Search results for: systems engineering management
17709 Metastatic Polypoid Nodular Melanoma Management During The COVID-19 Pandemic
Authors: Stefan Bradu, Daniel Siegel, Jameson Loyal, Andrea Leaf, Alana Kurtti, Usha Alapati, Jared Jagdeo
Abstract:
Compared with all other variants of nodular melanoma, patients with polypoid nodular melanoma have the lowest 5-year survival rate. The pathophysiology and management of polypoid melanoma are scarcely reported in the literature. Although surgical excision is the cornerstone of melanoma management, treatment of polypoid melanoma is complicated by several negative prognostic factors, including early metastasis. This report demonstrates the successful treatment of a rapidly developing red nodular polypoid melanoma with metastasis using surgery and adjuvant nivolumab in a SARS-CoV-2-positive patient who delayed seeking care due to the COVID-19 pandemic. In addition to detailing the successful treatment approach, the immunosuppressive effects of SARS-2-CoV and its possible contribution to the rapid progression of polypoid melanoma are discussed. This case highlights the complex challenges of melanoma diagnosis and management during the COVID-19 pandemic.Keywords: covid-19, dermatology, immunotherapy, melanoma, nivolumab
Procedia PDF Downloads 20917708 Detecting Earnings Management via Statistical and Neural Networks Techniques
Authors: Mohammad Namazi, Mohammad Sadeghzadeh Maharluie
Abstract:
Predicting earnings management is vital for the capital market participants, financial analysts and managers. The aim of this research is attempting to respond to this query: Is there a significant difference between the regression model and neural networks’ models in predicting earnings management, and which one leads to a superior prediction of it? In approaching this question, a Linear Regression (LR) model was compared with two neural networks including Multi-Layer Perceptron (MLP), and Generalized Regression Neural Network (GRNN). The population of this study includes 94 listed companies in Tehran Stock Exchange (TSE) market from 2003 to 2011. After the results of all models were acquired, ANOVA was exerted to test the hypotheses. In general, the summary of statistical results showed that the precision of GRNN did not exhibit a significant difference in comparison with MLP. In addition, the mean square error of the MLP and GRNN showed a significant difference with the multi variable LR model. These findings support the notion of nonlinear behavior of the earnings management. Therefore, it is more appropriate for capital market participants to analyze earnings management based upon neural networks techniques, and not to adopt linear regression models.Keywords: earnings management, generalized linear regression, neural networks multi-layer perceptron, Tehran stock exchange
Procedia PDF Downloads 42217707 Collaborative Managerial Practices of Heads of Educational Institutions: Principals and Students Perspective
Authors: Nasir Ahmed
Abstract:
The study was designed to explore the managerial practices of secondary school principals in collaboration with different school stakeholder’s i.e. Teachers, students and school councils. The population of the study comprised 41 principals of government secondary schools, 249 Secondary school teachers (SSTs), 3360 students of 10th class and 300 members of the school councils of government secondary schools (both boys and girls) in Wazirabad, Pakistan. 50 percentage principals, 40 percentage SSTs, 3 percentage students and 15% members of the school councils were taken as a sample of the study. Data was collected through different four-questionnaire design on a five point rating scale. The questionnaires for teachers, students, and school councils were developed to see their involvement in school management. The questionnaire for the secondary school principals was designed to find out to see their perceptions about the involvement of these stakeholders in school’s management. The results of the students indicated that, the remaining stakeholders were not cooperating with the school management. It was recommended that all the stakeholders be provided equal opportunities to take an active part in the school management. This may be based on a formal mechanism for the collaborative efforts of all the stakeholders.Keywords: collaboration, management, school stakeholders, school councils, managerial practices
Procedia PDF Downloads 28217706 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability
Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi
Abstract:
There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitizationKeywords: cybersecurity, supply chain methodology, secure substation, digitization
Procedia PDF Downloads 6417705 Evaluation of the Impact of Community Based Disaster Risk Management Applied In Landslide Prone Area; Reference to Badulla District
Authors: S. B. D. Samarasinghe, Malini Herath
Abstract:
Participatory planning is a very important process for decision making and choosing the best alternative options for community welfare, development of the society and its interactions among community and professionals. People’s involvement is considered as the key guidance in participatory planning. Presently, Participatory planning is being used in many fields. It's not only limited to planning but also to disaster management, poverty, housing, etc. In the past, Disaster management practice was a top-down approach, but it raised many issues as it was converted to a bottom-up approach. There are several approaches that can aid disaster management. Community-Based Disaster Risk Management (CBDRM) is a very successful participatory approach to risk management that is often successfully applied by other disaster-prone countries. In the local context, CBDRM has been applied to prevent Diseases as well as to prevent disasters such as landslides, tsunamis and floods. From three years before, Sri Lanka has initiated the CBDRM approach to minimize landslide vulnerability. Hence, this study mainly focuses on the impact of CBDRM approaches on landslide hazards. Also to identify their successes and failures from both implementing parties and community. This research is carried out based on a qualitative method combined with a descriptive research approach. A successful framework was prepared via a literature review. Case studies were selected considering landslide CBDRM programs which were implemented by Disaster Management Center and National Building Research Organization in Badulla. Their processes were evaluated. Data collection is done through interviews and informal discussions. Then their ideas were quantified by using the Relative Effectiveness index. The resulting numerical value was used to rank the program effectiveness and their success, failures and impacting factors. Results show that there are several failures among implementing parties and the community. Overcoming those factors can make way for better conduction of future CBDRM programs.Keywords: community-based disaster risk management, disaster management, preparedness, landslide
Procedia PDF Downloads 14717704 Development of a Conceptual Framework for Supply Chain Management Strategies Maximizing Resilience in Volatile Business Environments: A Case of Ventilator Challenge UK
Authors: Elena Selezneva
Abstract:
Over the last two decades, an unprecedented growth in uncertainty and volatility in all aspects of the business environment has caused major global supply chain disruptions and malfunctions. The effects of one failed company in a supply chain can ripple up and down the chain, causing a number of entities or an entire supply chain to collapse. The complicating factor is that an increasingly unstable and unpredictable business environment fuels the growing complexity of global supply chain networks. That makes supply chain operations extremely unpredictable and hard to manage with the established methods and strategies. It has caused the premature demise of many companies around the globe as they could not withstand or adapt to the storm of change. Solutions to this problem are not easy to come by. There is a lack of new empirically tested theories and practically viable supply chain resilience strategies. The mainstream organizational approach to managing supply chain resilience is rooted in well-established theories developed in the 1960-1980s. However, their effectiveness is questionable in currently extremely volatile business environments. The systems thinking approach offers an alternative view of supply chain resilience. Still, it is very much in the development stage. The aim of this explorative research is to investigate supply chain management strategies that are successful in taming complexity in volatile business environments and creating resilience in supply chains. The design of this research methodology was guided by an interpretivist paradigm. A literature review informed the selection of the systems thinking approach to supply chain resilience. Therefore, an explorative single case study of Ventilator Challenge UK was selected as a case study for its extremely resilient performance of its supply chain during a period of national crisis. Ventilator Challenge UK is intensive care ventilators supply project for the NHS. It ran for 3.5 months and finished in 2020. The participants moved on with their lives, and most of them are not employed by the same organizations anymore. Therefore, the study data includes documents, historical interviews, live interviews with participants, and social media postings. The data analysis was accomplished in two stages. First, data were thematically analyzed. In the second stage, pattern matching and pattern identification were used to identify themes that formed the findings of the research. The findings from the Ventilator Challenge UK case study supply management practices demonstrated all the features of an adaptive dynamic system. They cover all the elements of supply chain and employ an entire arsenal of adaptive dynamic system strategies enabling supply chain resilience. Also, it is not a simple sum of parts and strategies. Bonding elements and connections between the components of a supply chain and its environment enabled the amplification of resilience in the form of systemic emergence. Enablers are categorized into three subsystems: supply chain central strategy, supply chain operations, and supply chain communications. Together, these subsystems and their interconnections form the resilient supply chain system framework conceptualized by the author.Keywords: enablers of supply chain resilience, supply chain resilience strategies, systemic approach in supply chain management, resilient supply chain system framework, ventilator challenge UK
Procedia PDF Downloads 8117703 Development of Management System of the Experience of Defensive Modeling and Simulation by Data Mining Approach
Authors: D. Nam Kim, D. Jin Kim, Jeonghwan Jeon
Abstract:
Defense Defensive Modeling and Simulation (M&S) is a system which enables impracticable training for reducing constraints of time, space and financial resources. The necessity of defensive M&S has been increasing not only for education and training but also virtual fight. Soldiers who are using defensive M&S for education and training will obtain empirical knowledge and know-how. However, the obtained knowledge of individual soldiers have not been managed and utilized yet since the nature of military organizations: confidentiality and frequent change of members. Therefore, this study aims to develop a management system for the experience of defensive M&S based on data mining approach. Since individual empirical knowledge gained through using the defensive M&S is both quantitative and qualitative data, data mining approach is appropriate for dealing with individual empirical knowledge. This research is expected to be helpful for soldiers and military policy makers.Keywords: data mining, defensive m&s, management system, knowledge management
Procedia PDF Downloads 25517702 Supply Chain Risk Management (SCRM): A Simplified Alternative for Implementing SCRM for Small and Medium Enterprises
Authors: Paul W. Murray, Marco Barajas
Abstract:
Recent changes in supply chains, especially globalization and collaboration, have created new risks for enterprises of all sizes. A variety of complex frameworks, often based on enterprise risk management strategies have been presented under the heading of Supply Chain Risk Management (SCRM). The literature on promotes the benefits of a robust SCRM strategy; however, implementing SCRM is difficult and resource demanding for Large Enterprises (LEs), and essentially out of reach for Small and Medium Enterprises (SMEs). This research debunks the idea that SCRM is necessary for all enterprises and instead proposes a simple and effective Vendor Selection Template (VST). Empirical testing and a survey of supply chain practitioners provide a measure of validation to the VST. The resulting VSTis a valuable contribution because is easy to use, provides practical results, and is sufficiently flexible to be universally applied to SMEs.Keywords: multiple regression analysis, supply chain management, risk assessment, vendor selection
Procedia PDF Downloads 46517701 AI Ethical Values as Dependent on the Role and Perspective of the Ethical AI Code Founder- A Mapping Review
Authors: Moshe Davidian, Shlomo Mark, Yotam Lurie
Abstract:
With the rapid development of technology and the concomitant growth in the capability of Artificial Intelligence (AI) systems and their power, the ethical challenges involved in these systems are also evolving and increasing. In recent years, various organizations, including governments, international institutions, professional societies, civic organizations, and commercial companies, have been choosing to address these various challenges by publishing ethical codes for AI systems. However, despite the apparent agreement that AI should be “ethical,” there is debate about the definition of “ethical artificial intelligence.” This study investigates the various AI ethical codes and their key ethical values. From the vast collection of codes that exist, it analyzes and compares 25 ethical codes that were found to be representative of different types of organizations. In addition, as part of its literature review, the study overviews data collected in three recent reviews of AI codes. The results of the analyses demonstrate a convergence around seven key ethical values. However, the key finding is that the different AI ethical codes eventually reflect the type of organization that designed the code; i.e., the organizations’ role as regulator, user, or developer affects the view of what ethical AI is. The results show a relationship between the organization’s role and the dominant values in its code. The main contribution of this study is the development of a list of the key values for all AI systems and specific values that need to impact the development and design of AI systems, but also allowing for differences according to the organization for which the system is being developed. This will allow an analysis of AI values in relation to stakeholders.Keywords: artificial intelligence, ethical codes, principles, values
Procedia PDF Downloads 10717700 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life
Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar
Abstract:
In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home
Procedia PDF Downloads 11317699 Obtainment of Systems with Efavirenz and Lamellar Double Hydroxide as an Alternative for Solubility Improvement of the Drug
Authors: Danilo A. F. Fontes, Magaly A. M.Lyra, Maria L. C. Moura, Leslie R. M. Ferraz, Salvana P. M. Costa, Amanda C. Q. M. Vieira, Larissa A. Rolim, Giovanna C. R. M. Schver, Ping I. Lee, Severino Alves-Júnior, José L. Soares-Sobrinho, Pedro J. Rolim-Neto
Abstract:
Efavirenz (EFV) is a first-choice drug in antiretroviral therapy with high efficacy in the treatment of infection by Human Immunodeficiency Virus, which causes Acquired Immune Deficiency Syndrome (AIDS). EFV has low solubility in water resulting in a decrease in the dissolution rate and, consequently, in its bioavailability. Among the technological alternatives to increase solubility, the Lamellar Double Hydroxides (LDH) have been applied in the development of systems with poorly water-soluble drugs. The use of analytical techniques such as X-Ray Diffraction (XRD), Infrared Spectroscopy (IR) and Differential Scanning Calorimetry (DSC) allowed the elucidation of drug interaction with the lamellar compounds. The objective of this work was to characterize and develop the binary systems with EFV and LDH in order to increase the solubility of the drug. The LDH-CaAl was synthesized by the method of co-precipitation from salt solutions of calcium nitrate and aluminum nitrate in basic medium. The systems EFV-LDH and their physical mixtures (PM) were obtained at different concentrations (5-60% of EFV) using the solvent technique described by Takahashi & Yamaguchi (1991). The characterization of the systems and the PM’s was performed by XRD techniques, IR, DSC and dissolution test under non-sink conditions. The results showed improvements in the solubility of EFV when associated with LDH, due to a possible change in its crystal structure and formation of an amorphous material. From the DSC results, one could see that the endothermic peak at 173°C, temperature that correspond to the melting process of EFZ in the crystal form, was present in the PM results. For the EFZ-LDH systems (with 5, 10 and 30% of drug loading), this peak was not observed. XRD profiles of the PM showed well-defined peaks for EFV. Analyzing the XRD patterns of the systems, it was found that the XRD profiles of all the systems showed complete attenuation of the characteristic peaks of the crystalline form of EFZ. The IR technique showed that, in the results of the PM, there was the appearance of one band and overlap of other bands, while the IR results of the systems with 5, 10 and 30% drug loading showed the disappearance of bands and a few others with reduced intensity. The dissolution test under non-sink conditions showed that systems with 5, 10 and 30% drug loading promoted a great increase in the solubility of EFV, but the system with 10% of drug loading was the only one that could keep substantial amount of drug in solution at different pHs.Keywords: Efavirenz, Lamellar Double Hydroxides, Pharmaceutical Techonology, Solubility
Procedia PDF Downloads 58317698 Using Seismic Base Isolation Systems in High-Rise Hospital Buildings and a Hybrid Proposal
Authors: Elif Bakkaloglu, Necdet Torunbalci
Abstract:
The fact of earthquakes in Turkiye is an inevitable natural disaster. Therefore, buildings must be prepared for this natural hazard. Especially in hospital buildings, earthquake resistance is an essential point because hospitals are one of the first places where people come after an earthquake. Although hospital buildings are more suitable for horizontal architecture, it is necessary to construct and expand multi-storey hospital buildings due to difficulties in finding suitable places as a result of excessive urbanization, difficulties in obtaining appropriate size land and decrease in suitable places and increase in land values. In Turkiye, using seismic isolators in public hospitals, which are placed in first-degree earthquake zone and have more than 100 beds, is made obligatory by general instruction. As a result of this decision, it may sometimes be necessary to construct seismic isolated multi-storey hospital buildings in cities where those problems are experienced. Although widespread use of seismic isolators in Japan, there are few multi-storey buildings in which seismic isolators are used in Turkiye. As it is known, base isolation systems are the most effective methods of earthquake resistance, as number of floors increases, center of gravity moves away from base in multi-storey buildings, increasing the overturning effect and limiting the use of these systems. In this context, it is aimed to investigate structural systems of multi-storey buildings which built using seismic isolation methods in the World. In addition to this, a working principle is suggested for disseminating seismic isolators in multi-storey hospital buildings. The results to be obtained from the study will guide architects who design multi-storey hospital buildings in their architectural designs and engineers in terms of structural system design.Keywords: earthquake, energy absorbing systems, hospital, seismic isolation systems
Procedia PDF Downloads 15117697 Enhancing Information Technologies with AI: Unlocking Efficiency, Scalability, and Innovation
Authors: Abdal-Hafeez Alhussein
Abstract:
Artificial Intelligence (AI) has become a transformative force in the field of information technologies, reshaping how data is processed, analyzed, and utilized across various domains. This paper explores the multifaceted applications of AI within information technology, focusing on three key areas: automation, scalability, and data-driven decision-making. We delve into how AI-powered automation is optimizing operational efficiency in IT infrastructures, from automated network management to self-healing systems that reduce downtime and enhance performance. Scalability, another critical aspect, is addressed through AI’s role in cloud computing and distributed systems, enabling the seamless handling of increasing data loads and user demands. Additionally, the paper highlights the use of AI in cybersecurity, where real-time threat detection and adaptive response mechanisms significantly improve resilience against sophisticated cyberattacks. In the realm of data analytics, AI models—especially machine learning and natural language processing—are driving innovation by enabling more precise predictions, automated insights extraction, and enhanced user experiences. The paper concludes with a discussion on the ethical implications of AI in information technologies, underscoring the importance of transparency, fairness, and responsible AI use. It also offers insights into future trends, emphasizing the potential of AI to further revolutionize the IT landscape by integrating with emerging technologies like quantum computing and IoT.Keywords: artificial intelligence, information technology, automation, scalability
Procedia PDF Downloads 1717696 Investigating the Public’s Perceptions and Factors Contributing to the Management of Household Solid Waste in Rural Communities: A Case Study of Two Contrasting Rural Wards in the Greater Tzaneen Municipality
Authors: Dimakatso Machetele, Clare Kelso, Thea Schoeman
Abstract:
In developing countries such as India, China, and South Africa, disposal of household solid waste in rural areas is of great concern. Rural communities face numerous challenges that include the absence of waste collection services and sanitation facilities. The inadequate provision of waste collection and sanitation services results to the occurrence of infectious diseases e.g., malaria. The gap in the management of household solid waste between rural and urban communities, whereby urban communities have better waste management services compared to rural areas is an environmental injustice towards rural communities. The unequal distribution of infrastructure in South Africa’s waste management is a concern that stems from the spatial inequalities of the country’s apartheid history. The Limpopo province has a higher proportion of households without waste collection services from the municipality. The present research objectives are to investigate the public’s perceptions and factors contributing to the management of household solid waste in two contrasting rural Wards in the Greater Tzaneen Municipality. There is limited data and studies that have been conducted to understand the management of household solid waste in rural areas, and specifically, for the Greater Tzaneen Municipality located in the Limpopo province, South Africa. The findings of the study will propose recommendations to the Greater Tzaneen Municipality, rural municipalities in South Africa, and globally to explore sustainable methods to manage household solid waste and explore economic opportunities within the waste management sector to alleviate poverty in rural communities.Keywords: rural, household solid wase, perceptions, waste management
Procedia PDF Downloads 11417695 Implementation of Human Resource Management in Greek Law Enforcement Agencies
Authors: Konstantinos G. Papaioannou, Panagiotis K. Serdaris
Abstract:
This study, examines the level of implementation of Human Resource Management (HRM) activities in law enforcement agencies in Greece. Recognizing that HRM is crucial for maximizing organizational performance, the study aims to evaluate its application within Greek law enforcement. A quantitative-descriptive survey was conducted, involving 996 executives from Greek Law Enforcement Agencies (477 from the Hellenic Police and 519 from the Hellenic Coast Guard), through random sampling. The survey, revealed significant concerns regarding the minimal implementation of HRM practices, in both agencies. The findings indicate that HRM practices, such as HR planning, recruitment, job position, selection, training and development, personnel management, compensation, labor relations and health and safety, are minimally applied. Neither the Hellenic Police nor the Hellenic Coast Guard appears to follow a comprehensive HRM plan. The study, contributes both theoretically and practically by highlighting the lack of HRM implementation in these agencies. The data suggest that by adopting strategic HRM practices, these organizations can enhance personnel performance and better fulfill their societal roles. Future research should extend to law enforcement agencies in other countries to draw more representative conclusion.Keywords: coastguard, human resources management, law enforcement agencies, performance management, police
Procedia PDF Downloads 4417694 Optimal Solutions for Real-Time Scheduling of Reconfigurable Embedded Systems Based on Neural Networks with Minimization of Power Consumption
Authors: Ghofrane Rehaiem, Hamza Gharsellaoui, Samir Benahmed
Abstract:
In this study, Artificial Neural Networks (ANNs) were used for modeling the parameters that allow the real-time scheduling of embedded systems under resources constraints designed for real-time applications running. The objective of this work is to implement a neural networks based approach for real-time scheduling of embedded systems in order to handle real-time constraints in execution scenarios. In our proposed approach, many techniques have been proposed for both the planning of tasks and reducing energy consumption. In fact, a combination of Dynamic Voltage Scaling (DVS) and time feedback can be used to scale the frequency dynamically adjusting the operating voltage. Indeed, we present in this paper a hybrid contribution that handles the real-time scheduling of embedded systems, low power consumption depending on the combination of DVS and Neural Feedback Scheduling (NFS) with the energy Priority Earlier Deadline First (PEDF) algorithm. Experimental results illustrate the efficiency of our original proposed approach.Keywords: optimization, neural networks, real-time scheduling, low-power consumption
Procedia PDF Downloads 37117693 Application of Hybrid Honey Bees Mating Optimization Algorithm in Multiuser Detection of Wireless Communication Systems
Abstract:
Wireless communication systems have changed dramatically and shown spectacular evolution over the past two decades. These radio technologies are engaged in a quest endless high-speed transmission coupled to a constant need to improve transmission quality. Various radio communication systems being developed use code division multiple access (CDMA) technique. This work analyses a hybrid honey bees mating optimization algorithm (HBMO) applied to multiuser detection (MuD) in CDMA communication systems. The HBMO is a swarm-based optimization algorithm, which simulates the mating process of real honey bees. We apply a hybridization of HBMO with simulated annealing (SA) in order to improve the solution generated by the HBMO. Simulation results show that the detection based on Hybrid HBMO, in term of bit error rate (BER), is viable option when compared with the classic detectors from literature under Rayleigh flat fading channel.Keywords: BER, DS-CDMA multiuser detection, genetic algorithm, hybrid HBMO, simulated annealing
Procedia PDF Downloads 43517692 Screening of Strategic Management Criterions in Hospitals Using Delphi-Fuzzy Method
Authors: Helia Moayedi, Mahdi Moaidi
Abstract:
Nowadays, the managing and planning of hospitals is facing many problems. Failure to recognize the main criteria for strategic management to ensure long-term hospital performance can lead to many health problems. To achieve this goal, a qualitative-quantitate method titled Delphi-Fuzzy has been applied. This strategy makes it possible for experts to screen among the most important criteria in strategic management. To conduct this operation, a statistical society consisting of 20 experts in Ahwaz hospitals has been questioned. The final model confirms the key criterions after three stages of Delphi. This model provides the possibility to focus on the basic criteria and can determine the organization’s main orientation.Keywords: Delphi-fuzzy method, hospital management, long-term planning, qualitative-quantitate method, screening of strategic criteria, strategic planning
Procedia PDF Downloads 13117691 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research
Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez
Abstract:
Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.Keywords: action research, information security, information technology, methodological design, process virtualization, risk management
Procedia PDF Downloads 16517690 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 14017689 Endeavor in Management Process by Executive Dashboards: The Case of the Financial Directorship in Brazilian Navy
Authors: R. S. Quintal, J. L. Tesch Santos, M. D. Davis, E. C. de Santana, M. de F. Bandeira dos Santos
Abstract:
The objective is to identify the contributions from the introduction of the computerized system deal within the Accounting Department of Brazilian Navy Financial Directorship and its possible effects on the budgetary and financial harvest of Brazilian Navy. The relevance lies in the fact that the management process is responsible for the continuous improvement of organizational performance through higher levels of quality in their activities. Improvements in organizational processes have direct effects on crops cost, quality, reliability, flexibility and speed. The method of study of this research is the case study. The choice of case study attended, among other demands, a need for greater flexibility to study processes related to a computerized system. The sources of evidence were used literature, documentary and direct observation. Direct observation was made by monitoring the implementation of the computerized system in the Division of Management Analysis. The main findings of the study point to the fact that the computerized system may contribute significantly to the standardization of information. There was improvement of internal processes in the division of management analysis, made possible the consolidation of a standard management and performance analysis that contribute to global homogeneity in the treatment of information essential to the process of decision making. This study has limitations related to the fact the search result be subject exclusively to the case studied, and it is impossible to generalize to other organs of government.Keywords: process management, management control, business intelligence, Brazilian Navy
Procedia PDF Downloads 23817688 Image Processing techniques for Surveillance in Outdoor Environment
Authors: Jayanth C., Anirudh Sai Yetikuri, Kavitha S. N.
Abstract:
This paper explores the development and application of computer vision and machine learning techniques for real-time pose detection, facial recognition, and number plate extraction. Utilizing MediaPipe for pose estimation, the research presents methods for detecting hand raises and ducking postures through real-time video analysis. Complementarily, facial recognition is employed to compare and verify individual identities using the face recognition library. Additionally, the paper demonstrates a robust approach for extracting and storing vehicle number plates from images, integrating Optical Character Recognition (OCR) with a database management system. The study highlights the effectiveness and versatility of these technologies in practical scenarios, including security and surveillance applications. The findings underscore the potential of combining computer vision techniques to address diverse challenges and enhance automated systems for both individual and vehicular identification. This research contributes to the fields of computer vision and machine learning by providing scalable solutions and demonstrating their applicability in real-world contexts.Keywords: computer vision, pose detection, facial recognition, number plate extraction, machine learning, real-time analysis, OCR, database management
Procedia PDF Downloads 2617687 Fruit Identification System in Sweet Orange Citrus (L.) Osbeck Using Thermal Imaging and Fuzzy
Authors: Ingrid Argote, John Archila, Marcelo Becker
Abstract:
In agriculture, intelligent systems applications have generated great advances in automating some of the processes in the production chain. In order to improve the efficiency of those systems is proposed a vision system to estimate the amount of fruits in sweet orange trees. This work presents a system proposal using capture of thermal images and fuzzy logic. A bibliographical review has been done to analyze the state-of-the-art of the different systems used in fruit recognition, and also the different applications of thermography in agricultural systems. The algorithm developed for this project uses the metrics of the fuzzines parameter to the contrast improvement and segmentation of the image, for the counting algorith m was used the Hough transform. In order to validate the proposed algorithm was created a bank of images of sweet orange Citrus (L.) Osbeck acquired in the Maringá Farm. The tests with the algorithm Indicated that the variation of the tree branch temperature and the fruit is not very high, Which makes the process of image segmentation using this differentiates, This Increases the amount of false positives in the fruit counting algorithm. Recognition of fruits isolated with the proposed algorithm present an overall accuracy of 90.5 % and grouped fruits. The accuracy was 81.3 %. The experiments show the need for a more suitable hardware to have a better recognition of small temperature changes in the image.Keywords: Agricultural systems, Citrus, Fuzzy logic, Thermal images.
Procedia PDF Downloads 22917686 The Role of Social Isolation and Its Relevance Towards the Intersex Condition for Policy Management of Inclusive Education
Authors: Hamza Iftikhar
Abstract:
The intersex person’s social isolation condition is the leading concern in inclusive educational practices. It provides for the relevance of intersex communities with the influence of social isolation on their education and well-being. Given the underlying concern, this paper stresses the isolation-free condition of the intersex community by facilitating inclusive education. The Atkinson and Shiffrin Model and Behaviorism-Based Intersex Theory supports inclusive education by extending the desire for the significant management of stereotypes, quality teaching, parental beliefs, expressions, physique, and intersex attribution. The reducing role of social isolation for inclusive education is analyzed using the qualitative research method. The semi-structured interview research instrument is used for the data collection from the Ministry of Human Rights, Educational Institutions, and inter-sex Representatives. The results show that managing directors and heads of educational institutions frame policy management for the free social isolation of intersex persons, which is relevant through inclusive education. The implication of this paper is to provide a better social condition for intersex persons towards inclusive education through effective policy management.Keywords: social isolation, inter-sex, relevance, inclusive education, policy management
Procedia PDF Downloads 10117685 Literature Review: Application of Artificial Intelligence in EOR
Authors: Masoumeh Mofarrah, Amir NahanMoghadam
Abstract:
Higher oil prices and increasing oil demand are main reasons for great attention to Enhanced Oil Recovery (EOR). Comprehensive researches have been accomplished to develop, appraise and improve EOR methods and their application. Recently Artificial Intelligence (AI) gained popularity in petroleum industry that can help petroleum engineers to solve some fundamental petroleum engineering problems such as reservoir simulation, EOR project risk analysis, well log interpretation and well test model selection. This study presents a historical overview of most popular AI tools including neural networks, genetic algorithms, fuzzy logic and expert systems in petroleum industry and discusses two case studies to represent the application of two mentioned AI methods for selecting an appropriate EOR method based on reservoir characterization in feasible and effective way.Keywords: artificial intelligence, EOR, neural networks, expert systems
Procedia PDF Downloads 40817684 A Model Approach of Good Practice Based on the Project Management Body of Knowledge® Guide in the Project Owner
Authors: Claudia Marcela Munoz Gonzalez, Diego Fernando Hernandez Losada, Hugo Alberto Herrera Fonseca
Abstract:
The project owner's role in the public-private investment consists of controlling and verifying the correct execution of the project's objectives and resources. Likewise, it is a discipline little explored in the academic field, whereby this work wishes to contribute with a model of good practices based on the project management methodology proposed by the Project Management Body of Knowledge® Guide. In the same way, highlight what are the controls that an integral project owner should take into account in its exercise and application, through the stages in which its contract runs. This proposal aims to structure its practice and integrate its functions according to a project management methodology. In addition, these practices will be applied in a case study of projects in the agricultural sector, particularly in the construction of irrigation district in Cundinamarca, Colombia.Keywords: controls, construction of irrigation district, PMBOK®, project owner
Procedia PDF Downloads 45817683 Steps towards the Development of National Health Data Standards in Developing Countries
Authors: Abdullah I. Alkraiji, Thomas W. Jackson, Ian Murray
Abstract:
The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.Keywords: interoperabilty, medical data exchange, health data standards, case study, Saudi Arabia
Procedia PDF Downloads 33817682 Effectiveness of Management Transfer Programs for Managing Irrigation Resources in Developing Countries: A Case Study of Farmer- and Agency-Managed Schemes from Nepal
Authors: Tirtha Raj Dhakal, Brian Davidson, Bob Farquharson
Abstract:
Irrigation management transfer has been taken as the important policy instrument for effective irrigation resource management in many developing countries. The change in governance of the irrigation schemes for its day-to-day operation and maintenance has been centered in recent Nepalese irrigation policies also. However, both farmer- and agency-managed irrigation schemes in Nepal are performing well below than expected. This study tries to link the present concerns of poor performance of both forms of schemes with the institutions for its operation and management. Two types of surveys, management and farm surveys; were conducted as a case study in the command area of Narayani Lift Irrigation Project (agency-managed) and Khageri Irrigation System (farmer-managed) of Chitwan District. The farm survey from head, middle and tail regions of both schemes revealed that unequal water distribution exists in these regions in both schemes with greater percentage of farmers experiencing this situation in agency managed scheme. In both schemes, the cost recovery rate was very low, even below five percent in Lift System indicating poor operation and maintenance of the schemes. Also, the institution on practice in both schemes is unable to create any incentives for farmers’ willingness to pay as well as for its economical use in the farm. Thus, outcomes from the study showed that only the management transfer programs may not achieve the goal of efficient irrigation resource management. This may suggest water professionals to rethink about the irrigation policies for refining institutional framework irrespective of the governance of schemes for improved cost recovery and better water distribution throughout the irrigation schemes.Keywords: cost recovery, governance, institution, irrigation management transfer, willingness to pay
Procedia PDF Downloads 29317681 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management
Authors: Fatemehsadat Mousaviabarbekouh
Abstract:
Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting
Procedia PDF Downloads 11217680 The Impact of Using Building Information Modeling Technology in Construction Projects Management
Authors: Mohammad Ashraf
Abstract:
This research links the use of Building Information Modeling technology in constructions and infrastructure projects, starting from the moment when considering the establishment of a project to demolishing or renovating it, going through the design work, planning, procurement and implementation. BIM Software's which used are Revit, Navisworks and Asta Project in the case study for the Atletico Madrid Stadium project (Wanda Stadium). Also, the project improves through various phases of construction (planning - implementation - management). Besides, the level of the details managed within this project advances gradually. In addition, the construction process problems become about 30 % less than before, resulting from high coordination between designing, implementation and follow through that is done by the project management office (PMO). The current disposition in the industry is to tightly manage the detail contained within the planning and coordination phases of construction, but we miss the opportunity to manage that data as it matures and grows into the execution and commissioning phases.Keywords: construction management, BIM technology, planning, design, procurements, critical path method
Procedia PDF Downloads 280