This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environme...This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environment provided by blockchain is highly secure and trustworthy. In Blockchain system, some data fragments are grouped into one piece called as <i>blocks</i>, and all blocks are connected to create a chain of blocks in database. When blocks are connected, hash value is used to connect blocks properly. Blockchain technology enables highly secure and reliable data management system under relatively poor ICT environment. For example, developing countries such as African countries do not have sufficient ICT environment. Therefore adopting blockchain technology is suitable for such countries. Based on this consideration, we have started to build RLEMS on the blockchain system. In previous work, we used the MultiChain as a blockchain platform. However, as MultiChain platform is mainly for private blockchain system, it is not suitable for government-level data management system. Therefore, we tried to use another blockchain framework. We selected Hyperledger Fabric which was developed by Linux Foundation. It enables to implement all styles of blockchain system. This article describes the design and implementation of RLEMS by using Hyperledger Fabric. Furthermore, to provide the best user experience, we also built the web application interface with Java web application framework named PrimeFace. The implementation of a prototype revealed that the Hyperledger Fabric blockchain technology is more suitable than MultiChain.展开更多
The research aims to propose a proper model for organizing a creative wedding event to boost Community-Based Eco-Tourism(CBET)in rural areas.It is participatory research.Site observation and in-depth interviews are 10...The research aims to propose a proper model for organizing a creative wedding event to boost Community-Based Eco-Tourism(CBET)in rural areas.It is participatory research.Site observation and in-depth interviews are 10 stakeholders from various organization;local people,the district sheriff,the provincial culture,the national park,the district municipality,the community-based tourism group,the wedding organizers and the educators from a wedding event in themed“Carry Love Covering the Forest”organized in Wiang Sa,Suratthani,the southern part of Thailand were applied.Thematic analysis was applied to analyze the data.The results found that the managing model for organizing an event tourism in Community-Based Eco-Tourism composes of three stages being pre-event,during-event,and after-event.The research provides a comprehensive understanding management model of CBET.The research makes contribution to develop and manage a new creative event to enhance positive impacts of community-based tourism to sustain,especially in eco-tourism destination.展开更多
Introduction: Sorafenib is an orally active multikinase inhibitor approved for the treatment of advanced hepatocellular carcinoma (HCC) and is the only systemic treatment associated with a survival benefit in advanced...Introduction: Sorafenib is an orally active multikinase inhibitor approved for the treatment of advanced hepatocellular carcinoma (HCC) and is the only systemic treatment associated with a survival benefit in advanced stage. The aims of this study were to evaluate the tolerance and survival of sorafenib-treated patients, and to identify potential prognostic factors of survival. Methods: A total of 88 HCC patients treated with sorafenib from June 2010 to January 2014 were retrospectively reviewed. Tumour stage, liver function and adverse events to sorafenib were analyzed. Univariate and multivariate analysis were carried out to identify predictors of survival in patients with advanced HCC treated with sorafenib. Results: There were 64 (73%) males included in this study, with a median age of 61.16 years. Eight (91%) patients had Child-Pugh class A cirrhosis. Most patients were classified as BCLC C (82%). Hepatitis C virus was the predominant cause of HCC (68%). Sorafenib was the initial treatment modality in 43%. Median time of sorafenib therapy was 8.23 months. Overall survival in 1 year was 57.3% and 36.7% in 2 years. The median survival was 16.3 months. In the univariate analysis of the OS based on Child-Pugh score did not demonstrate a significant difference in our study (p = 0.62). The presence of dermatologic adverse event predicted a better overall survival in the multivariate analysis. Better survival was also observed in patients with AFP level <100 ng/ml in the start of sorafenib therapy (p = 0.001). Patients that used Sorafenib for ≥6 months had shown better outcome. None of the patients discontinued sorafenib because of adverse effects. Conclusions: Advanced HCC patients treated with sorafenib who experienced dermatologic adverse event and low AFP level <100 ng/ml showed better overall survival. As expected, longer sorafenib therapy (≥6 months) was associated to better survival. Even in the presence of adverse events, the use of sorafenib should be continued because the longer usage time improves survival.展开更多
ISO International Standards constitute a toolbox not only for the environmental integrity of the planet,but also for economic growthand social equity-in other words,for all three dimensions ofsustainable development.
This paper investigates how social media can be used as a communication tool throughout the event management process, how online social networking interfaces can allow consumers to become more engaged with special eve...This paper investigates how social media can be used as a communication tool throughout the event management process, how online social networking interfaces can allow consumers to become more engaged with special events, and how social media can be used to help gauge the social and cultural impact of special events. By synthesizing prominent literature that is peripherally related, this paper establishes both a base of knowledge for this new realm of inquiry, as well as identifying a platform for further research. The paper also adds to the knowledge based by creating a theoretical framework which brings together practice theory with situationist theory to present a new lens through which to examine this issue. From a theoretical standpoint, technology is said to be a reflection of society. If technology can be linked to society and society in turn can be equated with the spectacle then it is a natural progression to examine technology as spectacle. Therefore, using the two theories in tandem provides a very suitable lens to frame an investigation of technology as spectacle, and the viability of social media as a communication tool for special events.展开更多
This paper investigates the control systems and coordination mechanisms applied in the relationships between cruise line companies and terminal concessionaires in the cruise events management when the ships are stoppi...This paper investigates the control systems and coordination mechanisms applied in the relationships between cruise line companies and terminal concessionaires in the cruise events management when the ships are stopping on the quay. Using a case study methodology and focusing on the Italian context, this exploratory study, through a qualitative approach, interviewed two main cruise terminal concessionaires and indirectly observed events planned by cruise companies in sea ports selected for outlining the role of control systems, coordination, and knowledge sharing between the players in cruise events decision-making processes. The first results show that the cruise event management processes on ship berthing and on terminal are separated. The cruise companies don't involve terminal concessionaires in the event organization considering them only service suppliers Also, the concessionaires conceive the events planned in the cruise infrastructures as a business unit to optimize the space use, without any forms of coordination or control with cruise companies. Knowledge sharing, coordination, and control among the two players could support the planning, and management of "new cruise events" in which the visitors may be led from the infrastructure to the ships stopped on the quay. This study offers a set of key performance indicators to support the management, control, and coordination of each inter-organizational relationship identified. Managerial implications and suggestions for improving cruise events management have been provided.展开更多
The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they rece...The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
This work explores the feasibility of a novel predictive control strategy on a power factor correction system. The proposed control strategy allows a significant reduction of the power losses respect to a classical pr...This work explores the feasibility of a novel predictive control strategy on a power factor correction system. The proposed control strategy allows a significant reduction of the power losses respect to a classical predictive control strategy working with a fixed execution time Ts. The proposed control strategy operates with a variable execution time T~, and it has been implemented using a low cost hardware platform based on TI~ TMS320F2812 DSP. The chosen platform is capable to execute a control strategy code with a variable execution time T,. This operation can be performed by setting in proper manner, the timer registers of one of two event manager A/B blocks present on the mentioned DSP (digital signal processor).展开更多
One of the key factors in a profitable open-pit mine is the efficiency of the waste disposal system. Using GPS-technology, the truck-dispatching decisions can be made in real-time but the chosen strategy has a crucial...One of the key factors in a profitable open-pit mine is the efficiency of the waste disposal system. Using GPS-technology, the truck-dispatching decisions can be made in real-time but the chosen strategy has a crucial role. Therefore, finding the optimal dispatching strategy for truck-shovel operations is extremely important. Dispatching strategies have been reported in the literature, but the comparison of these strategies is still missing. This paper illustrates the differences between the strategies by conducting a stochastic simulation study based on the data gathered from an actual mine. The findings underline the importance of the global vision in dispatching decisions.展开更多
Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the tar...Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept.展开更多
Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the tar...Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept.展开更多
文摘This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environment provided by blockchain is highly secure and trustworthy. In Blockchain system, some data fragments are grouped into one piece called as <i>blocks</i>, and all blocks are connected to create a chain of blocks in database. When blocks are connected, hash value is used to connect blocks properly. Blockchain technology enables highly secure and reliable data management system under relatively poor ICT environment. For example, developing countries such as African countries do not have sufficient ICT environment. Therefore adopting blockchain technology is suitable for such countries. Based on this consideration, we have started to build RLEMS on the blockchain system. In previous work, we used the MultiChain as a blockchain platform. However, as MultiChain platform is mainly for private blockchain system, it is not suitable for government-level data management system. Therefore, we tried to use another blockchain framework. We selected Hyperledger Fabric which was developed by Linux Foundation. It enables to implement all styles of blockchain system. This article describes the design and implementation of RLEMS by using Hyperledger Fabric. Furthermore, to provide the best user experience, we also built the web application interface with Java web application framework named PrimeFace. The implementation of a prototype revealed that the Hyperledger Fabric blockchain technology is more suitable than MultiChain.
文摘The research aims to propose a proper model for organizing a creative wedding event to boost Community-Based Eco-Tourism(CBET)in rural areas.It is participatory research.Site observation and in-depth interviews are 10 stakeholders from various organization;local people,the district sheriff,the provincial culture,the national park,the district municipality,the community-based tourism group,the wedding organizers and the educators from a wedding event in themed“Carry Love Covering the Forest”organized in Wiang Sa,Suratthani,the southern part of Thailand were applied.Thematic analysis was applied to analyze the data.The results found that the managing model for organizing an event tourism in Community-Based Eco-Tourism composes of three stages being pre-event,during-event,and after-event.The research provides a comprehensive understanding management model of CBET.The research makes contribution to develop and manage a new creative event to enhance positive impacts of community-based tourism to sustain,especially in eco-tourism destination.
文摘Introduction: Sorafenib is an orally active multikinase inhibitor approved for the treatment of advanced hepatocellular carcinoma (HCC) and is the only systemic treatment associated with a survival benefit in advanced stage. The aims of this study were to evaluate the tolerance and survival of sorafenib-treated patients, and to identify potential prognostic factors of survival. Methods: A total of 88 HCC patients treated with sorafenib from June 2010 to January 2014 were retrospectively reviewed. Tumour stage, liver function and adverse events to sorafenib were analyzed. Univariate and multivariate analysis were carried out to identify predictors of survival in patients with advanced HCC treated with sorafenib. Results: There were 64 (73%) males included in this study, with a median age of 61.16 years. Eight (91%) patients had Child-Pugh class A cirrhosis. Most patients were classified as BCLC C (82%). Hepatitis C virus was the predominant cause of HCC (68%). Sorafenib was the initial treatment modality in 43%. Median time of sorafenib therapy was 8.23 months. Overall survival in 1 year was 57.3% and 36.7% in 2 years. The median survival was 16.3 months. In the univariate analysis of the OS based on Child-Pugh score did not demonstrate a significant difference in our study (p = 0.62). The presence of dermatologic adverse event predicted a better overall survival in the multivariate analysis. Better survival was also observed in patients with AFP level <100 ng/ml in the start of sorafenib therapy (p = 0.001). Patients that used Sorafenib for ≥6 months had shown better outcome. None of the patients discontinued sorafenib because of adverse effects. Conclusions: Advanced HCC patients treated with sorafenib who experienced dermatologic adverse event and low AFP level <100 ng/ml showed better overall survival. As expected, longer sorafenib therapy (≥6 months) was associated to better survival. Even in the presence of adverse events, the use of sorafenib should be continued because the longer usage time improves survival.
文摘ISO International Standards constitute a toolbox not only for the environmental integrity of the planet,but also for economic growthand social equity-in other words,for all three dimensions ofsustainable development.
文摘This paper investigates how social media can be used as a communication tool throughout the event management process, how online social networking interfaces can allow consumers to become more engaged with special events, and how social media can be used to help gauge the social and cultural impact of special events. By synthesizing prominent literature that is peripherally related, this paper establishes both a base of knowledge for this new realm of inquiry, as well as identifying a platform for further research. The paper also adds to the knowledge based by creating a theoretical framework which brings together practice theory with situationist theory to present a new lens through which to examine this issue. From a theoretical standpoint, technology is said to be a reflection of society. If technology can be linked to society and society in turn can be equated with the spectacle then it is a natural progression to examine technology as spectacle. Therefore, using the two theories in tandem provides a very suitable lens to frame an investigation of technology as spectacle, and the viability of social media as a communication tool for special events.
文摘This paper investigates the control systems and coordination mechanisms applied in the relationships between cruise line companies and terminal concessionaires in the cruise events management when the ships are stopping on the quay. Using a case study methodology and focusing on the Italian context, this exploratory study, through a qualitative approach, interviewed two main cruise terminal concessionaires and indirectly observed events planned by cruise companies in sea ports selected for outlining the role of control systems, coordination, and knowledge sharing between the players in cruise events decision-making processes. The first results show that the cruise event management processes on ship berthing and on terminal are separated. The cruise companies don't involve terminal concessionaires in the event organization considering them only service suppliers Also, the concessionaires conceive the events planned in the cruise infrastructures as a business unit to optimize the space use, without any forms of coordination or control with cruise companies. Knowledge sharing, coordination, and control among the two players could support the planning, and management of "new cruise events" in which the visitors may be led from the infrastructure to the ships stopped on the quay. This study offers a set of key performance indicators to support the management, control, and coordination of each inter-organizational relationship identified. Managerial implications and suggestions for improving cruise events management have been provided.
文摘The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘This work explores the feasibility of a novel predictive control strategy on a power factor correction system. The proposed control strategy allows a significant reduction of the power losses respect to a classical predictive control strategy working with a fixed execution time Ts. The proposed control strategy operates with a variable execution time T~, and it has been implemented using a low cost hardware platform based on TI~ TMS320F2812 DSP. The chosen platform is capable to execute a control strategy code with a variable execution time T,. This operation can be performed by setting in proper manner, the timer registers of one of two event manager A/B blocks present on the mentioned DSP (digital signal processor).
文摘One of the key factors in a profitable open-pit mine is the efficiency of the waste disposal system. Using GPS-technology, the truck-dispatching decisions can be made in real-time but the chosen strategy has a crucial role. Therefore, finding the optimal dispatching strategy for truck-shovel operations is extremely important. Dispatching strategies have been reported in the literature, but the comparison of these strategies is still missing. This paper illustrates the differences between the strategies by conducting a stochastic simulation study based on the data gathered from an actual mine. The findings underline the importance of the global vision in dispatching decisions.
文摘Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept.
文摘Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept.