Results (128)
Search Parameters:
Keyword: RiskAn Empirical Comparison of Different Two-Factor Models in the Context of Portfolio Optimisation
The crisis linked to the COVID-19 and the uncertainty it generates in the unprecedented health, societal, economic and financial fields have had a strong impact on the stock markets. Indeed, in such a climate of very high uncertainty, it is to be expected that the excessive stock market price movements will continue, with both declines…
Read MoreA Typological Study of Portuguese Mortality from Non-communicable Diseases
The most common non-communicable diseases, such as cardiovascular diseases and cancer, are a problem in global and national growth. The World Health Organization considers it a priority to study the specific causes of these diseases for trend monitoring. The aim of this paper is to identify a hierarchy of clusters of Portuguese mortality by non-communicable…
Read MoreA Hybrid Mod
The ability to verify the critical risk factors related to an effective diagnosis is very crucial for improving accuracy on coronary heart disease prediction. The objective of this research is to find the best predictive model for coronary heart disease diagnosis. Three approaches are set up to achieve the goals (1) investigating the classifier algorithms…
Read MoreCase Study to Determine the Causes of Fire in Agriculture
The aim of this paper is to identify a critical link in the man – machine – environment system in the case of an adverse event, such as a hay baling fire, based on a comprehensive risk assessment method. The rate of spread of fires in agriculture depends on meteorological conditions, with large areas affected…
Read MoreAn Explanatory Review on Cybersecurity Capability Maturity Models
Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…
Read MoreA CNN-based Differential Image Processing Approach for Rainfall Classification
With the aim of preventing hydro-geological risks and overcoming the problems of current rain gauges, this paper proposes a low-complexity and cost-effective video rain gauge. In particular, in this paper the authors propose a new approach to rainfall classification based on image processing and video matching process employing convolutional neural networks (CNN). The system consists…
Read MoreComputational Intelligence and Statistical Learning Performances on Predicting Dengue Incidence using Remote Sensing Data
Dengue is a viral infection disease transmitted to people through the bite of specific mosquito species living in a tropical zone. According to the World Health Organization, dengue has been listed among the top-ten diseases for 2019 as it makes 3.9 billion people in 128 countries be at risk of infection. One major cause of…
Read MoreUtilization of Data Mining to Predict Non-Performing Loan
In the banking industry, the existence of problem loans is inevitable. NPL (Non-Performing Loan) will certainly have an impact on the reduction in the capital of a bank. One good step in reducing the risk of credit default or the emergence of non-performing loans is to take proper care of debtors who begin to experience…
Read MoreWarehouse Relocation of a Company in the Automotive Industry Using P-median
To have enough information on time can be helpful when companies try to reduce costs and operate more efficiently. An international company that supplies parts for the automotive industry is currently testing its new facilities in Mexico. The relocation of the raw materials and finished goods warehouses were tested using a P-Median model. The operating…
Read MoreMeasurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia
The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…
Read MorePrognosis of Failure Events Based on Labeled Temporal Petri Nets
To reduce the risk of accidental system shutdowns, we propose to control system developers (supervisor, SCADA) a prediction tool to determine the occurrence date of an imminent failure event. The existing approaches report the rate of occurrence of a future failure event (stochastic method), but do not provide an estimation date of its occurrence. The…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreApproach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection
Fraud, as regards means of payment, means the behavior of any legal or natural one that makes an abnormal or irregular use of a way of payment, elements of it or information contained therein, to improperly obtain an honest, service or enrichment, and or causing financial damage to the one that has distributed the means…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MoreSafety in Industry 4.0: The Multi-Purpose Applications of Augmented Reality in Digital Factories
The digital factory is a concept signing a new era for industry, the so-called Industry 4.0, in which ordinary production systems like manufacturing plants, machineries and utilities are being equipped with diagnostic and sensitive instrumentation to be connected to digital shared networks. This data-sharing, trough the big data management techniques, is a fully integrated base…
Read MoreStoring and Transporting Hazardous Material, Logistics Strategies for Moroccan Companies
Companies manufacturing, using or transporting hazardous materials (HM) face risks at every link in their supply chain. Industrial activities related to this type of material expose not only the workers, but also the population and environment to serious risks. Logistic management and risk management are often considered independent. However, logistics choices related to hazardous materials…
Read MoreVerification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion
With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…
Read MoreAnalysis of Information Security for a Voting Process for Sectional Governments in Ecuador
Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…
Read MoreImprove the Accuracy of Short-Term Forecasting Algorithms by Standardized Load Profile and Support Regression Vector: Case study Vietnam
Short-term load forecasting (STLF) plays an important role in building business strategies, ensuring reliability and safe operation for any electrical system. There are many different methods, including: regression models, time series, neural networks, expert systems, fuzzy logic, machine learning and statistical algorithms used for short-term forecasts. However, the practical requirement is how to minimize the…
Read MorePrediction of Non-Communicable Diseases Using Class Comparison Data Mining
Data mining is recognized as an effective technique for extracting and retrieving valuable information or decision from the vast available data. Because of the nature of the functionality of medical centers and hospitals, their data centers contain a collection of valuable information about their patients. By properly processing these data, different applications can be developed…
Read MoreEffectiveness and Comparison of Digital Substations Over Conventional Substations
The entire electrical system is changing at an abrupt speed since its beginning. With the rapid advance of renewable energies (which are constantly subject to fluctuations), the electricity generation is distributed to countless locations. The traditional model of the unidirectional flow of electricity is leaning towards multidirectional flows. This situation needs significant changes in the…
Read MoreSupporting Better Physical Activity in a Smart City: a Framework for Suggesting and Supervising Walking Paths
The increase of elderly population creates the need to promote healthy aging, with autonomy and independence, for preserving the functional capacity and quality of life as much as possible. To achieve this goal the recommendations include walking a certain amount of steps daily, given that the exact amount of steps changes with age, lesions, and…
Read MoreStress Level Classification Using Heart Rate Variability
The research programme reported in this paper is set within the framework of our research under the theme of ICT support for Active Healthy Ageing (AHA). This longitudinal empirical research is focused on the study of the impact on the management of cardio-vascular disease if supported by sustained health monitoring using wearable connected devices. One…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read More
