Search results for: risks and vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1854

Search results for: risks and vulnerabilities

1284 Design and Development of Motorized Placer for Balloon Uterine Stents in Gynecology

Authors: Metehan Mutlu, Meltem Elitas

Abstract:

This study aims to provide an automated method for placing the balloon uterine stents after hysteroscopy adhesiolysis. Currently, there are no automatized tools to place the balloon uterine stent; therefore, surgeons into the endometrial cavity manually fit it. However, it is very hard to pass the balloon stent through the cervical canal, which is roughly 10mm after the surgery. Our method aims to provide an effective and practical way of placing the stent, by automating the procedure through our designed device. Furthermore, our device does the required tasks fast compared to traditional methods, reduces the narcosis time, and decreases the bacterial contamination risks.

Keywords: balloon uterine stent, endometrial cavity, hysteroscopy, motorized-tool

Procedia PDF Downloads 268
1283 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 74
1282 Analysis of the Strategic Value at the Usage of Green IT Application for the Organizational Product or Service in Order to Gain the Competitive Advantage; Case: E-Money of a Telecommunication Firm in Indonesia

Authors: I Putu Deny Arthawan Sugih Prabowo, Eko Nugroho, Rudy Hartanto

Abstract:

Known, Green IT is a concept about how to use the technology (IT) wisely, efficiently, and environmentally. However, it exists as the consequence of the rapid-growth of the technology (especially IT) currently. Not only for the environments, the usage of Green IT applications, e.g. Cloud Computing (Cloud Storage) and E-Money (E-Cash), also gives its benefits for the organizational business strategy (especially the organizational product/service strategy) in order to gain the organizational competitive advantage (to be the market leader). This paper takes the case at E-Money as a Value-Added Services (VAS) of a telecommunication firm (company) in Indonesia which it also competes with the competitors’ similar product (service). Although it has been a popular telecommunication firm’s product/service, but its strategic values for the organization (firm) is still unknown, and therefore, the aim of this paper is for analyzing its strategic values for gaining the organizational competitive advantage. However, in this paper, its strategic value analysis is viewed by how to assess (consider) its strategic benefits and also manage the challenges or risks of its implementation at the organization as an organizational product/service. Then the paper uses a research model for investigating the influences of both perceived risks and the organizational cultures to the usage of Green IT Application at the organization and also both the usage of Green IT Application at the organization and the threats-challenges of the organizational products/services to the competitive advantage of the organizational products/services. However, the paper uses the quantitative research method (collecting the information from the field respondents by using the research questionnaires) and then, the primary data is analyzed by both descriptive and inferential statistics. Also in this paper, SmartPLS is used for analyzing the primary data by the quantitative research method. Besides using the quantitative research method, the paper also uses the qualitative research method, such as interviewing the field respondent and/or directly field observation, for deeply confirming the quantitative research method’s analysis results at the certain domain, e.g. both organizational cultures and internal processes that support the usage of Green IT applications for the organizational product/service (E-Money in this paper case). However, the paper is still at an infant stage of in-progress research. Then the paper’s results may be used as a reference for the organization (firm or company) in developing the organizational business strategies, especially about the organizational product/service that relates to Green IT applications. Besides it, the paper may also be the future study, e.g. the influence of knowledge transfer about E-Money and/or other Green IT application-based products/services to the organizational service performance that relates to the product (service) in order to gain the competitive advantage.

Keywords: Green IT, competitive advantage, strategic value, organization (firm or company), organizational product (service)

Procedia PDF Downloads 294
1281 Evaluating the Effects of Weather and Climate Change to Risks in Crop Production

Authors: Marcus Bellett-Travers

Abstract:

Different modelling approaches have been used to determine or predict yield of crops in different geographies. Central to the methodologies are the presumption that it is the absolute yield of the crop in a given location that is of the highest priority to those requiring information on crop productivity. Most individuals, companies and organisations within the agri-food sector need to be able to balance the supply of crops with the demand for them. Different modelling approaches have been used to determine and predict crop yield. The growing need to ensure certainty of supply and stability of prices requires an approach that describes the risk in producing a crop. A review of current methodologies to evaluate the risk to food production from changes in the weather and climate is presented.

Keywords: crop production, risk, climate, modelling

Procedia PDF Downloads 370
1280 The Diversity of Contexts within Which Adolescents Engage with Digital Media: Contributing to More Challenging Tasks for Parents and a Need for Third Party Mediation

Authors: Ifeanyi Adigwe, Thomas Van der Walt

Abstract:

Digital media has been integrated into the social and entertainment life of young children, and as such, the impact of digital media appears to affect young people of all ages and it is believed that this will continue to shape the world of young children. Since, technological advancement of digital media presents adolescents with diverse contexts, platforms and avenues to engage with digital media outside the home environment and from parents' supervision, a wide range of new challenges has further complicated the already difficult tasks for parents and altered the landscape of parenting. Despite the fact that adolescents now have access to a wide range of digital media technologies both at home and in the learning environment, parenting practices such as active, restrictive, co-use, participatory and technical mediations are important in mitigating of online risks adolescents may encounter as a result of digital media use. However, these mediation practices only focus on the home environment including digital media present in the home and may not necessarily transcend outside the home and other learning environments where adolescents use digital media for school work and other activities. This poses the question of who mediates adolescent's digital media use outside the home environment. The learning environment could be a ''loose platform'' where an adolescent can maximise digital media use considering the fact that there is no restriction in terms of content and time allotted to using digital media during school hours. That is to say that an adolescent can play the ''bad boy'' online in school because there is little or no restriction of digital media use and be exposed to online risks and play the ''good boy'' at home because of ''heavy'' parental mediation. This is the reason why parent mediation practices have been ineffective because a parent may not be able to track adolescents digital media use considering the diversity of contexts, platforms and avenues adolescents use digital media. This study argues that due to the diverse nature of digital media technology, parents may not be able to monitor the 'whereabouts' of their children in the digital space. This is because adolescent digital media usage may not only be confined to the home environment but other learning environments like schools. This calls for urgent attention on the part of teachers to understand the intricacies of how digital media continue to shape the world in which young children are developing and learning. It is, therefore, imperative for parents to liaise with the schools of their children to mediate digital media use during school hours. The implication of parents- teachers mediation practices are discussed. The article concludes by suggesting that third party mediation by teachers in schools and other learning environments should be encouraged and future research needs to consider the emergent strategy of teacher-children mediation approach and the implication for policy for both the home and learning environments.

Keywords: digital media, digital age, parent mediation, third party mediation

Procedia PDF Downloads 146
1279 Risk Identification of Investment Feasibility in Indonesia’s Toll Road Infrastructure Investment

Authors: Christo Februanto Putra

Abstract:

This paper presents risk identification that affects investment feasibility on toll road infrastructure in Indonesia using qualitative methods survey based on the expert practitioner in investor, contractor, and state officials. The problems on infrastructure investment in Indonesia, especially on KPBU model contract, is many risk factors in the investment plan is not calculated in detail thoroughly. Risk factor is a value used to provide an overview of the risk level assessment of an event which is a function of the probability of the occurrence and the consequences of the risks that arise. As results of the survey which is to show which risk factors impacts directly to the investment feasibility and rank them by their impacts on the investment.

Keywords: risk identification, indonesia toll road, investment feasibility

Procedia PDF Downloads 266
1278 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 132
1277 Residual Life Prediction for a System Subject to Condition Monitoring and Two Failure Modes

Authors: Akram Khaleghei, Ghosheh Balagh, Viliam Makis

Abstract:

In this paper, we investigate the residual life prediction problem for a partially observable system subject to two failure modes, namely a catastrophic failure and a failure due to the system degradation. The system is subject to condition monitoring and the degradation process is described by a hidden Markov model with unknown parameters. The parameter estimation procedure based on an EM algorithm is developed and the formulas for the conditional reliability function and the mean residual life are derived, illustrated by a numerical example.

Keywords: partially observable system, hidden Markov model, competing risks, residual life prediction

Procedia PDF Downloads 404
1276 Safety Tolerance Zone for Driver-Vehicle-Environment Interactions under Challenging Conditions

Authors: Matjaž Šraml, Marko Renčelj, Tomaž Tollazzi, Chiara Gruden

Abstract:

Road safety is a worldwide issue with numerous and heterogeneous factors influencing it. On the side, driver state – comprising distraction/inattention, fatigue, drowsiness, extreme emotions, and socio-cultural factors highly affect road safety. On the other side, the vehicle state has an important role in mitigating (or not) the road risk. Finally, the road environment is still one of the main determinants of road safety, defining driving task complexity. At the same time, thanks to technological development, a lot of detailed data is easily available, creating opportunities for the detection of driver state, vehicle characteristics and road conditions and, consequently, for the design of ad hoc interventions aimed at improving driver performance, increase awareness and mitigate road risks. This is the challenge faced by the i-DREAMS project. i-DREAMS, which stands for a smart Driver and Road Environment Assessment and Monitoring System, is a 3-year project funded by the European Union’s Horizon 2020 research and innovation program. It aims to set up a platform to define, develop, test and validate a ‘Safety Tolerance Zone’ to prevent drivers from getting too close to the boundaries of unsafe operation by mitigating risks in real-time and after the trip. After the definition and development of the Safety Tolerance Zone concept and the concretization of the same in an Advanced driver-assistance system (ADAS) platform, the system was tested firstly for 2 months in a driving simulator environment in 5 different countries. After that, naturalistic driving studies started for a 10-month period (comprising a 1-month pilot study, 3-month baseline study and 6 months study implementing interventions). Currently, the project team has approved a common evaluation approach, and it is developing the assessment of the usage and outcomes of the i-DREAMS system, which is turning positive insights. The i-DREAMS consortium consists of 13 partners, 7 engineering universities and research groups, 4 industry partners and 2 partners (European Transport Safety Council - ETSC - and POLIS cities and regions for transport innovation) closely linked to transport safety stakeholders, covering 8 different countries altogether.

Keywords: advanced driver assistant systems, driving simulator, safety tolerance zone, traffic safety

Procedia PDF Downloads 53
1275 Characterization of Aerosol Particles in Ilorin, Nigeria: Ground-Based Measurement Approach

Authors: Razaq A. Olaitan, Ayansina Ayanlade

Abstract:

Understanding aerosol properties is the main goal of global research in order to lower the uncertainty associated with climate change in the trends and magnitude of aerosol particles. In order to identify aerosol particle types, optical properties, and the relationship between aerosol properties and particle concentration between 2019 and 2021, a study conducted in Ilorin, Nigeria, examined the aerosol robotic network's ground-based sun/sky scanning radiometer. The AERONET algorithm version 2 was utilized to retrieve monthly data on aerosol optical depth and angstrom exponent. The version 3 algorithm, which is an almucantar level 2 inversion, was employed to retrieve daily data on single scattering albedo and aerosol size distribution. Excel 2016 was used to analyze the data's monthly, seasonal, and annual mean averages. The distribution of different types of aerosols was analyzed using scatterplots, and the optical properties of the aerosol were investigated using pertinent mathematical theorems. To comprehend the relationships between particle concentration and properties, correlation statistics were employed. Based on the premise that aerosol characteristics must remain constant in both magnitude and trend across time and space, the study's findings indicate that the types of aerosols identified between 2019 and 2021 are as follows: 29.22% urban industrial (UI) aerosol type, 37.08% desert (D) aerosol type, 10.67% biomass burning (BB), and 23.03% urban mix (Um) aerosol type. Convective wind systems, which frequently carry particles as they blow over long distances in the atmosphere, have been responsible for the peak-of-the-columnar aerosol loadings, which were observed during August of the study period. The study has shown that while coarse mode particles dominate, fine particles are increasing in seasonal and annual trends. Burning biomass and human activities in the city are linked to these trends. The study found that the majority of particles are highly absorbing black carbon, with the fine mode having a volume median radius of 0.08 to 0.12 meters. The investigation also revealed that there is a positive coefficient of correlation (r = 0.57) between changes in aerosol particle concentration and changes in aerosol properties. Human activity is rapidly increasing in Ilorin, causing changes in aerosol properties, indicating potential health risks from climate change and human influence on geological and environmental systems.

Keywords: aerosol loading, aerosol types, health risks, optical properties

Procedia PDF Downloads 44
1274 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 86
1273 The Relationship of Depression Risk and Gestational Diabetes Mellitus: A Systematic Review and Meta-Analysis

Authors: Yu Chen Su

Abstract:

Introduction: Gestational diabetes mellitus (GDM) refers to impaired glucose tolerance in pregnant women, impacting both the mother and newborn with short and long-term effects. It increases risks of preeclampsia, hypertension, type 2 diabetes, cesarean section, and preterm birth. GDM is associated with fetal macrosomia, shoulder dystocia, neonatal hypoglycemia, and future type 2 diabetes risk. A study on 6,421 pregnant women found 12% experienced high stress, linked to maladaptive coping and depressive emotions. Women with high-risk pregnancies may experience greater stress and depression. Research suggests GDM increases depression prevalence. A study on 632 Hispanic women with GDM showed severe stress and depression tendencies. Involving 95 women with GDM, 33.4% exhibited depression symptoms. Another study compared 180 GDM women to 186 with normal glucose levels, revealing higher depression levels in GDM women. They found GDM women were 1.85 times more likely to receive antidepressants during pregnancy and 1.69 times more likely to experience postpartum depression. Maternal stress and depressive symptoms during pregnancy are significant factors. Early identification by healthcare professionals can greatly benefit GDM women, their infants, and their families. Objectives: The purpose of this study was to investigate the association between gestational diabetes mellitus (GDM) and the risk of depression. Methods: This study reviewed and analyzed relevant literature on gestational diabetes mellitus (GDM) and depression in 6,876 patients. The literature search followed PRISMA guidelines and included databases like Embase, PubMed, MEDLINE, CINAHL, and Cochrane Library. Prospective or retrospective studies with relevant risk ratios and estimates were included, using a random-effects model for the analysis of depression risk correlation. Studies without depression data or relevant risks were excluded. The search period extended until October 2022. Results: Systematic review of 7 studies (6,876 participants) found a significant association (OR = 8.77, CI: 7.98-9.64, p < 0.05) between gestational diabetes mellitus (GDM) and higher depression risk compared to healthy pregnant women. Conclusions: Pregnancy is a significant life transition involving physiological, psychological, and social changes. Gestational diabetes poses challenges to women's physical and mental well-being. Sensitive healthcare professionals identifying issues early can greatly benefit women, babies, and the family.

Keywords: gestational diabetes, depression, systematic review, neta-analysis

Procedia PDF Downloads 64
1272 Characteristics of the entrepreneurial professor: Educational Leadership and Higher Education

Authors: Ana Verde

Abstract:

Higher education is now a source of new paradigms, advanced research in various fields of knowledge and an essential element in providing solutions to the major problems it faces today. In the education sector, more and more attention is being paid to the importance of entrepreneurship and the need for students to acquire skills in the classroom in order to be successful in their future careers. In the field of education, the term "teacherpreneur" has been coined in recent years to describe a teacher who is committed to educational change, passionate about his or her work, charismatic, self-confident, flexible, responsible, able to dare to break the established rules and take risks, and whose work is student-centred and action oriented. This research analyses the characteristics of the entrepreneurial professor and educational leader, and how their practice can be directed towards educational improvement.

Keywords: higher education, entrepreneurial, skills, leadership

Procedia PDF Downloads 48
1271 The Mediator as an Evaluator: An Analysis of Evaluation as a Method for the Lawyer’s Reform to Mediation

Authors: Dionne Coley B. A.

Abstract:

The role of a lawyer as a mediator is to be impartial in assisting parties to arrive at a decision. This decision should be made in a voluntary and mutually acceptable manner where the mediator encourages the parties to communicate, identify their interests, assess risks and consider settlement options. One of the key components to mediation is impartiality where mediators are to have a duty to remain impartial throughout the course of mediation and uphold an “objective” demeanor with both parties. The question is whether a mediator should take on evaluative role while encouraging the parties to come to a decision. This means that the mediator would not only encourage dialogue and responses between the parties but also assess and provide an opinion on the matter. This paper submits the argument that the role of a mediator should not be one of evaluation as this does not encourage the dialogue, process or desired outcomes associated with mediation.

Keywords: evaluation, lawyer, mediation, reform

Procedia PDF Downloads 411
1270 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 144
1269 Climate Change Impacts, Vulnerability, and Adaptation among Rural Households in Ethiopia

Authors: Birtukan Atinkut Asmare

Abstract:

Climate change disproportionately affects many Africans who heavily rely on climate-exposed sectors such as rain-fed agriculture and fishing, rendering them highly vulnerable. Gender plays a significant role, as men and women experience unequal impacts and vulnerabilities due to gender norms, labor divisions, resource access, and power dynamics. Drawing on an integrated framework, this study sheds light on the gendered impacts of climate change on household’s livelihood, their vulnerability, and adaptation in rural Ethiopia's Lake Tana Basin. This study utilized mixed research methods, integrating diverse qualitative techniques such as focus group discussions, key informant interviews, and field observations, along with quantitative data gathered through household surveys. The findings reveal that women-headed households were more vulnerable to climate change than male-headed households. Flood was the major climate-induced hazards in the area that threatened the lives and livelihoods of households. In response to climate change, households undertook different adaptation measures such as agroforestry practices, crop diversification, seasonal migration, petty trading, charcoal and fuel wood sales. However, the adaptation strategies were slightly varied based on the gender of the household head. Women-headed households specifically engaged in fuelwood collection and selling and petty trading activities. The main constraints for adaptation were limited access to technologies, extension services, information, and financial services. Therefore, this research urges attention from research, policy, and advisory services on rural households who are trying to survive in the face of climate change.

Keywords: agriculture, climate change impacts, ethiopia, gender

Procedia PDF Downloads 49
1268 Building Transparent Supply Chains through Digital Tracing

Authors: Penina Orenstein

Abstract:

In today’s world, particularly with COVID-19 a constant worldwide threat, organizations need greater visibility over their supply chains more than ever before, in order to find areas for improvement and greater efficiency, reduce the chances of disruption and stay competitive. The concept of supply chain mapping is one where every process and route is mapped in detail between each vendor and supplier. The simplest method of mapping involves sourcing publicly available data including news and financial information concerning relationships between suppliers. An additional layer of information would be disclosed by large, direct suppliers about their production and logistics sites. While this method has the advantage of not requiring any input from suppliers, it also doesn’t allow for much transparency beyond the first supplier tier and may generate irrelevant data—noise—that must be filtered out to find the actionable data. The primary goal of this research is to build data maps of supply chains by focusing on a layered approach. Using these maps, the secondary goal is to address the question as to whether the supply chain is re-engineered to make improvements, for example, to lower the carbon footprint. Using a drill-down approach, the end result is a comprehensive map detailing the linkages between tier-one, tier-two, and tier-three suppliers super-imposed on a geographical map. The driving force behind this idea is to be able to trace individual parts to the exact site where they’re manufactured. In this way, companies can ensure sustainability practices from the production of raw materials through the finished goods. The approach allows companies to identify and anticipate vulnerabilities in their supply chain. It unlocks predictive analytics capabilities and enables them to act proactively. The research is particularly compelling because it unites network science theory with empirical data and presents the results in a visual, intuitive manner.

Keywords: data mining, supply chain, empirical research, data mapping

Procedia PDF Downloads 164
1267 Big Data Strategy for Telco: Network Transformation

Authors: F. Amin, S. Feizi

Abstract:

Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.

Keywords: big data, next generation networks, network transformation, strategy

Procedia PDF Downloads 347
1266 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 36
1265 Numerical Simulation of Seismic Process Accompanying the Formation of Shear-Type Fault Zone in Chuya-Kuray Depressions

Authors: Mikhail O. Eremin

Abstract:

Seismic activity around the world is clearly a threat to people's lives, as well as infrastructure and capital construction. It is the instability of the latter to powerful earthquakes that most often causes human casualties. Therefore, during construction it is necessary to take into account the risks of large-scale natural disasters. The task of assessing the risks of natural disasters is one of the most urgent at the present time. The final goal of any study of earthquakes is forecasting. This is especially important for seismically active regions of the planet where earthquakes occur frequently. Gorni Altai is one of such regions. In work, we developed the physical-mathematical model of stress-strain state evolution of loaded geomedium with the purpose of numerical simulation of seismic process accompanying the formation of Chuya-Kuray fault zone Gorni Altay, Russia. We build a structural model on the base of seismotectonic and paleoseismogeological investigations, as well as SRTM-data. Base of mathematical model is the system of equations of solid mechanics which includes the fundamental conservation laws and constitutive equations for elastic (Hooke's law) and inelastic deformation (modified model of Drucker-Prager-Nikolaevskii). An initial stress state of the model correspond to gravitational. Then we simulate an activation of a buried dextral strike-slip paleo-fault located in the basement of the model. We obtain the stages of formation and the structure of Chuya-Kuray fault zone. It is shown that results of numerical simulation are in good agreement with field observations in statistical sense. Simulated seismic process is strongly bound to the faults - lineaments with high degree of inelastic strain localization. Fault zone represents en-echelon system of dextral strike-slips according to the Riedel model. The system of surface lineaments is represented with R-, R'-shear bands, X- and Y-shears, T-fractures. Simulated seismic process obeys the laws of Gutenberg-Richter and Omori. Thus, the model describes a self-similar character of deformation and fracture of rocks and geomedia. We also modified the algorithm of determination of separate slip events in the model due to the features of strain rates dependence vs time.

Keywords: Drucker-Prager model, fault zone, numerical simulation, Riedel bands, seismic process, strike-slip fault

Procedia PDF Downloads 128
1264 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 73
1263 Sustainable Adaptation: Social Equity and Local-Level Climate Adaptation Planning in U.S. Cities

Authors: Duran Fiack, Jeremy Cumberbatch, Michael Sutherland, Nadine Zerphey

Abstract:

Civic leaders have increasingly relied upon local climate adaptation plans to identify vulnerabilities, prioritize goals, and implement actions in order to prepare cities for the present and projected effects of global climate change. The concept of sustainability is central to these efforts, as climate adaptation discussions are often framed within the context of economic resilience, environmental protection, and the distribution of climate change impacts across various socioeconomic groups. For urban centers, the climate change issue presents unique challenges for each of these dimensions; however, its potential impacts on marginalized populations are extensive. This study draws from the ‘just sustainabilities’ framework to perform a qualitative analysis of climate adaptation plans prepared by 22 of the 100 largest U.S. cities and examine whether, and to what extent, such initiatives prioritize social equity improvements. Past research has found that the integration of sustainability in urban policy and planning often produces outcomes that favor environmental and economic objectives over social equity improvements. We find that social equity is a particularly prominent theme in local-level climate adaptation efforts, relative to environmental quality and economic development. The findings contribute to the literature on climate adaptation and sustainability within the urban context and offer practical insight for local-level stakeholders concerning potential obstacles and opportunities for the integration of social equity initiatives into climate adaptation planning. Given the likelihood that climate changes will continue to impose unique challenges for marginalized communities in urban areas, advancing our understanding of how social equity concerns are integrated into adaptation efforts is likely to become an increasingly critical area of inquiry.

Keywords: climate adaptation plan, climate change, social equity, sustainability

Procedia PDF Downloads 135
1262 Well-being at Work in the Sports Sector: Systematic Review and Perspectives

Authors: Ouazoul Abdelouahd, Jemjami Nadia

Abstract:

The concept of well-being at work is one of today's significant challenges in maintaining quality of life and managing psycho-social risks at work. Indeed, work in the sports sector has evolved, and this exponential evolution, marked by increasing demands and psychological, physical, and social challenges, which sometimes exceed the resources of sports actors, influences their sense of well-being at work. Well-being and burnout as antagonists provide information on the quality of working life in sports. The Basic aim of this literature review is to analyze the scientific corpus dealing with the subject of well-being at work in the sports sector while exploring the link between sports burnout and well-being. The results reveal the richness of the conceptual approaches and the difficulties of implementing them. Prospects for future research have, therefore, been put forward.

Keywords: Well-being, quality of life, Burnout, ; psycho-social risk, Sports sector

Procedia PDF Downloads 68
1261 Human Health Risks Assessment of Particulate Air Pollution in Romania

Authors: Katalin Bodor, Zsolt Bodor, Robert Szep

Abstract:

The particulate matter (PM) smaller than 2.5 μm are less studied due to the limited availability of PM₂.₅, and less information is available on the health effects attributable to PM₁₀ in Central-Eastern Europe. The objective of the current study was to assess the human health risk and characterize the spatial and temporal variation of PM₂.₅ and PM₁₀ in eight Romanian regions between the 2009-2018 and. The PM concentrations showed high variability over time and spatial distribution. The highest concentration was detected in the Bucharest region in the winter period, and the lowest was detected in West. The relative risk caused by the PM₁₀ for all-cause mortality varied between 1.017 (B) and 1.025 (W), with an average 1.020. The results demonstrate a positive relative risk of cardiopulmonary and lung cancer disease due to exposure to PM₂.₅ on the national average 1.26 ( ± 0.023) and 1.42 ( ± 0.037), respectively.

Keywords: PM₂.₅, PM₁₀, relative risk, health effect

Procedia PDF Downloads 154
1260 The Impact of Electronic Commerce on Organisational Efectiveness: A Study of Zenith Bank Plc

Authors: Olusola Abiodun Arinde

Abstract:

This research work was prompted by the very important role e-commerce plays in every organization, be it private or public. The underlying objective of this study is to have a critical appraisal of the extent to which e-commerce impacts on organizational effectiveness. This research was carried out using Zenith Bank Plc as a case study. Relevant data were collected through structured questionnaire, oral interview, journals, newspapers, and textbooks. The data collected were analyzed and hypotheses were tested. Based on the result of the hypotheses, it was observed that e-commerce is significant to every organization. Through e-commerce, fast services delivery would be guaranteed to customers, this would lead to higher productivity and profit for organizations. E-commerce should be managed in such a way that it does not alienate customers; it should also prevent enormous risks that are associated with e-commerce.

Keywords: e-commerce, fast service, productivity, profit

Procedia PDF Downloads 226
1259 Technological Improvements and the Challenges They Pose to Market Competition in the Philippines

Authors: Isabel L. Guidote

Abstract:

Continued advancements and innovation in the technological arena may yield both beneficial and detrimental effects to market competition in the Philippines. This paper discusses recent developments in the digital sphere which have resulted in improved access to the Philippine market for both producers and consumers. Acknowledging that these developments are likely to disrupt or alter prevailing market conditions, this paper likewise tackles competition theories of harm that may arise as a result of such technological innovations, with reference to cases decided by foreign competition authorities and the European Commission. As the Philippine moves closer to the digital frontier, it is imperative that producers, consumers, and regulators alike be well-equipped to address the risks and challenges posed by these rapid advancements in technology.

Keywords: antitrust, competition law, market competition, technology

Procedia PDF Downloads 159
1258 Levy Model for Commodity Pricing

Authors: V. Benedico, C. Anacleto, A. Bearzi, L. Brice, V. Delahaye

Abstract:

The aim in present paper is to construct an affordable and reliable commodity prices based on a recalculation of its cost through time which allows visualize the potential risks and thus, take more appropriate decisions regarding forecasts. Here attention has been focused on Levy model, more reliable and realistic than classical random Gaussian one as it takes into consideration observed abrupt jumps in case of sudden price variation. In application to Energy Trading sector where it has never been used before, equations corresponding to Levy model have been written for electricity pricing in European market. Parameters have been set in order to predict and simulate the price and its evolution through time to remarkable accuracy. As predicted by Levy model, the results show significant spikes which reach unconventional levels contrary to currently used Brownian model.

Keywords: commodity pricing, Lévy Model, price spikes, electricity market

Procedia PDF Downloads 418
1257 Well-being at Work in the Sports Sector: Systematic Review and Perspectives

Authors: Ouazoul Abdeloauhd, Jemjami Nadia

Abstract:

The concept of well-being at work is one of today's significant challenges in maintaining quality of life and managing psycho-social risks at work. Indeed, work in the sports sector has evolved, and this exponential evolution, marked by increasing demands and psychological, physical, and social challenges, which sometimes exceed the resources of sports actors, influences their sense of well-being at work. Well-being and burnout as antagonists provide information on the quality of working life in sports. The Basic aim of this literature review is to analyze the scientific corpus dealing with the subject of well-being at work in the sports sector while exploring the link between sports burnout and well-being. The results reveal the richness of the conceptual approaches and the difficulties of implementing them. Prospects for future research have, therefore, been put forward.

Keywords: well-being, burnout, quality of life, psycho-social risk, work on sports sector

Procedia PDF Downloads 76
1256 Effects of Age and Energy Expenditure on Obesity Among Adults in Abeokuta, Nigeria

Authors: Adeniyi Samuel Adekoya

Abstract:

The study assessed the independent effects of age and energy expenditure on the risks of obesity among adults (20-64 years). A cross-sectional study with changes in age, changes in work and leisure-time, and physical activities information played roles, with cut-off for energy expenditure and BMI in rural and urban localities. Physical activity information determined the energy expenditure, while the BMI determined the risk of obesity among the subjects. Statistically, age has a strong and direct association with obesity in both rural and urban settings, while energy expenditure was inverse in its association. Findings from the this study showed that in developing societies, age tends to be a risk factor for obesity, whereas energy expenditure is to be protective. Level of education and economic development are also relevant modifiers of the influences exerted by these variables.

Keywords: age, energy expenditure, BMI, rural/urban

Procedia PDF Downloads 412
1255 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 419