International Journal of Safety and Security Engineering

Journal Information
ISSN / EISSN : 2041-9031 / 2041-904X
Total articles ≅ 456
Current Coverage
SCOPUS
GEOBASE
COMPENDEX
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

, Divya Midhunchakkaravarthy
International Journal of Safety and Security Engineering, Volume 11, pp 201-205; doi:10.18280/ijsse.110209

Abstract:
The utilization of energy in blockchain division is high as resource allocation models are using this technology and the rundown of resource utilization cases is continually developing. The communicated and permanent nature of blockchain innovation might be utilized to quicken the progressing change to increasingly decentralized and digitalized vitality frameworks and to address a portion of the difficulties the business is confronting in providing security in identification of authorized users and resource allocation transactions among the authorized users. The allocated resources to the users need to be recorded, otherwise the attackers may use them for malicious operations. In any case, blockchain is a developing innovation and it is viewed as a basic vulnerability by numerous users as the difficulties and chances of execution are still to a great extent. There is in this way an absence of information and shortage of dynamic gadgets for getting why, when and how the innovation can include significant worth. The proposed Resource Allocation for Authorized Users using Time specific Blockchain Methodology (RAAUTBM) performs resource allocation to authorized users to avoid malicious actions among blockchain-based use cases and increase practical information about how blockchain could be actualized. The RAAUTBM model verifies all the users for allotting access to the system. The proposed model allots the resources only to the authorized users and to identify the malicious users and remove them from the framework. The resources once allotted to a user remains for a time interval and then the resource is re-allotted to other authorized users for avoiding delay. Resource exchanges in this segment are known to be dull and wasteful, to a limited extent because of the absence of promoted straightforwardness. This research work centers around the advancement of a blockchain application that can improve the resource exchange procedure among authorized users. The proposed model is compared with the traditional methods and the results demonstrate that the proposed model is effective in allocating resources only to the authorized users.
, Barnali Gupta Banik
International Journal of Safety and Security Engineering, Volume 11, pp 167-173; doi:10.18280/ijsse.110205

Abstract:
The idea of sharing economy gives rise to unique ideas and develops innovative businesses. This article aims to relate the smart city concept by introducing the smart transport system and explores the opportunities of adopting blockchain technology in ride-sharing services. Blockchain technology is a distributed, decentralized public ledger that allows peer-to-peer transactions in a secured way without any third party. This paper proposes a blockchain-based framework from the existing centralized framework for a ride-sharing service and implements the same as a decentralized application (DApp) based on smart contracts on Ethereum Blockchain. Using smart contracts facilitate the users with automated transactions, removes the intermediaries, and enables various activities to be carried out safely and securely. Implementation of smart contracts is done using the Solidity programming language. This DApp uses the min matching algorithm to match riders requesting rideshare to save total travel distance. With the overwhelming growth in the usage of cryptocurrencies, smart contracts usage in applications as proposed in this paper can transform the sharing economy.
, Muruganantham Ponnusamy, G. Thamarai Selvi, R. Saravanakumar, M. Ashok, V. Nagaraj
International Journal of Safety and Security Engineering, Volume 11, pp 207-211; doi:10.18280/ijsse.110210

Abstract:
Road safety and its risk assessment has become very significant due to the increasing population and usage of transports in the current scenario. This research work primarily focuses on assessing the critical risk factors that trigger road accidents in India. Based on literature review and expert’s opinion, twenty-eight risk factors are identified and rated on a scale from 1 – 6. These critical factors are prepared as a questionnaire and the required input data is collected from a diversified set of automotive users. Further, the data is carefully processed and analyzed for identification of severe risk factors and its allied route cause based on the survey pattern. Three different cut-off patterns (Low risk, high risk & medium risk zone) are included to make the study more interesting, and the 28 factors are clustered with the aid of the collective results. Also, the dominant risk factors that has higher probability in triggering road accidents are identified for possible rectification.
, Ritika, Madan Garg
International Journal of Safety and Security Engineering, Volume 11, pp 193-199; doi:10.18280/ijsse.110208

Abstract:
Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.
Ali Fadhil Naser, Hussam Ali Mohammed, Ayad Ali Mohammed
International Journal of Safety and Security Engineering, Volume 11, pp 143-153; doi:10.18280/ijsse.110203

Abstract:
The objective of this study was to assess the seismic performance of two types of bridges structures under effect of earthquake by using different locations and numbers of piers. The results of D/C ratio showed that simply supported I girder bridge appeared higher structural capacity than continuous box girder bridge which was resisted the seismic demand. Continuous box girder bridge had higher seismic demand and lower structural capacity comparing with simply supported I girder bridge. Commonly, the seismic design for two types of bridges models with increasing of piers numbers was suitable to resist the earthquake action for region type B. The results of non-linear static analysis (pushover method) showed that the increasing of piers numbers had significant effects on the seismic design of bridges structures to increase the displacement capacity, force capacity, and decreasing of seismic demand to reduce the effects of earthquake action on the bridges structural members. The bridge type simply supported I girder had higher capacity in longitudinal direction than continuous box girder bridge. Whereas, for continuous box girder bridge appeared higher capacity in transverse direction than simply supported I girder. The performance points which were based on displacement were decreased with increasing the piers numbers for bridges structures supports.
Edi Kurniawan, , Muchamad Dafip
International Journal of Safety and Security Engineering, Volume 11, pp 175-183; doi:10.18280/ijsse.110206

Abstract:
Flood is a common and frequent natural disaster in many countries that causes huge economic losses and casualties every year. Youth participation in flood disaster management (FDM) has not been much explored, especially in the non-prone area but contributing to flooding resilience. Therefore, this study aims to identify youth participation in disaster management to help an improvement in preparedness action. The research was conducted using a qualitative model: case study research, involving 191 young people aged 14-35-years in 16 sub-districts in Semarang City. The data, including youth’s action, knowledge, and participation in FDM, was collected using Google Form, observation, and interview, then statistically analyzed using Mann-Whitney’s test and path analysis. The results show the respondents in flood-affected areas are more actively participating in flood disaster management action because of their experience in facing flooding. Also, the planning step is significantly influenced by the FDM implementation. The planning process is the main defining factor in disaster management successfulness and essentially affecting mitigation, rehabilitation, and evaluation steps. The level of youth participation is deemed necessary to be increased to develop a more comprehensive disaster management program according to regional needs. We suggest that FDM should be transformed into disaster awareness which is delivered through education, socialization, training, and/or flood disaster response simulations.
I-Jyh Wen, Chien Wei Liang
International Journal of Safety and Security Engineering, Volume 11, pp 185-192; doi:10.18280/ijsse.110207

Abstract:
In petrochemical industry, the execution of construction involves three main issues, namely, design planning, construction, and job safety. Three-dimensional (3D) models are increasingly applied to design and construction. However, the improper concept of 3D design has bred potential unsatisfactory behaviors and the lack of vigilance among workers. Besides, many employees are not fully aware of the safety in 3D design and construction planning. Therefore, our goal is to improve the safety and health of construction workers through design practices in the upstream of the construction phase, and verify the applicability of the combination of 3D models and safety knowledge. Specifically, a questionnaire survey was carried out among 124 employees in the construction-related fields of the petrochemical industry. The collected data were processed, and statically analyzed on SPSS. The results show that safety knowledge was acceptable in 3D model design from the perspective of project executors, and the integration of safety knowledge into the design helps to improve the safety environment of the construction site.
, Kholida Hanim
International Journal of Safety and Security Engineering, Volume 11, pp 135-142; doi:10.18280/ijsse.110202

Abstract:
Risk of goods and security incidents, such as theft, boycott, smuggling and terrorism are likely to occur in a shipping process, therefore risk controls are needed to reduce the adverse effects. A research on the supply chain security risk management based on ISO 28001 security supply chain is conducted to overcome such problems. The purpose of this research is to analyse compliance & supply chain security risks and propose a mitigation based on ISO 28001 in a logistic service provider in Indonesia. A gap analysis is conducted to assess the compliance of security performance in seven areas, i.e. supply chain security management, security plans, asset security, personnel security, information security, security of goods & conveyance and transportation units closed cargo. The result of the assessment showed that a compliance level of above 75% indicates that the company is ready to implement an ISO 28001. The risk mitigation plan is proposed based on Failure mode effect analysis (FMEA) which calculates the Risk Priority Number (RPN). The RPN value indicates the level of risk where the higher the value, the more critical the risk and become the priority to handle. The mitigation proposed for managing risk are reducing, sharing and avoiding.
Ghassan M. Suleiman, , Murat Ergun, Khaled Al Omari
International Journal of Safety and Security Engineering, Volume 11, pp 129-134; doi:10.18280/ijsse.110201

Abstract:
Traffic accidents present a serious problem for both developed and developing countries and have become an urgent matter to tackle in all large metropolitan areas. This study aims to perform a deep comprehensive analysis of the traffic accidents issue in Istanbul, one of the world’s most populous cities. The accidents were classified and its intensities were presented on Istanbul map using a GIS tool. Furthermore, the performance of Negative Binomial Regression analysis and Adaptive Neuro-Fuzzy Inference System (ANFIS) model was assessed. Data collection of independent variables included distribution of trips, percentage of street parking, rate of car ownership, street density and population density. Trips were divided into three categories, passenger car, minibus and bus trips. The results showed that four legs intersection got the highest proportion of accidents among the other types with (40%). It also demonstrated that increasing both the percentage of bus trips and the percentage of street parking will decrease the traffic accident rate. Furthermore, the implementation of ANFIS model increased the accuracy of forecasts and reduced errors more than the regression model.
, Yongzheng Yang, Lixia Zhang, Xiaoxia Yang, Jinshun Yang, Meijun Liu
International Journal of Safety and Security Engineering, Volume 11, pp 155-165; doi:10.18280/ijsse.110204

Abstract:
To study the influence of illumination and longitudinal slope at the entrance and exit of an undersea tunnel on driver EEG characteristics, a real vehicle experiment was performed with the Jiaozhou Bay Undersea Tunnel. The experimental data of a driver’s real vehicle experiment were collected using an illuminance meter, EEG instrument, video recorder and other experimental equipment. The EEG power spectrum was classified according to frequency, the difference between the EEG power spectrum at the entrance and exit sections and other regions was analyzed, and the influence of the illumination and longitudinal slope of the undersea tunnel on the brain activity of drivers was studied. The region near the entrance and exit of the undersea tunnel was divided equidistantly, the changes in the EEG power of the driver during the process of entering and exiting the undersea tunnel were analyzed, and the changes in brain activity and different brain regions during the process were studied. Based on the EEG power, the model of illumination, longitudinal slope and their coupling effect was established. The traffic safety of the entrance and exit of the undersea tunnel was analyzed, and a high-risk driving region was found. The results show that the power spectrum of the entrance and exit sections of the undersea tunnel is obviously different from those of other sections. At 50 m behind the entrance point and 50 m in front of the exit point of the undersea tunnel, the power of the β wave changes rapidly and is at a high level. The consistency between the variation law of the β wave and the variation law of illumination is high. At the entrance and exit of the undersea tunnel, the active regions of the driver’s brain are concentrated in the frontal lobe and occipital lobe.
Back to Top Top