Search results for: security risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8386

Search results for: security risk

7696 Apricot Insurance Portfolio Risk

Authors: Kasirga Yildirak, Ismail Gur

Abstract:

We propose a model to measure hail risk of an Agricultural Insurance portfolio. Hail is one of the major catastrophic event that causes big amount of loss to an insurer. Moreover, it is very hard to predict due to its strange atmospheric characteristics. We make use of parcel based claims data on apricot damage collected by the Turkish Agricultural Insurance Pool (TARSIM). As our ultimate aim is to compute the loadings assigned to specific parcels, we build a portfolio risk model that makes use of PD and the severity of the exposures. PD is computed by Spherical-Linear and Circular –Linear regression models as the data carries coordinate information and seasonality. Severity is mapped into integer brackets so that Probability Generation Function could be employed. Individual regressions are run on each clusters estimated on different criteria. Loss distribution is constructed by Panjer Recursion technique. We also show that one risk-one crop model can easily be extended to the multi risk–multi crop model by assuming conditional independency.

Keywords: hail insurance, spherical regression, circular regression, spherical clustering

Procedia PDF Downloads 248
7695 A Risk-Based Approach to Construction Management

Authors: Chloe E. Edwards, Yasaman Shahtaheri

Abstract:

Risk management plays a fundamental role in project planning and delivery. The purpose of incorporating risk management into project management practices is to identify and address uncertainties related to key project-related activities. The uncertainties, known as risk events, can relate to project deliverables that are quantifiable and are often measured by impact to project schedule, cost, or environmental impact. Risk management should be incorporated as an iterative practice throughout the planning, execution, and commissioning phases of a project. This paper specifically examines how risk management contributes to effective project planning and delivery through a case study of a transportation project. This case study focused solely on impacts to project schedule regarding three milestones: readiness for delivery, readiness for testing and commissioning, and completion of the facility. The case study followed the ISO 31000: Risk Management – Guidelines. The key factors that are outlined by these guidelines include understanding the scope and context of the project, conducting a risk assessment including identification, analysis, and evaluation, and lastly, risk treatment through mitigation measures. This process requires continuous consultation with subject matter experts and monitoring to iteratively update the risks accordingly. The risk identification process led to a total of fourteen risks related to design, permitting, construction, and commissioning. The analysis involved running 1,000 Monte Carlo simulations through @RISK 8.0 Industrial software to determine potential milestone completion dates based on the project baseline schedule. These dates include the best case, most likely case, and worst case to provide an estimated delay for each milestone. Evaluation of these results provided insight into which risks were the highest contributors to the projected milestone completion dates. Based on the analysis results, the risk management team was able to provide recommendations for mitigation measures to reduce the likelihood of risks occurring. The risk management team also provided recommendations for managing the identified risks and project activities moving forward to meet the most likely or best-case milestone completion dates.

Keywords: construction management, monte carlo simulation, project delivery, risk assessment, transportation engineering

Procedia PDF Downloads 104
7694 Assessment of Mortgage Applications Using Fuzzy Logic

Authors: Swathi Sampath, V. Kalaichelvi

Abstract:

The assessment of the risk posed by a borrower to a lender is one of the common problems that financial institutions have to deal with. Consumers vying for a mortgage are generally compared to each other by the use of a number called the Credit Score, which is generated by applying a mathematical algorithm to information in the applicant’s credit report. The higher the credit score, the lower the risk posed by the candidate, and the better he is to be taken on by the lender. The objective of the present work is to use fuzzy logic and linguistic rules to create a model that generates Credit Scores.

Keywords: credit scoring, fuzzy logic, mortgage, risk assessment

Procedia PDF Downloads 402
7693 Risk Management in Construction Projects

Authors: Mustafa Dogru, Ruveyda Komurlu

Abstract:

Companies and professionals in the construction sector face various risks in every project depending on the characteristics, size, complexity, the location of the projects and the techniques used. Some risks’ effects may increase as the project progresses whereas new risks may emerge. Because of the ever-changing nature of the risks, risk management is a cyclical process that needs to be repeated throughout the project. Since the risks threaten the success of the project, risk management is an important part of the entire project management process. The aims of this study are to emphasize the importance of risk management in construction projects, summarize the risk identification process, and introduce a number of methods for preventing risks such as alternative design, checklists, prototyping and test-analysis-correction technique etc. Following the literature review conducted to list the techniques for preventing risks, case studies has been performed to compare and evaluate the success of the techniques in a number of completed projects with the same typology, performed domestic and international. Findings of the study suggest that controlling and minimizing the level of the risks in construction projects, taking optimal precautions for different risks, and mitigating or eliminating the effects of risks are important in order to prevent additional costs for the project. Additionally, focusing on the risks that have highest impact is the most rational way to minimize the effects of the risks on projects.

Keywords: construction projects, construction management, project management, risk management

Procedia PDF Downloads 309
7692 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 65
7691 Comparison of Food Products Contaminated by DDTs in South Africa and Mozambique

Authors: Lesa A. Thompson, Yoshinori Ikenaka, Victor Wepener, Mayumi Ishizuka

Abstract:

One method for controlling malaria in endemic regions is the killing of vector mosquitoes using pesticides such as DDT in indoor residual spraying (IRS). This study was carried out to investigate the presence of and human health risk due to DDT and its metabolites (collectively, DDTs) contaminating human food sources in areas where DDT is used for IRS. Free-range chicken products (meat and eggs) were collected from homesteads in KwaZulu-Natal Province in the northeast of South Africa, and fish meat samples from Maputo Bay in neighbouring Mozambique. Samples were analysed for DDTs (o,p’-DDT, p,p’-DDT, o,p’-DDD, p,p’-DDD, o,p’-DDE and p,p’-DDE) using a gas chromatograph with electron capture detector (GC-ECD). DDTs were detected in all food types, with the predominant congener being p,p’-DDE. The presence of p,p’-DDT confirmed recent release of DDT into the environment. By using concentration levels detected in foods and national consumption levels, the risk to human health through consumption of such food products was calculated. In order of risk level, these were: chicken eggs > chicken meat > fish meat. Human risk (carcinogenic) values greater than one suggest there is an increased health risk through consumption of these foods.

Keywords: DDT, food contamination, human health risk, Mozambique, South Africa

Procedia PDF Downloads 336
7690 Total Longitudinal Displacement (tLoD) of the Common Carotid Artery (CCA) Does Not Differ between Patients with Moderate or High Cardiovascular Risk (CV) and Patients after Acute Myocardial Infarction (AMI)

Authors: P. Serpytis, K. Azukaitis, U. Gargalskaite, R. Navickas, J. Badariene, V. Dzenkeviciute

Abstract:

Purpose: Total longitudinal displacement (tLoD) of the common carotid artery (CCA) wall is a novel ultrasound marker of vascular function that can be evaluated using modified speckle tracking techniques. Decreased CCA tLoD has already been shown to be associated with diabetes and was shown to predict one year cardiovascular outcome in patients with suspected coronary artery disease (CAD) . The aim of our study was to evaluate if CCA tLoD differ between patients with moderate or high cardiovascular (CV) risk and patients after recent acute myocardial infarction (AMI). Methods: 49 patients (54±6 years) with moderate or high CV risk and 42 patients (58±7 years) after recent AMI were included. All patients were non-diabetic. CCA tLoD was evaluated using GE EchoPAC speckle tracking software and expressed as mean of both sides. Data on systolic blood pressure, total and high density lipoprotein (HDL) cholesterol levels, high sensitivity C-reactive protein (hsCRP) level, smoking status and family history of early CV events was evaluated and assessed for association with CCA tLoD. Results: tLoD of CCA did not differ between patients with moderate or high CV risk and patients with very high CV risk after MI (0.265±0.128 mm vs. 0.237±0.103 mm, p>0.05). Lower tLoD was associated with lower HDL cholesterol levels (r=0.211, p=0.04) and male sex (0.228±0.1 vs. 0.297±0.134, p=0.01). Conclusions: tLoD of CCA did not differ between patients with moderate or high CV risk and patients with very high CV risk after AMI. However, lower CCA tLoD was significantly associated with low HDL cholesterol levels and male sex.

Keywords: total longitudinal displacement, carotid artery, cardiovascular risk, acute myocardial infarction

Procedia PDF Downloads 382
7689 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 411
7688 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa

Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq

Abstract:

The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.

Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa

Procedia PDF Downloads 95
7687 Correlation between Seismic Risk Insurance Indexes and Uninhabitability Indexes of Buildings in Morocco

Authors: Nabil Mekaoui, Nacer Jabour, Abdelhamid Allaoui, Abderahim Oulidi

Abstract:

The reliability of several insurance indexes of the seismic risk is evaluated and compared for an efficient seismic risk coverage of buildings in Morocco, thus, reducing the basic risk. A large database of earthquake ground motions is established from recent seismic events in Morocco and synthetic ground motions compatible with the design spectrum in order to conduct nonlinear time history analyses on three building models representative of the building stock in Morocco. The uninhabitability index is evaluated based on the simulated damage index, then correlated with preselected insurance indexes. Interestingly, the commonly used peak ground acceleration index showed poor correlation when compared with other indexes, such as spectral accelerations at low periods. Recommendations on the choice of suitable insurance indexes are formulated for efficient seismic risk coverage in Morocco.

Keywords: catastrophe modeling, damage, earthquake, reinsurance, seismic hazard, trigger index, vulnerability

Procedia PDF Downloads 64
7686 A Deep-Learning Based Prediction of Pancreatic Adenocarcinoma with Electronic Health Records from the State of Maine

Authors: Xiaodong Li, Peng Gao, Chao-Jung Huang, Shiying Hao, Xuefeng B. Ling, Yongxia Han, Yaqi Zhang, Le Zheng, Chengyin Ye, Modi Liu, Minjie Xia, Changlin Fu, Bo Jin, Karl G. Sylvester, Eric Widen

Abstract:

Predicting the risk of Pancreatic Adenocarcinoma (PA) in advance can benefit the quality of care and potentially reduce population mortality and morbidity. The aim of this study was to develop and prospectively validate a risk prediction model to identify patients at risk of new incident PA as early as 3 months before the onset of PA in a statewide, general population in Maine. The PA prediction model was developed using Deep Neural Networks, a deep learning algorithm, with a 2-year electronic-health-record (EHR) cohort. Prospective results showed that our model identified 54.35% of all inpatient episodes of PA, and 91.20% of all PA that required subsequent chemoradiotherapy, with a lead-time of up to 3 months and a true alert of 67.62%. The risk assessment tool has attained an improved discriminative ability. It can be immediately deployed to the health system to provide automatic early warnings to adults at risk of PA. It has potential to identify personalized risk factors to facilitate customized PA interventions.

Keywords: cancer prediction, deep learning, electronic health records, pancreatic adenocarcinoma

Procedia PDF Downloads 153
7685 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 492
7684 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 329
7683 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 527
7682 Mitigating Supply Chain Risk for Sustainability Using Big Data Knowledge: Evidence from the Manufacturing Supply Chain

Authors: Mani Venkatesh, Catarina Delgado, Purvishkumar Patel

Abstract:

The sustainable supply chain is gaining popularity among practitioners because of increased environmental degradation and stakeholder awareness. On the other hand supply chain, risk management is very crucial for the practitioners as it potentially disrupts supply chain operations. Prediction and addressing the risk caused by social issues in the supply chain is paramount importance to the sustainable enterprise. More recently, the usage of Big data analytics for forecasting business trends has been gaining momentum among professionals. The aim of the research is to explore the application of big data, predictive analytics in successfully mitigating supply chain social risk and demonstrate how such mitigation can help in achieving sustainability (environmental, economic & social). The method involves the identification and validation of social issues in the supply chain by an expert panel and survey. Later, we used a case study to illustrate the application of big data in the successful identification and mitigation of social issues in the supply chain. Our result shows that the company can predict various social issues through big data, predictive analytics and mitigate the social risk. We also discuss the implication of this research to the body of knowledge and practice.

Keywords: big data, sustainability, supply chain social sustainability, social risk, case study

Procedia PDF Downloads 403
7681 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 122
7680 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River

Authors: Kebron Asnake

Abstract:

Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.

Keywords: water, health, agriculture, medicine

Procedia PDF Downloads 76
7679 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 235
7678 Planning Strategies for Urban Flood Mitigation through Different Case Studies of Best Practices across the World

Authors: Bismina Akbar, Smitha M. V.

Abstract:

Flooding is a global phenomenon that causes widespread devastation, economic damage, and loss of human lives. In the past twenty years, the number of reported flood events has increased significantly. Millions of people around the globe are at risk of flooding from coastal, dam breaks, groundwater, and urban surface water and wastewater sources. Climate change is one of the important causes for them since it affects, directly and indirectly, the river network. Although the contribution of climate change is undeniable, human contributions are there to increase the frequency of floods. There are different types of floods, such as Flash floods, Coastal floods, Urban floods, River (or fluvial) floods, and Ponding (or pluvial flooding). This study focuses on formulating mitigation strategies for urban flood risk reduction through analysis of different best practice case studies, including China, Japan, Indonesia, and Brazil. The mitigation measures suggest that apart from the structural and non-structural measures, environmental considerations like blue-green solutions are beneficial for flood risk reduction. And also, Risk-Informed Master plans are essential nowadays to take risk-based decision processes that enable more sustainability and resilience.

Keywords: hazard, mitigation, risk reduction, urban flood

Procedia PDF Downloads 72
7677 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 196
7676 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 159
7675 Infection Risk of Fecal Coliform Contamination in Drinking Water Sources of Urban Slum Dwellers: Application of Quantitative Microbiological Risk Assessment

Authors: Sri Yusnita Irda Sari, Deni Kurniadi Sunjaya, Ardini Saptaningsih Raksanagara

Abstract:

Water is one of the fundamental basic needs for human life, particularly drinking water sources. Although water quality is getting better, fecal-contamination of water is still found around the world, especially in the slum area of mid-low income countries. Drinking water source contamination in urban slum dwellers increases the risk of water borne diseases. Low level of sanitation and poor drinking water supply known as risk factors for diarrhea, moreover bacteria-contaminated drinking water source is the main cause of diarrhea in developing countries. This study aimed to assess risk infection due to Fecal Coliform contamination in various drinking water sources in urban area by applying Quantitative Microbiological Risk Assessment (QMRA). A Cross-sectional survey was conducted in a period of August to October 2015. Water samples were taken by simple random sampling from households in Cikapundung river basin which was one of urban slum area in the center of Bandung city, Indonesia. About 379 water samples from 199 households and 15 common wells were tested. Half of the households used treated drinking water from water gallon mostly refill water gallon which was produced in drinking water refill station. Others used raw water sources which need treatment before consume as drinking water such as tap water, borehole, dug well and spring water source. Annual risk to get infection due to Fecal Coliform contamination from highest to lowest risk was dug well (1127.9 x 10-5), spring water (49.7 x 10-5), borehole (1.383 x 10-5) and tap water (1.121 x 10-5). Annual risk infection of refill drinking water was 1.577 x 10-5 which is comparable to borehole and tap water. Household water treatment and storage to make raw water sources drinkable is essential to prevent risk of water borne diseases. Strong regulation and intense monitoring of refill water gallon quality should be prioritized by the government; moreover, distribution of tap water should be more accessible and affordable especially in urban slum area.

Keywords: drinking water, quantitative microbiological risk assessment, slum, urban

Procedia PDF Downloads 275
7674 Development of a Fuzzy Logic Based Model for Monitoring Child Pornography

Authors: Mariam Ismail, Kazeem Rufai, Jeremiah Balogun

Abstract:

A study was conducted to apply fuzzy logic to the development of a monitoring model for child pornography based on associated risk factors, which can be used by forensic experts or integrated into forensic systems for the early detection of child pornographic activities. A number of methods were adopted in the study, which includes an extensive review of related works was done in order to identify the factors that are associated with child pornography following which they were validated by an expert sex psychologist and guidance counselor, and relevant data was collected. Fuzzy membership functions were used to fuzzify the associated variables identified alongside the risk of the occurrence of child pornography based on the inference rules that were provided by the experts consulted, and the fuzzy logic expert system was simulated using the Fuzzy Logic Toolbox available in the MATLAB Software Release 2016. The results of the study showed that there were 4 categories of risk factors required for assessing the risk of a suspect committing child pornography offenses. The results of the study showed that 2 and 3 triangular membership functions were used to formulate the risk factors based on the 2 and 3 number of labels assigned, respectively. The results of the study showed that 5 fuzzy logic models were formulated such that the first 4 was used to assess the impact of each category on child pornography while the last one takes the 4 outputs from the 4 fuzzy logic models as inputs required for assessing the risk of child pornography. The following conclusion was made; there were factors that were related to personal traits, social traits, history of child pornography crimes, and self-regulatory deficiency traits by the suspects required for the assessment of the risk of child pornography crimes committed by a suspect. Using the values of the identified risk factors selected for this study, the risk of child pornography can be easily assessed from their values in order to determine the likelihood of a suspect perpetuating the crime.

Keywords: fuzzy, membership functions, pornography, risk factors

Procedia PDF Downloads 124
7673 Evaluation of a Risk Assessment Method for Fiber Emissions from Sprayed Asbestos-Containing Materials

Authors: Yukinori Fuse, Masato Kawaguchi

Abstract:

A quantitative risk assessment method was developed for fiber emissions from sprayed asbestos-containing materials (ACMs). In Japan, instead of being quantitative, these risk assessments have relied on the subjective judgment of skilled engineers, which may vary from one person to another. Therefore, this closed sampling method aims at avoiding any potential variability between assessments. This method was used to assess emissions from ACM sprayed in eleven buildings and the obtained results were compared with the subjective judgments of a skilled engineer. An approximate correlation tendency was found between both approaches. In spite of existing uncertainties, the closed sampling method is useful for public health protection. We firmly believe that this method may find application in the management and renovation decisions of buildings using friable and sprayed ACM.

Keywords: asbestos, renovation, risk assessment, maintenance

Procedia PDF Downloads 375
7672 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 304
7671 Foodborne Disease Risk Factors Among Women in Riyadh, Saudi Arabia

Authors: Abdullah Alsayeqh

Abstract:

The burden of foodborne diseases in Saudi Arabia is currently unknown. The objective of this study was to identify risk factors associated with these diseases among women in Riyadh. A cross-sectional study was carried out from March to July, 2013 where participants’ responses indicated that they were at risk of these diseases through improper food-holding temperature (45.28%), inadequate cooking (35.47%), cross-contamination (32.23%), and food from unsafe sources (22.39%). The claimed food safety knowledge by 22.04% of participants was not evidenced by their reported behaviors (p > 0.05). This is the first study to identify the gap in food safety knowledge among women in Riyadh which needs to be addressed by the concerned authorities in the country by engaging women more effectively in food safety educational campaigns.

Keywords: foodborne diseases, risk factors, knowledge, women, Saudi Arabia

Procedia PDF Downloads 503
7670 Cyber Operational Design and Military Decision Making Process

Authors: M. Karaman, H. Catalkaya

Abstract:

Due to the complex nature of cyber attacks and their effects ranging from personal to governmental level, it becomes one of the priority tasks for operation planners to take into account the risks, influences and effects of cyber attacks. However it can also be embedded or integrated technically with electronic warfare planning, cyber operation planning is needed to have a sole and broadened perspective. This perspective embodies itself firstly in operational design and then military decision making process. In order to find out the ill-structured problems, understand or visualize the operational environment and frame the problem, operational design can help support cyber operation planners and commanders. After having a broadened and conceptual startup with cyber operational design, military decision making process will follow the principles of design into more concrete elements like reaching results after risk management and center of gravity analysis of our and the enemy. In this paper we tried to emphasize the importance of cyber operational design, cyber operation planning and its integration to military decision making problem. In this foggy, uncertain and unaccountable cyber security environment, it is inevitable to stay away from cyber attacks. Therefore, a cyber operational design should be formed with line of operations, decisive points and end states in cyber then a tactical military decision making process should be followed with cyber security focus in order to support the whole operation.

Keywords: cyber operational design, military decision making process (MDMP), operation planning, end state

Procedia PDF Downloads 584
7669 Risk and Uncertainty in Aviation: A Thorough Analysis of System Vulnerabilities

Authors: C. V. Pietreanu, S. E. Zaharia, C. Dinu

Abstract:

Hazard assessment and risks quantification are key components for estimating the impact of existing regulations. But since regulatory compliance cannot cover all risks in aviation, the authors point out that by studying causal factors and eliminating uncertainty, an accurate analysis can be outlined. The research debuts by making delimitations on notions, as confusion on the terms over time has reflected in less rigorous analysis. Throughout this paper, it will be emphasized the fact that the variation in human performance and organizational factors represent the biggest threat from an operational perspective. Therefore, advanced risk assessment methods analyzed by the authors aim to understand vulnerabilities of the system given by a nonlinear behavior. Ultimately, the mathematical modeling of existing hazards and risks by eliminating uncertainty implies establishing an optimal solution (i.e. risk minimization).

Keywords: control, human factor, optimization, risk management, uncertainty

Procedia PDF Downloads 245
7668 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 60
7667 The Impact of Structural Empowerment on Risk Management Practices: A Case Study of Saudi Arabia Construction Small and Medium-Sized Enterprises

Authors: S. Alyami, S. Mohammad

Abstract:

These Risk management practices have a significant impact on construction SMEs. The effective utilisation of these practices depends on culture change in order to optimise decision making for critical activities within construction projects. Thus, successful implementation of empowerment strategies would enhance operational employees to participate in effective decision making. However, there remain many barriers to individuals and organisations within empowerment strategies that require empirical investigation before the industry can benefit from their implementation. Gaps in understanding the relationship between employee empowerment and risk management practices still exist. This research paper aims to examine the impact of the structural empowerment on risk management practices in construction SMEs. The questionnaire has been distributed to participants (162 employees) that involve projects and civil engineers within a case study from Saudi construction SMEs. Partial least squares based structural equation modeling (PLS-SEM) was utilised to perform analysis. The results reveal a positive relationship between empowerment and risk management practices. The study shows how structural empowerment contributes to operational employees in risk management practices through involving activities such as decision making, self-efficiency, and autonomy. The findings of this study will contribute to close the current gaps in the construction SMEs context.

Keywords: construction SMEs, culture, decision making, empowerment, risk management

Procedia PDF Downloads 112