The aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disruptive events and the selection of appropriate risk treatment plans. Moreover, the framework leverages a fuzzy reasoning system in conjunction with a multi-criteria decision-making method to process ambiguous information, thereby enhancing decision accuracy and reliability. The findings demonstrate that this comprehensive approach not only prioritizes risks effectively but also supports companies in refining their response strategies, ensuring the efficient delivery of services under challenging conditions. Ultimately, the study redefines resilience as a dynamic process of navigating and adapting to chaos rather than merely resisting it.
Semi-active suspension systems have emerged as an attractive alternative to fully active suspensions because they offer a superior capacity to improve vehicle ride comfort and handling performance with significantly lower energy consumption. Conventional semi-active control strategies, however, such as skyhook damping, often cannot accommodate the nonlinear and time-varying dynamics of vehicles in operation under impulse or severe road disturbances. In this context, an intelligent smart-damper controller is proposed in this paper by incorporating a Modified Fuzzy Adaptive Fuzzy Logic Control framework in a half-car suspension model. In the developed controller, the effective damping force is adaptively tuned using real-time measurements of
... Show MoreThe sustainability of the individual and society get great interest in contemporary studies,
Considering the rebuilding of the society cultural values as the most important goals, which
prompted many researchers to explore ways and social elements of sustainability and the most
important urban and architectural vocabulary achieving it, thus, the search will be directed
towards the human being within the social dimensions of sustainability, his belonging and
awareness of identity through the employment of local heritage in the contemporary product.
The literatures confirmed the continuity of heritage vocabulary in the contemporary product, accordingly the research problem was defined as: "The visual continuity of the her
Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe research aims to define the main and subsidiary criteria for evaluating the industrial market sectors and proposing a model for arranging these criteria according to priority and knowing the highest criteria in terms of relative importance in the General Company for Automobile Trade and Machinery, and for the purpose of establishing this model, experiences in the concerned company were approved, and this study proposes a multi-criteria decision model According to the FEAHP, the expanded fuzzy hierarchical analysis method enables the commercial company to develop clear strategic policies on which the company’s management system depends on determining criteria for evaluating and selecting market sectors and making appropriate
... Show MoreThe main objective of resources management is to supply and support the site operation with necessary resources in a way to achieve the required timing in handing over the work as well as to achieve the cost-realism within the budget estimated. The research aims to know the advantage of using GIS in management of resources as one of the new tools that keep pace with the evolution in various countries around the world also collect the vast amount of spatial data resources in one environment easily to handled and accessed quickly and this help to make the right decision regarding management of resources in various construction projects. The process of using GIS in the management and identification of resources is of extreme importance in t
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MorePurpose The purpose of this study was to evaluate the complications associated with the use of reconstruction plates with or without non-vascularized bone graft in reconstruction of mandibular segmental defects caused by trauma and tumor resection and to analyze various factors that are associated with the development of complications. Methods A retrospective observational study was conducted, and the investigated variables included the age and gender of the patients, etiology of the defect, the site of the defect, the size of the defect, whether bone graft was used or not, type of plate used, and whether the reconstruction was immediate or delayed. The outcome variables were the postoperative complications and the success rate. Results Fif
... Show More