CINXE.COM
Search results for: incident information system
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: incident information system</title> <meta name="description" content="Search results for: incident information system"> <meta name="keywords" content="incident information system"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="incident information system" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="incident information system"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 25655</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: incident information system</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25655</span> Design of Incident Information System in IoT Virtualization Platform</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amon%20Olimov">Amon Olimov</a>, <a href="https://publications.waset.org/abstracts/search?q=Umarov%20Jamshid"> Umarov Jamshid</a>, <a href="https://publications.waset.org/abstracts/search?q=Dae-Ho%20Kim"> Dae-Ho Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Chol-U%20Lee"> Chol-U Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryum-Duck%20Oh"> Ryum-Duck Oh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes IoT virtualization platform based incident information system. IoT information based environment is the platform that was developed for the purpose of collecting a variety of data by managing regionally scattered IoT devices easily and conveniently in addition to analyzing data collected from roads. Moreover, this paper configured the platform for the purpose of providing incident information based on sensed data. It also provides the same input/output interface as UNIX and Linux by means of matching IoT devices with the directory of file system and also the files. In addition, it has a variety of approaches as to the devices. Thus, it can be applied to not only incident information but also other platforms. This paper proposes the incident information system that identifies and provides various data in real time as to urgent matters on roads based on the existing USN/M2M and IoT visualization platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=incident%20information%20system" title="incident information system">incident information system</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualization%20platform" title=" virtualization platform"> virtualization platform</a>, <a href="https://publications.waset.org/abstracts/search?q=USN" title=" USN"> USN</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M" title=" M2M"> M2M</a> </p> <a href="https://publications.waset.org/abstracts/29328/design-of-incident-information-system-in-iot-virtualization-platform" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29328.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">351</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25654</span> Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nahid%20Tavakoli">Nahid Tavakoli</a>, <a href="https://publications.waset.org/abstracts/search?q=Asghar%20Ehteshami"> Asghar Ehteshami</a>, <a href="https://publications.waset.org/abstracts/search?q=Akbar%20Hassanzadeh"> Akbar Hassanzadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatemeh%20Amini"> Fatemeh Amini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value<o/oo1). Conclusions: According to ISO/IEC 27002 standards, none of the hospitals were completely complained with to present the best possible Information Security Incident Management. One of the most important aspects to consider when developing the information security incident management policy is to define the roles and responsibilities of the information security incident response team. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20incident%20management" title="information security incident management">information security incident management</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management" title=" information security management"> information security management</a>, <a href="https://publications.waset.org/abstracts/search?q=standards" title=" standards"> standards</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitals" title=" hospitals "> hospitals </a> </p> <a href="https://publications.waset.org/abstracts/38364/investigation-of-information-security-incident-management-based-on-international-standard-isoiec-27002-in-educational-hospitals-in-2014" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">575</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25653</span> e-Learning Security: A Distributed Incident Response Generator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bel%20G%20Raggad">Bel G Raggad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20system" title="decision support system">decision support system</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-Learning%20security" title=" e-Learning security"> e-Learning security</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20response" title=" incident response"> incident response</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection" title=" intrusion detection"> intrusion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20risk" title=" security risk"> security risk</a>, <a href="https://publications.waset.org/abstracts/search?q=statefull%20inspection" title=" statefull inspection"> statefull inspection</a> </p> <a href="https://publications.waset.org/abstracts/23292/e-learning-security-a-distributed-incident-response-generator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23292.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25652</span> Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bagus%20Hanindhito">Bagus Hanindhito</a>, <a href="https://publications.waset.org/abstracts/search?q=Fariz%20Azmi%20Pratama"> Fariz Azmi Pratama</a>, <a href="https://publications.waset.org/abstracts/search?q=Ulfah%20Nadiya"> Ulfah Nadiya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20information%20system" title="academic information system">academic information system</a>, <a href="https://publications.waset.org/abstracts/search?q=academic%20crime" title=" academic crime"> academic crime</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensic" title=" digital forensic"> digital forensic</a>, <a href="https://publications.waset.org/abstracts/search?q=high-availability%20server%20and%20storage" title=" high-availability server and storage"> high-availability server and storage</a>, <a href="https://publications.waset.org/abstracts/search?q=rapid%20evidence%20remote%20acquisition" title=" rapid evidence remote acquisition"> rapid evidence remote acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20incident" title=" security incident"> security incident</a> </p> <a href="https://publications.waset.org/abstracts/95626/rapid-evidence-remote-acquisition-in-high-availability-server-and-storage-system-for-digital-forensic-to-unravel-academic-crime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95626.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25651</span> Continuous FAQ Updating for Service Incident Ticket Resolution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kohtaroh%20Miyamoto">Kohtaroh Miyamoto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As enterprise computing becomes more and more complex, the costs and technical challenges of IT system maintenance and support are increasing rapidly. One popular approach to managing IT system maintenance is to prepare and use an FAQ (Frequently Asked Questions) system to manage and reuse systems knowledge. Such an FAQ system can help reduce the resolution time for each service incident ticket. However, there is a major problem where over time the knowledge in such FAQs tends to become outdated. Much of the knowledge captured in the FAQ requires periodic updates in response to new insights or new trends in the problems addressed in order to maintain its usefulness for problem resolution. These updates require a systematic approach to define the exact portion of the FAQ and its content. Therefore, we are working on a novel method to hierarchically structure the FAQ and automate the updates of its structure and content. We use structured information and the unstructured text information with the timelines of the information in the service incident tickets. We cluster the tickets by structured category information, by keywords, and by keyword modifiers for the unstructured text information. We also calculate an urgency score based on trends, resolution times, and priorities. We carefully studied the tickets of one of our projects over a 2.5-year time period. After the first 6 months, we started to create FAQs and confirmed they improved the resolution times. We continued observing over the next 2 years to assess the ongoing effectiveness of our method for the automatic FAQ updates. We improved the ratio of tickets covered by the FAQ from 32.3% to 68.9% during this time. Also, the average time reduction of ticket resolution was between 31.6% and 43.9%. Subjective analysis showed more than 75% reported that the FAQ system was useful in reducing ticket resolution times. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=FAQ%20system" title="FAQ system">FAQ system</a>, <a href="https://publications.waset.org/abstracts/search?q=resolution%20time" title=" resolution time"> resolution time</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20incident%20tickets" title=" service incident tickets"> service incident tickets</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20system%20maintenance" title=" IT system maintenance"> IT system maintenance</a> </p> <a href="https://publications.waset.org/abstracts/13618/continuous-faq-updating-for-service-incident-ticket-resolution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13618.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25650</span> Major Incident Tier System in the Emergency Department: An Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Catherine%20Bernard">Catherine Bernard</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Ransom"> Paul Ransom</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recent events have prompted emergency planners to re-evaluate their emergency response to major incidents and mass casualties. At the Royal Sussex County Hospital, we have adopted a tiered system comprised of three levels, anticipating an increasing P1, P2 or P3 load. This will aid planning in the golden period between Major Incident ‘Standby,’ and ‘Declared’. Each tier offers step-by-step instructions on appropriate patient movement within and out of the department, as well as suggestions for overflow areas and additional staffing levels. This system can be adapted to individual hospitals and provides concise instructions to be followed in a potentially overwhelming situation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disaster%20planning" title="disaster planning">disaster planning</a>, <a href="https://publications.waset.org/abstracts/search?q=emergency%20preparedness" title=" emergency preparedness"> emergency preparedness</a>, <a href="https://publications.waset.org/abstracts/search?q=major%20incident%20planning" title=" major incident planning"> major incident planning</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20casualty%20event" title=" mass casualty event"> mass casualty event</a> </p> <a href="https://publications.waset.org/abstracts/85011/major-incident-tier-system-in-the-emergency-department-an-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85011.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25649</span> Incident Management System: An Essential Tool for Oil Spill Response</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Heyder%20Alatas">Ali Heyder Alatas</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Xin"> D. Xin</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Nai%20Ming"> L. Nai Ming</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=command%20and%20control" title="command and control">command and control</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20management%20system" title=" incident management system"> incident management system</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20spill%20response" title=" oil spill response"> oil spill response</a>, <a href="https://publications.waset.org/abstracts/search?q=response%20organisation" title=" response organisation"> response organisation</a> </p> <a href="https://publications.waset.org/abstracts/90408/incident-management-system-an-essential-tool-for-oil-spill-response" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90408.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25648</span> Improved Safety Science: Utilizing a Design Hierarchy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ulrica%20Pettersson">Ulrica Pettersson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <h2 style="margin-top:1.0pt;margin-right:0cm;margin-bottom:0cm;margin-left: 0cm;margin-bottom:.0001pt;text-align:justify;text-indent:10.2pt"><span lang="EN-GB" style="font-size: 9pt;">Collection of information on incidents is regularly done through pre-printed incident report forms. These tend to be incomplete and frequently lack essential information. ne consequence is that reports with inadequate information, that do not fulfil analysts’ requirements, are transferred into the analysis process. To improve an incident reporting form, theory in design science, witness psychology and interview and questionnaire research has been used. Previously three experiments have been conducted to evaluate the form and shown significant improved results. The form has proved to capture knowledge, regardless of the incidents’ character or context. The aim in this paper is to describe how design science, in more detail a design hierarchy can be used to construct a collection form for improvements in safety science.<o:p></o:p></span></h2> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20collection" title="data collection">data collection</a>, <a href="https://publications.waset.org/abstracts/search?q=design%20science" title=" design science"> design science</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20reports" title=" incident reports"> incident reports</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20science" title=" safety science"> safety science</a> </p> <a href="https://publications.waset.org/abstracts/58257/improved-safety-science-utilizing-a-design-hierarchy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25647</span> Reaching New Levels: Using Systems Thinking to Analyse a Major Incident Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matthew%20J.%20I.%20Woolley">Matthew J. I. Woolley</a>, <a href="https://publications.waset.org/abstracts/search?q=Gemma%20J.%20M.%20Read"> Gemma J. M. Read</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20M.%20Salmon"> Paul M. Salmon</a>, <a href="https://publications.waset.org/abstracts/search?q=Natassia%20Goode"> Natassia Goode</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The significance of high consequence, workplace failures within construction continues to resonate with a combined average of 12 fatal incidents occurring daily throughout Australia, the United Kingdom, and the United States. Within the Australian construction domain, more than 35 serious, compensable injury incidents are reported daily. These alarming figures, in conjunction with the continued occurrence of fatal and serious, occupational injury incidents globally suggest existing approaches to incident analysis may not be achieving required injury prevention outcomes. One reason may be that, incident analysis methods used in construction have not kept pace with advances in the field of safety science and are not uncovering the full range system-wide contributory factors that are required to achieve optimal levels of construction safety performance. Another reason underpinning this global issue may also be the absence of information surrounding the construction operating and project delivery system. For example, it is not clear who shares the responsibility for construction safety in different contexts. To respond to this issue, to the author’s best knowledge, a first of its kind, control structure model of the construction industry is presented and then used to analyse a fatal construction incident. The model was developed by applying and extending the Systems Theoretic and Incident Model and Process method to hierarchically represent the actors, constraints, feedback mechanisms, and relationships that are involved in managing construction safety performance. The Causal Analysis based on Systems Theory (CAST) method was then used to identify the control and feedback failures involved in the fatal incident. The conclusions from the Coronial investigation into the event are compared with the findings stemming from the CAST analysis. The CAST analysis highlighted additional issues across the construction system that were not identified in the coroner’s recommendations, suggested there is a potential benefit in applying a systems theory approach to incident analysis in construction. The findings demonstrate the utility applying systems theory-based methods to the analysis of construction incidents. Specifically, this study shows the utility of the construction control structure and the potential benefits for project leaders, construction entities, regulators, and construction clients in controlling construction performance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20project%20management" title="construction project management">construction project management</a>, <a href="https://publications.waset.org/abstracts/search?q=construction%20performance" title=" construction performance"> construction performance</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20analysis" title=" incident analysis"> incident analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=systems%20thinking" title=" systems thinking"> systems thinking</a> </p> <a href="https://publications.waset.org/abstracts/112026/reaching-new-levels-using-systems-thinking-to-analyse-a-major-incident-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112026.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25646</span> Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mutemwa">M. Mutemwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20operation%20centre" title="cybersecurity operation centre">cybersecurity operation centre</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20response" title=" incident response"> incident response</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20matrix" title=" priority matrix"> priority matrix</a>, <a href="https://publications.waset.org/abstracts/search?q=procedures%20and%20policies" title=" procedures and policies"> procedures and policies</a> </p> <a href="https://publications.waset.org/abstracts/99513/integrating-a-security-operations-centre-with-an-organizations-existing-procedures-policies-and-information-technology-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99513.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25645</span> Volunteered Geographic Information Coupled with Wildfire Fire Progression Maps: A Spatial and Temporal Tool for Incident Storytelling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cassandra%20Hansen">Cassandra Hansen</a>, <a href="https://publications.waset.org/abstracts/search?q=Paul%20Doherty"> Paul Doherty</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Ferner"> Chris Ferner</a>, <a href="https://publications.waset.org/abstracts/search?q=German%20Whitley"> German Whitley</a>, <a href="https://publications.waset.org/abstracts/search?q=Holly%20Torpey"> Holly Torpey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wildfire is a natural and inevitable occurrence, yet changing climatic conditions have increased the severity, frequency, and risk to human populations in the wildland/urban interface (WUI) of the Western United States. Rapid dissemination of accurate wildfire information is critical to both the Incident Management Team (IMT) and the affected community. With the advent of increasingly sophisticated information systems, GIS can now be used as a web platform for sharing geographic information in new and innovative ways, such as virtual story map applications. Crowdsourced information can be extraordinarily useful when coupled with authoritative information. Information abounds in the form of social media, emergency alerts, radio, and news outlets, yet many of these resources lack a spatial component when first distributed. In this study, we describe how twenty-eight volunteer GIS professionals across nine Geographic Area Coordination Centers (GACC) sourced, curated, and distributed Volunteered Geographic Information (VGI) from authoritative social media accounts focused on disseminating information about wildfires and public safety. The combination of fire progression maps with VGI incident information helps answer three critical questions about an incident, such as: where the first started. How and why the fire behaved in an extreme manner and how we can learn from the fire incident's story to respond and prepare for future fires in this area. By adding a spatial component to that shared information, this team has been able to visualize shared information about wildfire starts in an interactive map that answers three critical questions in a more intuitive way. Additionally, long-term social and technical impacts on communities are examined in relation to situational awareness of the disaster through map layers and agency links, the number of views in a particular region of a disaster, community involvement and sharing of this critical resource. Combined with a GIS platform and disaster VGI applications, this workflow and information become invaluable to communities within the WUI and bring spatial awareness for disaster preparedness, response, mitigation, and recovery. This study highlights progression maps as the ultimate storytelling mechanism through incident case studies and demonstrates the impact of VGI and sophisticated applied cartographic methodology make this an indispensable resource for authoritative information sharing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=storytelling" title="storytelling">storytelling</a>, <a href="https://publications.waset.org/abstracts/search?q=wildfire%20progression%20maps" title=" wildfire progression maps"> wildfire progression maps</a>, <a href="https://publications.waset.org/abstracts/search?q=volunteered%20geographic%20information" title=" volunteered geographic information"> volunteered geographic information</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20and%20temporal" title=" spatial and temporal"> spatial and temporal</a> </p> <a href="https://publications.waset.org/abstracts/140122/volunteered-geographic-information-coupled-with-wildfire-fire-progression-maps-a-spatial-and-temporal-tool-for-incident-storytelling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">176</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25644</span> Artificial Intelligence for Safety Related Aviation Incident and Accident Investigation Scenarios</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bernabeo%20R.%20Alberto">Bernabeo R. Alberto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the tremendous improvements in the processing power of computers, the possibilities of artificial intelligence will increasingly be used in aviation and make autonomous flights, preventive maintenance, ATM (Air Traffic Management) optimization, pilots, cabin crew, ground staff, and airport staff training possible in a cost-saving, less time-consuming and less polluting way. Through the use of artificial intelligence, we foresee an interviewing scenario where the interviewee will interact with the artificial intelligence tool to contextualize the character and the necessary information in a way that aligns reasonably with the character and the scenario. We are creating simulated scenarios connected with either an aviation incident or accident to enhance also the training of future accident/incident investigators integrating artificial intelligence and augmented reality tools. The project's goal is to improve the learning and teaching scenario through academic and professional expertise in aviation and in the artificial intelligence field. Thus, we intend to contribute to the needed high innovation capacity, skills, and training development and management of artificial intelligence, supported by appropriate regulations and attention to ethical problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=aviation%20accident" title=" aviation accident"> aviation accident</a>, <a href="https://publications.waset.org/abstracts/search?q=aviation%20incident" title=" aviation incident"> aviation incident</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a> </p> <a href="https://publications.waset.org/abstracts/191510/artificial-intelligence-for-safety-related-aviation-incident-and-accident-investigation-scenarios" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">22</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25643</span> Hauntology of History: Intimate Revolt in Lou Ye’s Summer Palace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yueming%20Li">Yueming Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper analyzes Lou Ye’s Summer Palace (2006), an autobiographical film of the Sixth Generation of Directors in Mainland China, from the approaches of inter-textual analysis and intellectual history. It highlights the film’s reconstruction of the June 4th Incident as an intermediary device for the revival and haunting of the 1980s’ New Enlightenment Movement. The paper demonstrates how the June 4th Incident unfolds as historical trauma and collective experience of the Generation through Lou’s flickering narrative in both plot organization and visual representation, under an individualized and internal viewpoint. It further proposes that these revenants of the June 4th Incident translate into “realms of memory,” which lend themselves for biographical and historical reconstruction of the June 4th Incident based on a politics of embodiment. Through this, Lou and his contemporaries acquire agency to actively respond to the June 4th Incident as an “intimate revolt.” In this sense, the film revisits the New Enlightenment Movement in that they similarly construct rebellious connotations in a seemingly depoliticized manner. As the paper examines how an autobiographical film reconstructs, revisits, and responds to a historical event and its absence, it answers how individuals’ agency intertwines with and counteracts their historical living contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=new%20enlightenment%20movement" title="new enlightenment movement">new enlightenment movement</a>, <a href="https://publications.waset.org/abstracts/search?q=summer%20palace" title=" summer palace"> summer palace</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20June%204th%20incident" title=" the June 4th incident"> the June 4th incident</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20sixth%20generation%20of%20directors" title=" the sixth generation of directors"> the sixth generation of directors</a> </p> <a href="https://publications.waset.org/abstracts/148940/hauntology-of-history-intimate-revolt-in-lou-yes-summer-palace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148940.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25642</span> Modification of the Risk for Incident Cancer with Changes in the Metabolic Syndrome Status: A Prospective Cohort Study in Taiwan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yung-Feng%20Yen">Yung-Feng Yen</a>, <a href="https://publications.waset.org/abstracts/search?q=Yun-Ju%20Lai"> Yun-Ju Lai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Metabolic syndrome (MetS) is reversible; however, the effect of changes in MetS status on the risk of incident cancer has not been extensively studied. We aimed to investigate the effects of changes in MetS status on incident cancer risk. Methods: This prospective, longitudinal study used data from Taiwan’s MJ cohort of 157,915 adults recruited from 2002–2016 who had repeated MetS measurements 5.2 (±3.5) years apart and were followed up for the new onset of cancer over 8.2 (±4.5) years. A new diagnosis of incident cancer in study individuals was confirmed by their pathohistological reports. The participants’ MetS status included MetS-free (n=119,331), MetS-developed (n=14,272), MetS-recovered (n=7,914), and MetS-persistent (n=16,398). We used the Fine-Gray sub-distribution method, with death as the competing risk, to determine the association between MetS changes and the risk of incident cancer. Results: During the follow-up period, 7,486 individuals had new development of cancer. Compared with the MetS-free group, MetS-persistent individuals had a significantly higher risk of incident cancer (adjusted hazard ratio [aHR], 1.10; 95% confidence interval [CI], 1.03-1.18). Considering the effect of dynamic changes in MetS status on the risk of specific cancer types, MetS persistence was significantly associated with a higher risk of incident colon and rectum, kidney, pancreas, uterus, and thyroid cancer. The risk of kidney, uterus, and thyroid cancer in MetS-recovered individuals was higher than in those who remained MetS but lower than MetS-persistent individuals. Conclusions: Persistent MetS is associated with a higher risk of incident cancer, and recovery from MetS may reduce the risk. The findings of our study suggest that it is imperative for individuals with pre-existing MetS to seek treatment for this condition to reduce the cancer risk. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metabolic%20syndrome%20change" title="metabolic syndrome change">metabolic syndrome change</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer" title=" cancer"> cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factor" title=" risk factor"> risk factor</a>, <a href="https://publications.waset.org/abstracts/search?q=cohort%20study" title=" cohort study"> cohort study</a> </p> <a href="https://publications.waset.org/abstracts/161544/modification-of-the-risk-for-incident-cancer-with-changes-in-the-metabolic-syndrome-status-a-prospective-cohort-study-in-taiwan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161544.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25641</span> Investigation of Arson Fire Incident in Textile Garment Building Using Fire Dynamic Simulation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsin%20Ali%20Shaikh">Mohsin Ali Shaikh</a>, <a href="https://publications.waset.org/abstracts/search?q=Song%20Weiguo"> Song Weiguo</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Kashan%20Surahio"> Muhammad Kashan Surahio</a>, <a href="https://publications.waset.org/abstracts/search?q=Usman%20Shahid"> Usman Shahid</a>, <a href="https://publications.waset.org/abstracts/search?q=Rehmat%20Karim"> Rehmat Karim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigated a catastrophic arson fire incident that occurred at a textile garment building in Karachi, Pakistan. Unfortunately, a catastrophic event led to the loss of 262 lives and caused 55 severe injuries. The primary objective is to analyze the aspects of the fire incident and understand the causes of arson fire disasters. The study utilized Fire Dynamic Simulation (F.D.S) was employed to simulate fire propagation, visibility, harmful gas concentration, fire temperature, and numerical results. The analysis report has determined the specific circumstances that created the unpleasant incident in the present study. The significance of the current findings lies in their potential to prevent arson fires, improve fire safety measures, and the development of safety plans in building design. The fire dynamic simulation findings can serve as a theoretical basis for the investigation of arson fires and evacuation planning in textile garment buildings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=investigation" title="investigation">investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20arson%20incident" title=" fire arson incident"> fire arson incident</a>, <a href="https://publications.waset.org/abstracts/search?q=textile%20garment" title=" textile garment"> textile garment</a>, <a href="https://publications.waset.org/abstracts/search?q=fire%20dynamic%20simulation%20%28FDS%29" title=" fire dynamic simulation (FDS)"> fire dynamic simulation (FDS)</a> </p> <a href="https://publications.waset.org/abstracts/175170/investigation-of-arson-fire-incident-in-textile-garment-building-using-fire-dynamic-simulation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175170.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25640</span> Permanent Reduction of Arc Flash Energy to Safe Limit on Line Side of 480 Volt Switchgear Incomer Breaker</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abid%20Khan">Abid Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A recognized engineering challenge is related to personnel protection from fatal arc flash incident energy in the line side of the 480-volt switchgear incomer breakers during maintenance activities. The incident energy is typically high due to slow fault clearance, and it can be higher than the available personnel protective equipment (PPE) ratings. A fault in this section of the switchgear is cleared by breakers or fuses in the upstream higher voltage system (4160 Volt or higher). The current reflection in the higher voltage upstream system for a fault in the 480-volt switchgear is low, the clearance time is slower, and the inversely proportional incident energy is hence higher. The installation of overcurrent protection at a 480-volt system upstream of the incomer breaker will operate fast enough and trips the upstream higher voltage breaker when a fault develops at the incomer breaker. Therefore, fault current reduction as reflected in the upstream higher voltage system is eliminated. Since the fast overcurrent protection is permanently installed, it is always functional, does not require human interventions, and eliminates exposure to human errors. It is installed at the maintenance activities location, and its operations can be locally monitored by craftsmen during maintenance activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arc%20flash" title="arc flash">arc flash</a>, <a href="https://publications.waset.org/abstracts/search?q=mitigation" title=" mitigation"> mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=maintenance%20switch" title=" maintenance switch"> maintenance switch</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20level" title=" energy level"> energy level</a> </p> <a href="https://publications.waset.org/abstracts/138671/permanent-reduction-of-arc-flash-energy-to-safe-limit-on-line-side-of-480-volt-switchgear-incomer-breaker" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138671.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25639</span> Development of Quality Assessment Tool to Gauge Fire Response Activities of Emergency Personnel in Denmark</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20E.%20Lynette">Jennifer E. Lynette</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this study is to develop a nation-wide assessment tool to gauge the quality and efficiency of response activities by emergency personnel to fires in Denmark. Current fire incident reports lack detailed information that can lead to breakthroughs in research and improve emergency response efforts. Information generated from the report database is analyzed and assessed for efficiency and quality. By utilizing information collection gaps in the incident reports, an improved, indepth, and streamlined quality gauging system is developed for use by fire brigades. This study pinpoints previously unrecorded factors involved in the response phases of a fire. Variables are recorded and ranked based on their influence to event outcome. By assessing and measuring these data points, quality standards are developed. These quality standards include details of the response phase previously overlooked which individually and cumulatively impact the overall success of a fire response effort. Through the application of this tool and implementation of associated quality standards at Denmark’s fire brigades, there is potential to increase efficiency and quality in the preparedness and response phases, thereby saving additional lives, property, and resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emergency%20management" title="emergency management">emergency management</a>, <a href="https://publications.waset.org/abstracts/search?q=fire" title=" fire"> fire</a>, <a href="https://publications.waset.org/abstracts/search?q=preparedness" title=" preparedness"> preparedness</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20standards" title=" quality standards"> quality standards</a>, <a href="https://publications.waset.org/abstracts/search?q=response" title=" response"> response</a> </p> <a href="https://publications.waset.org/abstracts/38422/development-of-quality-assessment-tool-to-gauge-fire-response-activities-of-emergency-personnel-in-denmark" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">326</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25638</span> Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pichamon%20Chansuchai">Pichamon Chansuchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=audit" title="audit">audit</a>, <a href="https://publications.waset.org/abstracts/search?q=best%20practice" title=" best practice"> best practice</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=payment" title=" payment"> payment</a> </p> <a href="https://publications.waset.org/abstracts/14455/guidelines-for-proper-internal-control-of-internet-payment-a-case-study-of-internet-payment-gateway-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25637</span> Association of Human Immunodeficiency Virus with Incident Autoimmune Hemolytic Anemia: A Population-Based Cohort Study in Taiwan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yung-Feng%20Yen">Yung-Feng Yen</a>, <a href="https://publications.waset.org/abstracts/search?q=I-an%20Jen"> I-an Jen</a>, <a href="https://publications.waset.org/abstracts/search?q=Yi-Ming%20Arthur%20Chen"> Yi-Ming Arthur Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The molecular mimicry between human immunodeficiency virus (HIV) protein and red blood cell (RBC) antigens could induce the production of anti-RBC autoantibodies. However, the association between HIV infection and subsequent development of autoimmune hemolytic anemia (AIHA) remains unclear. This nationwide population-based cohort study aimed to determine the association between incident AIHA and HIV in Taiwan. From 2000–2012, we identified adult people living with HIV/AIDS (PLWHA) from the Taiwan centers for disease control HIV Surveillance System. HIV-infected individuals were defined by positive HIV-1 western blot. Age- and sex-matched controls without HIV infection were selected from the Taiwan National Health Insurance Research Database for comparison. All patients were followed until Dec. 31, 2012, and observed for occurrence of AIHA. Of 171,468 subjects (19,052 PLWHA, 152,416 controls), 30 (0.02%) had incident AIHA during a mean follow-up of 5.45 years, including 23 (0.12%) PLWHA and 7 (0.01%) controls. After adjusting for potential confounders, HIV infection was found to be an independent risk factor of incident AIHA (adjusted hazard ratio [AHR], 20.9; 95% confidence interval [CI], 8.34-52.3). Moreover, PLWHA receiving HAART were more likely to develop AIHA than those not receiving HAART (AHR, 10.8; 95% CI, 2.90-40.1). Additionally, the risk of AIHA was significantly increased in those taking efavirenz (AHR, 3.15; 95% CI, 1.18-8.43) or atazanavir (AHR, 6.58; 95% CI, 1.88-22.9) component of the HAART. In conclusion, HIV infection is an independent risk factor for incident AIHA. Clinicians need to be aware of the higher risk of AIHA in PLWHA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=autoimmune%20disease" title="autoimmune disease ">autoimmune disease </a>, <a href="https://publications.waset.org/abstracts/search?q=hemolytic%20anemia" title=" hemolytic anemia"> hemolytic anemia</a>, <a href="https://publications.waset.org/abstracts/search?q=HIV" title=" HIV"> HIV</a>, <a href="https://publications.waset.org/abstracts/search?q=highly%20active%20antiretroviral%20treatment" title=" highly active antiretroviral treatment"> highly active antiretroviral treatment</a> </p> <a href="https://publications.waset.org/abstracts/75329/association-of-human-immunodeficiency-virus-with-incident-autoimmune-hemolytic-anemia-a-population-based-cohort-study-in-taiwan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/75329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">235</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25636</span> Analyzing Safety Incidents using the Fatigue Risk Index Calculator as an Indicator of Fatigue within a UK Rail Franchise</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Scott%20Evans">Michael Scott Evans</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Smith"> Andrew Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The feeling of fatigue at work could potentially have devastating consequences. The aim of this study was to investigate whether the well-established objective indicator of fatigue – the Fatigue Risk Index (FRI) calculator used by the rail industry is an effective indicator to the number of safety incidents, in which fatigue could have been a contributing factor. The study received ethics approval from Cardiff University’s Ethics Committee (EC.16.06.14.4547). A total of 901 safety incidents were recorded from a single British rail franchise between 1st June 2010 – 31st December 2016, into the Safety Management Information System (SMIS). The safety incident types identified that fatigue could have been a contributing factor were: Signal Passed at Danger (SPAD), Train Protection & Warning System (TPWS) activation, Automatic Warning System (AWS) slow to cancel, failed to call, and station overrun. From the 901 recorded safety incidents, the scheduling system CrewPlan was used to extract the Fatigue Index (FI) score and Risk Index (RI) score of all train drivers on the day of the safety incident. Only the working rosters of 64.2% (N = 578) (550 men and 28 female) ranging in age from 24 – 65 years old (M = 47.13, SD = 7.30) were accessible for analyses. Analysis from all 578 train drivers who were involved in safety incidents revealed that 99.8% (N = 577) of Fatigue Index (FI) scores fell within or below the identified guideline threshold of 45 as well as 97.9% (N = 566) of Risk Index (RI) scores falling below the 1.6 threshold range. Their scores represent good practice within the rail industry. These findings seem to indicate that the current objective indicator, i.e. the FRI calculator used in this study by the British rail franchise was not an effective predictor of train driver’s FI scores and RI scores, as safety incidents in which fatigue could have been a contributing factor represented only 0.2% of FI scores and 2.1% of RI scores. Further research is needed to determine whether there are other contributing factors that could provide a better indication as to why there is such a significantly large proportion of train drivers who are involved in safety incidents, in which fatigue could have been a contributing factor have such low FI and RI scores. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fatigue%20risk%20index%20calculator" title="fatigue risk index calculator">fatigue risk index calculator</a>, <a href="https://publications.waset.org/abstracts/search?q=objective%20indicator%20of%20fatigue" title=" objective indicator of fatigue"> objective indicator of fatigue</a>, <a href="https://publications.waset.org/abstracts/search?q=rail%20industry" title=" rail industry"> rail industry</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20incident" title=" safety incident"> safety incident</a> </p> <a href="https://publications.waset.org/abstracts/83185/analyzing-safety-incidents-using-the-fatigue-risk-index-calculator-as-an-indicator-of-fatigue-within-a-uk-rail-franchise" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83185.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25635</span> Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dyana%20Zainudin">Dyana Zainudin</a>, <a href="https://publications.waset.org/abstracts/search?q=Atta%20Ur-Rahman"> Atta Ur-Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Thaier%20Hamed"> Thaier Hamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management%20system" title="information security management system">information security management system</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20behaviour" title=" information security behaviour"> information security behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20governance" title=" information security governance"> information security governance</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20culture" title=" information security culture"> information security culture</a> </p> <a href="https://publications.waset.org/abstracts/73708/information-security-dilemma-employees-behaviour-on-three-dimensions-to-failure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73708.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">208</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25634</span> Towards A New Maturity Model for Information System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Matrane">Ossama Matrane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20system" title="information system">information system</a>, <a href="https://publications.waset.org/abstracts/search?q=maturity%20models" title=" maturity models"> maturity models</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20management" title=" information security management"> information security management</a>, <a href="https://publications.waset.org/abstracts/search?q=OPM3" title=" OPM3"> OPM3</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20governance" title=" IT governance"> IT governance</a> </p> <a href="https://publications.waset.org/abstracts/26349/towards-a-new-maturity-model-for-information-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26349.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">447</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25633</span> Analysis of the Scattered Fields by Dielectric Sphere Inside Different Dielectric Mediums: The Case of the Source and Observation Point Is Reciprocal</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emi%CC%87ne%20Av%C5%9Far%20Aydin">Emi̇ne Avşar Aydin</a>, <a href="https://publications.waset.org/abstracts/search?q=Nezahat%20G%C3%BCnen%C3%A7%20Tuncel"> Nezahat Günenç Tuncel</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Hami%CC%87t%20Serbest"> A. Hami̇t Serbest</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The electromagnetic scattering from a canonical structure is an important issue in electromagnetic theory. In this study, the electromagnetic scattering from a dielectric sphere with oblique incidence is investigated. The incident field is considered as a plane wave with H polarized. The scattered and transmitted field expressions with unknown coefficients are written. The unknown coefficients are obtained by using exact boundary conditions. Then, the sphere is considered as having frequency dependent dielectric permittivity. The frequency dependence is shown by Cole-Cole model. The far scattered field expressions are found respect to different incidence angles in the 1-8 GHz frequency range. The observation point is the angular distance of pi from an incident wave. While an incident wave comes with a certain angle, observation point turns from 0 to 360 degrees. According to this, scattered field amplitude is maximum at the location of the incident wave, scattered field amplitude is minimum at the across incident wave. Also, the scattered fields are plotted versus frequency to show frequency-dependence explicitly. Graphics are shown for some incident angles compared with the Harrington's solution. Thus, the results are obtained faster and more reliable with reciprocal rotation. It is expected that when there is another sphere with different properties in the outer sphere, the presence and location of the sphere will be detected faster. In addition, this study leads to use for biomedical applications in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=scattering" title="scattering">scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=dielectric%20sphere" title=" dielectric sphere"> dielectric sphere</a>, <a href="https://publications.waset.org/abstracts/search?q=oblique%20incidence" title=" oblique incidence"> oblique incidence</a>, <a href="https://publications.waset.org/abstracts/search?q=reciprocal%20rotation" title=" reciprocal rotation"> reciprocal rotation</a> </p> <a href="https://publications.waset.org/abstracts/32409/analysis-of-the-scattered-fields-by-dielectric-sphere-inside-different-dielectric-mediums-the-case-of-the-source-and-observation-point-is-reciprocal" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32409.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25632</span> Unpacking Chilean Preservice Teachers’ Beliefs on Practicum Experiences through Digital Stories</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claudio%20D%C3%ADaz">Claudio Díaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mabel%20Ortiz"> Mabel Ortiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An EFL teacher education programme in Chile takes five years to train a future teacher of English. Preservice teachers are prepared to learn an advanced level of English and teach the language from 5th to 12th grade in the Chilean educational system. In the context of their first EFL Methodology course in year four, preservice teachers have to create a five-minute digital story that starts from a critical incident they have experienced as teachers-to-be during their observations or interventions in the schools. A critical incident can be defined as a happening, a specific incident or event either observed by them or involving them. The happening sparks their thinking and may make them subsequently think differently about the particular event. When they create their digital stories, preservice teachers put technology, teaching practice and theory together to narrate a story that is complemented by still images, moving images, text, sound effects and music. The story should be told as a personal narrative, which explains the critical incident. This presentation will focus on the creation process of 50 Chilean preservice teachers’ digital stories highlighting the critical incidents they started their stories. It will also unpack preservice teachers’ beliefs and reflections when approaching their teaching practices in schools. These beliefs will be coded and categorized through content analysis to evidence preservice teachers’ most rooted conceptions about English teaching and learning in Chilean schools. The findings seem to indicate that preservice teachers’ beliefs are strongly mediated by contextual and affective factors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=beliefs" title="beliefs">beliefs</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20stories" title=" digital stories"> digital stories</a>, <a href="https://publications.waset.org/abstracts/search?q=preservice%20teachers" title=" preservice teachers"> preservice teachers</a>, <a href="https://publications.waset.org/abstracts/search?q=practicum" title=" practicum"> practicum</a> </p> <a href="https://publications.waset.org/abstracts/60066/unpacking-chilean-preservice-teachers-beliefs-on-practicum-experiences-through-digital-stories" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60066.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25631</span> Review on Implementation of Artificial Intelligence and Machine Learning for Controlling Traffic and Avoiding Accidents</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neha%20Singh">Neha Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Shristi%20Singh"> Shristi Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Accidents involving motor vehicles are more likely to cause serious injuries and fatalities. It also has a host of other perpetual issues, such as the regular loss of life and goods in accidents. To solve these issues, appropriate measures must be implemented, such as establishing an autonomous incident detection system that makes use of machine learning and artificial intelligence. In order to reduce traffic accidents, this article examines the overview of artificial intelligence and machine learning in autonomous event detection systems. The paper explores the major issues, prospective solutions, and use of artificial intelligence and machine learning in road transportation systems for minimising traffic accidents. There is a lot of discussion on additional, fresh, and developing approaches that less frequent accidents in the transportation industry. The study structured the following subtopics specifically: traffic management using machine learning and artificial intelligence and an incident detector with these two technologies. The internet of vehicles and vehicle ad hoc networks, as well as the use of wireless communication technologies like 5G wireless networks and the use of machine learning and artificial intelligence for the planning of road transportation systems, are elaborated. In addition, safety is the primary concern of road transportation. Route optimization, cargo volume forecasting, predictive fleet maintenance, real-time vehicle tracking, and traffic management, according to the review's key conclusions, are essential for ensuring the safety of road transportation networks. In addition to highlighting research trends, unanswered problems, and key research conclusions, the study also discusses the difficulties in applying artificial intelligence to road transport systems. Planning and managing the road transportation system might use the work as a resource. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20detector" title=" incident detector"> incident detector</a>, <a href="https://publications.waset.org/abstracts/search?q=road%20transport%20systems" title=" road transport systems"> road transport systems</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20management" title=" traffic management"> traffic management</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20incident%20detection" title=" automatic incident detection"> automatic incident detection</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a> </p> <a href="https://publications.waset.org/abstracts/159822/review-on-implementation-of-artificial-intelligence-and-machine-learning-for-controlling-traffic-and-avoiding-accidents" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159822.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25630</span> Sudan’s Approach to Knowledge Management in Disaster Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Abdalla%20Elamein%20Boshara">Mohamed Abdalla Elamein Boshara</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Charles%20Woods"> Peter Charles Woods</a>, <a href="https://publications.waset.org/abstracts/search?q=Nour%20Eldin%20Mohamed%20Elshaiekh"> Nour Eldin Mohamed Elshaiekh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Knowledge Management has become very important for Disaster Management response and planning. This paper proposes the implementation of a Knowledge Management System with a sustainable data collection mechanism for reliable and timely information management to support decision makers in making the right decisions in the timely manner. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title="knowledge management">knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster%20management" title=" disaster management"> disaster management</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20tracking" title=" incident tracking"> incident tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20application" title=" web application"> web application</a> </p> <a href="https://publications.waset.org/abstracts/18077/sudans-approach-to-knowledge-management-in-disaster-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18077.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">780</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25629</span> Management Information System to Help Managers for Providing Decision Making in an Organization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ajayi%20Oluwasola%20Felix">Ajayi Oluwasola Felix</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Management information system (MIS) provides information for the managerial activities in an organization. The main purpose of this research is, MIS provides accurate and timely information necessary to facilitate the decision-making process and enable the organizations planning control and operational functions to be carried out effectively. Management information system (MIS) is basically concerned with processing data into information and is then communicated to the various departments in an organization for appropriate decision-making. MIS is a subset of the overall planning and control activities covering the application of humans technologies, and procedures of the organization. The information system is the mechanism to ensure that information is available to the managers in the form they want it and when they need it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Management%20Information%20Systems%20%28MIS%29" title="Management Information Systems (MIS)">Management Information Systems (MIS)</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-making" title=" decision-making"> decision-making</a>, <a href="https://publications.waset.org/abstracts/search?q=MIS%20in%20Organizations" title=" MIS in Organizations"> MIS in Organizations</a> </p> <a href="https://publications.waset.org/abstracts/24938/management-information-system-to-help-managers-for-providing-decision-making-in-an-organization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">557</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25628</span> Hospital Evacuation: Best Practice Recommendations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ronald%20Blough">Ronald Blough</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hospitals, clinics, and medical facilities are the core of the Health Services sector providing 24/7 medical care to those in need. Any disruption of these important medical services highlights the vulnerabilities in the medical system. An internal or external event can create a catastrophic incident paralyzing the medical services causing the facility to shift into emergency operations with the possibility of evacuation. The hospital administrator and government officials must decide in a very short amount of time whether to shelter in place or evacuate. This presentation will identify best practice recommendations regarding the hospital evacuation decision and response analyzing previous hospital evacuations to encourage hospitals in the region to review or develop their own emergency evacuation plans. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disaster%20preparedness" title="disaster preparedness">disaster preparedness</a>, <a href="https://publications.waset.org/abstracts/search?q=hospital%20evacuation" title=" hospital evacuation"> hospital evacuation</a>, <a href="https://publications.waset.org/abstracts/search?q=shelter-in-place" title=" shelter-in-place"> shelter-in-place</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20containment" title=" incident containment"> incident containment</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20services%20vulnerability" title=" health services vulnerability"> health services vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=hospital%20resources" title=" hospital resources"> hospital resources</a> </p> <a href="https://publications.waset.org/abstracts/11331/hospital-evacuation-best-practice-recommendations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">368</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25627</span> Assessment of the Photovoltaic and Solar Thermal Potential Installation Area on Residential Buildings: Case Study of Amman, Jordan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jenan%20Abu%20Qadourah">Jenan Abu Qadourah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The suitable surface areas for the ST and PV installation are determined based on incident solar irradiation on different surfaces, shading analysis and suitable architectural area for integration considering limitations due to the constructions, available surfaces area and use of the available surfaces for other purposes. The incident solar radiation on the building surfaces and the building solar exposure analysis of the location of Amman, Jordan, is performed with Autodesk Ecotect analysis 2011 simulation software. The building model geometry within the typical urban context is created in “SketchUp,” which is then imported into Ecotect. The hourly climatic data of Amman, Jordan selected are the same ones used for the building simulation in IDA ICE and Polysun simulation software. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=photovoltaic" title="photovoltaic">photovoltaic</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20thermal" title=" solar thermal"> solar thermal</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20incident" title=" solar incident"> solar incident</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20fa%C3%A7ade" title=" building façade"> building façade</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20potential" title=" solar potential"> solar potential</a> </p> <a href="https://publications.waset.org/abstracts/145964/assessment-of-the-photovoltaic-and-solar-thermal-potential-installation-area-on-residential-buildings-case-study-of-amman-jordan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145964.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25626</span> Integration GIS–SCADA Power Systems to Enclosure Air Dispersion Model </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Shaker">Ibrahim Shaker</a>, <a href="https://publications.waset.org/abstracts/search?q=Amr%20El%20Hossany"> Amr El Hossany</a>, <a href="https://publications.waset.org/abstracts/search?q=Moustafa%20Osman"> Moustafa Osman</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20El%20Raey"> Mohamed El Raey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will explore integration model between GIS–SCADA system and enclosure quantification model to approach the impact of failure-safe event. There are real demands to identify spatial objects and improve control system performance. Nevertheless, the employed methodology is predicting electro-mechanic operations and corresponding time to environmental incident variations. Open processing, as object systems technology, is presented for integration enclosure database with minimal memory size and computation time via connectivity drivers such as ODBC:JDBC during main stages of GIS–SCADA connection. The function of Geographic Information System is manipulating power distribution in contrast to developing issues. In other ward, GIS-SCADA systems integration will require numerical objects of process to enable system model calibration and estimation demands, determine of past events for analysis and prediction of emergency situations for response training. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=air%20dispersion%20model" title="air dispersion model">air dispersion model</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20management" title=" environmental management"> environmental management</a>, <a href="https://publications.waset.org/abstracts/search?q=SCADA%20systems" title=" SCADA systems"> SCADA systems</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS%20system" title=" GIS system"> GIS system</a>, <a href="https://publications.waset.org/abstracts/search?q=integration%20power%20system" title=" integration power system"> integration power system</a> </p> <a href="https://publications.waset.org/abstracts/53013/integration-gis-scada-power-systems-to-enclosure-air-dispersion-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">369</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=855">855</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=856">856</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=incident%20information%20system&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>