Complexity and dynamism of day-to-day activities in organizations are inextricably linked, one impacting the other, increasing the challenges for constant adaptation of the way to organize work to address emerging dem...
详细信息
ISBN:
(纸本)9789898425065
Complexity and dynamism of day-to-day activities in organizations are inextricably linked, one impacting the other, increasing the challenges for constant adaptation of the way to organize work to address emerging demands. In this scenario, there are a variety of information, insight and reasoning being processed between people and systems, during process execution. We argue that process variations could be decided in real time, using context information collected. This paper presents a proposal for a business process line cycle, with a set of activities encapsulated in the form of components as central artefact. We explain how composition and adaptation of work may occur in real time and discuss a scenario for this proposal.
Armed conflicts occur in various parts of the world and result in many casualties and material losses. Weapons of mass destruction are one of the most feared weapons, along with the emergence of chemical, nuclear, rad...
Armed conflicts occur in various parts of the world and result in many casualties and material losses. Weapons of mass destruction are one of the most feared weapons, along with the emergence of chemical, nuclear, radiological, biological, and explosive weapons. The use of weapons of mass destruction is prohibited, but their production is still uncontrolled making it possible for various parties such as terrorists, to easily use available chemical weapons raw materials such as triacetone triperoxide (TATP) bombs and the like. In addition, chemical weapons whose distribution in liquid or gas form is not regulated by the Chemical Weapons Convention (CWC) can cause long-term damage, such as the risk of permanent burns or long-term illness and even infect victims after they expire. Of course, these cases represent a threat to national security due to the irresponsible availability of chemicals to the public or what are called man-made disasters. Therefore, similar incidents need to be avoided to minimize the damage they cause. Society 5.0 can leverage information and communication technology to strengthen early detection systems and prompt responses to terrorist threats involving the misuse of chemicals as chemical weapons. This research was conducted through a systematic literature review in the form identifying, assessing, and interpreting all findings on a research topic to answer research question. The aim of this research is to analyze strategies for preventing chemicals used as chemical weapons through controlling Law Number 9 of 2008. The results of the research show that the rules regarding the control and supervision of chemicals used as chemical weapons are still being enforcedand ineffective. Indonesia in general is still vulnerable to the circulation of chemicals. Therefore, it is necessary to optimize the role of all relevant stakeholders in forming and controlling the Indonesian chemical industry against the threat of dual use.
Cybersecurity threats affect all sectors of the economy, especially the chemical industry. The chemical industry is a critical infrastructure vulnerable to cyberattacks. In addition to financial and reputational losse...
Cybersecurity threats affect all sectors of the economy, especially the chemical industry. The chemical industry is a critical infrastructure vulnerable to cyberattacks. In addition to financial and reputational losses, they can also cause serious accidents (such as loss of control of hazardous materials) with serious consequences for workers, society, and the environment. Industrial control panel systems are typically embedded in a variety of physical devices. The safety of control systems is crucial for ensuring the secure functioning of industrial chemical processes. Nevertheless, the susceptibility of control systems to cyber-attacks has intensified due to the extensive deployment of actuators, sensor measurements, and wireless communications. These attacks have the potential to propagate swiftly and result in severe industrial accidents. This study was conducted as part of a systematic literature review. The purpose of this study is to analyze cybersecurity threats to the chemical industry. Research shows that although cyber attacks are highly vulnerable to the chemical industry, they can be detected through neural network-based integration (NN) without having to know the process model when large quantities of historical data are available and easy to apply. It has been shown that it can be done. It is hoped that the policy recommendations obtained from this research will provide more effective guidelines for protecting the chemical industry from the risks of cyber threats.
“Society 5.0” is characterized as a high degree of integration of cyberspace and physical space capable of promoting economic growth and addressing social problems in a modern information society based on cutting-ed...
“Society 5.0” is characterized as a high degree of integration of cyberspace and physical space capable of promoting economic growth and addressing social problems in a modern information society based on cutting-edge technology advancements for data processing and knowledge creation. Recent developments in the field of biotechnology have been demonstrated by gene editing techniques, especially CRISPR-Cas9, such as basic research, applied biotechnology, and biomedical research Most biotechnology is essentially “dual use” because its development can result in both profitable and nefarious goals, all depending on the perspective and motivation of the perpetrator. The purpose of this research is a better understanding of biosecurity, biosecurity, and bioterrorism threats, so as to provide a foundation for policymakers, researchers, and health professionals to improve global health security so as to realize effective biodefense systems. The research was conducted by library research, namely data collection with literature studies. By implementing biosafety and biosecurity laboratory measures in accordance with established guidelines and guidelines can help protect people, animals, the environment, and national security. Medical intelligence is vital to monitoring and assessing the threat of bioterrorism through the process of data collection, which is then analyzed, and data dissemination. The medical intelligence community can help protect public safety and prevent bioterrorism by understanding and implementing strong biosafety and biosecurity practices in laboratories. Bioterrorism attacks that can occur at any time must be anticipated by medical intelligence by conducting research and assessment of bioterrorism threats, analyzing information so that it can be passed on to the government to take appropriate policies to be able to detect and monitor the spread of infectious diseases quickly, and developing strategies to prevent the spread of disease. Combining health s
Multidrug-resistant organisms (MDROs) pose a significant threat to public health due to their ability to cause various diseases. The emergence and evolution of superbugs have been accelerated by existing drug conserva...
Multidrug-resistant organisms (MDROs) pose a significant threat to public health due to their ability to cause various diseases. The emergence and evolution of superbugs have been accelerated by existing drug conservation policies, hindering the development of novel antibiotics. As a result, researchers are focusing on understanding disease causation pathways and developing advanced classes of antibiotics. Despite challenges related to transparency, regulations, ethics, and technical limitations, technology such as MDRO Dual Use Quickscan shows promise in combating MDRO-based threats. This work presents a web-based tools design that incorporates a data-driven framework and utilizes artificial intelligence (AI) to detect potential cases of dual-use research involving MDROs. A comprehensive literature review identified 15 questions relevant for evaluating MDRO dual-use research using the Quickscan tool. The Quickscan can be developed as a valuable tool for assessing the potential dual-use characteristics of MDRO research. It is recommended that expert opinions guide risk management in biologics and address potential perilous scenarios arising from dual-use activities. Artificial intelligence models, natural language processing techniques, and binary classification algorithms are suggested as viable options for detecting and assessing dual-use traits associated with MDROs. However, human supervision and assessment remain critical for interpreting outcomes and making informed decisions.
Companies have increasingly distributed their teams to increase productivity and quality, and to reduce their costs in software development processes. This scenario has brought new challenges to effective collaboratio...
详细信息
ISBN:
(纸本)9781509026814
Companies have increasingly distributed their teams to increase productivity and quality, and to reduce their costs in software development processes. This scenario has brought new challenges to effective collaboration and to enhance communication across peers. Pragmatic interoperability has been considered as one of the key requirements to tackle these challenges. However, there is lack of research investigating how to support development of pragmatic interoperability across globally dispersed groups. This paper proposes a model to support pragmatic interoperability in software projects to foster collaboration in distributed environments. The proposed model was implemented and evaluated in a collaborative architecture which supports collaborative scientific experiments development.
This study addresses the Wireless Sensor Network Planning Problem with Multiple Sources/Destinations (WSNPMSD), an optimization challenge focused on reducing the sensor count within a network topology for a specified ...
详细信息
ISBN:
(数字)9781737749769
ISBN:
(纸本)9798350371420
This study addresses the Wireless Sensor Network Planning Problem with Multiple Sources/Destinations (WSNPMSD), an optimization challenge focused on reducing the sensor count within a network topology for a specified area, considering numerous sources and destinations. We introduce a hybrid strategy for tackling WSNP-MSD, particularly effective for large-scale scenarios, combining a Biased Random-key Genetic Algorithm with a Local Branching Technique. This methodology is justified by the limitations exact methods may encounter when the number of variables increases. Through computational experiments, we demonstrate the superiority of our proposed method over conventional exact methods in managing large instances of the WSNP-MSD.
Business processes are dynamic and constantly evolving. Contextual elements that had not yet been identified and represented can arise and influence the execution of each process instance in diverse manners. In this s...
详细信息
Business processes are dynamic and constantly evolving. Contextual elements that had not yet been identified and represented can arise and influence the execution of each process instance in diverse manners. In this scenario, the identification of these elements is considered of great importance. This paper proposes a formalism for context associated with business processes that intends to identify the situation of an activity in order to subsidize decisions to be taken within the execution of a process.
Dynamic adaptation is the customization of a business process to make it applicable to a particular situation at any time of its life cycle. Adapting requires experience, and involves knowledge about various, internal...
详细信息
ISBN:
(纸本)9781467360845
Dynamic adaptation is the customization of a business process to make it applicable to a particular situation at any time of its life cycle. Adapting requires experience, and involves knowledge about various, internal and external, aspects of business. Thus, we argue for the application of adaptation rules, considering the context of a particular process instance. Furthermore, we state that a context-based adaptation environment should go beyond, and learn from decisions, as well as continuously identify new unforeseen situations (context definitions). The aim of this paper is to present a computational engine that infers the need to update situations and adaptation rules, suggesting changes to them. An application scenario is presented to discuss the usage of the proposal.
Wireless networks represent the new computer paradigm. They have as main function to provide users with permanent access, independently of their physical location. With the decrease in the costs of portable devices an...
详细信息
Wireless networks represent the new computer paradigm. They have as main function to provide users with permanent access, independently of their physical location. With the decrease in the costs of portable devices and the increase in their capacity, a new concept called ad hoc network appeared. Through this technology, communication is made directly between mobile computers. In this paper, the proposal and validation of a mechanism based on the bandwidth management principle are done to guarantee QoS (Quality of Service) in ad hoc wireless networks. Therefore, a software is developed to simulate ad hoc environments, making connections following the approach of the already proposed mechanism. Several experiences demonstrating the advantages of this method were carried out. They proved that this method guarantees a better use of the transmission channel and, at the same time, accepts more connections.
暂无评论