Search results for: operational risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3083

Search results for: operational risks

2963 Economic Evaluation Offshore Wind Project under Uncertainly and Risk Circumstances

Authors: Sayed Amir Hamzeh Mirkheshti

Abstract:

Offshore wind energy as a strategic renewable energy, has been growing rapidly due to availability, abundance and clean nature of it. On the other hand, budget of this project is incredibly higher in comparison with other renewable energies and it takes more duration. Accordingly, precise estimation of time and cost is needed in order to promote awareness in the developers and society and to convince them to develop this kind of energy despite its difficulties. Occurrence risks during on project would cause its duration and cost constantly changed. Therefore, to develop offshore wind power, it is critical to consider all potential risks which impacted project and to simulate their impact. Hence, knowing about these risks could be useful for the selection of most influencing strategies such as avoidance, transition, and act in order to decrease their probability and impact. This paper presents an evaluation of the feasibility of 500 MV offshore wind project in the Persian Gulf and compares its situation with uncertainty resources and risk. The purpose of this study is to evaluate time and cost of offshore wind project under risk circumstances and uncertain resources by using Monte Carlo simulation. We analyzed each risk and activity along with their distribution function and their effect on the project.

Keywords: wind energy project, uncertain resources, risks, Monte Carlo simulation

Procedia PDF Downloads 352
2962 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa

Authors: Masa Popovac, Philip Fine

Abstract:

Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.

Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa

Procedia PDF Downloads 482
2961 Dogmatic Analysis of Legal Risks of Using Artificial Intelligence: The European Union and Polish Perspective

Authors: Marianna Iaroslavska

Abstract:

ChatGPT is becoming commonplace. However, only a few people think about the legal risks of using Large Language Model in their daily work. The main dilemmas concern the following areas: who owns the copyright to what somebody creates through ChatGPT; what can OpenAI do with the prompt you enter; can you accidentally infringe on another creator's rights through ChatGPT; what about the protection of the data somebody enters into the chat. This paper will present these and other legal risks of using large language models at work using dogmatic methods and case studies. The paper will present a legal analysis of AI risks against the background of European Union law and Polish law. This analysis will answer questions about how to protect data, how to make sure you do not violate copyright, and what is at stake with the AI Act, which recently came into force in the EU. If your work is related to the EU area, and you use AI in your work, this paper will be a real goldmine for you. The copyright law in force in Poland does not protect your rights to a work that is created with the help of AI. So if you start selling such a work, you may face two main problems. First, someone may steal your work, and you will not be entitled to any protection because work created with AI does not have any legal protection. Second, the AI may have created the work by infringing on another person's copyright, so they will be able to claim damages from you. In addition, the EU's current AI Act imposes a number of additional obligations related to the use of large language models. The AI Act divides artificial intelligence into four risk levels and imposes different requirements depending on the level of risk. The EU regulation is aimed primarily at those developing and marketing artificial intelligence systems in the EU market. In addition to the above obstacles, personal data protection comes into play, which is very strictly regulated in the EU. If you violate personal data by entering information into ChatGPT, you will be liable for violations. When using AI within the EU or in cooperation with entities located in the EU, you have to take into account a lot of risks. This paper will highlight such risks and explain how they can be avoided.

Keywords: EU, AI act, copyright, polish law, LLM

Procedia PDF Downloads 20
2960 The Determinants of the Operational Performance in Airline Industry: A Case of a Turkish Airline Company

Authors: Mustafa K. Yilmaz, Ahmet Kaplan, Murat Guven, Vildan Kesici

Abstract:

Aviation industry influences the social and economic growth across the countries. Further, airline companies are highly affected by social, political, and financial crises and show a high degree of cyclicity in operational performance. Hence, this paper investigates the effects of available seat kilometers (ASK), revenue per kilometer (RPK), passenger load factor (PLF) as well as socio-political crisis on the number of passengers carried (PC) by Turkish Airlines company over the period of 2010M1-2018M12. To conduct the analysis, we employ fully modified ordinary least squares (FMOLS), dynamic ordinary least squares (DOLS), and canonical cointegration regression (CCR) techniques using monthly data. We use ASK, RPK, PLF as independent variables to identify the determinants of the PC, as a dependent variable. We also test the effect of the socio-political crisis. The results reveal that there is a significant and negative relationship between ASK and PC, while the relationship between RPK and PC is positive and significant. We also find that there is an insignificant relationship between PLF and PC. Further, we also find a negative effect of the crisis on the PC. These findings show although the crisis had an immediate effect on the operational performance of Turkish Airlines, the company recovered from the crisis and cope with the situation very promptly. Thus, this proves the resilience and agile management ability of the company.

Keywords: airline industry, operational performance, air traffic, socio-political crisis

Procedia PDF Downloads 176
2959 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 86
2958 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 267
2957 Approximations of Fractional Derivatives and Its Applications in Solving Non-Linear Fractional Variational Problems

Authors: Harendra Singh, Rajesh Pandey

Abstract:

The paper presents a numerical method based on operational matrix of integration and Ryleigh method for the solution of a class of non-linear fractional variational problems (NLFVPs). Chebyshev first kind polynomials are used for the construction of operational matrix. Using operational matrix and Ryleigh method the NLFVP is converted into a system of non-linear algebraic equations, and solving these equations we obtained approximate solution for NLFVPs. Convergence analysis of the proposed method is provided. Numerical experiment is done to show the applicability of the proposed numerical method. The obtained numerical results are compared with exact solution and solution obtained from Chebyshev third kind. Further the results are shown graphically for different fractional order involved in the problems.

Keywords: non-linear fractional variational problems, Rayleigh-Ritz method, convergence analysis, error analysis

Procedia PDF Downloads 298
2956 Crude Oil Electrostatic Mathematical Modelling on an Existing Industrial Plant

Authors: Fatemeh Yazdanmehr, Iulian Nistor

Abstract:

The scope of the current study is the prediction of water separation in a two-stage industrial crude oil desalting plant. This research study was focused on developing a desalting operation in an existing production unit of one Iranian heavy oil field with 75 MBPD capacity. Because of some operational issues, such as oil dehydration at high temperatures, the optimization of the desalter operational parameters was essential. The mathematical desalting is modeled based on the population balance method. The existing operational data is used for tuning and validation of the accuracy of the modeling. The inlet oil temperature to desalter used was decreased from 110°C to 80°C, and the desalted electrical field was increased from 0.75 kv to 2.5 kv. The proposed condition for the desalter also meets the water oil specification. Based on these conditions of desalter, the oil recovery is increased by 574 BBL/D, and the gas flaring decrease by 2.8 MMSCF/D. Depending on the oil price, the additional production of oil can increase the annual income by about $15 MM and reduces greenhouse gas production caused by gas flaring.

Keywords: desalter, demulsification, modelling, water-oil separation, crude oil emulsion

Procedia PDF Downloads 76
2955 Student Perceptions on Administrative Support in the Delivering of Open Distance Learning Programmes – A Case Study

Authors: E. J. Spamer, J. M. Van Zyl, MHA Combrinck

Abstract:

The Unit for Open Distance Learning (UODL) at the North-West University (NWU), South Africa was established in 2013 with its main function to deliver open distance learning (ODL) programmes to approximately 30 000 students from the Faculties of Education Sciences, Health Sciences, Theology and Arts and Culture. Quality operational and administrative processes are key components in the delivery of these programmes and they need to function optimally for students to be successful in their studies. Operational and administrative processes include aspects such as applications, registration, dissemination of study material, availability of electronic platforms, the management of assessment, and the dissemination of important information. To be able to ensure and enhance quality during these processes, it is vital to determine students’ perceptions with regards to these mentioned processes. A questionnaire was available online and also distributed to the 63 tuition centres. The purpose of this research was to determine the perceptions of ODL students from NWU regarding operational and administrative processes. 1903 students completed and submitted the questionnaire. The data was quantitatively analysed and discussed. Results indicated that the majority of students are satisfied with the operational and administrative processes; however, the results also indicated some areas that need improvement. The data gathered is important to identify strengths and areas for improvement and form part of a bigger strategy of qualitative assurance at the UODL.

Keywords: administrative support, ODL programmes, quantitative study, students' perceptions

Procedia PDF Downloads 272
2954 The Management of the Urban Project between Challenge and Need: The Case of the Modernization Project of Constantine

Authors: Mouhoubi Nedjima, Sassi Boudemagh Souad

Abstract:

In this article, and through the modernization project of metropolis of Constantine (PMMC) experience in Algeria, discussed to highlight the importance of management in an urban project at various levels: strategic and operational. The statement we attended to reach is to evaluate the modernization project of metropolis of Constantine in the light of management and prove the relation between a good urban management and the success of an urban project.

Keywords: urban project, strategic management, operational management, the modernization project of constantine

Procedia PDF Downloads 523
2953 The Delone and McLean Model: A Review and Reconceptualisation for Explaining Organisational IS Success

Authors: Probir Kumar Banerjee

Abstract:

Though the revised DeLone and McLean (DM) model of IS success is found to be effective at the individual level of analysis, there is lack of consensus in regard to its effectiveness at the organisational level. This research reviews the DM model in the light of business/IT alignment theory and supporting literature, and suggests its reconceptualization. Specifically, arguments are made for augmenting it with business process quality. Business process quality, it is argued, captures the effect of intent to use, use and user satisfaction interactions, thus eliminating the need to capture their interaction effects in explaining organisational IS success. It is also argued that ‘operational performance’ driven by systems and business process quality, and higher order measures of organisational performance tied to operational performance are appropriate measures of ‘net benefit’. Suggestions are made for reconceptualisation of the other constructs and an adapted model of organisational IS success is proposed.

Keywords: organisational IS success, business/IT alignment, systems quality, business process quality, operational performance, market performance

Procedia PDF Downloads 395
2952 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 232
2951 Fracture and Fatigue Crack Growth Analysis and Modeling

Authors: Volkmar Nolting

Abstract:

Fatigue crack growth prediction has become an important topic in both engineering and non-destructive evaluation. Crack propagation is influenced by the mechanical properties of the material and is conveniently modelled by the Paris-Erdogan equation. The critical crack size and the total number of load cycles are calculated. From a Larson-Miller plot the maximum operational temperature can for a given stress level be determined so that failure does not occur within a given time interval t. The study is used to determine a reasonable inspection cycle and thus enhances operational safety and reduces costs.

Keywords: fracturemechanics, crack growth prediction, lifetime of a component, structural health monitoring

Procedia PDF Downloads 49
2950 Audit and Assurance Program for AI-Based Technologies

Authors: Beatrice Arthur

Abstract:

The rapid development of artificial intelligence (AI) has transformed various industries, enabling faster and more accurate decision-making processes. However, with these advancements come increased risks, including data privacy issues, systemic biases, and challenges related to transparency and accountability. As AI technologies become more integrated into business processes, there is a growing need for comprehensive auditing and assurance frameworks to manage these risks and ensure ethical use. This paper provides a literature review on AI auditing and assurance programs, highlighting the importance of adapting traditional audit methodologies to the complexities of AI-driven systems. Objective: The objective of this review is to explore current AI audit practices and their role in mitigating risks, ensuring accountability, and fostering trust in AI systems. The study aims to provide a structured framework for developing audit programs tailored to AI technologies while also investigating how AI impacts governance, risk management, and regulatory compliance in various sectors. Methodology: This research synthesizes findings from academic publications and industry reports from 2014 to 2024, focusing on the intersection of AI technologies and IT assurance practices. The study employs a qualitative review of existing audit methodologies and frameworks, particularly the COBIT 2019 framework, to understand how audit processes can be aligned with AI governance and compliance standards. The review also considers real-time auditing as an emerging necessity for influencing AI system design during early development stages. Outcomes: Preliminary findings indicate that while AI auditing is still in its infancy, it is rapidly gaining traction as both a risk management strategy and a potential driver of business innovation. Auditors are increasingly being called upon to develop controls that address the ethical and operational risks posed by AI systems. The study highlights the need for continuous monitoring and adaptable audit techniques to handle the dynamic nature of AI technologies. Future Directions: Future research will explore the development of AI-specific audit tools and real-time auditing capabilities that can keep pace with evolving technologies. There is also a need for cross-industry collaboration to establish universal standards for AI auditing, particularly in high-risk sectors like healthcare and finance. Further work will involve engaging with industry practitioners and policymakers to refine the proposed governance and audit frameworks. Funding/Support Acknowledgements: This research is supported by the Information Systems Assurance Management Program at Concordia University of Edmonton.

Keywords: AI auditing, assurance, risk management, governance, COBIT 2019, transparency, accountability, machine learning, compliance

Procedia PDF Downloads 24
2949 Data Mining and Knowledge Management Application to Enhance Business Operations: An Exploratory Study

Authors: Zeba Mahmood

Abstract:

The modern business organizations are adopting technological advancement to achieve competitive edge and satisfy their consumer. The development in the field of Information technology systems has changed the way of conducting business today. Business operations today rely more on the data they obtained and this data is continuously increasing in volume. The data stored in different locations is difficult to find and use without the effective implementation of Data mining and Knowledge management techniques. Organizations who smartly identify, obtain and then convert data in useful formats for their decision making and operational improvements create additional value for their customers and enhance their operational capabilities. Marketers and Customer relationship departments of firm use Data mining techniques to make relevant decisions, this paper emphasizes on the identification of different data mining and Knowledge management techniques that are applied to different business industries. The challenges and issues of execution of these techniques are also discussed and critically analyzed in this paper.

Keywords: knowledge, knowledge management, knowledge discovery in databases, business, operational, information, data mining

Procedia PDF Downloads 538
2948 Poor Medical Waste Management (MWM) Practices and Its Risks to Human Health and the Environment

Authors: Babanyara Y. Y., Ibrahim D. B., Garba T., Bogoro A. G., Abubakar, M. Y.

Abstract:

Medical care is vital for our life, health, and well-being. However, the waste generated from medical activities can be hazardous, toxic, and even lethal because of their high potential for diseases transmission. The hazardous and toxic parts of waste from healthcare establishments comprising infectious, medical, and radioactive material as well as sharps constitute a grave risks to mankind and the environment, if these are not properly treated/disposed or are allowed to be mixed with other municipal waste. In Nigeria, practical information on this aspect is inadequate and research on the public health implications of poor management of medical wastes is few and limited in scope. Findings drawn from Literature particularly in the third world countries highlights financial problems, lack of awareness of risks involved in MWM, lack of appropriate legislation and lack of specialized MWM staff. The paper recommends how MWM practices can be improved in medical facilities.

Keywords: environmental pollution, infectious, management, medical waste, public health

Procedia PDF Downloads 310
2947 Water Quality Assessment Based on Operational Indicator in West Coastal Water of Malaysia

Authors: Seyedeh Belin Tavakoly Sany, H. Rosli, R. Majid, S. Aishah

Abstract:

In this study, water monitoring was performed from Nov. 2012 to Oct. 2013 to assess water quality and evaluate the spatial and temporal distribution of physicochemical and biological variables in water. Water samples were collected from 10 coastal water stations of West Port. In the case of water-quality assessment, multi-metric indices and operational indicators have been proposed to classify the trophic status at different stations. The trophic level of West Port coastal water ranges from eutrophic to hypertrophic. Chl-a concentration was used to estimate the biological response of phytoplankton biomass and indicated eutrophic conditions in West Port and mesotrophic conditions at the control site. During the study period, no eutrophication events or secondary symptoms occurred, which may be related to hydrodynamic turbulence and water exchange, which prevent the development of eutrophic conditions in the West Port.

Keywords: water quality, multi-metric indices, operational indicator, Malaysia, West Port

Procedia PDF Downloads 296
2946 Study of Environmental Impact

Authors: Houmame Benbouali

Abstract:

The risks, in general, exist in any project; one can hardly carry out a project without taking risks. The hydraulic works are rather complex projects in their design, realization and exploitation, and are often subjected at the multiple risks being able to influence with their good performance, and can have an negative impact on their environment. The present study was carried out to quote the impacts caused by purification plant STEP Chlef on the environment, it aims has studies the environmental impacts during construction and when designing this STEP, it is divided into two parts: The first part results from a research task bibliographer which contain three chapters (-cleansing of water worn-general information on water worn-proceed of purification of waste water). The second part is an experimental part which is divided into four chapters (detailed state initial-description of the station of purification-evaluation of the impacts of the project analyzes measurements and recommendations).

Keywords: treatment plant, waste water, waste water treatment, environmental impact

Procedia PDF Downloads 511
2945 Architectural Design Studio (ADS) as an Operational Synthesis in Architectural Education

Authors: Francisco A. Ribeiro Da Costa

Abstract:

Who is responsible for teaching architecture; consider various ways to participate in learning, manipulating various pedagogical tools to streamline the creative process. The Architectural Design Studio (ADS) should become a holistic, systemic process responding to the complexity of our world. This essay corresponds to a deep reflection developed by the author on the teaching of architecture. The outcomes achieved are the corollary of experimentation; discussion and application of pedagogical methods that allowed consolidate the creativity applied by students. The purpose is to show the conjectures that have been considered effective in creating an intellectual environment that nurtures the subject of Architectural Design Studio (ADS), as an operational synthesis in the final stage of the degree. These assumptions, which are part of the proposed model, displaying theories and teaching methodologies that try to respect the learning process based on student learning styles Kolb, ensuring their latent specificities and formulating the structure of the ASD discipline. In addition, the assessing methods are proposed, which consider the architectural Design Studio as an operational synthesis in the teaching of architecture.

Keywords: teaching-learning, architectural design studio, architecture, education

Procedia PDF Downloads 390
2944 Estimation of Effective Radiation Dose Following Computed Tomography Urography at Aminu Kano Teaching Hospital, Kano Nigeria

Authors: Idris Garba, Aisha Rabiu Abdullahi, Mansur Yahuza, Akintade Dare

Abstract:

Background: CT urography (CTU) is efficient radiological examination for the evaluation of the urinary system disorders. However, patients are exposed to a significant radiation dose which is in a way associated with increased cancer risks. Objectives: To determine Computed Tomography Dose Index following CTU, and to evaluate organs equivalent doses. Materials and Methods: A prospective cohort study was carried at a tertiary institution located in Kano northwestern. Ethical clearance was sought and obtained from the research ethics board of the institution. Demographic, scan parameters and CT radiation dose data were obtained from patients that had CTU procedure. Effective dose, organ equivalent doses, and cancer risks were estimated using SPSS statistical software version 16 and CT dose calculator software. Result: A total of 56 patients were included in the study, consisting of 29 males and 27 females. The common indication for CTU examination was found to be renal cyst seen commonly among young adults (15-44yrs). CT radiation dose values in DLP, CTDI and effective dose for CTU were 2320 mGy cm, CTDIw 9.67 mGy and 35.04 mSv respectively. The probability of cancer risks was estimated to be 600 per a million CTU examinations. Conclusion: In this study, the radiation dose for CTU is considered significantly high, with increase in cancer risks probability. Wide radiation dose variations between patient doses suggest that optimization is not fulfilled yet. Patient radiation dose estimate should be taken into consideration when imaging protocols are established for CT urography.

Keywords: CT urography, cancer risks, effective dose, radiation exposure

Procedia PDF Downloads 345
2943 Modeling Salam Contract for Profit and Loss Sharing

Authors: Dchieche Amina, Aboulaich Rajae

Abstract:

Profit and loss sharing suggests an equitable sharing of risks and profits between the parts involved in a financial transaction. Salam is a contract in which advance payment is made for goods to be delivered at a future date. The purpose of this work is to price a new contract for profit and loss sharing based on Salam contract, using Khiyar Al Ghabn which is an agreement of choice in case of misrepresent facts.

Keywords: Islamic finance, shariah compliance, profi t and loss sharing, derivatives, risks, hedging, salam contract

Procedia PDF Downloads 332
2942 Cost and Benefits of Collocation in the Use of Biogas to Reduce Vulnerabilities and Risks

Authors: Janaina Camile Pasqual Lofhagen, David Savarese, Veronika Vazhnik

Abstract:

The urgency of the climate crisis requires both innovation and practicality. The energy transition framework allows industry to deliver resilient cities, enhance adaptability to change, pursue energy objectives such as growth or efficiencies, and increase renewable energy. This paper investigates a real-world application perspective for the use of biogas in Brazil and the U.S.. It will examine interventions to provide a foundation of infrastructure, as well as the tangible benefits for policy-makers crafting law and providing incentives.

Keywords: resilience, vulnerability, risks, biogas, sustainability.

Procedia PDF Downloads 105
2941 Contracting Strategies to Foster Industrial Symbiosis Implementation

Authors: Robin Molinier

Abstract:

Industrial symbiosis (I.S) deals with the exchange of waste materials, fatal energy and utilities as resources for production. While it brings environmental benefits from resource conservation its economic profitability is one of the main barriers to its implementation. I.S involves several actors with their own objectives and resources so that each actor must be satisfied by ex-ante arrangements to commit toward investments and transactions. Regarding I.S Transaction cost economics helps to identify hybrid forms of governance for transactions governance due to I.S projects specificities induced by the need for customization (asset specificity, non-homogeneity). Thus we propose a framework to analyze the best contractual practices tailored to address I.S specific risks that we identified as threefold (load profiles and quality mismatch, value fluctuations). Schemes from cooperative game theory and contracting management are integrated to analyze value flows between actors. Contractual guidelines are then proposed to address the identified risks and to split the value for a set of I.S archetypes drawn from actual experiences.

Keywords: contracts, economics, industrial symbiosis, risks

Procedia PDF Downloads 209
2940 Analysis of Risk-Based Disaster Planning in Local Communities

Authors: R. A. Temah, L. A. Nkengla-Asi

Abstract:

Planning for future disasters sets the stage for a variety of activities that may trigger multiple recurring operations and expose the community to opportunities to minimize risks. Local communities are increasingly embracing the necessity for planning based on local risks, but are also significantly challenged to effectively plan and response to disasters. This research examines basic risk-based disaster planning model and compares it with advanced risk-based planning that introduces the identification and alignment of varieties of local capabilities within and out of the local community that can be pivotal to facilitate the management of local risks and cascading effects prior to a disaster. A critical review shows that the identification and alignment of capabilities can potentially enhance risk-based disaster planning. A tailored holistic approach to risk based disaster planning is pivotal to enhance collective action and a reduction in disaster collective cost.

Keywords: capabilities, disaster planning, hazards, local community, risk-based

Procedia PDF Downloads 206
2939 Risk Factors Affecting Construction Project Cost in Oman

Authors: Omar Amoudi, Latifa Al Brashdi

Abstract:

Construction projects are always subject to risks and uncertainties due to its unique and dynamic nature, outdoor work environment, the wide range of skills employed, various parties involved in addition to situation of construction business environment at large. Altogether, these risks and uncertainties affect projects objectives and lead to cost overruns, delay, and poor quality. Construction projects in Oman often experience cost overruns and delay. Managing these risks and reducing their impacts on construction cost requires firstly identifying these risks, and then analyzing their severity on project cost to obtain deep understanding about these risks. This in turn will assist construction managers in managing and tacking these risks. This paper aims to investigate the main risk factors that affect construction projects cost in the Sultanate of Oman. In order to achieve the main aim, literature review was carried out to identify the main risk factors affecting construction cost. Thirty-three risk factors were identified from the literature. Then, a questionnaire survey was designed and distributed among construction professionals (i.e., client, contractor and consultant) to obtain their opinion toward the probability of occurrence for each risk factor and its possible impact on construction project cost. The collected data was analyzed based on qualitative aspects and in several ways. The severity of each risk factor was obtained by multiplying the probability occurrence of a risk factor with its impact. The findings of this study reveal that the most significant risk factors that have high severity impact on construction project cost are: Change of Oil Price, Delay of Materials and Equipment Delivery, Changes in Laws and Regulations, Improper Budgeting, and Contingencies, Lack of Skilled Workforce and Personnel, Delays Caused by Contractor, Delays of Owner Payments, Delays Caused by Client, and Funding Risk. The results can be used as a basis for construction managers to make informed decisions and produce risk response procedures and strategies to tackle these risks and reduce their negative impacts on construction project cost.

Keywords: construction cost, construction projects, Oman, risk factors, risk management

Procedia PDF Downloads 345
2938 The Application of Maintenance Strategy in Energy Power Plant: A Case Study

Authors: Steven Vusmuzi Mashego, Opeyeolu Timothy Laseinde

Abstract:

This paper presents a case study on applying maintenance strategies observed in a turbo-generator at a coal power plant. Turbo generators are one of the primary and critical components in energy generation. It is essential to apply correct maintenance strategies and apply operational procedures accordingly. The maintenance strategies are implemented to ensure the high reliability of the equipment. The study was carried out at a coal power station which will transit to a cleaner energy source in the nearest future. The study is relevant as lessons learned in this system will support plans and operational models implemented when cleaner energy sources replace coal-powered turbines. This paper first outlines different maintenance strategies executed on the turbo-generator modules. Secondly, the impacts of human factors on a coal power station are discussed, and the findings prompted recommendations for future actions.

Keywords: maintenance strategies, turbo generator, operational error, human factor, electricity generation

Procedia PDF Downloads 112
2937 Measurement and Research of Green Office Building Operational Performance in China: A Case Study of a Green Office Building in Zhejiang Province

Authors: Xuechen Gui, Jian Ge, Senmiao Li

Abstract:

In recent years, green buildings in China have been developing rapidly and have developed into a wide variety of types, of which office building is a very important part. In many green office buildings, the energy consumption of building operation is high; the indoor environment quality needs to be improved, and the level of occupants’ satisfaction is low. This paper conducted a one-year measurement of operational performance of a green office building in Zhejiang Province. The measurement includes energy consumption of the building's one-year operation, the quality of the indoor environment and occupants’ satisfaction in different seasons. The energy consumption is collected from the power bureau. The quality of the indoor environment have been measured at different measuring points including offices, meeting rooms and reception for the whole year. The satisfaction of occupants are obtained from questionnaires. The results are compared with given standards and goals and the reasons why occupants are dissatisfied with the indoor environment are analyzed. Regarding energy consumption, the energy consumption of the building operational performance is much higher than the standard. Regarding the indoor environment, the temperature and humidity meet the standard for most of the time, but fine particulate matter (PM2.5) concentration is pretty high. Regarding occupants satisfaction, occupants have a higher expectation for indoor air quality even when the indoor air quality is well and occupants prefer a relatively humid environment. However the overall satisfaction is more than 80%, which indicates that occupants have a higher tolerability.

Keywords: green office building, energy consumption, indoor environment quality, occupants satisfaction, operational performance

Procedia PDF Downloads 177
2936 Perception of Risks of the Telecommunication Towers in Malaysia: A Qualitative Inquiry

Authors: Y. Kamarulzaman, A. Madun, F. D. Yusop, N. Abdullah, N. K. Hoong

Abstract:

In 2011, the Malaysian Government has initiated a nationwide project called 1BestariNet which will adopt the using of technology in teaching and learning, resulting in the construction of telecommunication towers inside the public schools’ premise. Using qualitative approach, this study investigated public perception of risks associated with the project, particularly the telecommunication towers. Data collection involved observation and in-depth interviews with 22 individuals consist of a segment of public that was anxious about the risks of radio frequency electromagnetic field (RFEMF) which include two employees of telecommunication companies (telcos) and five employees of Government agencies. Observation of the location of the towers at 10 public schools, a public forum, and media reports provide valuable information in our analysis. The study finds that the main concern is related to the health risks. This study also shows that it is not easy for the Government to manage public perception mainly because it involves public trust. We find that risk perception is related with public trust, as well as the perceived benefits and level of knowledge. Efficient communication and continuous engagement with the local communities help to build and maintain public trust, reduce public fear and anxiety, hence mitigating the risk perception among the public.

Keywords: risk perception, risk communication, trust, telecommunication tower, radio frequency electromagnetic field (RFEMF)

Procedia PDF Downloads 320
2935 Research on the Risks of Railroad Receiving and Dispatching Trains Operators: Natural Language Processing Risk Text Mining

Authors: Yangze Lan, Ruihua Xv, Feng Zhou, Yijia Shan, Longhao Zhang, Qinghui Xv

Abstract:

Receiving and dispatching trains is an important part of railroad organization, and the risky evaluation of operating personnel is still reflected by scores, lacking further excavation of wrong answers and operating accidents. With natural language processing (NLP) technology, this study extracts the keywords and key phrases of 40 relevant risk events about receiving and dispatching trains and reclassifies the risk events into 8 categories, such as train approach and signal risks, dispatching command risks, and so on. Based on the historical risk data of personnel, the K-Means clustering method is used to classify the risk level of personnel. The result indicates that the high-risk operating personnel need to strengthen the training of train receiving and dispatching operations towards essential trains and abnormal situations.

Keywords: receiving and dispatching trains, natural language processing, risk evaluation, K-means clustering

Procedia PDF Downloads 91
2934 Comparative Analysis of Photovoltaic Systems

Authors: Irtaza M. Syed, Kaameran Raahemifar

Abstract:

This paper presents comparative analysis of photovoltaic systems (PVS) and proposes practical techniques to improve operational efficiency of the PVS. The best engineering and construction practices for PVS are identified and field oriented recommendation are made. Comparative analysis of central and string inverter based, as well as 600 and 1000 VDC PVS are performed. In addition, direct current (DC) and alternating current (AC) photovoltaic (PV) module based systems are compared. Comparison shows that 1000 V DC String Inverters based PVS is the best choice.

Keywords: photovoltaic module, photovoltaic systems, operational efficiency improvement, comparative analysis

Procedia PDF Downloads 485