Abstract: Generally the natural environment is made up of air,
water and soil. The release of emission of industrial waste into
anyone of the components of the environment causes pollution.
Industrial pollution significantly threatens the inherent right of
people, to the enjoyment of a safe and secure environment. The aim
of this paper is to assess the effect of environmental pollution and
health risks of residents living near Ewekoro cement factory. The
research made use of IKONOS imagery for Geographical
Information System (GIS) to buffer and extract buildings that are less
than 1km to the factory, within 1km to 5km and above 5km to the
factory. Also questionnaire was used to elicit information on the
socio-economic factors, effect of environmental pollution on
residents and measures adopted to control industrial pollution on the
residents. Findings show that most buildings that fall between less
than 1km and 1km to 5km to the factory have high health risk in the
study area. The study recommended total relocation for the residents
of the study area to reduce health risk problems.
Abstract: A knowledge-based expert system with the acronym
RASPE is developed as an application tool to help decision makers in
construction companies make informed decisions about managing
risks in pipeline construction projects. Choosing to use expert
systems from all available artificial intelligence techniques is due to
the fact that an expert system is more suited to representing a
domain’s knowledge and the reasoning behind domain-specific
decisions. The knowledge-based expert system can capture the
knowledge in the form of conditional rules which represent various
project scenarios and potential risk mitigation/response actions. The
built knowledge in RASPE is utilized through the underlying
inference engine that allows the firing of rules relevant to a project
scenario into consideration. Paper provides an overview of the
knowledge acquisition process and goes about describing the
knowledge structure which is divided up into four major modules.
The paper shows one module in full detail for illustration purposes
and concludes with insightful remarks.
Abstract: Vegetation affects the mean and turbulent flow
structure. It may increase flood risks and sediment transport.
Therefore, it is important to develop analytical approaches for the bed
shear stress on vegetated bed, to predict resistance caused by
vegetation. In the recent years, experimental and numerical models
have both been developed to model the effects of submerged
vegetation on open-channel flow. In this paper, different analytic
models are compared and tested using the criteria of deviation, to
explore their capacity for predicting the mean velocity and select the
suitable one that will be applied in real case of rivers. The
comparison between the measured data in vegetated flume and
simulated mean velocities indicated, a good performance, in the case
of rigid vegetation, whereas, Huthoff model shows the best
agreement with a high coefficient of determination (R2=80%) and the
smallest error in the prediction of the average velocities.
Abstract: The development, operation and maintenance of
Integrated Waste Management Systems (IWMS) affects essentially
the sustainable concern of every region. The features of such systems
have great influence on all of the components of sustainability. In
order to reach the optimal way of processes, a comprehensive
mapping of the variables affecting the future efficiency of the system
is needed such as analysis of the interconnections among the
components and modeling of their interactions. The planning of a
IWMS is based fundamentally on technical and economical
opportunities and the legal framework. Modeling the sustainability
and operation effectiveness of a certain IWMS is not in the scope of
the present research. The complexity of the systems and the large
number of the variables require the utilization of a complex approach
to model the outcomes and future risks. This complex method should
be able to evaluate the logical framework of the factors composing
the system and the interconnections between them. The authors of
this paper studied the usability of the Fuzzy Cognitive Map (FCM)
approach modeling the future operation of IWMS’s. The approach
requires two input data set. One is the connection matrix containing
all the factors affecting the system in focus with all the
interconnections. The other input data set is the time series, a
retrospective reconstruction of the weights and roles of the factors.
This paper introduces a novel method to develop time series by
content analysis.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: Nowadays, the successful implementation of ICTs is
vital for almost any kind of organization. Good governance and ICT
management are essential for delivering value, managing
technological risks, managing resources and performance
measurement. In addition, outsourcing is a strategic IT service
solution which complements IT services provided internally in
organizations. This paper proposes the measurement tools of a new
holistic maturity model based on standards ISO/IEC 20000 and
ISO/IEC 38500, and the frameworks and best practices of ITIL and
COBIT, with a specific focus on IT outsourcing. These measurement
tools allow independent validation and practical application in the
field of higher education, using a questionnaire, metrics tables, and
continuous improvement plan tables as part of the measurement
process. Guidelines and standards are proposed in the model for
facilitating adaptation to universities and achieving excellence in the
outsourcing of IT services.
Abstract: Climate change confronts the built environment with
many new challenges in the form of more severe and frequent hydrometeorological
events. A series of strategies is proposed whereby the
various aspects of buildings and their sites can be made more resilient
to the effects of such events.
Abstract: The purpose of this study was to investigate
perceptions of climate change risk to forest ecosystems and forestbased
communities as well as perceived effectiveness of adaptation
strategies for climate change as well as challenges for adaptation.
Data was gathered using a pre-tested semi-structured questionnaire.
Simple random selection technique was applied. For the majority of
issues, the responses were obtained on multi-point likert scales, and
the scores provided were, in turn, used to estimate the means and
other useful estimates. A composite knowledge index developed
using correct responses to a set of self-rated statements were used to
evaluate the issues. The mean of the knowledge index was 0.64. Also
all respondents recorded values of the knowledge index above 0.25.
Increase forest fire was perceived by respondents as the greatest risk
to forest eco-system. Decrease access to water supplies was perceived
as the greatest risk to livelihoods of forest based communities. The
most effective adaptation strategy relevant to climate change risks to
forest eco-systems and forest based communities livelihoods in
Kathmandu valley in Nepal as perceived by the respondents was
reforestation and afforestation. As well, lack of public awareness was
perceived as the major limitation for climate change adaptation.
However, perceived risks as well as effective adaptation strategies
showed an inconsistent association with knowledge indicators and
social-cultural variables. The results provide useful information to
any party who involve with climate change issues in Nepal, since
such attempts would be more effective once the people’s perceptions
on these aspects are taken into account.
Abstract: Most quality models have defined usability as a
significant factor that leads to improving product acceptability,
increasing user satisfaction, improving product reliability, and also
financially benefitting companies. Usability is also the best factor that
balances both the technical and human aspects of a software product,
which is an important aspect in defining quality during software
development process. A usability risk consist risk factors that could
impact the usability of a software product thereby contributing to
negative user experiences and causing a possible software product
failure. Hence, it is important to mitigate and reduce usability risks in
the software development process itself. By managing possible
usability risks in software development process, failure of software
product could be reduced. Therefore, this research uses the Delphi
method to identify mitigation plans for reducing potential usability
risks. The Delphi method is conducted with seven experts from the
field of risk management and software development.
Abstract: Innovations not only contribute to competitiveness of
the company but have also positive effects on revenues. On average,
product innovations account to 14 percent of companies’ sales.
Innovation management has substantially changed during the last
decade, because of growing reliance on external partners. As a
consequence, a new task for purchasing arises, as firms need to
understand which suppliers actually do have high potential
contributing to the innovativeness of the firm and which do not.
Proper organization of the purchasing function is important since
for the majority of manufacturing companies deal with substantial
material costs which pass through the purchasing function. In the past
the purchasing function was largely seen as a transaction-oriented,
clerical function but today purchasing is the intermediate with supply
chain partners contributing to innovations, be it product or process
innovations. Therefore, purchasing function has to be organized
differently to enable firm innovation potential.
However, innovations are inherently risky. There are behavioral
risk (that some partner will take advantage of the other party),
technological risk in terms of complexity of products and processes
of manufacturing and incoming materials and finally market risks,
which in fact judge the value of the innovation. These risks are
investigated in this work. Specifically, technological risks which deal
with complexity of the products, and processes will be investigated
more thoroughly. Buying components or such high edge technologies
necessities careful investigation of technical features and therefore is
usually conducted by a team of experts. Therefore it is hypothesized
that higher the technological risk, higher will be the centralization of
the purchasing function as an interface with other supply chain
members.
Main contribution of this research lies is in the fact that analysis
was performed on a large data set of 1493 companies, from 25
countries collected in the GMRG 4 survey. Most analyses of
purchasing function are done by case study analysis of innovative
firms. Therefore this study contributes with empirical evaluations that
can be generalized.
Abstract: An anthropometric study applied to 1,115 students of
the Faculty of Chemical Sciences and Engineering of the
Autonomous University of California. Thirteen individual
measurements were taken in a sitting position. The results obtained
allow forming a reliable anthropometric database for statistical
studies and analysis and inferences of specific distributions, so the
opinion of experts in occupational medicine recommendations may
emit to reduce risks resulting in an alteration of the vital signs during
the execution of their school activities. Another use of these analyses
is to use them as a reliable reference for future deeper research, to the
design of spaces, tools, utensils, workstations, with anthropometric
dimensions and ergonomic characteristics suitable to use.
Abstract: The work proposes a decision support methodology
for the credit risk minimization in selection of investment projects.
The methodology provides two stages of projects’ evaluation.
Preliminary selection of projects with minor credit risks is made
using the Expertons Method. The second stage makes ranking of
chosen projects using the Possibilistic Discrimination Analysis
Method. The latter is a new modification of a well-known Method of
Fuzzy Discrimination Analysis.
Abstract: In this paper, we present a new maintenance model
for a partially observable system subject to two failure modes,
namely a catastrophic failure and a failure due to the system
degradation. The system is subject to condition monitoring and the
degradation process is described by a hidden Markov model. A
cost-optimal Bayesian control policy is developed for maintaining
the system. The control problem is formulated in the semi-Markov
decision process framework. An effective computational algorithm is
developed, illustrated by a numerical example.
Abstract: Recent growth in digital multimedia technologies has presented a lot of facilities in information transmission, reproduction and manipulation. Therefore, the concept of information security is one of the superior articles in the present day situation. The biometric information security is one of the information security mechanisms. It has the advantages as well as disadvantages. The biometric system is at risk to a range of attacks. These attacks are anticipated to bypass the security system or to suspend the normal functioning. Various hazards have been discovered while using biometric system. Proper use of steganography greatly reduces the risks in biometric systems from the hackers. Steganography is one of the fashionable information hiding technique. The goal of steganography is to hide information inside a cover medium like text, image, audio, video etc. through which it is not possible to detect the existence of the secret information. Here in this paper a new security concept has been established by making the system more secure with the help of steganography along with biometric security. Here the biometric information has been embedded to a skin tone portion of an image with the help of proposed steganographic technique.
Abstract: It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.
Abstract: In this paper, we investigate the residual life prediction
problem for a partially observable system subject to two failure
modes, namely a catastrophic failure and a failure due to the system
degradation. The system is subject to condition monitoring and the
degradation process is described by a hidden Markov model with
unknown parameters. The parameter estimation procedure based on
an EM algorithm is developed and the formulas for the conditional
reliability function and the mean residual life are derived, illustrated
by a numerical example.
Abstract: Recent changes in supply chains, especially globalization and collaboration, have created new risks for enterprises of all sizes. A variety of complex frameworks, often based on enterprise risk management strategies have been presented under the heading of Supply Chain Risk Management (SCRM). The literature on promotes the benefits of a robust SCRM strategy; however, implementing SCRM is difficult and resource demanding for Large Enterprises (LEs), and essentially out of reach for Small & Medium Enterprises (SMEs). This research debunks the idea that SCRM is necessary for all enterprises and instead proposes a simple and effective Vendor Selection Template (VST). Empirical testing and a survey of supply chain practitioners provide a measure of validation to the VST. The resulting VSTis a valuable contribution because is easy to use, provides practical results, and is sufficiently flexible to be universally applied to SMEs.
Abstract: The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.
Abstract: Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.
Abstract: This research presents the first comprehensive survey of congener profiles (7 indicator congeners) of polybrominated diphenyl ethers (PBDEs) in sediment samples covering ten sites in CauBay River, Vietnam. Chemical analyses were carried out in gas chromatography–mass spectrometry (GC–MS) for tri- to hepta- brominated congeners. Results pointed out a non-homogenous contamination of the sediment with ∑7 PBDE values ranging from 8.93 to 25.64ng g−1, reflecting moderate to low contamination closely in conformity to other Asian aquatic environments. The general order of decreasing congener contribution to the total load was: BDE 47 > 99 > 100 > 154, similar to the distribution pattern worldwide. PBDEs had rare risks in the sediment of studied area. However, due to the propensity of PBDEs to accumulate in various compartments of wildlife and human food webs, evaluation of biological tissues should be undertaken as a high priority.