In-depth analysis on safety and security research based on system dynamics: A bibliometric mapping approach-based study

2022 ◽  
Vol 147 ◽  
pp. 105617
Author(s):  
Xiaoqing Gou ◽  
Hui Liu ◽  
Yujie Qiang ◽  
Zhihui Lang ◽  
Haining Wang ◽  
...  
2019 ◽  
Vol 15 (1) ◽  
Author(s):  
Gherhana Novyany ◽  
Mahra Arari Heryanto

GHERHANA NOVYANY. 2017. Behavior Analysis of Katata Farmer Group Members to Market Development Program with Outcome Mapping approach. Under the guidance of MAHRA ARARI HERYANTO, SP., MT.Katata Farmers Group is under the guidance of Universitas Padjadjaran (UNPAD). UNPAD has several programs, one of them is market development program held by Agrologistika Padjadjaran Team. The purpose of this program is to simplify the supply chain of Katata Farmers Group. This program enables farmer groups to innovate their agricultural cultivation. Therefore, there is a change of social behavior and it occurs after the program was implemented. This research using qualitative method with in depth analysis, and outcome mapping used as the analysis tool. Purposive sampling was used in this research. The result of this research explains that there is a change of supply chain of Katata Farmer Group which previously has to supply its products to modern retail supplier. Nowadays, Katata Farmers Group can supply its products directly to modern retailers, Hero Group (Giant). There is a change of behavior in the Katata Farmers Group after implementation of this program, such as the interaction between each actors that involved in market development program are more complex than before the program implementation. Innovation in agricultural cultivation process allows group members to be more developed in performing their farming and recognized in using new technology that can support their bussiness.


2020 ◽  
Vol 97 (3) ◽  
pp. 581-588 ◽  
Author(s):  
Cristina Cecchini ◽  
Paolo Menesatti ◽  
Francesca Antonucci ◽  
Corrado Costa

2021 ◽  
Vol 24 (3) ◽  
pp. 1-37
Author(s):  
Amit Seal Ami ◽  
Kaushal Kafle ◽  
Kevin Moran ◽  
Adwait Nadkarni ◽  
Denys Poshyvanyk

Mobile application security has been a major area of focus for security research over the course of the last decade. Numerous application analysis tools have been proposed in response to malicious, curious, or vulnerable apps. However, existing tools, and specifically, static analysis tools, trade soundness of the analysis for precision and performance and are hence sound y . Unfortunately, the specific unsound choices or flaws in the design of these tools is often not known or well documented, leading to misplaced confidence among researchers, developers, and users. This article describes the Mutation-Based Soundness Evaluation (μSE) framework, which systematically evaluates Android static analysis tools to discover, document, and fix flaws, by leveraging the well-founded practice of mutation analysis. We implemented μSE and applied it to a set of prominent Android static analysis tools that detect private data leaks in apps. In a study conducted previously, we used μSE to discover 13 previously undocumented flaws in FlowDroid, one of the most prominent data leak detectors for Android apps. Moreover, we discovered that flaws also propagated to other tools that build upon the design or implementation of FlowDroid or its components. This article substantially extends our μSE framework and offers a new in-depth analysis of two more major tools in our 2020 study; we find 12 new, undocumented flaws and demonstrate that all 25 flaws are found in more than one tool, regardless of any inheritance-relation among the tools. Our results motivate the need for systematic discovery and documentation of unsound choices in soundy tools and demonstrate the opportunities in leveraging mutation testing in achieving this goal.


Information ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 17
Author(s):  
Yujie Qiang ◽  
Xuewen Tao ◽  
Xiaoqing Gou ◽  
Zhihui Lang ◽  
Hui Liu

To grasp the current status of network public opinion (NPO) research and explore the knowledge base and hot trends from a quantitative perspective, we retrieved 1385 related papers and conducted a bibliometric mapping analysis on them. Co-occurrence analysis, cluster analysis, co-citation analysis and keyword burst analysis were performed using VOSviewer and CiteSpace software. The results show that the NPO is mainly distributed in the disciplinary fields associated with journalism and communication and public management. There are four main hotspots: analysis of public opinion, analysis of communication channels, technical means and challenges faced. The knowledge base in the field of NPO research includes social media, user influence, and user influence related to opinion dynamic modeling and sentiment analysis. With the advent of the era of big data, big data technology has been widely used in various fields and to some extent can be said to be the research frontier in the field. Transforming big data public opinion into early warning, realizing in-depth analysis and accurate prediction of public opinion as well as improving decision-making ability of public opinion are the future research directions of NPO.


2021 ◽  
Author(s):  
Enayat A. Moallemi ◽  
Edoardo Bertone ◽  
Sibel Eker ◽  
Lei Gao ◽  
Katrina Szetey ◽  
...  

The 17 sustainable development goals (SDGs) represent a holistic and ambitious agenda for transforming the world towards societal well-being, economic prosperity, and environmental protection. Achieving the SDGs is, however, challenged by the performance of interconnected sectors and the complexity of their interactions which drive non-linear system responses, tipping points, and spillover effects in progress towards sustainability. Systems modelling, as an integrated way of thinking about and modelling multisectoral dynamics, can help explain how feedback interactions within and among different sectors can lead to broader system transformation and progress towards the SDGs. Here, we review how system dynamics, as one of prominent systems modelling approaches, can inform and contribute to sustainability research and implementation, framed by the SDGs. We systematically analyse 357 system dynamics studies undertaken at the local scale (e.g., communities, cities), published between 2015 (i.e., inception of the SDGs) and 2020. We analyse the studies to illuminate strengths and limitations in four key areas: diversity of scope; interdisciplinarity of the approaches; the role of stakeholder participation; and the analysis of SDG interactions. We assess strengths and limitations of the reviewed literature, and propose related research priorities in four areas: better consideration of societal aspects of sustainable development in modelling efforts; integrating with new interdisciplinary methods; improving genuine stakeholder engagement; a more in-depth analysis of feedback interactions underlaying the SDGs (i.e., synergies and trade-offs). The review provides a comprehensive knowledge base of existing works that can guide future applications and set a new research agenda for filling existing gaps in the application of systems modelling to sustainability.


Author(s):  
Isaac Chin Eian ◽  
Lim Ka Yong ◽  
Majesty Yeap Xiao Li ◽  
Yeo Hui Qi ◽  
Fatima Z

In this COVID-19 pandemic, the use and dependency on Internet has grown exponentially. The number of people doing online activities such as e-learning, remote working, online shopping and others have increased. This has also led to increased vulnerability to cyber crimes. Cyber security attacks have become a serious problem. The common types of cyber security attacks are phishing, malware, ransomware, social engineering, identity theft and denial-of-service. The attackers target the victims in order to get their credential information or financial benefits. Those people who are doing online activities are vulnerable to cyber threats. This is because the network is not safe. The attackers are able to code according to the weaknesses of the Internet. Once the attackers hack into the devices, they have the root access and can do whatever they want to do with the device. In this research paper, the concept of cyber security attack and detailed research about real attacks are discussed. This is followed by detailed review about the recent cyber security attacks with a critical analysis. Moreover, the research paper will be proposing the latest research contribution of cyber security during COVID-19 and the implementation scenario which will give the examples about how the companies maintain privacy as well as the limitations. Then, the paper will be discussing the reasons that people are vulnerable to cyber security and the unique solution to the problems stated. Finally, this paper will conclude with an in-depth analysis and future direction for cyber security research.


Energies ◽  
2021 ◽  
Vol 14 (19) ◽  
pp. 6126
Author(s):  
Ying Ye ◽  
Zongyu Yue ◽  
Hu Wang ◽  
Haifeng Liu ◽  
Chaohui Wu ◽  
...  

A natural-gas-diesel dual-fuel marine engine with a pre-chamber is a promising solution for ocean transportation to meet the International Maritime Organization (IMO) emission regulations. This engine system employs a pre-chamber with direct injection of diesel to ignite premixed natural gas due to its higher ignition energy, which can enable lower lean limit and higher thermal efficiency. The dual-fuel pre-chamber marine engine presents complex multi-regime combustion characteristics in- and outside the pre-chamber, thus posing challenges in its numerical simulation in a cost-effective manner. Therefore, this paper presents a three-dimensional modeling study for the multi-regime combustion in a large-bore two-stroke marine dual-fuel engine, proposing a novel mapping approach, which couples the well-stirred reactor (WSR) model with the G-equation model to achieve high computational accuracy and efficiency simultaneously. In-depth analysis is performed using representative exothermic reaction (RXR) analysis and premixed turbulent combustion fundamentals to better understand the combustion process and to provide guidance in the selection of mapping timing. The results show that the use of mapping to switch from the WSR to the G-equation model can effectively reduce the runtime significantly by 71.5%, meanwhile maintaining similar accuracies in predictions of in-cylinder pressure traces, HRR and NOx emissions, compared to using WSR all along. Additionally, the choice of mapping timing based on several parameters is preliminarily discussed.


2020 ◽  
Vol 32 (3) ◽  
pp. 278-286
Author(s):  
Aleksandra Różańska ◽  
Aleksandra Gruszka

Sign in / Sign up

Export Citation Format

Share Document