, de acuerdo con la importancia de cada producto en el total de ventas de la distribuidora; posteriormente se aplicó el modelo de Cantidad Económica de Pedido –EOQ–, con el fin de sistematizar los conteos periódicos en los productos guardados en bodega, establecer los registros de las ventas realizadas, determinar la cantidad óptima de pedidos y el momento justo en el cual se debe pedir mercancía a los proveedores y las cantidades mínimas de reorden.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

As the agricultural non-point source pollution(ANPSP) has become the most significant threat for water environmental deterioration and lake eutrophication in China, more and more scientists and technologists are focusing on the control countermeasure and pollution mechanism of agricultural non-point source pollution. The unreasonable rural production structure and limited scientific management measures are the main reasons for acute ANSPS problems in China. At present, the problem for pollution control is a lack of specific regulations, which affects the government's management efficiency. According to these characteristics and problems, this paper puts forward some corresponding policies. The status of the agricultural non-point source pollution of China is analyzed, and ANSPS prevention and control model is provided based on governance policy, environmental legislation, technical system and subsidy policy. At last, the case analysis of Qiandao Lake is given, and an economic policy is adopted based on its situation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

El ejercicio de labores asistenciales en el personal de la salud, las largas horas de trabajo y la responsabilidad en la ejecución de sus tareas, llevan consigo la exposición a riesgos psicosociales; que de no ser debidamente controlados pueden llevar al individuo a generar respuestas inadecuadas a nivel cognitivo, emocional e intelectual, las cuales se manifiestan en algunos casos con la aparición de sintomatología osteomuscular y/o asociada al estrés. OBJETIVO Identificar la relación entre las demandas de la tarea, el control sobre las mismas y la presencia e intensidad de síntomas de estrés y osteo-musculares en médicos, especialistas y personal de enfermería de una institución hospitalaria de IV nivel en Bogotá. Métodos Estudio de corte transversal en una muestra de 100 profesionales de la salud. Se utilizaron tres instrumentos: cuestionario Nórdico para la detección y análisis de síntomas músculo esqueléticos, cuestionario Karasek para identificar la percepción del trabajo y la relación del entorno profesional y el cuestionario de Estrés del Ministerio de la Protección Social validado para la población colombiana. Se obtuvo previa autorización del Comité de Investigaciones y Comité de Ética del Hospital. El análisis estadístico se realizó con el IBM SPSS Statistics versión 2.0 Resultados Se observó que los síntomas osteomusculares con mayor prevalencia estuvieron relacionados con afectaciones en espalda 43% y cuello 36%; no se observan diferencias estadísticamente significativas entre los distintos profesionales. En cuanto a presencia de sintomatología asociada al estrés, la mayor prevalencia se presentó en síntomas osteomusculares en cuello y espalda en el 84% de los casos, dolor de cabeza en el 74%, trastornos del sueño y cansancio en el 64% y percepción de sobrecarga laboral en el 63%. Para el análisis de prevalencia de los factores psicosociales laborales se utilizó la clasificación de la combinación de altas o bajas demandas y alto o bajo control, el resultado de estos teniendo en cuenta el modelo Demanda-control fue la siguiente: trabajo de alta tensión 34%; trabajo activo 40%; trabajo aburrido 13% y trabajo pasivo 13%. Se encontró una asociación entre la sintomatología y las variables toma de decisiones en médicos especialistas (OR 3,12; IC 95%: 2,80 – 3,49) lo que ratifica que este tipo de profesional tiene una mayor libertad para generar decisiones en su actuar médico y control sobre la tarea para especialistas (OR 3,23; IC 95%: 2,82 – 3,70) y enfermeros jefes (OR 3,36; IC 95%: 2,91 – 3,89); lo que permite inferir que cada uno de estos profesionales posee las herramientas para asumir las exigencias y dar respuesta a los distintos aspectos que están ligados a la tarea. Conclusiones: La presencia de síntomas osteo musculares en zonas como cuello y espalda son propios de la actividad del personal de la salud y se asocia a las posturas inadecuadas y el puesto de trabajo, así como al estrés. En cuanto a la sintomatología asociada al estrés se ratifica la presencia de sintomatología osteo muscular (cuello y espalda), como manifestaciones asociadas al cansancio, trastornos del sueño, sobrecarga laboral, dolor de cabeza y en menor porcentaje dificultades para relacionarse con otros. Respecto a los factores de riesgo psicosocial, se observó que el trabajo activo es la condición predominante en el personal de la salud, pero se observa además que un porcentaje importante experimenta episodios de tensión laboral, asociados a condiciones propias de las demandas psicológicas y el control sobre la tarea. Por lo anterior, se deben establecer acciones encaminadas a favorecer espacios saludables, y programas tendientes a la mejora de las condiciones de tal manera que disminuya la presencia de sintomatología osteomuscular y/o sintomatología derivada del estrés.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Se desarrolla un marco teórico de la seguridad comunitaria al definirla a partir de la evolución que ha tenido el tema de la seguridad comunitaria a partir de la adopción del enfoque más amplio de la seguridad humana de los habitantes como base y eje de las políticas públicas, de donde nace un nuevo conjunto de prioridades para la erradicación de los factores de riesgo social asociados o que son proclives a la violencia y la comisión de delitos, tales como la deserción escolar, el desempleo, la violencia en todas sus formas, la inequidad de género y diversidad social, la falta de cohesión social, las migraciones, internas o externas, forzadas por las condiciones de vida. El enfoque se basa en un nuevo modelo criminológico que está sustentado en el marco de los derechos humanos, la seguridad humana y el modelo de control social democrático para formar un modelo de desarrollo humano sostenible, por tanto la prevención sustentada en políticas públicas para la seguridad humana, la participación comunitaria y el nuevo rol de la policía comunitaria.It develops a theoretical framework for defining the community from the developments that have taken the issue of community safety from the adoption of the broader approach to human security of people as the basis and focus of public policy, arises where a new set of priorities for the eradication of social risk factors that are associated with or prone to violence and committing crimes, such as school dropouts, unemployment, violence in all its forms, gender inequity and social diversity, lack of social cohesion, migration, internal or external, forced by the conditions of life. The approach is based on a new criminological model that is based on the framework of human rights, human security and control model to form a social democratic model of sustainable human development, thus preventing sustained public policies for security human, community involvement and the new role of community police.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Electrostatic discharge is the sudden and brief electric current that flashes between two objects at different voltages. This is a serious issue ranging in application from solid-state electronics to spectacular and dangerous lightning strikes (arc flashes). The research herein presents work on the experimental simulation and measurement of the energy in an electrostatic discharge. The energy released in these discharges has been linked to ignitions and burning in a number of documented disasters and can be enormously hazardous in many other industrial scenarios. Simulations of electrostatic discharges were designed to specifications by IEC standards. This is typically based on the residual voltage/charge on the discharge capacitor, whereas this research examines the voltage and current in the actual spark in order to obtain a more precise comparative measurement of the energy dissipated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

From September 2000 to June 2003, a community-based program for dengue control using local predacious copepods of the genus Mesocyclops was conducted in three rural communes in the central Vietnam provinces of Quang Nam, Quang Ngai, and Khanh Hoa. Post-project, three subsequent entomologic surveys were conducted until March 2004. The number of households and residents in the communes were 5,913 and 27,167, respectively, and dengue notification rates for these communes from 1996 were as high as 2,418.5 per 100,000 persons. Following knowledge, attitude, and practice evaluations, surveys of water storage containers indicated that Mesocyclops spp. already occurred in 3-17% and that large tanks up to 2,000 liters, 130-300-liter jars, wells, and some 220-liter metal drums were the most productive habitats for Aedes aegypti. With technical support, the programs were driven by communal management committees, health collaborators, schoolteachers, and pupils. From quantitative estimates of the standing crop of third and fourth instars from 100 households, Ae. aegypti were reduced by approximately 90% by year 1, 92.3-98.6% by year 2, and Ae. aegypti immature forms had been eliminated from two of three communes by June 2003. Similarly, from resting adult collections from 100 households, densities were reduced to 0-1 per commune. By March 2004, two communes with no larvae had small numbers but the third was negative; one adult was collected in each of two communes while one became negative. Absolute estimates of third and fourth instars at the three intervention communes and one left untreated had significant correlations (P = 0.009-< 0.001) with numbers of adults aspirated from inside houses on each of 15 survey periods. By year 1, the incidence of dengue disease in the treated communes was reduced by 76.7% compared with non-intervention communes within the same districts, and no dengue was evident in 2002 and 2003, compared with 112.8 and 14.4 cases per 100,000 at district level. Since we had similar success in northern Vietnam from 1998 to 2000, this study demonstrates that this control model is broadly acceptable and achievable at community level but vigilance is required post-project to prevent reinfestation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Expertise in nursing has been widely studied although there have been no previous studies into what constitutes expertise in nephrology (renal) nursing. This paper, which is abstracted from a larger study into the acquisition and exercise of nephrology nursing expertise, provides evidence of the characteristics and practices of non-expert nephrology nurses. Using the grounded theory method, the study took place in one renal unit in New South Wales, Australia, and involved six non-expert and 11 expert nurses. Sampling was purposive then theoretical. Simultaneous data collection and analysis using participant observation, review of nursing documentation and semistructured interviews was undertaken. The study revealed a three-stage skills-acquisitive process that was identified as non-expert, experienced non-expert and expert stages. Non-expert nurses showed superficial nephrology nursing knowledge and limited experience; they were acquiring basic nephrology nursing skills and possessed a narrow focus of practice.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

There is a growing trend to offer students learning opportunities that are flexible, innovative and engaging. As educators embrace student-centred agile teaching and learning methodologies, which require continuous reflection and adaptation, the need to evaluate students’ learning in a timely manner has become more pressing. Conventional evaluation surveys currently dominate the evaluation landscape internationally, despite recognition that they are insufficient to effectively evaluate curriculum and teaching quality. Surveys often: (1) fail to address the issues for which educators need feedback, (2) constrain student voice, (3) have low response rates and (4) occur too late to benefit current students. Consequently, this paper explores principles of effective feedback to propose a framework for learner-focused evaluation. We apply a three-stage control model, involving feedforward, concurrent and feedback evaluation, to investigate the intersection of assessment and evaluation in agile learning environments. We conclude that learner-focused evaluation cycles can be used to guide action so that evaluation is not undertaken simply for the benefit of future offerings, but rather to benefit current students by allowing ‘real-time’ learning activities to be adapted in the moment. As a result, students become co-producers of learning and evaluation becomes a meaningful, responsive dialogue between students and their instructors.