Michael Dreyfuss

ORCID: 0000-0002-6165-8979
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Queuing Theory Analysis
  • Supply Chain and Inventory Management
  • Reliability and Maintenance Optimization
  • Transportation and Mobility Innovations
  • Transportation Planning and Optimization
  • Software Reliability and Analysis Research
  • Hearing Loss and Rehabilitation
  • Advanced Battery Technologies Research
  • Information and Cyber Security
  • Advanced Manufacturing and Logistics Optimization
  • Electric Vehicles and Infrastructure
  • Network Security and Intrusion Detection
  • Traffic and Road Safety
  • Forecasting Techniques and Applications
  • Impact of Light on Environment and Health
  • Sustainable Supply Chain Management
  • Hearing Impairment and Communication
  • Cybercrime and Law Enforcement Studies
  • Delphi Technique in Research
  • Urban and Freight Transport Logistics
  • Auction Theory and Applications
  • Smart Parking Systems Research
  • Intelligent Tutoring Systems and Adaptive Learning
  • Nasal Surgery and Airway Studies
  • Consumer Retail Behavior Studies

Jerusalem College of Technology
2014-2024

Sheba Medical Center
2023

Naval Postgraduate School
2018

Johns Hopkins University
1996

10.1016/j.ejor.2017.02.031 article EN European Journal of Operational Research 2017-02-24

Objective: To analyze the impact of age at implantation on cost-effectiveness cochlear (CI). Study Design: Cost-utility analysis in an adapted Markov model. Setting: Adults with profound postlingual hearing loss a “high income” country. Intervention: Unilateral and sequential CI were compared aids (HA). Main Outcome Measure: Incremental ratio (ICER), calculated as costs per quality adjusted life year (QALY) gained (in CHF/QALY), for individual sex combinations relation to two different...

10.1097/mao.0000000000002275 article EN Otology & Neurotology 2019-06-07

This article describes a two-step decision support model for investing in information technology security, both development and application. In the first step, risk level of each system's components is mapped, with aim identifying subsystems that pose highest risk. second determines how much to invest various technological tools workplace culture programs enhance security. An application this an system academic institution Israel described. comprises ten authors identify three bear most...

10.4018/irmj.2018010104 article EN Information Resources Management Journal 2017-11-28

Objective: To analyze the cost effectiveness of cochlear implantation (CI) for treatment single-sided deafness (SSD). Study Design: Cost-utility analysis in an adapted Markov model. Setting: Adults with a high-income country. Intervention: Unilateral CI was compared no intervention. Main Outcome Measure: Incremental cost-effectiveness ratios were different thresholds ($10,000 to $150,000) age, sex, and combinations. The calculations based on quality-adjusted life year (QALY), national...

10.1097/mao.0000000000003135 article EN Otology & Neurotology 2021-03-25

This study investigates how an increase in the quality of business ventures, measured as their success probability, affects trust and return on investment (ROI) situations where investor–entrepreneur interaction is affected by moral hazard asymmetric information. We model a repeated problem between investors entrepreneurs, featuring adverse selection. Hidden Markov techniques computer simulations are used to derive main results. find that ROI may decline improves. Although lenders tend...

10.3390/ijfs12040123 article EN cc-by International Journal of Financial Studies 2024-12-09

Aim/Purpose: This paper describes and information system for the maintenance management of municipal lighting systems that also serves as a decision support tool reducing power consumption on urban lighting. Background: Many municipalities are financially constrained unable to invest in improving their infrastructure. We propose very efficient inexpensive way set up database provide city leaders with tools improve efficiently. Methodology: An data an Integer Programming model deriving...

10.28945/3995 article EN Issues in Informing Science and Information Technology 2018-01-01

This study analyzes the current Israeli public–private partnership (PPP) project of automatic enforcement cameras. There are fewer cameras than poles in law enforcement; therefore, moved between poles. First, authors present a linear programming approach (mobility model) to determine optimal allocation on based road crash data and geographical constraints. Second, number buy movements required (camera-movement tradeoff model). Third, use Monte–Carlo simulation camera failures define an...

10.1080/19439962.2018.1552638 article EN Journal of Transportation Safety & Security 2019-01-24

We consider an MB/G/∞ exchangeable-item repair system with spares and ample servers to which arriving customers bring groups of random size B identical items for repair. An exact formula the waiting time distribution a computationally efficient approximation are presented this system. From this, we not only have standard fillrate, but practical extension concept ‘window fillrate’, provides probability filling order within specified acceptable period time. The model solution can be used...

10.3138/infor.52.2.51 article EN INFOR Information Systems and Operational Research 2014-05-01

Importance: Septorhinoplasties are performed for functional, aesthetic, or a combination of these indications. As nonvital intervention, cost-effectiveness may be questioned. Objective: To determine the septorhinoplasty. Design and Setting: The literature was reviewed revision rates (RRs) health utility values (HUVs) both septorhinoplasty Age-specific mortality life expectancies were used. Costs gathered from international settings analyzed in an adapted Markov model. Intervention:...

10.1089/fpsam.2021.0122 article EN Facial Plastic Surgery & Aesthetic Medicine 2021-10-14

Abstract In this paper, we propose a new method of elements ranking in system reliability design using the theory fuzzy relations. The problem is formulated as an automatic classification based on transitive closure similarity This allows splitting set into disjoint classes, which are similar importance. To define relations present parameters each element vector influences. measure elements, use distance between two vectors and for degree influence evaluation, special algorithm expert...

10.1002/sys.21450 article EN Systems Engineering 2018-05-28

In this paper we consider policies for cannibalisation in a repair/replacement inventory system where our focus will be the waiting time of customer repair queue. The policy affected most by required to effect and specifically disassembling functioning components from newly arrived customer. problem wish address is when should carried out environment too complex an analytic result. We examine two heuristic approaches, which may give good results. first present calculation intensive second...

10.1504/ijlsm.2019.10023575 article EN International Journal of Logistics Systems and Management 2019-01-01

We develop a two-stage model for identifying IT system modules with high security risks. In the first phase, we identify subsystems that pose highest risk and which require further investigation. next high-security-risk using more detailed approach. The output of this helps managers decide on how to invest efficiently in improving their system. describe an application academic institution Israel. three ten are found be very risky. highlight critical within those subsystems. results our...

10.28945/3436 article EN Informing Science and IT Education Conference 2016-01-01

Models involving exchangeable component repair systems are widely treated in the literature. In such systems, a customer arrives at queue with failed which is replaced from stocks of previously repaired components. Various strategies and service measures have been discussed. Customers who arrive single type will be referred to appropriate exchange component. The waiting time distribution for has also developed. development servicing multiple failures neglected. There many instances where two...

10.1504/ijor.2018.10004560 article EN International Journal of Operational Research 2017-04-13
Coming Soon ...