A secure and efficient inventory management system for disasters
نویسندگان
چکیده
An efficient humanitarian inventory control model and emergency logistics system plays a crucial role in maintaining reliable flow of vital supplies to the victims located in the shelters and minimizing the impacts of the unforeseen disruptions that can occur. This system should not only allow the efficient usage and distribution of emergency supplies but should also offer the ability to be integrated with emerging ITS technologies such as Radio Frequency Identification Devices (RFIDs) for commodity tracking and logistics. This paper proposes a comprehensive methodology for the development of a humanitarian emergency management framework based on the real-time tracking of emergency supplies and demands through the use of RFID technology integrated with a multi-commodity stochastic humanitarian inventory management model (MC-SHIC). First, logistics and management aspects of RFID technologies in the context of the emergency disaster relief framework are discussed. Then, MC-SHIC model proposed to determine the optimal emergency inventory levels to prevent possible disruptions at the minimal cost is presented. The solution of the model with several sensitivity analyses obtained using the pLEPs algorithm is presented and discussed. Realizing that actual emergency inventory levels can deviate from optimal values during the actual disaster relief period due to the possible stochastic disruptions such as fluctuating demand for vital supplies in the shelters, a comprehensive on-line inventory control framework is proposed to minimize impacts of these unforeseen disruptions, or at least to address the problem at hand as fast as possible. Within this methodology, we obtain an approximation of the MC-SHIC model using a simultaneous perturbation stochastic approximation (SPSA) based functional approximator, and compare the performance of these algorithms for solving the new unconstrained optimization problem. Finally, proposed model-free on-line control methodology is discussed using examples to understand the efficiency and practicality of both algorithms in terms of computational times and accuracy of results. Published by Elsevier Ltd.
منابع مشابه
Toward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملInfrastructure Management Information System Framework for Disasters
PRADHAN, ANU RAJ. Infrastructure Management Information System Framework for Disasters. (Under the direction of Dr. Debra F. Laefer) Three-tiered enterprise GIS architecture offers a robust, efficient, and secure mechanism as a potential revolution to disaster management systems. This paper addresses the severe limitations of existing disaster management systems and proposes an integrated manag...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملHealth Sector Coordination in Disasters: Barriers & Facilitators
Background: Coordination is a critical factor in successful organization and appropriate response to disasters. In this regard, a centralized coordination mechanism is the first step towards an effective, efficient, and sustainable response in order to be ensured of the short- and long-term recovery. Thus, this study aimed to identify and prioritize the barriers and facilitators of coordination...
متن کامل