SummaryIn this study, a web based decision support system (WBDSS) has been developed to provide decision aid for risk analysis on occupational health and safety at shipyards. The system has been constructed as a modular structure to make its application easy for all kind of firms. The WBDSS is rule based and its database includes safety measures and risks for each tool and machine used in shipbuilding process. In addition, probability and hazard values have been involved in the case of violated measures. The frequencies of the violations that occurred in the work environment are entered to the system by the user. Hence, the system provides a decision support about the risks related to facilities and the cautions to be taken in the workplace. The developed WBDSS has the capability of determining accident, almost accident, and threat formation factors at workplace according to the changing parameters. In this aspect, it enables one to constantly monitor, check and evaluate risk preventive measures. Then, the capabilities of the suggested decision support system have been tested with different scenarios for shipyard processes. When the developed WBDSS is applied to all workplaces, it is aimed at providing a decrease in the number of accidents which cause death, occupational illness, injury, and temporary incapability.
Özetçe -Bilgilere erişimin gittikçe daha kolay bir hal aldıgı günümüzde, veritabanlarının bütünlügünün korunması önemini artıran bir konu haline geldi. Bu yüzden de bu alandaki çalışmalar gün geçtikçe artmaktadır. Mevcut ilişkisel veritabanı damgalama yöntemlerinin çogu, elde ettigi damgayı orijinal veritabanının içinde tutar. Önerilen yöntemde ise orijinal veritabanından elde edilen damga bagımsız bir yerde tutularak sıfır damgalama uygulanmıştır. Yöntemi sütun degiştirme saldırılarına karşı güçlü hale getirmek için hücre degeri ikili gruplara ayrılıp sütun numarası ikililere eklenmiştir.İkililerin histogramı damga olarak kullanıldı çünkü hücre degerindeki bir degişim veya sütunun degiştirilmesi histogramı etkileyecektir. Deneysel sonuçlar, literatürdeki belirtilen diger çalışmalara kıyasla sütun degiştirme saldırısına karşı saglamlıgının yanında geliştirilmiş bir işlem zamanını da göstermektedir.Abstract-Protecting database integrity has become a matter of increasing importance nowadays as accessing information is getting easier. Therefore, database watermarking approach to protect the integrity become an active research area. Most of the existing relational database watermarking techniques embed a generated watermark in the database. Zero watermarking is employed in the proposed technique by storing the watermark generated from the database in another medium independent from the database. In order to make the method robust to column replacement attacks, cell values are split into overlapping pairs and column number is added to pairs. The histogram of pairs is used as the watermark because any change in either a cell value or column replacement would affect the histogram. Experimental results indicate robustness to column replacement attack as well as improved processing time compared to other works reported in the literature.
In this paper, we introduce notions of RLA-local modules and locally artinian supplemented modules which are proper generalizations as notions of strongly local modules and ss-supplemented modules, respectively and we study some properties of these module. In particular, we give a characterization of semi perfect rings and left perfect rings.
Günümüzde internet kullanımının hızlı bir şekilde yaygınlaşmasıyla bilgilere erişim daha kolay bir hale gelmiştir. Fakat bu durum veritabanı bütünlüğünün korunuyor olması gibi sorunları da ortaya çıkarmıştır. Son yıllarda veritabanı bütünlüğü önemini arttıran bir konu haline gelmiştir ve bu alandaki çalışmalar gittikçe artmaktadır. İlişkisel veritabanları üzerinde yapılan çalışmaların çoğunda elde edilen damga bilgisi yine orijinal veritabanının içinde tutulmaktadır. Bu durum, veritabanı üzerinde tolere edilebilecek boyutta olsa da bozulmalara neden olmaktadır. Önerilen yöntemde ise elde edilen damga bilgisi veritabanından bağımsız olarak gönderilerek sıfır damgalama şeması uygulanmıştır. Bu yöntemde öncelikle veritabanı gruplara ayrılmaktadır. Ardından her grup bir matris olarak ele alınarak ayrık kosinüs dönüşümü (AKD) katsayıları hesaplanmaktadır. Hesaplanan AKD katsayıların pozitif veya negatif olması durumuna göre 1 veya 0 olarak etiketlenir. Her grup için AKD katsayılarının hesaplanması ve etiketleme işlemlerinin ardından grup damgaları birleştirilerek tüm veritabanı için damga bilgisi elde edilmiş olur. Veritabanı üzerindeki değerlerde meydana gelecek herhangi bir değişiklik, hesaplanan AKD katsayılarını da değiştirecek ve yapılan herhangi bir saldırı grup seviyesinde algılanabilecektir. Yapılan çalışmada kullanılan AKD, ilişkisel veritabanlarının damgalanmasında ilk defa kullanılmıştır. Deneysel çalışmalar sonucunda önerilen yöntemin, veritabanındaki değişimleri benzer çalışmalara göre daha hassas bir şekilde tespit edebildiği gözlemlenmiştir. Nowadays rapid increase of the internet usage makes the data easily accessible. On the other hands, this situation arises another problem like protection of the database integrity. In recent years, database integrity protection becomes more popular and number of the works in this field is increasing in each day. Most works which are related with relational databases hides watermark information, which is generated from the current database, into the same database. This situation causes the data corruptions, which may be tolerable, on the database itself. Proposed method applies zero database watermarking scheme by transferring watermark information as a side information. The method divides the database into groups as the first step and then Discrete Cosine Transform (DCT) is applied by the method on each group which is represented by a matrix. Computed DCT coefficients are labeled as zero or one according to their signs. After computing coefficients and labeling operations for each groups, the watermark information for whole database will be obtained by concatenating groups' watermarks. Computed DCT coefficients will change if any modification has been occurred on the database and any attack could be detected at the group level. DCT is used by the method to obtain watermark information from the database at first time in the literature. Experimental results indicate that the proposed method can detect tampering on the database with finer accuracy compared to similar w...
Despite of the main objective of recent biosurveillance researches is bioterrorist attack threats, detection of natural outbreaks are also being tried to solve by governments all over the world. Such that, international foundations as WHO, OECD and EU publish public declaration about necessity of an international central surveillance system. Each data source and contagious disease carries its own patterns. Therefore, standardizing the process of outbreak detection cannot be applicable. Various methods have been analyzed and published on test results in biosurveillance researches. In general, these methods are the algorithms in literature of SPC and Machine Learning, although specific algorithms have been proposed like Early Aberration Reporting System (EARS) methods. Differences between published results show that, the characteristic of time series are tested with algorithm and the chosen parameters of this algorithm are also determine results. Our tool provides preprocessing of data; testing, analyzing and reporting on anomaly detection algorithms specialized at biosurveillance. These functionalities make it possible to use outputs for comparing algorithms and decision making.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.