scholarly journals Analyzing and Managing the Impact of Risks using Multi Fuzzy Inference System

2020 ◽  
Vol 8 (6) ◽  
pp. 1567-1571

Information technology security risk evaluations are necessary in determining measures being taken for risk analysis. Risk analysis is also significant as it predicts the loopholes in the software which can get manipulated during suspicious activities. The article has attempted to analyze the risk issue and further suggests a multi-fuzzy risk evaluation approach for the identification of security threats. This approach analyses hacker risks based on the potential ability for an assailant, their overall probability for an attacks as well as the implications of such attacks. It typically consists of 3 sub fuzzy inference structures. The 1 st fuzzy inference structure assesses an assailant's total capacities. The 2 nd fuzzy inference structure assesses the general probability of ambush success, whereas the 3 rd fuzzy inference structure measures risk thresholds.

2021 ◽  
Vol 40 (2) ◽  
pp. 16-20
Author(s):  
L.V. Zahoruyko ◽  
◽  
T.A. Martʹyanova ◽  
A.V. Skyrda ◽  
◽  
...  

Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


2020 ◽  
pp. 2-10
Author(s):  
Roman Anosov ◽  
◽  
Sergey Anosov ◽  
Igor Shakhalov ◽  
◽  
...  

Water ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 793
Author(s):  
Abdul Razzaq Ghumman ◽  
Mohammed Jamaan ◽  
Afaq Ahmad ◽  
Md. Shafiquzzaman ◽  
Husnain Haider ◽  
...  

The evaporation losses are very high in warm-arid regions and their accurate evaluation is vital for the sustainable management of water resources. The assessment of such losses involves extremely difficult and original tasks because of the scarcity of data in countries with an arid climate. The main objective of this paper is to develop models for the simulation of pan-evaporation with the help of Penman and Hamon’s equations, Artificial Neural Networks (ANNs), and the Artificial Neuro Fuzzy Inference System (ANFIS). The results from five types of ANN models with different training functions were compared to find the best possible training function. The impact of using various input variables was investigated as an original contribution of this research. The average temperature and mean wind speed were found to be the most influential parameters. The estimation of parameters for Penman and Hamon’s equations was quite a daunting task. These parameters were estimated using a state of the art optimization algorithm, namely General Reduced Gradient Technique. The results of the Penman and Hamon’s equations, ANN, and ANFIS were compared. Thirty-eight years (from 1980 to 2018) of manually recorded pan-evaporation data regarding mean daily values of a month, including the relative humidity, wind speed, sunshine duration, and temperature, were collected from three gauging stations situated in Al Qassim, Saudi Arabia. The Nash and Sutcliffe Efficiency (NSE) and Mean Square Error (MSE) evaluated the performance of pan-evaporation modeling techniques. The study shows that the ANFIS simulation results were better than those of ANN and Penman and Hamon’s equations. The findings of the present research will help managers, engineers, and decision makers to sustainability manage natural water resources in warm-arid regions.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ammar Chakhrit ◽  
Mohammed Chennoufi

Purpose This paper aims to enable the analysts of reliability and safety system to assess the criticality and prioritize failure modes perfectly to prefer actions for controlling the risks of undesirable scenarios. Design/methodology/approach To resolve the challenge of uncertainty and ambiguous related to the parameters, frequency, non-detection and severity considered in the traditional approach failure mode effect and criticality analysis (FMECA) for risk evaluation, the authors used fuzzy logic where these parameters are shown as members of a fuzzy set, which fuzzified by using appropriate membership functions. The adaptive neuro-fuzzy inference system process is suggested as a dynamic, intelligently chosen model to ameliorate and validate the results obtained by the fuzzy inference system and effectively predict the criticality evaluation of failure modes. A new hybrid model is proposed that combines the grey relational approach and fuzzy analytic hierarchy process to improve the exploitation of the FMECA conventional method. Findings This research project aims to reflect the real case study of the gas turbine system. Using this analysis allows evaluating the criticality effectively and provides an alternate prioritizing to that obtained by the conventional method. The obtained results show that the integration of two multi-criteria decision methods and incorporating their results enable to instill confidence in decision-makers regarding the criticality prioritizations of failure modes and the shortcoming concerning the lack of established rules of inference system which necessitate a lot of experience and shows the weightage or importance to the three parameters severity, detection and frequency, which are considered to have equal importance in the traditional method. Originality/value This paper is providing encouraging results regarding the risk evaluation and prioritizing failures mode and decision-makers guidance to refine the relevance of decision-making to reduce the probability of occurrence and the severity of the undesirable scenarios with handling different forms of ambiguity, uncertainty and divergent judgments of experts.


Author(s):  
Tiina K. O. Rodrigue

In information technology security as scored by management budget, the author examines information technology (IT) security in the context of organizational management, business, complexity leadership theories, and current IT security scholarship. Based on well-known organizational power and politics theory as well as accounting, budget, and management literature, the chapter examines what is known about the impact of power and politics on IT security and the importance of budgetary gamesmanship as illustrated by understanding that the budget as a game, the politics of allocation within an organization, the influence of budgetary bias and how it shapes what CISOs must understand and master, the unfunded mandate impediment through which each the organization picks winners and losers under the auspices of “doing more with less.” The author suggests a future framework for IT security-management-budget review that includes measures that track expenditure versus the power alignment and how to gauge the net effect on an organization's information-technology security posture.


Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1548
Author(s):  
Marjana Čubranić-Dobrodolac ◽  
Libor Švadlenka ◽  
Svetlana Čičević ◽  
Aleksandar Trifunović ◽  
Momčilo Dobrodolac

A constantly increasing number of deaths on roads forces analysts to search for models that predict the driver’s propensity for road traffic accidents (RTAs). This paper aims to examine a relationship between the speed and space assessment capabilities of drivers in terms of their association with the occurrence of RTAs. The method used for this purpose is based on the implementation of the interval Type-2 Fuzzy Inference System (T2FIS). The inputs to the first T2FIS relate to the speed assessment capabilities of drivers. These capabilities were measured in the experiment with 178 young drivers, with test speeds of 30, 50, and 70 km/h. The participants assessed the aforementioned speed values from four different observation positions in the driving simulator. On the other hand, the inputs of the second T2FIS are space assessment capabilities. The same group of drivers took two types of space assessment tests—2D and 3D. The third considered T2FIS sublimates of all previously mentioned inputs in one model. The output in all three T2FIS structures is the number of RTAs experienced by a driver. By testing three proposed T2FISs on the empirical data, the result of the research indicates that the space assessment characteristics better explain participation in RTAs compared to the speed assessment capabilities. The results obtained are further confirmed by implementing a multiple regression analysis.


Author(s):  
W. Baker ◽  
G. Smith ◽  
K. Watson

Collaboration between supply chain partners, facilitated by integration of information flows, has created more efficient and effective networks. However, the benefits of interconnectivity are not gained without risk. Though essential to support collaboration, increased use of information technology has removed internal and external protective barriers around an organization’s assets and processes. Thus, supply chains are better able to satisfy the needs of customers while more vulnerable to an array of IT-specific risks. This chapter identifies the sources of IT threats in the supply chain, categorizes those threats, and validates them by means of a survey of 188 companies representing a range of supply chain functions. Analysis suggests that supply chain risk is affected by IT threats, and therefore the benefits of collaboration facilitated by IT integration must exceed the increase in risk due to IT security threats.


Sign in / Sign up

Export Citation Format

Share Document