Search results for: geopolitical risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1752

Search results for: geopolitical risks

1572 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 56
1571 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 107
1570 Human Health Risk Assessment of Mercury-Contaminated Soils in Alebediah Mining Community, Sudan

Authors: Ahmed Elwaleed, Huiho Jeong, Ali H. Abdelbagi, Nguyen Thi Quynh, Koji Arizono, Yasuhiro Ishibashi

Abstract:

Artisanal and small-scale gold mining (ASGM) poses substantial risks to both human health and the environment, particularly through contamination of soil, water, and air. Prolonged exposure to ASGM-contaminated soils can lead to acute or chronic mercury toxicity. This study assesses the human health risks associated with mercury-contaminated soils and tailings in the Alebediah mining community in Sudan. Soil samples were collected from various locations within Alebediah, including ASGM areas, farmlands, and residential areas, along with tailings samples commonly found within ASGM sites. The evaluation of potential health risks to humans included the computation of the estimated daily intake (AvDI), the hazard quotient (HQ), and the hazard index (HI) for both adults and children. The primary exposure route identified as potentially posing a significant health risk was the volatilization of mercury from tailings samples, where mercury concentrations reached up to 25.5 mg/kg. In contrast, other samples within the ASGM area showed elevated mercury levels but did not present significant health risks, with HI values below 1. However, all areas indicated HI values above 1 for the remaining exposure routes. The study observed a decrease in mercury concentration with increasing distance from the ASGM community. Additionally, soil samples revealed elevated mercury levels exceeding background values, prompting an assessment of contamination levels using the enrichment factor (EF). The findings indicated that farmlands and residential areas exhibited depleted EF, while areas surrounding the ASGM community showed none to moderate pollution. In contrast, ASGM areas exhibited significant to extreme pollution. A GIS map was generated to visually depict the extent of mercury pollution, facilitating communication with stakeholders and decision-makers.

Keywords: mercury pollution, artisanal and small-scale gold mining, health risk assessment, hazard index, soil and tailings, enrichment factor

Procedia PDF Downloads 47
1569 A Supply Chain Risk Management Model Based on Both Qualitative and Quantitative Approaches

Authors: Henry Lau, Dilupa Nakandala, Li Zhao

Abstract:

In today’s business, it is well-recognized that risk is an important factor that needs to be taken into consideration before a decision is made. Studies indicate that both the number of risks faced by organizations and their potential consequences are growing. Supply chain risk management has become one of the major concerns for practitioners and researchers. Supply chain leaders and scholars are now focusing on the importance of managing supply chain risk. In order to meet the challenge of managing and mitigating supply chain risk (SCR), we must first identify the different dimensions of SCR and assess its relevant probability and severity. SCR has been classified in many different ways, and there are no consistently accepted dimensions of SCRs and several different classifications are reported in the literature. Basically, supply chain risks can be classified into two dimensions namely disruption risk and operational risk. Disruption risks are those caused by events such as bankruptcy, natural disasters and terrorist attack. Operational risks are related to supply and demand coordination and uncertainty, such as uncertain demand and uncertain supply. Disruption risks are rare but severe and hard to manage, while operational risk can be reduced through effective SCM activities. Other SCRs include supply risk, process risk, demand risk and technology risk. In fact, the disorganized classification of SCR has created confusion for SCR scholars. Moreover, practitioners need to identify and assess SCR. As such, it is important to have an overarching framework tying all these SCR dimensions together for two reasons. First, it helps researchers use these terms for communication of ideas based on the same concept. Second, a shared understanding of the SCR dimensions will support the researchers to focus on the more important research objective: operationalization of SCR, which is very important for assessing SCR. In general, fresh food supply chain is subject to certain level of risks, such as supply risk (low quality, delivery failure, hot weather etc.) and demand risk (season food imbalance, new competitors). Effective strategies to mitigate fresh food supply chain risk are required to enhance operations. Before implementing effective mitigation strategies, we need to identify the risk sources and evaluate the risk level. However, assessing the supply chain risk is not an easy matter, and existing research mainly use qualitative method, such as risk assessment matrix. To address the relevant issues, this paper aims to analyze the risk factor of the fresh food supply chain using an approach comprising both fuzzy logic and hierarchical holographic modeling techniques. This novel approach is able to take advantage the benefits of both of these well-known techniques and at the same time offset their drawbacks in certain aspects. In order to develop this integrated approach, substantial research work is needed to effectively combine these two techniques in a seamless way, To validate the proposed integrated approach, a case study in a fresh food supply chain company was conducted to verify the feasibility of its functionality in a real environment.

Keywords: fresh food supply chain, fuzzy logic, hierarchical holographic modelling, operationalization, supply chain risk

Procedia PDF Downloads 222
1568 The Development of a School-Based Wellbeing Programme to Enhance the Social Functioning of Learners in Middle Childhood

Authors: Soretha Beets, Izanette Van Schalkwyk, Doret K. Kirsten

Abstract:

Children in middle childhood are exposed to various risks, for example, risks associated with poverty and/or dysfunctional families, that may threaten their social functioning. The aim of this study was to develop and design a programme that can be presented to children in middle childhood in order to enhance their social functioning towards better wellbeing. The skills and competencies needed to be included in the programme were identified by means of a literature review and 4 focus groups with educators from 4 sub-areas in a certain district in the North-West Province of South Africa. The programme consists of 8 sessions, presented in a certain order. The sessions cover the following aspects: self-esteem and gratitude, self-regulation and goal-setting, values and relationships, communication and listening, conflict management, emotional competence, and resilient coping. These aspects may benefit children in the middle child’s wellbeing and live on the short-term and may also hold long-term benefits.

Keywords: middle childhood, programme development, social functioning, wellbeing

Procedia PDF Downloads 135
1567 The Use of Video Conferencing to Aid the Decision in Whether Vulnerable Patients Should Attend In-Person Appointments during a COVID Pandemic

Authors: Nadia Arikat, Katharine Blain

Abstract:

During the worst of the COVID pandemic, only essential treatment was provided for patients needing urgent care. With the prolonged extent of the pandemic, there has been a return to more routine referrals for paediatric dentistry advice and treatment for specialist conditions. However, some of these patients and/or their carers may have significant medical issues meaning that attending in-person appointments carries additional risks. This poses an ethical dilemma for clinicians. This project looks at how a secure video conferencing platform (“Near Me”) has been used to assess the need and urgency for in-person new patient visits, particularly for patients and families with additional risks. “Near Me” is a secure online video consulting service used by NHS Scotland. In deciding whether to bring a new patient to the hospital for an appointment, the clinical condition of the teeth together with the urgency for treatment need to be assessed. This is not always apparent from the referral letter. In addition, it is important to judge the risks to the patients and carers of such visits, particularly if they have medical issues. The use and effectiveness of “Near Me” consultations to help decide whether vulnerable paediatric patients should have in-person appointments will be illustrated and discussed using two families: one where the child is medically compromised (Alagille syndrome with previous liver transplant), and the other where there is a medically compromised parent (undergoing chemotherapy and a bone marrow transplant). In both cases, it was necessary to take into consideration the risks and moral implications of requesting that they attend the dental hospital during a pandemic. The option of remote consultation allowed further clinical information to be evaluated and the families take part in the decision-making process about whether and when such visits should be scheduled. These cases will demonstrate how medically compromised patients (or patients with vulnerable carers), could have their dental needs assessed in a socially distanced manner by video consultation. Together, the clinician and the patient’s family can weigh up the risks, with regards to COVID-19, of attending for in-person appointments against the benefit of having treatment. This is particularly important for new paediatric patients who have not yet had a formal assessment. The limitations of this technology will also be discussed. It is limited by internet availability, the strength of the connection, the video quality and families owning a device which allows video calls. For those from a lower socio-economic background or living in some rural areas, this may not be possible or limit its usefulness. For the two patients discussed in this project, where the urgency of their dental condition was unclear, video consultation proved beneficial in deciding an appropriate outcome and preventing unnecessary exposure of vulnerable people to a hospital environment during a pandemic, demonstrating the usefulness of such technology when it is used appropriately.

Keywords: COVID-19, paediatrics, triage, video consultations

Procedia PDF Downloads 64
1566 Concussion Prediction for Speed Skater Impacting on Crash Mats by Computer Simulation Modeling

Authors: Yilin Liao, Hewen Li, Paula McConvey

Abstract:

Concussion for speed skaters often occurs when skaters fall on the ice and impact the crash mats during practices and competition races. Gaining insight into the impact of interactions is of essential interest as it is directly related to skaters’ potential health risks and injuries. Precise concussion measurements are challenging and very difficult, making computer simulation the only reliable way to analyze accidents. This research aims to create the crash mat and skater’s multi-body model using Solidworks, develop a computer simulation model for skater-mat impact using ANSYS software, and predict the skater’s concussion degree by evaluating the “head injury criteria” (HIC) through the resulting accelerations. The developed method and results help understand the relationship between impact parameters and concussion risk for speed skaters and inform the design of crash mats and skating rink layouts more specifically by considering athletes’ health risks.

Keywords: computer simulation modeling, concussion, impact, speed skater

Procedia PDF Downloads 108
1565 A Virtual Reality Simulation Tool for Reducing the Risk of Building Content during Earthquakes

Authors: Ali Asgary, Haopeng Zhou, Ghassem Tofighi

Abstract:

Use of virtual (VR), augmented reality (AR), and extended reality technologies for training and education has increased in recent years as more hardware and software tools have become available and accessible to larger groups of users. Similarly, the applications of these technologies in earthquake related training and education are on the rise. Several studies have reported promising results for the use of VR and AR for evacuation behaviour and training under earthquake situations. They simulate the impacts that earthquake has on buildings, buildings’ contents, and how building occupants and users can find safe spots or open paths to outside. Considering that considerable number of earthquake injuries and fatalities are linked to the behaviour, our goal is to use these technologies to reduce the impacts of building contents on people. Building on our artificial intelligence (AI) based indoor earthquake risk assessment application that enables users to use their mobile device to assess the risks associated with building contents during earthquakes, we develop a virtual reality application to demonstrate the behavior of different building contents during earthquakes, their associate moving, spreading, falling, and collapsing risks, and their risk mitigation methods. We integrate realistic seismic models, building contents behavior with and without risk mitigation measures in virtual reality environment. The application can be used for training of architects, interior design experts, and building users to enhance indoor safety of the buildings that can sustain earthquakes. This paper describes and demonstrates the application development background, structure, components, and usage.

Keywords: virtual reality, earthquake damage, building content, indoor risks, earthquake risk mitigation, interior design, unity game engine, oculus

Procedia PDF Downloads 58
1564 Belt Conveyor Dynamics in Transient Operation for Speed Control

Authors: D. He, Y. Pang, G. Lodewijks

Abstract:

Belt conveyors play an important role in continuous dry bulk material transport, especially at the mining industry. Speed control is expected to reduce the energy consumption of belt conveyors. Transient operation is the operation of increasing or decreasing conveyor speed for speed control. According to literature review, current research rarely takes the conveyor dynamics in transient operation into account. However, in belt conveyor speed control, the conveyor dynamic behaviors are significantly important since the poor dynamics might result in risks. In this paper, the potential risks in transient operation will be analyzed. An existing finite element model will be applied to build a conveyor model, and simulations will be carried out to analyze the conveyor dynamics. In order to realize the soft speed regulation, Harrison’s sinusoid acceleration profile will be applied, and Lodewijks estimator will be built to approximate the required acceleration time. A long inclined belt conveyor will be studied with two major simulations. The conveyor dynamics will be given.

Keywords: belt conveyor , speed control, transient operation, dynamics

Procedia PDF Downloads 299
1563 An Approach to Tackle Start up Problems Using Applied Games

Authors: Aiswarya Gopal, Kamal Bijlani, Vinoth Rengaraj, R. Jayakrishnan

Abstract:

In the business world, the term “startup” is frequently ringing the bell with the high frequency of young ventures. The main dilemma of startups is the unsuccessful management of the unique risks that have to be confronted in the present world of competition and technology. This research work tried to bring out a game based methodology to improve enough real-world experience among entrepreneurs as well as management students to handle risks and challenges in the field. The game will provide experience to the player to overcome challenges like market problems, running out of cash, poor management, and product problems which can be resolved by a proper strategic approach in the entrepreneurship world. The proposed serious game works on the life cycle of a new software enterprise where the entrepreneur moves from the planning stage to secured financial stage, laying down the basic business structure, and initiates the operations ensuring the increment in confidence level of the player.

Keywords: business model, game based learning, poor management, start up

Procedia PDF Downloads 451
1562 Potential Risks of Using Disconnected Composite Foundation Systems in Active Seismic Zones

Authors: Mohamed ElMasry, Ahmad Ragheb, Tareq AbdelAziz, Mohamed Ghazy

Abstract:

Choosing the suitable infrastructure system is becoming more challenging with the increase in demand for heavier structures contemporarily. This is the case where piled raft foundations have been widely used around the world to support heavy structures without extensive settlement. In the latter system, piles are rigidly connected to the raft, and most of the load goes to the soil layer on which the piles are bearing. In spite of that, when soil profiles contain thicker soft clay layers near the surface, or at relatively shallow depths, it is unfavorable to use the rigid piled raft foundation system. Consequently, the disconnected piled raft system was introduced as an alternative approach for the rigidly connected system. In this system, piles are disconnected from the raft using a cushion of soil, mostly of a granular interlayer. The cushion is used to redistribute the stresses among the piles and the subsoil. Piles are also used to stiffen the subsoil, and by this way reduce the settlement without being rigidly connected to the raft. However, the seismic loading effect on such disconnected foundation systems remains a problem, since the soil profiles may include thick clay layers which raise risks of amplification of the dynamic earthquake loads. In this paper, the effects of seismic behavior on the connected and disconnected piled raft systems are studied through a numerical model using Midas GTS NX Software. The study concerns the soil-structure interaction and the expected behavior of the systems. Advantages and disadvantages of each foundation approach are studied, and a comparison between the results are presented to show the effects of using disconnected piled raft systems in highly seismic zones. This was done by showing the excitation amplification in each of the foundation systems.

Keywords: soil-structure interaction, disconnected piled-raft, risks, seismic zones

Procedia PDF Downloads 235
1561 Environmental Pollution and Health Risks of Residents Living near Ewekoro Cement Factory, Ewekoro, Nigeria

Authors: Michael Ajide Oyinloye

Abstract:

The natural environment is made up of air, water and soil. The release of emission of industrial waste into anyone of the components of the environment causes pollution. Industrial pollution significantly threatens the inherent right of people, to the enjoyment of a safe and secure environment. The aim of this paper is to assess the effect of environmental pollution and health risks of residents living near Ewekoro Cement factory. The research made use of IKONOS imagery for Geographical Information System (GIS) to buffer and extract buildings that are less than 1 km to the plant, within 1 km to 5 km and above 5 km to the factory. Also, a questionnaire was used to elicit information on the socio-economic factors, the effect of environmental pollution on residents and measures adopted to control industrial pollution on the residents. Findings show that most buildings that between less than 1 km and 1 km to 5 km to the factory have high health risk in the study area. The study recommended total relocation for the residents of the study area to reduce risk health problems.

Keywords: environmental pollution, health risk, GIS, satellite imagery, ewekoro

Procedia PDF Downloads 510
1560 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 127
1559 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 66
1558 Analysis of Exponential Distribution under Step Stress Partially Accelerated Life Testing Plan Using Adaptive Type-I Hybrid Progressive Censoring Schemes with Competing Risks Data

Authors: Ahmadur Rahman, Showkat Ahmad Lone, Ariful Islam

Abstract:

In this article, we have estimated the parameters for the failure times of units based on the sampling technique adaptive type-I progressive hybrid censoring under the step-stress partially accelerated life tests for competing risk. The failure times of the units are assumed to follow an exponential distribution. Maximum likelihood estimation technique is used to estimate the unknown parameters of the distribution and tampered coefficient. Confidence interval also obtained for the parameters. A simulation study is performed by using Monte Carlo Simulation method to check the authenticity of the model and its assumptions.

Keywords: adaptive type-I hybrid progressive censoring, competing risks, exponential distribution, simulation, step-stress partially accelerated life tests

Procedia PDF Downloads 319
1557 Early Detection of Lymphedema in Post-Surgery Oncology Patients

Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar

Abstract:

Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.

Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes

Procedia PDF Downloads 104
1556 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa

Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq

Abstract:

The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.

Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa

Procedia PDF Downloads 60
1555 The Structuring of Economic of Brazilian Innovation and the Institutional Proposal to the Legal Management for Global Conformity to Treat the Technological Risks

Authors: Daniela Pellin, Wilson Engelmann

Abstract:

Brazil has sought to accelerate your development through technology and innovation as a response to the global influences, which has received in internal management practices. For this, it had edited the Brazilian Law of Innovation 13.243/2016. However observing the Law overestimated economic aspects the respective application will not consider the stakeholders and the technological risks because there is no legal treatment. The economic exploitation and the technological risks must be controlled by limits of democratic system to find better social development to contribute with the economics agents for making decision to conform with global directions. The research understands this is a problem to face given the social particularities of the country because there has been the literal import of the North American Triple Helix Theory consolidated in developed countries and the negative consequences when applied in developing countries. Because of this symptomatic scenario, it is necessary to create adjustment to conduct the management of the law besides social democratic interests to increase the country development. For this, therefore, the Government will have to adopt some conducts promoting side by side with universities, civil society and companies, informational transparency, catch of partnerships, create a Confort Letter document for preparation to ensure the operation, joint elaboration of a Manual of Good Practices, make accountability and data dissemination. Also the Universities must promote informational transparency, drawing up partnership contracts and generating revenue, development of information. In addition, the civil society must do data analysis about proposals received for discussing to give opinion related. At the end, companies have to give public and transparent information about investments and economic benefits, risks and innovation manufactured. The research intends as a general objective to demonstrate that the efficiency of the propeller deployment will be possible if the innovative decision-making process goes through the institutional logic. As specific objectives, the American influence must undergo some modifications to better suit the economic-legal incentives to potentiate the development of the social system. The hypothesis points to institutional model for application to the legal system can be elaborated based on emerging characteristics of the country, in such a way that technological risks can be foreseen and there will be global conformity with attention to the full development of society as proposed by the researchers.The method of approach will be the systemic-constructivist with bibliographical review, data collection and analysis with the construction of the institutional and democratic model for the management of the Law.

Keywords: development, governance of law, institutionalization, triple helix

Procedia PDF Downloads 121
1554 Recurrent Neural Networks for Complex Survival Models

Authors: Pius Marthin, Nihal Ata Tutkun

Abstract:

Survival analysis has become one of the paramount procedures in the modeling of time-to-event data. When we encounter complex survival problems, the traditional approach remains limited in accounting for the complex correlational structure between the covariates and the outcome due to the strong assumptions that limit the inference and prediction ability of the resulting models. Several studies exist on the deep learning approach to survival modeling; moreover, the application for the case of complex survival problems still needs to be improved. In addition, the existing models need to address the data structure's complexity fully and are subject to noise and redundant information. In this study, we design a deep learning technique (CmpXRnnSurv_AE) that obliterates the limitations imposed by traditional approaches and addresses the above issues to jointly predict the risk-specific probabilities and survival function for recurrent events with competing risks. We introduce the component termed Risks Information Weights (RIW) as an attention mechanism to compute the weighted cumulative incidence function (WCIF) and an external auto-encoder (ExternalAE) as a feature selector to extract complex characteristics among the set of covariates responsible for the cause-specific events. We train our model using synthetic and real data sets and employ the appropriate metrics for complex survival models for evaluation. As benchmarks, we selected both traditional and machine learning models and our model demonstrates better performance across all datasets.

Keywords: cumulative incidence function (CIF), risk information weight (RIW), autoencoders (AE), survival analysis, recurrent events with competing risks, recurrent neural networks (RNN), long short-term memory (LSTM), self-attention, multilayers perceptrons (MLPs)

Procedia PDF Downloads 57
1553 Enzyme Linked Immuno Sorbent Assay Based Detection of Aflatoxin M1 and Ochratoxin A in Raw Milk in Punjab, India

Authors: Pallavi Moudgil, J. S. Bedi, R. S. Aulakh, J. P. S. Gill

Abstract:

Mycotoxins in milk are of major public health concern. The present study was envisaged with an aim to monitor the occurrence of aflatoxin M1 and ochratoxin A in raw milk samples collected from individual animals from dairy farms located in Punjab (India). A total of 168 raw milk samples were collected and analysed using competitive ELISA kits. Out of these, 9 (5.4%) samples were found positive for aflatoxin M1 with the mean concentration of 0.006-0.13 ng/ml and 2 (1.2%) samples exceeded the established maximum residue limit of 0.05 ng/ml established by the European Union. For ochratoxin A, 2 (0.1%) samples were found positive with the mean concentration of 0.61-0.83 ng/ml with both the samples below the established maximum residue limit of 2 ng/ml. The results showed that the milk of dairy cattle is safe with respect to ochratoxin A contamination but occurrence of aflatoxin M1 above maximum residue limit suggested that feed contaminated with mycotoxins might have been offered to dairy cattle that can pose serious health risks to consumers.

Keywords: Aflatoxin M1, health risks, maximum residue limit, milk, Ochratoxin A

Procedia PDF Downloads 456
1552 Identification of CLV for Online Shoppers Using RFM Matrix: A Case Based on Features of B2C Architecture

Authors: Riktesh Srivastava

Abstract:

Online Shopping have established an astonishing evolution in the last few years. And it is now apparent that B2C architecture is becoming progressively imperative channel for even traditional brick and mortar type traders as well. In this completion knowing customers and predicting behavior are extremely important. More important, when any customer logs onto the B2C architecture, the traces of their buying patterns can be stored and used for future predictions. Such a prediction is called Customer Lifetime Value (CLV). Earlier, we used Net Present Value to do so, however, it ignores two important aspects of B2C architecture, “market risks” and “big amount of customer data”. Now, we use RFM- Recency, Frequency and Monetary Value to estimate the CLV, and as the term exemplifies, market risks, is well sheltered. Big Data Analysis is also roofed in RFM, which gives real exploration of the Big Data and lead to a better estimation for future cash flow from customers. In the present paper, 6 factors (collected from varied sources) are used to determine as to what attracts the customers to the B2C architecture. For these 6 factors, RFM is computed for 3 years (2013, 2014 and 2015) respectively. CLV and Revenue are the two parameters defined using RFM analysis, which gives the clear picture of the future predictions.

Keywords: CLV, RFM, revenue, recency, frequency, monetary value

Procedia PDF Downloads 193
1551 Application of Failure Mode and Effects Analysis (FMEA) on the Virtual Process Hazard Analysis of Acetone Production Process

Authors: Princes Ann E. Prieto, Denise F. Alpuerto, John Rafael C. Unlayao, Neil Concibido, Monet Concepcion Maguyon-Detras

Abstract:

Failure Mode and Effects Analysis (FMEA) has been used in the virtual Process Hazard Analysis (PHA) of the Acetone production process through the dehydrogenation of isopropyl alcohol, for which very limited process risk assessment has been published. In this study, the potential failure modes, effects, and possible causes of selected major equipment in the process were identified. During the virtual FMEA mock sessions, the risks in the process were evaluated and recommendations to reduce and/or mitigate the process risks were formulated. The risk was estimated using the calculated risk priority number (RPN) and was classified into four (4) levels according to their effects on acetone production. Results of this study were also used to rank the criticality of equipment in the process based on the calculated criticality rating (CR). Bow tie diagrams were also created for the critical hazard scenarios identified in the study.

Keywords: chemical process safety, failure mode and effects analysis (FMEA), process hazard analysis (PHA), process safety management (PSM)

Procedia PDF Downloads 105
1550 Scaling up Potato Economic Opportunities: Evaluation of Youths Participation in Potato Value Chain in Nigeria

Authors: Chigozirim N. Onwusiribe, Jude A. Mbanasor

Abstract:

The potato value chain when harnessed can engage numerous youths and aid in the fight against poverty, malnutrition and unemployment. This study seeks to evaluate the level of youth participation in the potato value chain in Nigeria. Specifically, this study will examine the extent of youth participation in potato value chain, analyze the cost, benefits and sustainability of youth participation in the potato value chain, identify the factors that can propel or hinder youth participation in the potato value chain and make recommendations that will result in the increase in youth employment in the potato value chain. This study was conducted in the North Central and South East geopolitical zones of Nigeria. A multi stage sampling procedure was used to select 540 youths from the study areas. Focused group discussions and survey approach was used to elicit the required data. The data were analyzed using statistical and econometric tools. The study revealed that the potato value chain is very profitable.

Keywords: value, chain, potato, youth, enterprise

Procedia PDF Downloads 115
1549 Understanding Tacit Knowledge and DIKW

Authors: Bahadir Aydin

Abstract:

Today it is difficult to reach accurate knowledge because of mass data. This huge data makes the environment more and more caotic. Data is a main piller of intelligence. There is a close tie between knowledge and intelligence. Information gathered from different sources can be modified, interpreted and classified by using knowledge development process. This process is applied in order to attain intelligence. Within this process the effect of knowledge is crucial. Knowledge is classified as explicit and tacit knowledge. Tacit knowledge can be seen as "only the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose for all organization is to be succesful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. By the help of process the decision-maker can be presented with a clear holistic understanding, as early as possible in the decision making process. Planning, execution and assessments are the key functions that connects to information to knowledge. Altering from the current traditional reactive approach to a proactive knowledge development approach would reduce extensive duplication of work in the organization. By new approach to this process, knowledge can be used more effectively.

Keywords: knowledge, intelligence cycle, tacit knowledge, KIDW

Procedia PDF Downloads 494
1548 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 75
1547 PTSD in Peacekeepers: A Systematic Review

Authors: Laura Rodrigues Carmona, Maria José Chambel, Vânia Sofia Carvalho

Abstract:

Background: In peacekeeping operations, military personnel are often exposed to the same traumatic stress factors found during conventional war and may also be subject to the physical risks and psychological stressors associated with posttraumatic stress disorder (PTSD). Objectives: To discuss the prevalence of PTSD among peacekeepers as well as the risks of and protective factors against this disorder and its comorbidities and/or consequences. Methods: A systematic literature search was performed with relevant keywords, and 53 articles were identified for this review. Results and conclusions: Military personnel deployed in peacekeeping operations have a higher prevalence of PTSD than nonmilitary personnel, a prevalence similar to that of military personnel deployed in war situations. Concerning the salient risk factors, the contextual factors are highlighted, and in regard to the protective factors, the individual factors are highlighted. This study thus demonstrates that there are factors in which the role of the military is essential, via both its selection and monitoring of peacekeepers during and after their deployment, to protect deployed personnel’s mental health.

Keywords: peacekeepers, peacekeeping, military, PTSD, post-traumatic stress disorder, posttraumatic stress disorder

Procedia PDF Downloads 46
1546 Development of Risk-Based Dam Safety Framework in Climate Change Condition for Batu Dam, Malaysia

Authors: Wan Noorul Hafilah Binti Wan Ariffin

Abstract:

Dam safety management is the crucial infrastructure as dam failure has a catastrophic effect on the community. Dam safety management is the effective framework of key actions and activities for the dam owner to manage the safety of the dam for its entire life cycle. However, maintaining dam safety is a challenging task as there are changes in current dam states. These changes introduce new risks to the dam's safety, which had not been considered when the dam was designed. A new framework has to be developed to adapt to the changes in the dam risk and make the dams resilient. This study proposes a risk-based decision-making adaptation framework for dam safety management. The research focuses on climate change's impact on hydrological situations as it causes floods and damages the dam structure. The risk analysis framework is adopted to improve the dam management strategies. The proposed study encompasses four phases. To start with, measuring the effect by assessing the impact of climate change on embankment dam, the second phase is to analyze the potential embankment dam failures. The third is analyzing the different components of risks related to the dam and, finally, developing a robust decision-making framework.

Keywords: climate change, embankment dam, failure, risk-informed decision making

Procedia PDF Downloads 116
1545 Classification of Health Risk Factors to Predict the Risk of Falling in Older Adults

Authors: L. Lindsay, S. A. Coleman, D. Kerr, B. J. Taylor, A. Moorhead

Abstract:

Cognitive decline and frailty is apparent in older adults leading to an increased likelihood of the risk of falling. Currently health care professionals have to make professional decisions regarding such risks, and hence make difficult decisions regarding the future welfare of the ageing population. This study uses health data from The Irish Longitudinal Study on Ageing (TILDA), focusing on adults over the age of 50 years, in order to analyse health risk factors and predict the likelihood of falls. This prediction is based on the use of machine learning algorithms whereby health risk factors are used as inputs to predict the likelihood of falling. Initial results show that health risk factors such as long-term health issues contribute to the number of falls. The identification of such health risk factors has the potential to inform health and social care professionals, older people and their family members in order to mitigate daily living risks.

Keywords: classification, falls, health risk factors, machine learning, older adults

Procedia PDF Downloads 117
1544 Internet, Fake News, and Democracy: The Case of Kosovo

Authors: Agrinë Baraku

Abstract:

This paper focuses on the convergence of the internet, fake news, and democracy. This paper will examine the convergence of these concepts, the tenets of democracy which are affected by the ever-increasing exposure to fake news, and whether the impact strengthens or can further weaken countries with fragile democracies. To demonstrate the convergence and the impact and to further the discussion about this topic, the case of Kosovo is explored. Its position in the Western Balkans makes it even more susceptible to the pressure stemming from geopolitical interests, which intersect with the generation of fake news by different international actors. Domestically, through data generated by Kantar (Index) Kosova Longitudinal Study on Media Measurement Survey (MMS), which focused on media viewership, the trend among Kosovar citizens is traced and then inserted into a bigger landscape, which is compounded by tenuous circumstances and challenges that Kosovo faces. Attention will be paid to what this can tell about where Kosovo currently is and the possibilities of what can be done regarding the phenomenon that is taking place.

Keywords: democracy, disinformation, internet, social media, fake news

Procedia PDF Downloads 68
1543 Creating a New Agenda for Foreign Direct Investment: Intersectoral Competition and Knowledge Management Issues in Trinidad and Tobago's Construction Industry

Authors: Shelly-Ann Gajadhar

Abstract:

Over the last twenty years, the traditional economic motivations of foreign direct investment have been amalgamated with geopolitical motivations. This is evidenced by the extensive ratification of bilateral investment treaties (BIT) globally and the emergence of state-owned multinational companies (SOMNCs) that directly compete with local domestic enterprises (LDE). This paper investigates the impact that Chinese SOMNCs have on LDEs within Trinidad and Tobago’s construction sector and, determines whether knowledge transfer occurs. The paper employed semi-structured interviews of industry experts and concluded that LDEs predominantly experience adverse spillovers, inclusive of a long-term competition effect, with no technology transfer occurring.

Keywords: foreign direct investment, bilateral investment treaties, knowledge transfer, international business, Caribbean

Procedia PDF Downloads 228