Results (5)
Search Parameters:
Keyword: Risk managementRisk Management: The Case of Intrusion Detection using Data Mining Techniques
Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…
Read MoreAnalysis of Long-term Equilibrium Relationship Between KRW, RMB, JPY Exchange Rates and International Financial Market Variables: Comparative Analysis of KRW, RMB, JPY
This study used 15 VECM analysis models to analyze the relationship among exchange rates of South Korea, China and Japan; and between exchange rates of each country and international financial market variables. The analysis variables are the Won, Yuan, Yen spot exchange rates and international financial market variables. The results of the analysis are as…
Read MoreWarehouse Relocation of a Company in the Automotive Industry Using P-median
To have enough information on time can be helpful when companies try to reduce costs and operate more efficiently. An international company that supplies parts for the automotive industry is currently testing its new facilities in Mexico. The relocation of the raw materials and finished goods warehouses were tested using a P-Median model. The operating…
Read MoreStoring and Transporting Hazardous Material, Logistics Strategies for Moroccan Companies
Companies manufacturing, using or transporting hazardous materials (HM) face risks at every link in their supply chain. Industrial activities related to this type of material expose not only the workers, but also the population and environment to serious risks. Logistic management and risk management are often considered independent. However, logistics choices related to hazardous materials…
Read MoreEstimation of Software Development Project Success using Fuzzy Logics
To date, software development is vital since software is a critical element in information technology. Requirements gathering, planning, estimation, estimation, development, collaboration, testing, and deployment. The problem is when it is delivered, so it reduces the risk of the problem which could happen is important. Threat prediction should be made. It will be aimed at…
Read More
