Search results for: security risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8386

Search results for: security risk

7636 Sociodemographic Risk Factors of Cervical Cancer in Imphal, Manipur

Authors: Arundhati Devi Maibam, K. Ingocha Singh

Abstract:

Cervical cancer is preventable if detected early. Determination of risk factors is essential to plan screening programmes to prevent the disease. To study the demographic risk factors of cervical cancer among Manipuri women, information on age, marital status, educational level, monthly family income and socioeconomic status were collected through a pre-tested interview schedule. In this study, 64 incident cases registered at the RT Dept, RIMS (Regional Institute of Medical Sciences), Imphal, Manipur, India during 2008-09 participated. Data were entered in Microsoft Excel and the results were expressed in percentages. Among the 64 patients with cervical cancer, 56 (88.9%) were in the age group of 40+ years. The majority of the patients were from rural areas (68.75%) and 31.25% were from urban areas. The majority of the patients were Hindus (73%), 55(85.9%) were of low educational level, 43(67.2%) were married, and 36 (56.25%) belonged to Class IV socioeconomic status. In conclusion, if detected early, cervical cancer is preventable and curable. The potential risk factors need to be identified and women in the risk group need to be motivated for screening. Affordable screening programmes and health care resources will help in lessening the burden of the disease.

Keywords: cervical cancer, Manipuri women, RIIMS, socio-demographic risk factors

Procedia PDF Downloads 274
7635 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 167
7634 When Helping Hurts: Addressing Violence in Healthcare Settings

Authors: Jason Maffia, Maria D’urso, Robert Crupi, Margaret Cartmell

Abstract:

The emotional aspects of traumatic events such as workplace violence are often ignored, causing low productivity, disillusionment, and resentment within an organization. As a result, if workplace violence, particularly in healthcare settings, is not adequately addressed, it will become a phenomenon, undermining the peace and stability among the active communities while also posing a risk to the population's health and well-being. This review intends to identify the risk factors and the implications of workplace violence in healthcare settings and highlight the collaborative efforts needed in sustaining control and prevention measures against workplace violence. It is essential that health care organizations are prepared physically and emotionally for traumatic situations. This study explores the theoretical nature of addressing work-related violence in healthcare settings as well as traumatic stress reactivity and the context within which reactions occur and recovery takes place. Cognitive, social, and organizational influences on response are identified and used to tentatively offer explanations for identifying security risks, development, and implementation of de-escalation teams, CISM programs and training staff in violence prevention are among strategies hospitals are employing to keep workers and patients safe. General conclusion regarding the implications for intervention effectiveness and design are discussed.

Keywords: healthcare settings, stress reactions, traumatic events, workplace violence

Procedia PDF Downloads 75
7633 The Mediating Effect of Destination Image on Intention to Use a Tourism App

Authors: Arej Alhemimah

Abstract:

This study investigates the influence of tourists’ perceptions of destination image on their intention to use a tourism app. It examines the roles played by tourists’ perceptions of app/website usability, information quality, and risk in shaping tourism destination image and, subsequently, their app use intention. Using an online questionnaire, the study surveyed 194 international tourists in Saudi Arabia. Results were analysed using PLS-SEM. All the proposed hypotheses were supported and significant. Perceived risk had the strongest influence, followed by the influence of tourists’ perceptions of information quality, then app usability. Additionally, perceived risk was found to have a strong effect on the application use intention. The study makes a significant contribution to the tourism website/application literature; its implications provide practical insights and recommendations for destination marketers and managers to improve their online and social media presence in terms of enhancing e-platform usability, quality of provided information, and most importantly, to create a destination strategy to manage tourists’ risk perceptions.

Keywords: destination image, perceived risk, use intention, tourism app, information quality

Procedia PDF Downloads 77
7632 High School Students’ Seismic Risk Perception and Preparedness in Shavar, Dhaka

Authors: Mohammad Lutfur Rahman

Abstract:

School students of Dhaka are in extreme risk of natural disasters. However, the study on assessment of the real scenario of high school students about perceptions of earthquake is very little. The purpose of this cross-sectional study is to assess the seismic risk perception and preparedness levels about earthquake among high school students in Shavar, Dhaka. A questionnaire was developed, and data collection was done about a group of high school students in seven classrooms. The author uses a method of surveying high school students to identify and describe the factors that influence their knowledge and perceptions about earthquake. This study examines gender and grade differences in perceived risk and communication behavior in response to the earthquake. Female students’ preparation, participation, and communication with family are more frequent than that of male students. Female students have been found to be more likely to learn about a disaster than male students. Higher grade students have more awareness but less preparedness about earthquake than that of the younger one. This research concludes that irrespective of grades, high school students are vulnerable to earthquake due to the lack of a seismic education program.

Keywords: awareness, earthquake, risk perception, seismic

Procedia PDF Downloads 244
7631 Some Discrepancies between Experimentally-Based Theory of Toxic Metals Combined Action and Actual Approaches to Occupational and Environmental Health Risk Assessment and Management

Authors: Ilzira A. Minigalieva

Abstract:

Assessment of cumulative health risks associated with the widely observed combined exposures to two or more metals and their compounds on the organism in industrial or general environment, as well as respective regulatory and technical risk management decision-making have presumably the theoretical and experimental toxicology of mixtures as their reliable scientific basis. Analysis of relevant literature and our own experience proves, however, that there is no full match between these different practices. Moreover, some of the contradictions between them are of a fundamental nature. This unsatisfactory state of things may be explained not only by unavoidable simplifications characteristic of the methodologies of risk assessment and permissible exposure standards setting but also by the extreme intrinsic complexity of the combined toxicity theory, the most essential issues of which are considered and briefly discussed in this paper.

Keywords: toxic metals, nanoparticles, typology of combined toxicity, mathematical modeling, health risk assessment and management

Procedia PDF Downloads 323
7630 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 177
7629 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 125
7628 Automatic Checkpoint System Using Face and Card Information

Authors: Kriddikorn Kaewwongsri, Nikom Suvonvorn

Abstract:

In the deep south of Thailand, checkpoints for people verification are necessary for the security management of risk zones, such as official buildings in the conflict area. In this paper, we propose an automatic checkpoint system that verifies persons using information from ID cards and facial features. The methods for a person’s information abstraction and verification are introduced based on useful information such as ID number and name, extracted from official cards, and facial images from videos. The proposed system shows promising results and has a real impact on the local society.

Keywords: face comparison, card recognition, OCR, checkpoint system, authentication

Procedia PDF Downloads 318
7627 The Language of Risk: Pregnancy and Childbirth in the COVID-19 Era

Authors: Sarah Holdren, Laura Crook, Anne Drapkin Lyerly

Abstract:

Objective: The COVID-19 Pandemic has drawn new attention to long-existing bioethical questions around pregnancy, childbirth, and parenthood. Due to the increased risk of severe COVID-19, pregnant individuals may experience anxiety regarding medical decision-making. Especially in the case of hospital births, questions around the ethics of bringing healthy pregnant individuals into a high-risk environment for viral transmission illuminate gaps in the American maternal and child healthcare system. Limited research has sought to understand the experiences of those who gave birth outside hospitals during this time. This study aims to understand pregnant individuals’ conceptualization of risk during the COVID-19 pandemic. Methods: Individuals who gave birth after March 2020 were recruited through advertisements on social media. Participants completed a 1-hour semi-structured interview and a demographic questionnaire. Interviews were transcribed and coded by members of the research team using thematic narrative analysis. Results: A total of 18 participants were interviewed and completed the demographic questionnaire. The language of risk was utilized in birth narratives in three different ways, which highlighted the multileveled and nuanced ways in which risk is understood and mitigated by pregnant and birthing individuals. These included: 1. The risk of contracting COVID-19 before, during, and after birth, 2. The risk of birth complications requiring medical interventions dependent on selected birthing space (home, birthing center, hospital), and 3. The overall risk of creating life in the middle of a pandemic. The risk of contracting COVID-19 and risk of birth complications were often weighed in paradoxical ways throughout each individual’s pregnancy, while phrases such as “pandemic baby” and “apocalypse” appeared throughout narratives and highlighted the broader implications of pregnancy and childbirth during this momentous time. Conclusions: Healthcare professionals should consider the variety of ways that pregnant and birthing individuals understand the risk when counseling patients on healthcare decisions, especially during times of healthcare crisis such as COVID-19. Future work should look to understand how the language of risk fits into a broader understanding of the human experience of growing life in times of crisis.

Keywords: maternal and child health, thematic narrative analysis, COVID-19, risk mitigation

Procedia PDF Downloads 160
7626 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 330
7625 Risk Factors Affecting Construction Project Cost in Oman

Authors: Omar Amoudi, Latifa Al Brashdi

Abstract:

Construction projects are always subject to risks and uncertainties due to its unique and dynamic nature, outdoor work environment, the wide range of skills employed, various parties involved in addition to situation of construction business environment at large. Altogether, these risks and uncertainties affect projects objectives and lead to cost overruns, delay, and poor quality. Construction projects in Oman often experience cost overruns and delay. Managing these risks and reducing their impacts on construction cost requires firstly identifying these risks, and then analyzing their severity on project cost to obtain deep understanding about these risks. This in turn will assist construction managers in managing and tacking these risks. This paper aims to investigate the main risk factors that affect construction projects cost in the Sultanate of Oman. In order to achieve the main aim, literature review was carried out to identify the main risk factors affecting construction cost. Thirty-three risk factors were identified from the literature. Then, a questionnaire survey was designed and distributed among construction professionals (i.e., client, contractor and consultant) to obtain their opinion toward the probability of occurrence for each risk factor and its possible impact on construction project cost. The collected data was analyzed based on qualitative aspects and in several ways. The severity of each risk factor was obtained by multiplying the probability occurrence of a risk factor with its impact. The findings of this study reveal that the most significant risk factors that have high severity impact on construction project cost are: Change of Oil Price, Delay of Materials and Equipment Delivery, Changes in Laws and Regulations, Improper Budgeting, and Contingencies, Lack of Skilled Workforce and Personnel, Delays Caused by Contractor, Delays of Owner Payments, Delays Caused by Client, and Funding Risk. The results can be used as a basis for construction managers to make informed decisions and produce risk response procedures and strategies to tackle these risks and reduce their negative impacts on construction project cost.

Keywords: construction cost, construction projects, Oman, risk factors, risk management

Procedia PDF Downloads 337
7624 Options Trading and Crash Risk

Authors: Cameron Truong, Mikhail Bhatia, Yangyang Chen, Viet Nga Cao

Abstract:

Using a sample of U.S. firms between 1996 and 2011, this paper documents a positive association between options trading volume and future stock price crash risk. This relation is evidently more pronounced among firms with higher information asymmetry, business uncertainty, and short-sale constraints. In a dichotomous cross-sectional setting, we also document that firms with options trading have higher future crash risk than firms without options trading. We further show in a difference-in-difference analysis that firms experience an increase in crash risk immediately after the listing of options. The results suggest that options traders are able of identifying bad news hoarding by management and choose to trade in a liquid options market in anticipation of future crashes.

Keywords: bad news hoarding, cross-sectional setting, options trading, stock price crash

Procedia PDF Downloads 442
7623 An Audit on the Role of Sentinel Node Biopsy in High-Risk Ductal Carcinoma in Situ and Intracystic Papillary Carcinoma

Authors: M. Sulieman, H. Arabiyat, H. Ali, K. Potiszil, I. Abbas, R. English, P. King, I. Brown, P. Drew

Abstract:

Introduction: The incidence of breast ductal Carcinoma in Situ (DCIS) has been increasing; it currently represents up 20-25% of all breast carcinomas. Some aspects of DCIS management are still controversial, mainly due to the heterogeneity of its clinical presentation and of its biological and pathological characteristics. In DCIS, histological diagnosis obtained preoperatively, carries the risk of sampling error if the presence of invasive cancer is subsequently diagnosed. The mammographic extent over than 4–5 cm and the presence of architectural distortion, focal asymmetric density or mass on mammography are proven important risk factors of preoperative histological under staging. Intracystic papillary cancer (IPC) is a rare form of breast carcinoma. Despite being previously compared to DCIS it has been shown to present histologically with invasion of the basement membrane and even metastasis. SLNB – Carries the risk of associated comorbidity that should be considered when planning surgery for DCIS and IPC. Objectives: The aim of this Audit was to better define a ‘high risk’ group of patients with pre-op diagnosis of non-invasive cancer undergoing breast conserving surgery, who would benefit from sentinel node biopsy. Method: Retrospective data collection of all patients with ductal carcinoma in situ over 5 years. 636 patients identified, and after exclusion criteria applied: 394 patients were included. High risk defined as: Extensive micro-calcification >40mm OR any mass forming DCIS. IPC: Winpath search from for the term ‘papillary carcinoma’ in any breast specimen for 5 years duration;.29 patients were included in this group. Results: DCIS: 188 deemed high risk due to >40mm calcification or a mass forming (radiological or palpable) 61% of those had a mastectomy and 32% BCS. Overall, in that high-risk group - the number with invasive disease was 38%. Of those high-risk DCIS pts 85% had a SLN - 80% at the time of surgery and 5% at a second operation. For the BCS patients - 42% had SLN at time of surgery and 13% (8 patients) at a second operation. 15 (7.9%) pts in the high-risk group had a positive SLNB, 11 having a mastectomy and 4 having BCS. IPC: The provisional diagnosis of encysted papillary carcinoma is upgraded to an invasive carcinoma on final histology in around a third of cases. This has may have implications when deciding whether to offer sentinel node removal at the time of therapeutic surgery. Conclusions: We have defined a ‘high risk’ group of pts with pre-op diagnosis of non-invasive cancer undergoing BCS, who would benefit from SLNB at the time of the surgery. In patients with high-risk features; the risk of invasive disease is up to 40% but the risk of nodal involvement is approximately 8%. The risk of morbidity from SLN is up to about 5% especially the risk of lymphedema.

Keywords: breast ductal carcinoma in Situ (DCIS), intracystic papillary carcinoma (IPC), sentinel node biopsy (SLNB), high-risk, non-invasive, cancer disease

Procedia PDF Downloads 107
7622 From the Local to the Global: New Terrorism

Authors: Shamila Ahmed

Abstract:

The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies.

Keywords: terrorism, war on terror, cosmopolitanism, global level terrorism

Procedia PDF Downloads 579
7621 Distribution and Risk Assessment of Phthalates in Water and Sediment of Omambala River, Anambra State, Nigeria, in Wet Season

Authors: Ogbuagu Josephat Okechukwu, Okeke Abuchi Princewill, Arinze Rosemary Uche, Tabugbo Ifeyinwa Blessing, Ogbuagu Adaora Stellamaris

Abstract:

Phthalates or Phthalate esters (PAEs), categorized as an endocrine disruptor and persistent organic pollutants, are known for their environmental contamination and toxicological effects. In this study, the concentration of selected phthalates was determined across the sampling site to investigate their occurrence and the ecological and health risk assessment they pose to the environment. Water and sediment samples were collected following standard procedures. Solid phase and ultrasonic methods were used to extract seven different PAEs, which were analyzed by Gas Chromatography with Mass Detector (GCMS). The analytical average recovery was found to be within the range of 83.4% ± 2.3%. The results showed that PAEs were detected in six out of seven samples with a high percentage of detection rate in water. Di-n-butyl phthalate (DPB) and disobutyl phthalates (DiBP) showed a greater detection rate compared to other PAE monomers. The concentration of PEs was found to be higher in sediment samples compared to water samples due to the fact that sediments serve as a sink for most persistent organic pollutants. The concentrations of PAEs in water samples and sediments ranged from 0.00 to 0.23 mg/kg and 0.00 to 0.028 mg/l, respectively. Ecological risk assessment using the risk quotient method (RQ) reveals that the estimated environmental risk caused by phthalates lies within the moderate level as RQ ranges from 0.1 to 1.0, whereas the health risk assessment caused by phthalates on estimating the average daily dose reveals that the ingestion of phthalates was found to be approaching permissible limit which can cause serious carcinogenic occurrence in the human system with time due to excess accumulation.

Keywords: phthalates, endocrine disruptor, risk assessment, ecological risk, health risk

Procedia PDF Downloads 67
7620 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 378
7619 Comprehensive Risk Analysis of Decommissioning Activities with Multifaceted Hazard Factors

Authors: Hyeon-Kyo Lim, Hyunjung Kim, Kune-Woo Lee

Abstract:

Decommissioning process of nuclear facilities can be said to consist of a sequence of problem solving activities, partly because there may exist working environments contaminated by radiological exposure, and partly because there may also exist industrial hazards such as fire, explosions, toxic materials, and electrical and physical hazards. As for an individual hazard factor, risk assessment techniques are getting known to industrial workers with advance of safety technology, but the way how to integrate those results is not. Furthermore, there are few workers who experienced decommissioning operations a lot in the past. Therefore, not a few countries in the world have been trying to develop appropriate counter techniques in order to guarantee safety and efficiency of the process. In spite of that, there still exists neither domestic nor international standard since nuclear facilities are too diverse and unique. In the consequence, it is quite inevitable to imagine and assess the whole risk in the situation anticipated one by one. This paper aimed to find out an appropriate technique to integrate individual risk assessment results from the viewpoint of experts. Thus, on one hand the whole risk assessment activity for decommissioning operations was modeled as a sequence of individual risk assessment steps, and on the other, a hierarchical risk structure was developed. Then, risk assessment procedure that can elicit individual hazard factors one by one were introduced with reference to the standard operation procedure (SOP) and hierarchical task analysis (HTA). With an assumption of quantification and normalization of individual risks, a technique to estimate relative weight factors was tried by using the conventional Analytic Hierarchical Process (AHP) and its result was reviewed with reference to judgment of experts. Besides, taking the ambiguity of human judgment into consideration, debates based upon fuzzy inference was added with a mathematical case study.

Keywords: decommissioning, risk assessment, analytic hierarchical process (AHP), fuzzy inference

Procedia PDF Downloads 423
7618 The Classification Performance in Parametric and Nonparametric Discriminant Analysis for a Class- Unbalanced Data of Diabetes Risk Groups

Authors: Lily Ingsrisawang, Tasanee Nacharoen

Abstract:

Introduction: The problems of unbalanced data sets generally appear in real world applications. Due to unequal class distribution, many research papers found that the performance of existing classifier tends to be biased towards the majority class. The k -nearest neighbors’ nonparametric discriminant analysis is one method that was proposed for classifying unbalanced classes with good performance. Hence, the methods of discriminant analysis are of interest to us in investigating misclassification error rates for class-imbalanced data of three diabetes risk groups. Objective: The purpose of this study was to compare the classification performance between parametric discriminant analysis and nonparametric discriminant analysis in a three-class classification application of class-imbalanced data of diabetes risk groups. Methods: Data from a healthy project for 599 staffs in a government hospital in Bangkok were obtained for the classification problem. The staffs were diagnosed into one of three diabetes risk groups: non-risk (90%), risk (5%), and diabetic (5%). The original data along with the variables; diabetes risk group, age, gender, cholesterol, and BMI was analyzed and bootstrapped up to 50 and 100 samples, 599 observations per sample, for additional estimation of misclassification error rate. Each data set was explored for the departure of multivariate normality and the equality of covariance matrices of the three risk groups. Both the original data and the bootstrap samples show non-normality and unequal covariance matrices. The parametric linear discriminant function, quadratic discriminant function, and the nonparametric k-nearest neighbors’ discriminant function were performed over 50 and 100 bootstrap samples and applied to the original data. In finding the optimal classification rule, the choices of prior probabilities were set up for both equal proportions (0.33: 0.33: 0.33) and unequal proportions with three choices of (0.90:0.05:0.05), (0.80: 0.10: 0.10) or (0.70, 0.15, 0.15). Results: The results from 50 and 100 bootstrap samples indicated that the k-nearest neighbors approach when k = 3 or k = 4 and the prior probabilities of {non-risk:risk:diabetic} as {0.90:0.05:0.05} or {0.80:0.10:0.10} gave the smallest error rate of misclassification. Conclusion: The k-nearest neighbors approach would be suggested for classifying a three-class-imbalanced data of diabetes risk groups.

Keywords: error rate, bootstrap, diabetes risk groups, k-nearest neighbors

Procedia PDF Downloads 431
7617 Oral Contraceptic Pill Associated Hypertension on the Sex Productive Women in the Andalas Public Health Center, Padang, Indonesia

Authors: Armenia Nazar, Sally M. J. Anggelya, Rose Dinda

Abstract:

Hypertension prevalence in Indonesian has increased from time to time since 2013, especially in women. This cross-sectional analysis study was made to observe the incidence of hypertension on the reproductive women (20-49 years old) with several risk factors who use contraceptive pills. Data was collected from June - October 2016 in the Andalas Public Health Center, East Padang District, Indonesia. An amount of 167 respondents who were taken using consecutive sampling technique were participate in this study. Data of social demography, contraceptive used, duration of use, hypertension risk factors (age, family history, central obesity, body mass index, physical activity, and stress) were collected and analyzed statistically using Chi-Square analysis. Significant was taken at p < 0.05. Results showed that the woman with contraceptive pill was tent to get hypertension (OR = 3,90 and p < 0,001). In addition, woman with a family history OR of 6,77 (p = 0,09), mild physical activity OR of 3,67 (p = 0,33), moderate physical activity OR of 3,33 (p = 0,16), and stressed OR of 5.11 (p = 0.18). These indicated that the contraceptive pill user is 3.9 times more risk to develop hypertension than non-users, especially one with a family history of hypertension. Other risk factors were not associated with hypertension risk in these sex productive women.

Keywords: hypertension, oral contraceptive, sex productive woman, risk factors

Procedia PDF Downloads 296
7616 A Fourier Method for Risk Quantification and Allocation of Credit Portfolios

Authors: Xiaoyu Shen, Fang Fang, Chujun Qiu

Abstract:

Herewith we present a Fourier method for credit risk quantification and allocation in the factor-copula model framework. The key insight is that, compared to directly computing the cumulative distribution function of the portfolio loss via Monte Carlo simulation, it is, in fact, more efficient to calculate the transformation of the distribution function in the Fourier domain instead and inverting back to the real domain can be done in just one step and semi-analytically, thanks to the popular COS method (with some adjustments). We also show that the Euler risk allocation problem can be solved in the same way since it can be transformed into the problem of evaluating a conditional cumulative distribution function. Once the conditional or unconditional cumulative distribution function is known, one can easily calculate various risk metrics. The proposed method not only fills the niche in literature, to the best of our knowledge, of accurate numerical methods for risk allocation but may also serve as a much faster alternative to the Monte Carlo simulation method for risk quantification in general. It can cope with various factor-copula model choices, which we demonstrate via examples of a two-factor Gaussian copula and a two-factor Gaussian-t hybrid copula. The fast error convergence is proved mathematically and then verified by numerical experiments, in which Value-at-Risk, Expected Shortfall, and conditional Expected Shortfall are taken as examples of commonly used risk metrics. The calculation speed and accuracy are tested to be significantly superior to the MC simulation for real-sized portfolios. The computational complexity is, by design, primarily driven by the number of factors instead of the number of obligors, as in the case of Monte Carlo simulation. The limitation of this method lies in the "curse of dimension" that is intrinsic to multi-dimensional numerical integration, which, however, can be relaxed with the help of dimension reduction techniques and/or parallel computing, as we will demonstrate in a separate paper. The potential application of this method has a wide range: from credit derivatives pricing to economic capital calculation of the banking book, default risk charge and incremental risk charge computation of the trading book, and even to other risk types than credit risk.

Keywords: credit portfolio, risk allocation, factor copula model, the COS method, Fourier method

Procedia PDF Downloads 160
7615 A Double Acceptance Sampling Plan for Truncated Life Test Having Exponentiated Transmuted Weibull Distribution

Authors: A. D. Abdellatif, A. N. Ahmed, M. E. Abdelaziz

Abstract:

The main purpose of this paper is to design a double acceptance sampling plan under the time truncated life test when the product lifetime follows an exponentiated transmuted Weibull distribution. Here, the motive is to meet both the consumer’s risk and producer’s risk simultaneously at the specified quality levels, while the termination time is specified. A comparison between the results of the double and single acceptance sampling plans is conducted. We demonstrate the applicability of our results to real data sets.

Keywords: double sampling plan, single sampling plan, producer’s risk, consumer’s risk, exponentiated transmuted weibull distribution, time truncated experiment, single, double, Marshal-Olkin

Procedia PDF Downloads 485
7614 Constraining Bank Risk: International Evidence on the Role of Bank Capital and Charter Value

Authors: Mamiza Haq

Abstract:

This paper examines the relevance of bank capital and charter value on bank insolvency and liquidity risks. Using an unbalanced panel of 2,111 unique local banks across 22 countries over 1998-2012, we find that both bank capital and charter value lower insolvency and liquidity risks, but this effect varies among conventional, Islamic, and Islamic-window banks. The risk constraining effect of bank capital becomes more prominent in the post 2007-2008 global financial crisis. Moreover, the relationships vary when conditioned upon other key bank-specific characteristics. For instance, the effect of capital on risk-reduction diminishes in the presence of high charter value for conventional-G7 and Islamic-window banks, during-GFC and pre-GFC period; respectively. Our findings have important policy implications related to bank safety. The results are robust to a range of robustness tests.

Keywords: bank capital, charter value, risk, financial crisis

Procedia PDF Downloads 272
7613 Equity Risk Premiums and Risk Free Rates in Modelling and Prediction of Financial Markets

Authors: Mohammad Ghavami, Reza S. Dilmaghani

Abstract:

This paper presents an adaptive framework for modelling financial markets using equity risk premiums, risk free rates and volatilities. The recorded economic factors are initially used to train four adaptive filters for a certain limited period of time in the past. Once the systems are trained, the adjusted coefficients are used for modelling and prediction of an important financial market index. Two different approaches based on least mean squares (LMS) and recursive least squares (RLS) algorithms are investigated. Performance analysis of each method in terms of the mean squared error (MSE) is presented and the results are discussed. Computer simulations carried out using recorded data show MSEs of 4% and 3.4% for the next month prediction using LMS and RLS adaptive algorithms, respectively. In terms of twelve months prediction, RLS method shows a better tendency estimation compared to the LMS algorithm.

Keywords: adaptive methods, LSE, MSE, prediction of financial Markets

Procedia PDF Downloads 330
7612 The Properties of Risk-based Approaches to Asset Allocation Using Combined Metrics of Portfolio Volatility and Kurtosis: Theoretical and Empirical Analysis

Authors: Maria Debora Braga, Luigi Riso, Maria Grazia Zoia

Abstract:

Risk-based approaches to asset allocation are portfolio construction methods that do not rely on the input of expected returns for the asset classes in the investment universe and only use risk information. They include the Minimum Variance Strategy (MV strategy), the traditional (volatility-based) Risk Parity Strategy (SRP strategy), the Most Diversified Portfolio Strategy (MDP strategy) and, for many, the Equally Weighted Strategy (EW strategy). All the mentioned approaches were based on portfolio volatility as a reference risk measure but in 2023, the Kurtosis-based Risk Parity strategy (KRP strategy) and the Minimum Kurtosis strategy (MK strategy) were introduced. Understandably, they used the fourth root of the portfolio-fourth moment as a proxy for portfolio kurtosis to work with a homogeneous function of degree one. This paper contributes mainly theoretically and methodologically to the framework of risk-based asset allocation approaches with two steps forward. First, a new and more flexible objective function considering a linear combination (with positive coefficients that sum to one) of portfolio volatility and portfolio kurtosis is used to alternatively serve a risk minimization goal or a homogeneous risk distribution goal. Hence, the new basic idea consists in extending the achievement of typical risk-based approaches’ goals to a combined risk measure. To give the rationale behind operating with such a risk measure, it is worth remembering that volatility and kurtosis are expressions of uncertainty, to be read as dispersion of returns around the mean and that both preserve adherence to a symmetric framework and consideration for the entire returns distribution as well, but also that they differ from each other in that the former captures the “normal” / “ordinary” dispersion of returns, while the latter is able to catch the huge dispersion. Therefore, the combined risk metric that uses two individual metrics focused on the same phenomena but differently sensitive to its intensity allows the asset manager to express, in the context of an objective function by varying the “relevance coefficient” associated with the individual metrics, alternatively, a wide set of plausible investment goals for the portfolio construction process while serving investors differently concerned with tail risk and traditional risk. Since this is the first study that also implements risk-based approaches using a combined risk measure, it becomes of fundamental importance to investigate the portfolio effects triggered by this innovation. The paper also offers a second contribution. Until the recent advent of the MK strategy and the KRP strategy, efforts to highlight interesting properties of risk-based approaches were inevitably directed towards the traditional MV strategy and SRP strategy. Previous literature established an increasing order in terms of portfolio volatility, starting from the MV strategy, through the SRP strategy, arriving at the EQ strategy and provided the mathematical proof for the “equalization effect” concerning marginal risks when the MV strategy is considered, and concerning risk contributions when the SRP strategy is considered. Regarding the validity of similar conclusions when referring to the MK strategy and KRP strategy, the development of a theoretical demonstration is still pending. This paper fills this gap.

Keywords: risk parity, portfolio kurtosis, risk diversification, asset allocation

Procedia PDF Downloads 59
7611 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 390
7610 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 404
7609 Integrating Individual and Structural Health Risk: A Social Identity Perspective on the HIV/AIDS Pandemic in Sub-Saharan Africa

Authors: Orla Muldoon, Tamaryn Nicolson, Mike Quayle, Aisling O'Donnell

Abstract:

Psychology most often considers the role of experience and behaviour in shaping health at the individual level. On the other hand epidemiology has long considered risk at the wider group or structural level. Here we use the social identity approach to integrate group-level risk with individual level behaviour. Using a social identity approach we demonstrate that group or macro-level factors impact implicitly and profoundly in everyday ways at the level of individuals, via social identities. We illustrate how identities related to race, gender and inequality intersect to affect HIV/AIDS risk and AIDS treatment behaviours; how social identity processes drive stigmatising consequences of HIV and AIDS, and promote positive and effective interventions. We conclude by arguing that the social identity approach offers the field an explanatory framework that conceptualizes how social and political forces intersect with individual identity and agency to affect human health.

Keywords: social identity approach, HIV/AIDS, Africa, HIV risk, race, gender

Procedia PDF Downloads 524
7608 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 328
7607 Risk Factors for Fall in Elderly with Diabetes Mellitus Type 2 in Jeddah Saudi Arabia 2022: A Cross-Sectional Study

Authors: Rami S. Alasmari, Abdullah Al Zahrani, Hattan A. Hassani, Hattan A. Hassani, Nawwaf A. Almalky, Abdullah F. Bokhari, Alwalied A. Hafez

Abstract:

Diabetes mellitus type 2 (DMT2) is a major chronic condition that is considered common among elderly people, with multiple potential complications that could contribute to falls. However, this concept is not well understood, thus, the aim of this study is to determine whether diabetes is an independent risk factor for falls in elderly. In this observational cross-sectional study, 309 diabetic patients aged 60 or more who visited the primary healthcare centers of the Ministry of National Guard Health Affairs in Jeddah were chosen via convenience sampling method. To collect the data, Semi-structured Fall Risk Assessment questionnaire and Fall Efficacy Score scale were used. The mean age of the participants was estimated to be 68.5 (SD:7.4) years. Among the participants, 48.2% experienced falling before, and 63.1% of them suffered falls in the past 12-months. The results showed that gait problems were independently associated with a higher likelihood of fall among the elderly patients (OR = 1.98, 95%CI, 1.08 to 3.62, p = 0.026. This paper suggests that diabetes mellitus is an independent fall risk factor among elderly. Therefore, identifying such patients as being at higher risk and prompt referral to a specialist falls clinic is recommended.

Keywords: diabetes, fall, elderly, risk factors

Procedia PDF Downloads 100