Search results for: maturity transformation risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7675

Search results for: maturity transformation risk

7225 Determination of the Bank's Customer Risk Profile: Data Mining Applications

Authors: Taner Ersoz, Filiz Ersoz, Seyma Ozbilge

Abstract:

In this study, the clients who applied to a bank branch for loan were analyzed through data mining. The study was composed of the information such as amounts of loans received by personal and SME clients working with the bank branch, installment numbers, number of delays in loan installments, payments available in other banks and number of banks to which they are in debt between 2010 and 2013. The client risk profile was examined through Classification and Regression Tree (CART) analysis, one of the decision tree classification methods. At the end of the study, 5 different types of customers have been determined on the decision tree. The classification of these types of customers has been created with the rating of those posing a risk for the bank branch and the customers have been classified according to the risk ratings.

Keywords: client classification, loan suitability, risk rating, CART analysis

Procedia PDF Downloads 329
7224 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 497
7223 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 282
7222 Study of Li-Rich Layered Cathode Materials for High-Energy Li-ion Batteries

Authors: Liu Li, Kim Seng Lee, Li Lu

Abstract:

The high-energy-density Li-rich layered materials are promising cathode materials for the next-generation high-performance lithium-ion batteries. They have attracted a lot of attentions due mainly to their high reversible capacity of more than 250 mAh•g-1 at low charge-discharge current. However several drawbacks still hinder their applications, such as voltage decay caused by an undesired phase transformation during cycling and poor rate capability. To conquer these issues, the authors applied F modification methods on the pristine Li1.2Mn0.54Ni0.13Co0.13O2 to enhance its electrochemical performance.

Keywords: Li-ion battery, Li-rich layered cathode material, phase transformation, cycling stability, rate capability

Procedia PDF Downloads 320
7221 Role of Desire in Risk-Perception: A Case Study of Syrian Refugees’ Migration towards Europe

Authors: Lejla Sunagic

Abstract:

The aim of the manuscript is to further the understanding of risky decision-making in the context of forced and irregular migration. The empirical evidence is collected through interviews with Syrian refugees who arrived in Europe via irregular pathways. Analytically, it has been approached through the juxtaposition between risk perception and the notion of desire. As different frameworks have been developed to address differences in risk perception, the common thread was the understanding that individual risk-taking has been addressed in terms of benefits outweighing risks. However, this framework cannot explain a big risk an individual takes because of an underprivileged position and due to a lack of positive alternatives, termed as risk-taking from vulnerability. The accounts of the field members of this study that crossed the sea in rubber boats to arrive in Europe make an empirical fit to such a postulate by reporting that the risk they have taken was not the choice but the only coping strategy. However, the vulnerability argument falls short of explaining why the interviewees, thinking retrospectively, find the risky journey they have taken to be worth it, while they would strongly advise others to restrain from taking such a huge risk. This inconsistency has been addressed by adding the notion of desire to migrate to the elements of risk perception. Desire, as a subjective experience, was what made the risk appear smaller in cost-benefit analysis at the time of decision-making of those who have realized migration. However, when they reflect on others in the context of potential migration via the same pathway, the interviewees addressed the others’ lack of capacity to avoid the same obstacles that they themselves were able to circumvent while omitting to reflect on others’ desire to migrate. Thus, in the risk-benefit analysis performed for others, the risk remains unblurred and tips over the benefits, given the inability to take into account the desire of others. If desire, as the transformative potential of migration, is taken out of the cost-benefit analysis of irregular migration, refugees might not have taken the risky journey. By casting the theoretical argument in the language of configuration, the study is filling in the gap of knowledge on the combination of migration drivers and the way they interact and produce migration outcomes.

Keywords: refugees, risk perception, desire, irregular migration

Procedia PDF Downloads 85
7220 Toehold Mediated Shape Transition of Nucleic Acid Nanoparticles

Authors: Emil F. Khisamutdinov

Abstract:

Development of functional materials undergoing structural transformations in response to an external stimulus such as environmental changes (pH, temperature, etc.), the presence of particular proteins, or short oligonucleotides are of great interest for a variety of applications ranging from medicine to electronics. The dynamic operations of most nucleic acid (NA) devices, including circuits, nano-machines, and biosensors, rely on networks of NA strand displacement processes in which an external or stimulus strand displaces a target strand from a DNA or RNA duplex. The rate of strand displacement can be greatly increased by the use of “toeholds,” single-stranded regions of the target complex to which the invading strand can bind to initiate the reaction, forming additional base pairs that provide a thermodynamic driving force for transformation. Herein, we developed a highly robust nanoparticle shape transition, sequentially transforming DNA polygons from one shape to another using the toehold-mediated DNA strand displacement technique. The shape transformation was confirmed by agarose gel electrophoresis and atomic force microscopy. Furthermore, we demonstrate that our approach is applicable for RNA shape transformation from triangle to square, which can be detected by fluorescence emission from malachite green binding RNA aptamer. Using gel-shift and fluorescence assays, we demonstrated efficient transformation occurs at isothermal conditions (37°C) that can be implemented within living cells as reporter molecules. This work is intended to provide a simple, cost-effective, and straightforward model for the development of biosensors and regulatory devices in nucleic acid nanotechnology.

Keywords: RNA nanotechnology, bionanotechnology, toehold mediated DNA switch, RNA split fluorogenic aptamers

Procedia PDF Downloads 64
7219 Risk Assessment of Heavy Rainfall and Development of Damage Prediction Function for Gyeonggi-Do Province

Authors: Jongsung Kim, Daegun Han, Myungjin Lee, Soojun Kim, Hung Soo Kim

Abstract:

Recently, the frequency and magnitude of natural disasters are gradually increasing due to climate change. Especially in Korea, large-scale damage caused by heavy rainfall frequently occurs due to rapid urbanization. Therefore, this study proposed a Heavy rain Damage Risk Index (HDRI) using PSR (Pressure – State - Response) structure for heavy rain risk assessment. We constructed pressure index, state index, and response index for the risk assessment of each local government in Gyeonggi-do province, and the evaluation indices were determined by principal component analysis. The indices were standardized using the Z-score method then HDRIs were obtained for 31 local governments in the province. The HDRI is categorized into three classes, say, the safest class is 1st class. As the results, the local governments of the 1st class were 15, 2nd class 7, and 3rd class 9. From the study, we were able to identify the risk class due to the heavy rainfall for each local government. It will be useful to develop the heavy rainfall prediction function by risk class, and this was performed in this issue. Also, this risk class could be used for the decision making for efficient disaster management. Acknowledgements: This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B3005695).

Keywords: natural disaster, heavy rain risk assessment, HDRI, PSR

Procedia PDF Downloads 193
7218 Unhealthy Food Consumption Behavior in Suan Sunandha Rajabhat Universities

Authors: Narumon Piaseu

Abstract:

This survey research was aimed to describe and compare consumption behavior of health risk food among students in Suan Sunandha Rajabhat University. Sample included 400 undergraduate students enrolled in the first semester of 2008 academic year. Data were collected by using self reported questionnaire developed by the researcher. Data were then analyzed by descriptive statistics including frequency, percentage, mean, standard deviation, and inferential statistics including independent t-test, and Oneway ANOVA. Results revealed that most of the sample were women (67%), enrolled in social related programs (74%). Approximately half of them (45.5%) stayed in dormitory. The mean of monthly income was 5,164 Baht and daily food expenditure was 114.55 Baht. Majority of them (83%) had ready-to-eat food. A major factor influencing their food selection was their parents (61%). A main reason for their food selection was food that looks good (70.75%). Almost half of them (46.25%) had heavy exercise less than 3 times per week. Regarding knowledge on health risk food, 43.5% of the sample had good knowledge. The followings were moderate (41%) and poor (41%). Most of the sample (60.75%) had consumption behavior at low risk. The following was at moderate risk (37.25%). Only 2% were at high risk. Among the sample, consumption behavior of health risk food were significantly different in years of study (F = 3.168, p = .024), daily food expenditure (F = 8.950, p <.001), and knowledge on health risk food (F = 37.856, p <.001), while no significant difference in consumption behavior of health risk food was found in those with a difference in gender, program of study, living place, and monthly income. Results indicate the importance of providing knowledge regarding health risk food for students and their parents in order to promote appropriate food consumption behavior among the students.

Keywords: food consumption, risky behavior, Suan Sunandha Rajabhat University, health risk

Procedia PDF Downloads 463
7217 Exploring the Effect of Accounting Information on Systematic Risk: An Empirical Evidence of Tehran Stock Exchange

Authors: Mojtaba Rezaei, Elham Heydari

Abstract:

This paper highlights the empirical results of analyzing the correlation between accounting information and systematic risk. This association is analyzed among financial ratios and systematic risk by considering the financial statement of 39 companies listed on the Tehran Stock Exchange (TSE) for five years (2014-2018). Financial ratios have been categorized into four groups and to describe the special features, as representative of accounting information we selected: Return on Asset (ROA), Debt Ratio (Total Debt to Total Asset), Current Ratio (current assets to current debt), Asset Turnover (Net sales to Total assets), and Total Assets. The hypotheses were tested through simple and multiple linear regression and T-student test. The findings illustrate that there is no significant relationship between accounting information and market risk. This indicates that in the selected sample, historical accounting information does not fully reflect the price of stocks.

Keywords: accounting information, market risk, systematic risk, stock return, efficient market hypothesis, EMH, Tehran stock exchange, TSE

Procedia PDF Downloads 124
7216 Railway Accidents: Using the Global Railway Accident Database and Evaluation for Risk Analysis

Authors: Mathias Linden, André Schneider, Harald F. O. von Korflesch

Abstract:

The risk of train accidents is an ongoing concern for railway organizations, governments, insurance companies and other depended sectors. Safety technologies are installed to reduce and to prevent potential damages of train accidents. Since the budgetary for the safety of railway organizations is limited, it is necessary not only to achieve a high availability and high safety standard but also to be cost effective. Therefore, an economic assessment of safety technologies is fundamental to create an accurate risk analysis. In order to conduct an economical assessment of a railway safety technology and a quantification of the costs of the accident causes, the Global Railway Accident Database & Evaluation (GRADE) has been developed. The aim of this paper is to describe the structure of this accident database and to show how it can be used for risk analyses. A number of risk analysis methods, such as the probabilistic safety assessment method (PSA), was used to demonstrate this accident database’s different possibilities of risk analysis. In conclusion, it can be noted that these analyses would not be as accurate without GRADE. The information gathered in the accident database was not available in this way before. Our findings are relevant for railway operators, safety technology suppliers, assurances, governments and other concerned railway organizations.

Keywords: accident causes, accident costs, accident database, global railway accident database & evaluation, GRADE, probabilistic safety assessment, PSA, railway accidents, risk analysis

Procedia PDF Downloads 354
7215 An Analytical Method for Solving General Riccati Equation

Authors: Y. Pala, M. O. Ertas

Abstract:

In this paper, the general Riccati equation is analytically solved by a new transformation. By the method developed, looking at the transformed equation, whether or not an explicit solution can be obtained is readily determined. Since the present method does not require a proper solution for the general solution, it is especially suitable for equations whose proper solutions cannot be seen at first glance. Since the transformed second order linear equation obtained by the present transformation has the simplest form that it can have, it is immediately seen whether or not the original equation can be solved analytically. The present method is exemplified by several examples.

Keywords: Riccati equation, analytical solution, proper solution, nonlinear

Procedia PDF Downloads 347
7214 Schedule Risk Management for Complex Projects: The Royal Research Ship: Sir David Attenborough Case Study

Authors: Chatelier Charlene, Oyegoke Adekunle, Ajayi Saheed, Jeffries Andrew

Abstract:

This study seeks to understand Schedule Risk Assessments as a priori for better performance whilst exploring the strategies employed to deliver complex projects like the New Polar research ship. This high-profile vessel was offered to Natural Environment Research Council and British Antarctic Survey (BAS) by Cammell Laird Shipbuilders. The Research Ship was designed to support science in extreme environments, with the expectancy to provide a wide range of specialist scientific facilities, instruments, and laboratories to conduct research over multiple disciplines. Aim: The focus is to understand the allocation and management of schedule risk on such a Major Project. Hypothesising that "effective management of schedule risk management" could be the most critical factor in determining whether the intended benefits mentioned are delivered within time and cost constraints. Objective 1: Firstly, the study seeks to understand the allocation and management of schedule risk in Major Projects. Objective 2: Secondly, it explores "effective management of schedule risk management" as the most critical factor determining the delivery of intended benefits. Methodology: This study takes a retrospective review of schedule risk management and how it influences project performance using a case study approach for the RRS (Royal Research Ship) Sir David Attenborough. Research Contribution: The outcomes of this study will contribute to a better understanding of project performance whilst building on its under-researched relationship to schedule risk management for complex projects. The outcomes of this paper will guide further research on project performance and enable the understanding of how risk-based estimates over time impact the overall risk management of the project.

Keywords: complexity, major projects, performance management, schedule risk management, uncertainty

Procedia PDF Downloads 87
7213 Quality of the Ruin Probabilities Approximation Using the Regenerative Processes Approach regarding to Large Claims

Authors: Safia Hocine, Djamil Aïssani

Abstract:

Risk models, recently studied in the literature, are becoming increasingly complex. It is rare to find explicit analytical relations to calculate the ruin probability. Indeed, the stability issue occurs naturally in ruin theory, when parameters in risk cannot be estimated than with uncertainty. However, in most cases, there are no explicit formulas for the ruin probability. Hence, the interest to obtain explicit stability bounds for these probabilities in different risk models. In this paper, we interest to the stability bounds of the univariate classical risk model established using the regenerative processes approach. By adopting an algorithmic approach, we implement this approximation and determine numerically the bounds of ruin probability in the case of large claims (heavy-tailed distribution).

Keywords: heavy-tailed distribution, large claims, regenerative process, risk model, ruin probability, stability

Procedia PDF Downloads 350
7212 Urban Flood Risk Mapping–a Review

Authors: Sherly M. A., Subhankar Karmakar, Terence Chan, Christian Rau

Abstract:

Floods are one of the most frequent natural disasters, causing widespread devastation, economic damage and threat to human lives. Hydrologic impacts of climate change and intensification of urbanization are two root causes of increased flood occurrences, and recent research trends are oriented towards understanding these aspects. Due to rapid urbanization, population of cities across the world has increased exponentially leading to improperly planned developments. Climate change due to natural and anthropogenic activities on our environment has resulted in spatiotemporal changes in rainfall patterns. The combined effect of both aggravates the vulnerability of urban populations to floods. In this context, an efficient and effective flood risk management with its core component as flood risk mapping is essential in prevention and mitigation of flood disasters. Urban flood risk mapping involves zoning of an urban region based on its flood risk, which depicts the spatiotemporal pattern of frequency and severity of hazards, exposure to hazards, and degree of vulnerability of the population in terms of socio-economic, environmental and infrastructural aspects. Although vulnerability is a key component of risk, its assessment and mapping is often less advanced than hazard mapping and quantification. A synergic effort from technical experts and social scientists is vital for the effectiveness of flood risk management programs. Despite an increasing volume of quality research conducted on urban flood risk, a comprehensive multidisciplinary approach towards flood risk mapping still remains neglected due to which many of the input parameters and definitions of flood risk concepts are imprecise. Thus, the objectives of this review are to introduce and precisely define the relevant input parameters, concepts and terms in urban flood risk mapping, along with its methodology, current status and limitations. The review also aims at providing thought-provoking insights to potential future researchers and flood management professionals.

Keywords: flood risk, flood hazard, flood vulnerability, flood modeling, urban flooding, urban flood risk mapping

Procedia PDF Downloads 576
7211 Potential Ecological Risk Index of the Northern Egyptian Lagoons, South of Mediterranean Sea, Egypt

Authors: Mohamed El-Bady

Abstract:

The Northern Egyptian Lagoons are (from east to west) Bardawil Lagoon, Manzala Lagoon, Burullus Lagoon, Edku Lagoons and Mariute Lagoon. These lagoons have been received the bulk of drainage water from the lands of Delta and from the other coastal areas. Where, the heavy metals can occur in Lagoons environments through a variety of sources, including industries, wastewaters and domestic effluents. The potential ecological risk index (RI) calculation of the bottom sediments of the northern lagoons depends on contamination factor (CF), potential ecological risk factor and proposed toxic response factor (Tr). Each lagoon with special indices according to its conditions.

Keywords: Northern Lagoons, Nile Delta, ecological risk index, contamination factor

Procedia PDF Downloads 332
7210 Modelling Operational Risk Using Extreme Value Theory and Skew t-Copulas via Bayesian Inference

Authors: Betty Johanna Garzon Rozo, Jonathan Crook, Fernando Moreira

Abstract:

Operational risk losses are heavy tailed and are likely to be asymmetric and extremely dependent among business lines/event types. We propose a new methodology to assess, in a multivariate way, the asymmetry and extreme dependence between severity distributions, and to calculate the capital for Operational Risk. This methodology simultaneously uses (i) several parametric distributions and an alternative mix distribution (the Lognormal for the body of losses and the Generalized Pareto Distribution for the tail) via extreme value theory using SAS®, (ii) the multivariate skew t-copula applied for the first time for operational losses and (iii) Bayesian theory to estimate new n-dimensional skew t-copula models via Markov chain Monte Carlo (MCMC) simulation. This paper analyses a newly operational loss data set, SAS Global Operational Risk Data [SAS OpRisk], to model operational risk at international financial institutions. All the severity models are constructed in SAS® 9.2. We implement the procedure PROC SEVERITY and PROC NLMIXED. This paper focuses in describing this implementation.

Keywords: operational risk, loss distribution approach, extreme value theory, copulas

Procedia PDF Downloads 589
7209 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 53
7208 Risk Management in Islamic Banks: A Case Study of the Faisal Islamic Bank of Egypt

Authors: Mohamed Saad Ahmed Hussien

Abstract:

This paper discusses the risk management in Islamic banks and aims to determine the difference in the practices and methods of risk management in those banks compared to the conventional banks, and to make a case study of the biggest Islamic bank in Egypt (Faisal Islamic Bank of Egypt) to identify the most important financial risks faced and how to manage those risks. It was found that Islamic banks face two types of risks. The first type is similar to the risks in conventional banks; the second type is the additional risks which facing the Islamic banks only as a result of some Islamic modes of financing. With regard to the risk management, Islamic banks such as conventional banks applied the regulatory rules issued by the Central Banks and the Basel Committee; Islamic banks also applied the instructions and procedures issued by the Islamic Financial Services Board (IFSB). Also, Islamic banks are similar to the conventional banks in the practices and methods which they use to manage the risks. And there are some factors that may affect the risk management in Islamic banks, such as the size of the bank and the efficiency of the administration and the staff of the bank.

Keywords: conventional banks, Faisal Islamic Bank of Egypt, Islamic banks, risk management

Procedia PDF Downloads 449
7207 The Use of Coronary Calcium Scanning for Cholesterol Assessment and Management

Authors: Eva Kirzner

Abstract:

Based on outcome studies published over the past two decades, in 2018, the ACC/AHA published new guidelines for the management of hypercholesterolemia that incorporate the use of coronary artery calcium (CAC) scanning as a decision tool for ascertaining which patients may benefit from statin therapy. This use is based on the recognition that the absence of calcium on CAC scanning (i.e., a CAC score of zero) usually signifies the absence of significant atherosclerotic deposits in the coronary arteries. Specifically, in patients with a high risk for atherosclerotic cardiovascular disease (ASCVD), initiation of statin therapy is generally recommended to decrease ASCVD risk. However, among patients with intermediate ASCVD risk, the need for statin therapy is less certain. However, there is a need for new outcome studies that provide evidence that the management of hypercholesterolemia based on these new ACC/AHA recommendations is safe for patients. Based on a Pub-Med and Google Scholar literature search, four relevant population-based or patient-based cohort studies that studied the relationship between CAC scanning, risk assessment or mortality, and statin therapy that were published between 2017 and 2021 were identified (see references). In each of these studies, patients were assessed for their baseline risk for atherosclerotic cardiovascular disease (ASCVD) using the Pooled Cohorts Equation (PCE), an ACC/AHA calculator for determining patient risk based on assessment of patient age, gender, ethnicity, and coronary artery disease risk factors. The combined findings of these four studies provided concordant evidence that a zero CAC score defines patients who remain at low clinical risk despite the non-use of statin therapy. Thus, these new studies confirm the use of CAC scanning as a safe tool for reducing the potential overuse of statin therapy among patients with zero CAC scores. Incorporating these new data suggest the following best practice: (1) ascertain ASCVD risk according to the PCE in all patients; (2) following an initial attempt trial to lower ASCVD risk with optimal diet among patients with elevated ASCVD risk, initiate statin therapy for patients who have a high ASCVD risk score; (3) if the ASCVD score is intermediate, refer patients for CAC scanning; and (4) and if the CAC score is zero among the intermediate risk ASCVD patients, statin therapy can be safely withheld despite the presence of an elevated serum cholesterol level.

Keywords: cholesterol, cardiovascular disease, statin therapy, coronary calcium

Procedia PDF Downloads 102
7206 Depositional Environment and Source Potential of Devonian Source Rock, Ghadames Basin, Southern Tunisia

Authors: S. Mahmoudi, A. Belhaj Mohamed, M. Saidi, F. Rezgui

Abstract:

Depositional environment and source potential of the different organic rich levels of Devonian age (up to 990m thick) from the onshore EC-1 well (Southern Tunisia) were investigated using different geochemical techniques (Rock-Eval pyrolysis, GC-MS) of over than 130 cutting samples. The obtained results including Rock Eval Pyrolysis data and biomarker distribution (terpanes, steranes and aromatics) have been used to describe the depositional environment and to assess the thermal maturity of the Devonian organic matter. These results show that the Emsian deposits exhibit poor to fair TOC contents. The associated organic matter is composed of mixed kerogen (type II/III), as indicated by the predominance of C29 steranes over C27 and C28 homologous, that was deposited in a slightly reduced environment favoring organic matter preservation. Thermal maturity assessed from Tmax, TNR and MPI-1 values shows a mature stage of organic matter. The Middle Devonian (Eifelian) shales are rich in type II organic matter that was deposited in an open marine depositional environment. The TOC values are high and vary between 2 and 7 % indicating good to excellent source rock. The relatively high IH values (reaching 547 mg HC/g TOC) and the low values of t19/t23 ratio (down to 0.2) confirm the marine origin of the organic matter (type II). During the Upper Devonian, the organic matter was deposited under variable redox conditions, oxic to suboxic which is clearly indicated by the low C35/C34 hopanes ratio, immature to marginally mature with the vitrinite reflectance ranging from 0.5 to 0.7 Ro and Tmax value of 426°C-436 °C and the TOC values range between 0.8% to 4%.

Keywords: biomarker, depositional environment, devonian, source rock

Procedia PDF Downloads 470
7205 Planning a Supply Chain with Risk and Environmental Objectives

Authors: Ghanima Al-Sharrah, Haitham M. Lababidi, Yusuf I. Ali

Abstract:

The main objective of the current work is to introduce sustainability factors in optimizing the supply chain model for process industries. The supply chain models are normally based on purely economic considerations related to costs and profits. To account for sustainability, two additional factors have been introduced; environment and risk. A supply chain for an entire petroleum organization has been considered for implementing and testing the proposed optimization models. The environmental and risk factors were introduced as indicators reflecting the anticipated impact of the optimal production scenarios on sustainability. The aggregation method used in extending the single objective function to multi-objective function is proven to be quite effective in balancing the contribution of each objective term. The results indicate that introducing sustainability factor would slightly reduce the economic benefit while improving the environmental and risk reduction performances of the process industries.

Keywords: environmental indicators, optimization, risk, supply chain

Procedia PDF Downloads 341
7204 Creating Entrepreneurial Universities: The Swedish Approach of Transformation

Authors: Fawaz Saad, Hamid Alalwany

Abstract:

Sweden has succeeded to maintain a high level of growth and development and has managed to sustain highly ranked position among the world’s developed countries. In this regard, Swedish universities are playing a vital role in supporting innovation and entrepreneurship at all levels and developing Swedish knowledge economy. This paper is aiming to draw on the experiences of two leading Swedish universities, addressing their transformation approach to create entrepreneurial universities and fulfilling their objectives in the era of knowledge economy. The objectives of the paper include: (1) Introducing the Swedish higher education and its characteristics. (2) Examining the infrastructure elements for innovation and Entrepreneurship at two of the Swedish entrepre-neurial universities. (3) Addressing the key aspects of support systems in the initiatives of both Chalmers and Gothenburg universities to support innovation and advance entrepreneurial practices. The paper will contribute to two discourses: (1) Examining the relationship between support systems for innovation and entrepreneurship and the Universities’ policies and practices. (2) Lessons for University leaders to assist the development and implementation of effective innovation and en-trepreneurship policies and practices.

Keywords: Entrepreneurial University, Chalmers University, Gothenburg University, innovation and entrepreneurship policies, entrepreneurial transformation

Procedia PDF Downloads 498
7203 Simplifying Health Risk Assessment (HRA) and Its Operationalisation for Turnaround Activities

Authors: Thirumila Muthukamaru

Abstract:

The objective of a Health Risk Assessment (HRA) is to achieve a quality evaluation of risk assessments in a timely manner where adequate controls can be in place to protect workers health, especially during turnarounds where the exposure to health hazards is expected to rise during the performance of the many activities that take place, exposing workers to health risk. HRA development requires a competent team comprising experienced subject matter experts in the field, such as Industrial hygienists, Occupational Health Doctors, Turnaround Coordinators, Operation / Maintenance personnel, etc. The conventional way of conducting HRA is not only tedious and time-consuming but also less appreciated when it is not interpreted correctly, which may contribute to inadequate operationalization of it. Simplification can be the essence of timely intervention in managing health risks. This paper is intended as a sharing of the approach taken to simplify the methodology of developing the HRA report and operationalizing it. The approach includes developing a Generic HRA for turnaround activities to be used as a reference document and the empowerment of identified personnel through upskilling sessions to take up the role of facilitating HRA sessions. This empowerment is one of the key approaches towards the successful translation of the HRA into specific turnaround Job Hazard Analysis (JHA) that embed it in the Permit to Work (PTW) process. The approach used here increases awareness and compliance on HRA for turnaround activities through better interpretation and operationalization of the HRA report, adding value to the risk assessment for turnaround activities.

Keywords: industrial hygiene, health risk assessment, HRA, risk assessment

Procedia PDF Downloads 32
7202 Genetic Trait Analysis of RIL Barley Genotypes to Sort-out the Top Ranked Elites for Advanced Yield Breeding Across Multi Environments of Tigray, Ethiopia

Authors: Hailekiros Tadesse Tekle, Yemane Tsehaye, Fetien Abay

Abstract:

Barley (Hordeum vulgare L.) is one of the most important cereal crops in the world, grown for the poor farmers in Tigray with low yield production. The purpose of this research was to estimate the performance of 166 barley genotypes against the quantitative traits with detailed analysis of the variance component, heritability, genetic advance, and genetic usefulness parameters. The finding of ANOVA was highly significant variation (p ≤ 0:01) for all the genotypes. We found significant differences in coefficient of variance (CV of 15%) for 5 traits out of the 12 quantitative traits. The topmost broad sense heritability (H2) was recorded for seeds per spike (98.8%), followed by thousand seed weight (96.5%) with 79.16% and 56.25%, respectively, of GAM. The traits with H2 ≥ 60% and GA/GAM ≥ 20% suggested the least influenced by the environment, governed by the additive genes and direct selection for improvement of such beneficial traits for the studied genotypes. Hence, the 20 outstanding recombinant inbred lines (RIL) barley genotypes performing early maturity, high yield, and 1000 seed weight traits simultaneously were the top ranked group barley genotypes out of the 166 genotypes. These are; G5, G25, G33, G118, G36, G123, G28, G34, G14, G10, G3, G13, G11, G32, G8, G39, G23, G30, G37, and G26. They were early in maturity, high TSW and GYP (TSW ≥ 55 g, GYP ≥ 15.22 g/plant, and DTM below 106 days). In general, the 166 genotypes were classified as high (group 1), medium (group 2), and low yield production (group 3) genotypes in terms of yield and yield component trait analysis by clustering; and genotype parameter analysis such as the heritability, genetic advance, and genetic usefulness traits in this investigation.

Keywords: barley, clustering, genetic advance, heritability, usefulness, variability, yield

Procedia PDF Downloads 75
7201 Influence Analysis of Profit Sharing Agreement and Financing Risk to Profitability in Islamic Bank of Indonesia

Authors: Irena Paramita Pramono

Abstract:

Islamic bank is a financial industry with huge potential to grow in Indonesia. Profit-sharing agreement in the operations of Islamic banks distinguishes Islamic banks with conventional banks. Profit-sharing agreement allows sharing of benefits and risks between shahibul maal and mudharib in islamic bank. This study aimed to observe the patterns of influence between the risk-sharing agreement, financing risk and Profitability in Islamic banks. This research used several Islamic banks as sample and path analysis method. The empirical results of this research shows that the profit-sharing agreement in deposits structure has no direct significant effect to ROA, but it has indirect effect to ROA through profit-sharing financing. On the other hand, profit-sharing financing has direct and indirect influence to ROA through financing risk. This research shows that profit-sharing financing has a positive significant effect to the financing risk and also to the ROA. The research recommends Islamic banks to continue using and developing profit-sharing agreement in its operational activities, hence to create value.

Keywords: Islamic bank, profit-loss sharing agreement, financing risk, profitability

Procedia PDF Downloads 796
7200 Effect of Pre Harvest Application of Amino Acids on Fruit Development of Sub-Tropical Peach

Authors: Manjot Kaur, Harminder Singh, S. K. Jawandha

Abstract:

The present investigations were carried out at Fruit Research Farm, Department of Fruit Science, Punjab Agricultural University, Ludhiana during the years 2016 and 2017, with the aim of assessing the effect of amino acids on fruit development, shoot growth and yield of peach. The six-year-old peach trees of cv. Florida Prince were sprayed with 0.25 % and 0.50 % concentrations of amino acids (Peptone P1 023), 7 and 14 days after full bloom and the sprays were repeated after 15 and 30 days. Experimental findings showed that all the amino acid treatments increased fruit growth, shoot growth, fruit retention and yield and decreased fruit drop as compared to control during both the years. Maximum fruit retention (89.29 %) and minimum fruit drop (10.71 %) was observed in T8 (2 sprays @ 0.50%). Highest mean shoot growth (113.89 cm) was recorded in T12 (3 sprays @ 0.50%) while the minimum was in control plants (88.23 cm). Fruit yield was also found to be maximum (53.92 kg/tree) under double spray treatment T8 (2 sprays @ 0.50%) of amino acids and minimum in plants sprayed with triple spray of amino acids. Fruit maturity was advanced by 3-4 days by double spray treatments of amino acids as compared to control. In brief, the application of double spray of amino acids @ 0.50% (applied 14 days after full bloom and 15 days later), was found to be best to improve the fruit growth, fruit retention and yield of Florida Prince peach under Punjab conditions.

Keywords: amino acids, fruit growth, maturity, peach, shoot growth

Procedia PDF Downloads 176
7199 Digital Material Characterization Using the Quantum Fourier Transform

Authors: Felix Givois, Nicolas R. Gauger, Matthias Kabel

Abstract:

The efficient digital material characterization is of great interest to many fields of application. It consists of the following three steps. First, a 3D reconstruction of 2D scans must be performed. Then, the resulting gray-value image of the material sample is enhanced by image processing methods. Finally, partial differential equations (PDE) are solved on the segmented image, and by averaging the resulting solutions fields, effective properties like stiffness or conductivity can be computed. Due to the high resolution of current CT images, the latter is typically performed with matrix-free solvers. Among them, a solver that uses the explicit formula of the Green-Eshelby operator in Fourier space has been proposed by Moulinec and Suquet. Its algorithmic, most complex part is the Fast Fourier Transformation (FFT). In our talk, we will discuss the potential quantum advantage that can be obtained by replacing the FFT with the Quantum Fourier Transformation (QFT). We will especially show that the data transfer for noisy intermediate-scale quantum (NISQ) devices can be improved by using appropriate boundary conditions for the PDE, which also allows using semi-classical versions of the QFT. In the end, we will compare the results of the QFT-based algorithm for simple geometries with the results of the FFT-based homogenization method.

Keywords: most likelihood amplitude estimation (MLQAE), numerical homogenization, quantum Fourier transformation (QFT), NISQ devises

Procedia PDF Downloads 68
7198 Human Health Risks Assessment of Particulate Air Pollution in Romania

Authors: Katalin Bodor, Zsolt Bodor, Robert Szep

Abstract:

The particulate matter (PM) smaller than 2.5 μm are less studied due to the limited availability of PM₂.₅, and less information is available on the health effects attributable to PM₁₀ in Central-Eastern Europe. The objective of the current study was to assess the human health risk and characterize the spatial and temporal variation of PM₂.₅ and PM₁₀ in eight Romanian regions between the 2009-2018 and. The PM concentrations showed high variability over time and spatial distribution. The highest concentration was detected in the Bucharest region in the winter period, and the lowest was detected in West. The relative risk caused by the PM₁₀ for all-cause mortality varied between 1.017 (B) and 1.025 (W), with an average 1.020. The results demonstrate a positive relative risk of cardiopulmonary and lung cancer disease due to exposure to PM₂.₅ on the national average 1.26 ( ± 0.023) and 1.42 ( ± 0.037), respectively.

Keywords: PM₂.₅, PM₁₀, relative risk, health effect

Procedia PDF Downloads 154
7197 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 75
7196 A Comparative Study of Generalized Autoregressive Conditional Heteroskedasticity (GARCH) and Extreme Value Theory (EVT) Model in Modeling Value-at-Risk (VaR)

Authors: Longqing Li

Abstract:

The paper addresses the inefficiency of the classical model in measuring the Value-at-Risk (VaR) using a normal distribution or a Student’s t distribution. Specifically, the paper focuses on the one day ahead Value-at-Risk (VaR) of major stock market’s daily returns in US, UK, China and Hong Kong in the most recent ten years under 95% confidence level. To improve the predictable power and search for the best performing model, the paper proposes using two leading alternatives, Extreme Value Theory (EVT) and a family of GARCH models, and compares the relative performance. The main contribution could be summarized in two aspects. First, the paper extends the GARCH family model by incorporating EGARCH and TGARCH to shed light on the difference between each in estimating one day ahead Value-at-Risk (VaR). Second, to account for the non-normality in the distribution of financial markets, the paper applies Generalized Error Distribution (GED), instead of the normal distribution, to govern the innovation term. A dynamic back-testing procedure is employed to assess the performance of each model, a family of GARCH and the conditional EVT. The conclusion is that Exponential GARCH yields the best estimate in out-of-sample one day ahead Value-at-Risk (VaR) forecasting. Moreover, the discrepancy of performance between the GARCH and the conditional EVT is indistinguishable.

Keywords: Value-at-Risk, Extreme Value Theory, conditional EVT, backtesting

Procedia PDF Downloads 314