Filter options

Publication Date
From
to
Subjects
Journals
Article Types
Countries / Territories
Open Access July 16, 2024

Management of Saltwater Intrusion in Coastal Aquifers: A Review and Case Studies from Egypt

Abstract Groundwater is undeniably crucial to people's lives, particularly in coastal regions. Therefore, it is imperative to address this vital water source strategically and implement a management plan to maintain its optimal state. The salinization of groundwater poses a significant challenge for coastal communities, stemming from factors like excessive groundwater extraction from coastal aquifers, [...] Read more.
Groundwater is undeniably crucial to people's lives, particularly in coastal regions. Therefore, it is imperative to address this vital water source strategically and implement a management plan to maintain its optimal state. The salinization of groundwater poses a significant challenge for coastal communities, stemming from factors like excessive groundwater extraction from coastal aquifers, reduced recharge, rising sea levels, climate change, and other causes. Saltwater intrusion (SWI) is a prevalent issue that needs attention, as it significantly threatens groundwater quantity and quality. SWI happens when saline water infiltrates coastal aquifers, contaminating freshwater supplies. This review article aims to define SWI, explore its causes and influencing factors, and discuss various monitoring techniques. Additionally, it examines different modeling methods and management tools, including remote sensing, field surveys, modeling approaches, and optimization techniques. To mitigate the adverse effects of SWI, several control measures are outlined, along with their pros and cons. The final section reviews previous SWI studies and case studies from the Nile Delta, Sinai Peninsula, and North-West coast in Egypt. These studies offer suggestions, adaptations, and mitigation measures for future research.
Figures
PreviousNext
Review Article
Open Access April 29, 2024

Digital Forensic Investigation Standards in Cloud Computing

Abstract Digital forensics in cloud computing environments presents significant challenges due to the distributed nature of data storage, diverse security practices employed by service providers, and jurisdictional complexities. This study aims to develop a comprehensive framework and improved methodologies tailored for conducting digital forensic investigations in cloud settings. A pragmatic research [...] Read more.
Digital forensics in cloud computing environments presents significant challenges due to the distributed nature of data storage, diverse security practices employed by service providers, and jurisdictional complexities. This study aims to develop a comprehensive framework and improved methodologies tailored for conducting digital forensic investigations in cloud settings. A pragmatic research philosophy integrating positivist and interpretivist paradigms guides an exploratory sequential mixed methods design. Qualitative methods, including case studies, expert interviews, and document analysis were used to explore key variables and themes. Findings inform hypotheses and survey instrument development for the subsequent quantitative phase involving structured surveys with digital forensics professionals, cloud providers, and law enforcement agencies, across the globe. The multi-method approach employs purposive and stratified random sampling techniques, targeting a sample of 100-150 participants, across the globe, for qualitative components and 300-500 for quantitative surveys. Qualitative data went through thematic and content analysis, while quantitative data were analysed using descriptive and inferential statistical methods facilitated by software such as SPSS and R. An integrated mixed methods analysis synthesizes and triangulates findings, enhancing validity, reliability, and comprehensiveness. Strict ethical protocols safeguard participant confidentiality and data privacy throughout the research process. This robust methodology contributed to the development of improved frameworks, guidelines, and best practices for digital forensics investigations in cloud computing, addressing legal and jurisdictional complexities in this rapidly evolving domain.
Figures
PreviousNext
Article
Open Access March 16, 2022

Postpartum Depression during the Pandemic Crisis in Bangladesh: A Teleconsultation Insight

Abstract Given the limited access to medical facilities, impeding lockdown, and social isolation during the COVID-19 pandemic, an upsurge in postpartum depression among pregnant mothers in their puerperal period has become more apparent alongside an eventual increase in suicidal behavior. This article aimed to discuss the crucial aspects of different clinical case studies treated during recent periods [...] Read more.
Given the limited access to medical facilities, impeding lockdown, and social isolation during the COVID-19 pandemic, an upsurge in postpartum depression among pregnant mothers in their puerperal period has become more apparent alongside an eventual increase in suicidal behavior. This article aimed to discuss the crucial aspects of different clinical case studies treated during recent periods throughout the COVID-19 pandemic via teleconsultations. We hoped to demonstrate tremendous opportunities for the application of healthcare via therapeutic tools online in telemedicine to manage such conditions in a developing country like Bangladesh with a severe scarcity of healthcare infrastructure and resources.
Case Report
Open Access October 15, 2022

Big Data and AI/ML in Threat Detection: A New Era of Cybersecurity

Abstract The unrelenting proliferation of data, entwined with the prevalence of mobile devices, has given birth to an unprecedented growth of information obscured by noise. With the Internet of Things and myriad endpoint devices generating vast volumes of sensitive and critical data, organizations are tasked with extracting actionable intelligence from this deluge. Governments and enterprises alike, even [...] Read more.
The unrelenting proliferation of data, entwined with the prevalence of mobile devices, has given birth to an unprecedented growth of information obscured by noise. With the Internet of Things and myriad endpoint devices generating vast volumes of sensitive and critical data, organizations are tasked with extracting actionable intelligence from this deluge. Governments and enterprises alike, even under pressure from regulatory boards, have strived to harness the power of data and leverage it to enhance safety and security, maximize performance, and mitigate risks. However, the adversaries themselves have capitalized on the unequal battle of big data and artificial intelligence to inflict widespread chaos. Therefore, the demand for big data analytics and AI/ML for high-fidelity intelligence, surveillance, and reconnaissance is at its highest. Today, in the cybersecurity realm, the detection of adverse incidents poses substantial challenges due to the sheer variety, volume, and velocity of deep packet inspection data. State-of-the-art detection techniques have fallen short of detecting the latest attacks after a big data breach incident. On the other hand, computational intelligence techniques such as machine learning have reignited the search for solutions for diverse monitoring problems. Recent advancements in AI/ML frameworks have the potential to analyze IoT/edge-generated big data in near real-time and assist risk assessment and mitigation through automated threat detection and modeling in the big data and AI/ML domain. Industry best practices and case studies are examined that endeavor to showcase how big data coupled with AI/ML unlocks new dimensions and capabilities in improved vigilance and monitoring, prediction of adverse incidents, intelligent modeling, and future uncertainty quantification by data resampling correction. All of these avenues lead to enhanced robustness, security, safety, and performance of industrial processes, computing, and infrastructures. A view of the future and how the potential threats due to the misuse of new technologies from bandwidth to IoT/edge, blockchain, AI, quantum, and autonomous fields is discussed. Cybersecurity is again playing out at a pace set by adversaries with low entry barriers and debilitating tools. The need for innovative solutions for defense from the emerging threat landscape, harnessing the power of new technologies and collaboration, is emphasized.
Figures
PreviousNext
Article
Open Access October 29, 2022

Neural Networks for Enhancing Rail Safety and Security: Real-Time Monitoring and Incident Prediction

Abstract The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the [...] Read more.
The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the improvements in monitoring can be achieved using artificial intelligence algorithms such as neural networks. Neural networks have been used to achieve real-time incident identification in monitoring the track quality in terms of classifying the graphical outputs of an ultrasonic system working with the rails and track bed, to predict incidents on the rail infrastructure due to transmission channels becoming blocked, and also to attempt scheduling preemptive and preventative maintenance. In terms of forecasting incidents and accidents on board the trains, neural networks have been used to model passenger behavior and optimize responses during a train station evacuation. In tackling the incidents and accidents occurring on rail transport, we contribute with two methodologies to detect anomalies in real-time and identify the level of security risk: at the maintenance level with personnel operating along the railways, and onboard passenger trains. These methodologies were evaluated on real-world datasets and shown to be able to achieve a high accuracy in the results. The results generated from these case studies also reveal the potential for network-wide applications, which could enhance security and safety on railway networks by offering the possibility of better managing network disruptions and more rapidly identifying security issues. The speed and coverage of the information generated through the implementation of these methodologies have implications in utilizing prediction for decision support and enhancing safety and security on board the rail network.
Figures
PreviousNext
Review Article
Open Access December 27, 2021

Predictive Analytics and Deep Learning for Logistics Optimization in Supply Chain Management

Abstract Managing supply chains efficiently has become a major concern for organizations. One of the important factors to optimize in supply chain management is logistics. The advent of technology and the increase in data availability allow for the enhancement of the efficiency of logistics in a supply chain. This discussion focuses on the blending of analytics with innovation in logistics to improve the [...] Read more.
Managing supply chains efficiently has become a major concern for organizations. One of the important factors to optimize in supply chain management is logistics. The advent of technology and the increase in data availability allow for the enhancement of the efficiency of logistics in a supply chain. This discussion focuses on the blending of analytics with innovation in logistics to improve the operations of a supply chain. An approach is presented on how predictive analytics can be used to improve logistics operations. In order to analyze big data in logistics effectively, an artificial intelligence computational technique, specifically deep learning, is employed. Two case studies are illustrated to demonstrate the practical employability of the proposed technique. This reveals the power and potential of using predictive analytics in logistics to project various KPI values ahead in the future based on the contemporary data from the logistics operations; sheds light on the innovative technique of employing deep learning through deep learning-based predictive analytics in logistics; suggests incorporating innovative techniques like deep learning with predictive analytics to develop an accurate forecasting technique in logistics and optimize operations and prevent disruption in the supply chain. The network of supply chains has become more complex, necessitating the need for the latest technological advancements. The sectors that have gained a fair amount of attention for the application of technology to optimize their operations are manufacturing, healthcare, aerospace, and the automotive industry. A little attention has been diverted to the logistics sector; many describe how analytics and artificial intelligence can be used in the logistics sector to achieve higher optimization. Currently, significant research has been done in optimizing logistics operations. Nevertheless, with the explosive volume of historical data being produced by the logistics operations of an organization, there is a great opportunity to learn valuable insights from the data accumulated over time for more long-term strategic planning. To develop the logistics operations in an organization, the use of historical data is essential to understand the trends in the operations. For example, regular maintenance planning and resource allocation based on trends are long-term activities that will not affect logistics operations immediately but can affect the business’s strategic planning in the long run. A predictive analysis technique employed on historical data of logistics can narrow down conclusions based on the future trends of logistics operations. Thus, the technique can be used to prevent the disruption of the supply chain.
Figures
PreviousNext
Review Article
Open Access December 27, 2019

A Comprehensive Study of Proactive Cybersecurity Models in Cloud-Driven Retail Technology Architectures

Abstract This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research [...] Read more.
This is a comprehensive, multi-year study designed to explore proactive security technologies implemented in cloud-driven retail technology architectures. Deploying cloud technologies in the retail environment creates a need for more comprehensive and proactive security technologies that protect both the psychological estate and fiscal estate. This work contributes to cloud-driven retail research by investigating anticipatory security technologies across numerous case studies. These case studies offer best practice models for elevating proactive cybersecurity in retail environments. The academic and professional communities currently lack security information and practices that apply to the retail environment. It is anticipated that the final results of this project will have value in shaping the next set of research in cybersecurity in retail environments. Many retail organizations are restricted to reactive security operations. Advanced security technologies operate on piloted activations that require the intervention of security analysts. In actuality, basic security products and security operations are now piloted by automation and machine learning. In one case study, a retail CTO shares a forensics example using a proactive security technology aimed at both psychological estate and fiscal estate. In another case study, direct discussions provide a retail university lecturer with insight into the use of driven intelligence for inventory management. The use of card technology for a model is used as an example that can be implemented as security technology which can be offered as a service to retail organizations.
Figures
PreviousNext
Review Article
Open Access November 24, 2022

Bridging Traditional ETL Pipelines with AI Enhanced Data Workflows: Foundations of Intelligent Automation in Data Engineering

Abstract Machine Learning (ML) and Artificial Intelligence (AI) are having an increasingly transformative impact on all industries and are already used in many mission-critical use cases in production, bringing considerable value. Data engineering, which combines ETL pipelines with other workflows managing data and machine learning operations, is also significantly impacted. The Intelligent Data [...] Read more.
Machine Learning (ML) and Artificial Intelligence (AI) are having an increasingly transformative impact on all industries and are already used in many mission-critical use cases in production, bringing considerable value. Data engineering, which combines ETL pipelines with other workflows managing data and machine learning operations, is also significantly impacted. The Intelligent Data Engineering and Automation framework offers the groundwork for intelligent automation processes. However, ML/AI are not the only disruptive forces; new Big Data technologies inspired by Web2.0 companies are also reshaping the Internet. Companies having the largest Big Data footprints not only provide applications with a Big Data operational model but also source their competitive advantage from data in the form of AI services and, consequently, impact the cost/performance equilibrium of ETL pipelines. All these technologies and reasons help explain why the traditional ETL pipeline design should adapt to current and emerging technologies and may be enhanced through artificial intelligence.
Figures
PreviousNext
Article
Open Access December 27, 2021

Digital Signal Processing Challenges in Financial Messaging Systems: Case Studies in High-Volume SWIFT Flows

Abstract Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud [...] Read more.
Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud detection, integrating pattern recognition and anomaly scoring procedures into a latency conscious processing system. The second focuses on minimizing delay without degrading detection accuracy, balancing speed and fidelity in filter design and control. Together, they demonstrate the potential for applying a DSP perspective to broad classes of problems encountered in processing financial messaging data. The first study extends work on a signal representation of financial messaging data streams and the associated noise characteristics by developing a vocabulary that translates real-world fraud patterns into DSP operations. Examination of the resulting choice of signal features, combined with considerations of detection speed, form the basis for details about implementing the pattern-recognition and anomaly-scoring tasks within a streaming-processing architecture.
Figures
PreviousNext
Review Article

Query parameters

Keyword:  Case Studies

View options

Citations of

Views of

Downloads of