scholarly journals Construction of Monitoring Model and Algorithm Design on Passenger Security during Shipping Based on Improved Bayesian Network

2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Jiali Wang ◽  
Qingnian Zhang ◽  
Wenfeng Ji

A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the impact on the passenger safety during shipping was established on basis of the multifield coupling theory in this paper. Meanwhile, the fuzzy-precise Bayesian network was applied to monitor the security of passengers in the shipping process. The model was applied to monitor the passenger safety during shipping of a shipping company in Hainan, and the effectiveness of this model was examined. This research work provides guidance for guaranteeing security of passengers during shipping.

Author(s):  
Keyu Qin ◽  
Haijun Huang ◽  
Jingya Liu ◽  
Liwen Yan ◽  
Yanxia Liu ◽  
...  

Islands are one of the most sensitive interfaces between global changes and land and sea dynamic effects, with high sensitivity and low stability. Therefore, under the dynamic coupling effect of human activities and frequent natural disasters, the vulnerability of the ecological environment of islands shows the characteristics of complexity and diversity. For the protection of island ecosystems, a system for the assessment of island ecosystems and studies on the mechanism of island ecological vulnerability are highly crucial. In this study, the North and South Changshan Islands of China were selected as the study area. Considering various impact factors of island ecological vulnerability, the geographical information systems (GIS) spatial analysis, field surveys, data sampling were used to evaluate island ecological vulnerability. The Bayesian network model was used to explore the impact mechanism of ecological vulnerability. The results showed that the ecological vulnerability of the North Changshan Island is higher than that of the South Changshan Island. Among all the indicators, the proportion of net primary productivity (NPP) and the steep slope has the strongest correlation with ecological vulnerability. This study can be used as references in the relevant departments to formulate management policies and promote the sustainable development of islands and their surrounding waters


2019 ◽  
Vol 20 (1) ◽  
pp. 264-284 ◽  
Author(s):  
Chen Chen ◽  
Xiaomin Liu ◽  
Hsiao-Hwa Chen ◽  
Meilian Li ◽  
Liqiang Zhao

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
G. Sundaramali ◽  
C. Vishal Reddy ◽  
Revanth Vinay Kumar Kodali ◽  
Sherin Thomas Sipri ◽  
K. Santhosh Raj ◽  
...  

PurposeThis research work focuses on implementing this methodology in reducing the rejection rate of the turbocharger component problem that occurs during the manufacturing process. Using design, measure, analyze, improve and control (DMAIC) processes, it has been identified that clamping pressure on the component is one factor that affects quality. The impact of clamping pressure is studied to arrive at the ideal clamping pressure in which the rejection rate is the least.Design/methodology/approachQuality is the keyword in manufacturing where the production of a defect-free component is the most sought out objective. The definition of quality keeps getting refined throughout the years, from making products with no defects to minimizing rejection and scrap in the manufacturing process. Production facilities, to achieve this purpose, have adopted various methods and use of the DMAIC of Six Sigma methodology is one among them.FindingsThe study identified the fault causing the defect and suggested the methods to correct the fault. The suggestions would result in reducing the losses arising due to this and similar rejection causes.Originality/valueWith the adoption of DMAIC, it is found that misalignment of top and side clamp pressure is zero. When the side clamp pressure is at 75 PSI, and top clamp pressure is changed from 90 PSI to 95 PSI, the mean of responses is greater than the side clamp pressure of 80 PSI. Therefore, from the three-combination top clamp pressure of 100 PSI and the side clamp pressure of 75 PSI is the optimal condition.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Rahman Khalil Ur ◽  
Jinsoo Shin ◽  
Muhammad Zubair ◽  
Gyunyoung Heo ◽  
Hanseong Son

The objective of this study is to find out the impact of instrumentation and control (I&C) components on the availability of I&C systems in terms of sensitivity analysis using Bayesian network. The analysis has been performed on I&C architecture of reactor protection system. The analysis results would be applied to develop I&C architecture which will meet the desire reliability features and save cost. RPS architecture unavailabilityP(x=0)and availabilityP(x=1)were estimated to6.1276E-05and9.9994E-01for failure (0) and perfect (1) states, respectively. The impact of I&C components on overall system risk has been studied in terms of risk achievement worth (RAW) and risk reduction worth (RRW). It is found that circuit breaker failure (TCB), bi-stable processor (BP), sensor transmitter (TR), and pressure transmitter (PT) have high impact on risk. The study concludes and recommends that circuit breaker bi-stable processor should be given more consideration while designing I&C architecture.


2020 ◽  
Vol 13 ◽  
pp. 152-172
Author(s):  
Elena Gubar ◽  
◽  
Edgar J. Sánchez Carrera ◽  
Suriya Kumacheva ◽  
Ekaterina Zhitkova ◽  
...  

The income tax system is the main instrument of fiscal policy that aims to improve income distribution and economic growth, but the problem arises when there is corrupt behavior in that system. While the tax audit is a tax control tool that is costly, the tax system should guarantee, however, the instruments for tax collection. In this research work, we formulate a model in which all taxpayers decide to pay taxes or not according to their personal income, individual preferences with respect to the audit and tax control information perceived in their social environment. We develop a theoretical model to study the structure of citizen networks that must pay taxes. First, we assume that citizens are classified by two social groups, the rich and the poor. When all citizens are taxpayers, but public authorities are corrupt, we show that the poor group is the most affected by corruption. However, when taxpayers are corrupt or tax evaders, we implement mechanisms to audit and control this corrupt behavior. Hence, we show that this situation of corruption and control of tax payments can be represented by several well-known theoretical games. Then, we apply the evolutionary theory of the game in the network considering that each taxpayer receives information from his∖her neighbors about the probability of audit and that he∖she could react according to his∖her risk status and real income. Such behavior forms a group of informed agents that propagate the information beyond the proportions of the informed and uninformed contributors that are modified. Our evolutionary model in the structure of the network describes the changes in the population of taxpayers driven by the impact of information on the future fiscal audit. Our simulation analysis shows that the initial and final preferences of taxpayers depend on important parameters, that is, taxes and fines, audit information and costs.


Author(s):  
Alex Acquah ◽  
Takyi Kwabena Nsiah ◽  
Ebenezer Yaw Ofosuhene ◽  
Elizabeth Naa Akushia Antie

For system-based auditing to work effectively the auditor will like to rely on internal controls to reduce the volume of substantive testing. It is therefore important for the auditor to examine the internal control practice and procedures that are in place in the client’s business. Where weaknesses are revealed, the auditor recommends ways of improving the systems. This research examines the relationship between some components (risk assessment, control environment and control activate) of internal control systems and the effectiveness of audit program in prudential bank Weija branch. The study exploited information by the help of both primary and secondary data from questionnaires and interview schedules. However, the purposive method of sampling was used in this research work. In all 10 respondents were sampled from the fifty (50) respondents under review. The data captured in this study, was analyzed and interpreted through descriptive method by the help of frequency tables, graphical presentation and tables. Based on the investigations carried, the internal control system was seen to be significant in detection of fraud in banks in Ghana; there is therefore the need for an effective and acceptable internal control structure in banking organizations. It was therefore recommended that Prudential Bank Limited set up internal audit units at their various branches all over the country, so that there shall always be internal audit personnel to ensure adherence to the internal controls that exist in the organization. In view of this, the internal audit personnel should also be revolved at regular intermissions to prevent any form of professional misconducts.


Author(s):  
Lixian Fan ◽  
Zimeng Zhang ◽  
Jingbo Yin ◽  
Xingyuan Wang

Ship accident has always been the focus in shipping and it is concerned by port state authorities. This study tries to investigate the impact of various factors on ship accident along with the port state’s detected deficiency items. Very importantly, it manages to identify the structural connections between the checked deficiency items. The data used in this study are mainly from Lloyd’s register of shipping, International Maritime Organization and Tokyo Memorandum of Understanding, with a total of 64,847 observations obtained. The Bayesian network model is employed and the Greedy thick thinning and Bayesian search algorithms are used to learn the structural networks. In addition to the impacts of the deficiency items and the ship inherent attributes on ship accidents, this study identifies some key deficiency items for port states. It also analyzes the intense connections between the key deficiency items with others. This helps simplify the port state’s inspection procedure and improve operational efficiency.


2011 ◽  
Vol 70 (1) ◽  
pp. 5-11 ◽  
Author(s):  
Beat Meier ◽  
Anja König ◽  
Samuel Parak ◽  
Katharina Henke

This study investigates the impact of thought suppression over a 1-week interval. In two experiments with 80 university students each, we used the think/no-think paradigm in which participants initially learn a list of word pairs (cue-target associations). Then they were presented with some of the cue words again and should either respond with the target word or avoid thinking about it. In the final test phase, their memory for the initially learned cue-target pairs was tested. In Experiment 1, type of memory test was manipulated (i.e., direct vs. indirect). In Experiment 2, type of no-think instructions was manipulated (i.e., suppress vs. substitute). Overall, our results showed poorer memory for no-think and control items compared to think items across all experiments and conditions. Critically, however, more no-think than control items were remembered after the 1-week interval in the direct, but not in the indirect test (Experiment 1) and with thought suppression, but not thought substitution instructions (Experiment 2). We suggest that during thought suppression a brief reactivation of the learned association may lead to reconsolidation of the memory trace and hence to better retrieval of suppressed than control items in the long term.


Crisis ◽  
2010 ◽  
Vol 31 (5) ◽  
pp. 238-246 ◽  
Author(s):  
Paul W. C. Wong ◽  
Wincy S. C. Chan ◽  
Philip S. L. Beh ◽  
Fiona W. S. Yau ◽  
Paul S. F. Yip ◽  
...  

Background: Ethical issues have been raised about using the psychological autopsy approach in the study of suicide. The impact on informants of control cases who participated in case-control psychological autopsy studies has not been investigated. Aims: (1) To investigate whether informants of suicide cases recruited by two approaches (coroners’ court and public mortuaries) respond differently to the initial contact by the research team. (2) To explore the reactions, reasons for participation, and comments of both the informants of suicide and control cases to psychological autopsy interviews. (3) To investigate the impact of the interviews on informants of suicide cases about a month after the interviews. Methods: A self-report questionnaire was used for the informants of both suicide and control cases. Telephone follow-up interviews were conducted with the informants of suicide cases. Results: The majority of the informants of suicide cases, regardless of the initial route of contact, as well as the control cases were positive about being approached to take part in the study. A minority of informants of suicide and control cases found the experience of talking about their family member to be more upsetting than expected. The telephone follow-up interviews showed that none of the informants of suicide cases reported being distressed by the psychological autopsy interviews. Limitations: The acceptance rate for our original psychological autopsy study was modest. Conclusions: The findings of this study are useful for future participants and researchers in measuring the potential benefits and risks of participating in similar sensitive research. Psychological autopsy interviews may be utilized as an active engagement approach to reach out to the people bereaved by suicide, especially in places where the postvention work is underdeveloped.


Sign in / Sign up

Export Citation Format

Share Document