Search results for: current research information systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 41427

Search results for: current research information systems

38427 Composite Electrodes Containing Ni-Fe-Cr as an Activatable Oxygen Evolution Catalyst

Authors: Olga A. Krysiak, Grzegorz Cichowicz, Wojciech Hyk, Michal Cyranski, Jan Augustynski

Abstract:

Metal oxides are known electrocatalyst in water oxidation reaction. Due to the fact that it is desirable for efficient oxygen evolution catalyst to contain numerous redox-active metal ions to guard four electron water oxidation reaction, mixed metal oxides exhibit enhanced catalytic activity towards oxygen evolution reaction compared to single metal oxide systems. On the surface of fluorine doped tin oxide coated glass slide (FTO) deposited (doctor blade technique) mixed metal oxide layer composed of nickel, iron, and chromium. Oxide coating was acquired by heat treatment of the aqueous precursors' solutions of the corresponding salts. As-prepared electrodes were photosensitive and acted as an efficient oxygen evolution catalyst. Our results showed that obtained by this method electrodes can be activated which leads to achieving of higher current densities. The recorded current and photocurrent associated with oxygen evolution process were at least two orders of magnitude higher in the presence of oxide layer compared to bare FTO electrode. The overpotential of the process is low (ca. 0,2 V). We have also checked the activity of the catalyst at different known photoanodes used in sun-driven water splitting. Herein, we demonstrate that we were able to achieve efficient oxygen evolution catalysts using relatively cheap precursor consisting of earth abundant metals and simple method of preparation.

Keywords: chromium, electrocatalysis, iron, metal oxides, nickel, oxygen evolution

Procedia PDF Downloads 210
38426 Integrated Human Resources and Work Environment Management System

Authors: Loreta Kaklauskiene, Arturas Kaklauskas

Abstract:

The Integrated Human Resources and Work Environment Management (HOWE) System optimises employee productivity, improves the work environment, and, at the same time, meets the employer’s strategic goals. The HOWE system has been designed to ensure an organisation can successfully compete in the global market, thanks to the high performance of its employees. The HOWE system focuses on raising workforce productivity and improving work conditions to boost employee performance and motivation. The methods used in our research are linear correlation, INVAR multiple criteria analysis, digital twin, and affective computing. The HOWE system is based on two patents issued in Lithuania (LT 6866, LT 6841) and one European Patent application (No: EP 4 020 134 A1). Our research analyses ways to make human resource management more efficient and boost labour productivity by improving and adapting a personalised work environment. The efficiency of human capital and labour productivity can be increased by applying personalised workplace improvement systems that can optimise lighting colours and intensity, scents, data, information, knowledge, activities, media, games, videos, music, air pollution, humidity, temperature, vibrations, and other workplace aspects. HOWE generates and maintains a personalised workspace for an employee, taking into account the person’s affective, physiological and emotional (APSE) states. The purpose of this project was to create a HOWE for the customisation of quality control in smart workspaces taking into account the user’s APSE states in an integrated manner as a single unit. This customised management of quality control covers the levels of lighting and colour intensities, scents, media, information, activities, learning materials, games, music, videos, temperature, energy efficiency, the carbon footprint of a workspace, humidity, air pollution, vibrations and other aspects of smart spaces. The system is based on Digital Twins technology, seen as a logical extension of BIM.

Keywords: human resource management, health economics, work environment, organizational behaviour and employee productivity, prosperity in work, smart system

Procedia PDF Downloads 75
38425 Current Status of Mosquitoes Vector Research and Control in Iran

Authors: Seyed Hassan Moosa-kazemi, Hassan Vatandoost

Abstract:

Malaria, Dirofilaria immitis (dog heart worm), and D. repens (dirofilariasis), which are transmitted by mosquitoes, have been reported in Iran. The Iranian mosquito fauna includes seven genera, 65 species, and three subspecies. Aedes albopictus has been reported since. West Nile, Sindbis, Dengue, Japanese encephalitis viruses, and the nematode Setaria (setariasis) has been reported in the country but there are no information about their vectors in Iran. Iran is malaria elimination phase. Insecticides residual spraying (IRS), distributed of insecticides long lasting treated nets (ITNs), fogging, release of larvivours fishes and Bacillus thuringiensis, chemical larviciding, as well as case finding and manipulation and modification of breeding places carried out thought the IVM program in the country. Prolonged exposure to insecticides over several generations of the vectors, develop resistance, a capacity to survive contact with insecticides. However, use of insecticides in agriculture has often been implicated as contributing to resistance in mosquito’s vectors. Resistance of mosquitoes to some insecticides has been documented just within a few years after the insecticides were introduced. Some enzymes such as monooxygenases, esterases and glutathione S-transferases have been considered as a reason for resistance to pyrethroid insecticides. In conclusion, regarding to documented resistance and tolerance of mosquitoes vectors to some insecticides, resistance management is suggested by using new insecticide with novel mode of action.

Keywords: control, Iran, resistance, vector

Procedia PDF Downloads 303
38424 The Role of Female Population as a Consumer in Modern Marketing Strategy and Management

Authors: Jana Aleksić, Marijana Petković

Abstract:

Female population has an increasing role when it comes to purchase. Consequently, the female population has a greater role in modern marketing. Although it is thought that women buy more than men, marketing strategy was not directed specifically towards women. The thing that has changed regarding women’s role in modern marketing is the fact that the female population has a leading position when it comes to decision making in various fields and various sectors, which was not the case in the past. Marketing should be directed towards women but it should be done in the right way. Compared to men, women buy in a different way, and they look for more various advantages in the product itself, than men do. This paper aims to show the importance of the female role in the modern marketing and management and to redirect marketing in some way towards female population through new marketing strategies and management systems. Hypothesis is that women have an important role in marketing, and marketing strategy of modern society could and should be based on and directed towards female population and their tastes when it comes to purchasing. It is necessary and desirable to apply marketing strategy with a special strategy that has an emphasis on women and their purchase or in a word to apply WS- woman strategy. This research was carried out as a random sample research, where were obtained 212 valid surveys whose results serve as a basis for drawing conclusions about the research as well as to verify the formulated hypotheses. The research was carried out during 2011 and 2012. The study has shown a significant role of the female population in the marketing process.

Keywords: marketing, management, female, purchase, strategy

Procedia PDF Downloads 448
38423 Teacher Professional Development –Current Practices in a Secondary School in Brunei Darussalam

Authors: Shanthi Thomas

Abstract:

This research paper presents the current practices of teacher professional development, perceived as beneficial by teachers themselves, in a private secondary school in Brunei Darussalam. This is part of the findings of a larger qualitative study on teacher empowerment, using ethnographic methods for data collection, i.e. participant observation, interviews and document analysis. The field work was carried out over a period of six months in 2013. An analysis of the field data revealed multiple pathways of teacher professional development existing in the school. The results indicate that school leaders, the teacher community in the school, students, and the teachers themselves were the agents in a school that facilitated teacher empowerment. Besides contributing to the knowledge base on teacher professional development, the results of this study provides directions for educational policy makers in their efforts to enhance professional development in secondary schools of similar characteristics. For school leaders and the teacher community, these findings offer guidelines for maximizing the opportunities for these professional development practices, by strengthening collegiality and by using the existing structures optimally for the benefit of all concerned.

Keywords: colleagues and the wider teacher community, school leaders, self-driven professional development, teacher professional development

Procedia PDF Downloads 413
38422 Sinhala Sign Language to Grammatically Correct Sentences using NLP

Authors: Anjalika Fernando, Banuka Athuraliya

Abstract:

This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired community

Keywords: Sinhala sign language, sign Language, NLP, LSTM, NMT

Procedia PDF Downloads 104
38421 Relationship Financing: A Process of Interpretative Phenomenological Analysis

Authors: Y. Fandja, O. Colot, M. Croquet

Abstract:

Small and medium-sized firms (SMEs) face difficulties in accessing bank credit. Bank credit is actually the main source of external financing for SMEs. In general, SMEs are risky businesses because of the potential opacity maintained by the leader in the management of affairs, the agency conflicts between business owners and third-party funders and the potential opportunism of the leader due to the incompleteness of the contracts. These elements accentuate the problems of information asymmetries between SMEs and bankers leading to capital rationing. Moreover, the last economic crisis reinforced this rationing of capital. However, a long-term relationship between SMEs and their bank would enable the latter to accumulate a set of relevant information allowing the reduction of information asymmetry and, consequently, the reduction of credit rationing. The objective of this research is to investigate the lived experience of SMEs loan officers in their relationships with their clients in order to understand how these relationships can affect the financing structure of these SMEs. To carry out this research, an Interpretative Phenomenological Analysis is implemented. This approach is part of the constructivist paradigm and refers to the subjective narratives of the individual rather than to an objective description of the facts. The role of the researcher is to explore the lived experience of the interviewees and to try to understand the meaning they give to this experience. Currently, several sixty-minute semi-structured interviews with loan officers for SMEs have been conducted. The analysis of the content of these interviews brought out three main themes. First, the relationship between the credit officer and the company manager is complex because the credit officer is not aware of establishing a personal relationship with his client. Second; the emotional involvement in the bank financing decision is present and third, the trust in the relationship between the credit officer and his client is very important. The originality of this research is to use the interpretative phenomenological analysis more specific to psychology and sociology in order to approach in a different way the problem of the financing of SMEs through their particular relations with the bankers.

Keywords: financing structure, interpretative phenomenological analysis, relationship financing, SME

Procedia PDF Downloads 159
38420 Engaging Local Communities on Large-Scale Construction Project

Authors: Melissa Teo

Abstract:

It is increasingly important that project managers develop greater capabilities to better manage the social, cultural, political, environmental and economic impacts on proposed construction projects. These challenges are best resolved in consultation with communities rather than in conflict with them. This is particularly important on controversial projects which are projects that have obtained government sanctioned ‘development approval’ but not ‘community approval’. While a rich body of research and intellectual frameworks exist in the fields of urban geography and planning to understand and manage community concerns during the pre-development approval stages of new projects, current theoretical frameworks guiding community engagement in project management are inadequate. A new and innovative research agenda is needed to guide thinking about the role of local communities in the construction process and is an important research gap that needs to be filled. Within this context, this research aims to assess the effectiveness of strategies adopted by project teams to engage with local communities so as to capture lessons learnt to apply to future projects. This paper reports a research methodology which uses Arnstein’s model of participation to better understand how power differentials between the project team and local communities can influence the adoption of community engagement strategies. A case study approach is utilizing interviews and documentary analysis of a large-scale controversial construction project in Queensland, Australia is presented. The findings will result in a number of recommendations to guide community engagement practices on future projects.

Keywords: community engagement, construction, case study, project management

Procedia PDF Downloads 253
38419 The Current Level of Shared Decision-Making in Head-And-Neck Oncology: An Exploratory Study – Preliminary Results

Authors: Anne N. Heirman, Song Duimel, Rob van Son, Lisette van der Molen, Richard Dirven, Gyorgi B. Halmos, Julia van Weert, Michiel W.M. van den Brekel

Abstract:

Objectives: Treatments for head-neck cancer are drastic and often significantly impact the quality of life and appearance of patients. Shared decision-making (SDM) beholds a collaboration between patient and doctor in which the most suitable treatment can be chosen by integrating patient preferences, values, and medical information. SDM has a lot of advantages that would be useful in making difficult treatment choices. The objective of this study was to determine the current level of SDM among patients and head-and-neck surgeons. Methods: Consultations of patients with a non-cutaneous head-and-neck malignancy facing a treatment decision were selected and included. If given informed consent, the consultation was recorded with an audio recorder, and the patient and surgeon filled in a questionnaire immediately after the consultation. The SDM level of the consultation was scored objectively by independent observers who judged audio recordings of the consultation using the OPTION5-scale, ranging from 0% (no SDM) to 100% (optimum SDM), as well as subjectively by patients (using the SDM-Q-9 and Control preference scale) and clinicians (SDM-Q-Doc, modified control preference scale) percentages. Preliminary results: Five head-neck surgeons have each at least seven recorded conversations with different patients. One of them was trained in SDM. The other four had no experience with SDM. Most patients were male (74%), and oropharyngeal carcinoma was the most common diagnosis (41%), followed by oral cancer (33%). Five patients received palliative treatment of which two patients were not treated recording guidelines. At this moment, all recordings are scored by the two independent observers. Analysis of the results will follow soon. Conclusion: The current study will determine to what extent there is a discrepancy between the objective and subjective level of shared decision-making (SDM) during a doctor-patient consultation in Head-and-Neck surgery. The results of the analysis will follow shortly.

Keywords: head-and-neck oncology, patient involvement, physician-patient relations, shared decision making

Procedia PDF Downloads 94
38418 Electrocoagulation of Ni(OH)2/NiOOH for the Removal of Boron Using Nickel Foam as Sacrificial Anode

Authors: Yu-Jen Shih, Yao-Hui Hunag

Abstract:

Electrocoagulation (EC) using metallic nickel foam as anode and cathode for the removal of boron from solution was studied. The electrolytic parameters included pH, current density, and initial boron concentration for optimizing the EC process. Experimental results showed that removal efficiency was increased by elevating pH from 4.0 to 8.0, and then decreased at higher pH. The electrolytic efficacy was not affected by current density. In respect of energy consumption, 1.25 mA/cm2 of current density was acceptable for an effective EC of boron, while increasing boric acid from 10 to 100 ppm-B did not impair removal efficiency too much. Cyclic voltammetry indicated that the oxide film, Ni(OH)2 and NiOOH, at specific overpotentials would result in less weight loss of anode than that predicted by the Faraday’s law. The optimal conditions under which 99.2% of boron was removed and less than 1 ppm-B remained in the electrolyte would be pH 8, four pairs of electrodes, and 1.25 mA/cm2 in 120 min as treating wastewaters containing 10 ppm-B. XRD and SEM characterization suggested that the granular crystallites of hydroxide precipitates was composed of theophrastite.

Keywords: borohydrides, hydrogen generation, NiOOH, electrocoagulation, cyclic voltammetry, boron removal

Procedia PDF Downloads 260
38417 Developing an Information Model of Manufacturing Process for Sustainability

Authors: Jae Hyun Lee

Abstract:

Manufacturing companies use life-cycle inventory databases to analyze sustainability of their manufacturing processes. Life cycle inventory data provides reference data which may not be accurate for a specific company. Collecting accurate data of manufacturing processes for a specific company requires enormous time and efforts. An information model of typical manufacturing processes can reduce time and efforts to get appropriate reference data for a specific company. This paper shows an attempt to build an abstract information model which can be used to develop information models for specific manufacturing processes.

Keywords: process information model, sustainability, OWL, manufacturing

Procedia PDF Downloads 430
38416 Synthetic Method of Contextual Knowledge Extraction

Authors: Olga Kononova, Sergey Lyapin

Abstract:

Global information society requirements are transparency and reliability of data, as well as ability to manage information resources independently; particularly to search, to analyze, to evaluate information, thereby obtaining new expertise. Moreover, it is satisfying the society information needs that increases the efficiency of the enterprise management and public administration. The study of structurally organized thematic and semantic contexts of different types, automatically extracted from unstructured data, is one of the important tasks for the application of information technologies in education, science, culture, governance and business. The objectives of this study are the contextual knowledge typologization, selection or creation of effective tools for extracting and analyzing contextual knowledge. Explication of various kinds and forms of the contextual knowledge involves the development and use full-text search information systems. For the implementation purposes, the authors use an e-library 'Humanitariana' services such as the contextual search, different types of queries (paragraph-oriented query, frequency-ranked query), automatic extraction of knowledge from the scientific texts. The multifunctional e-library «Humanitariana» is realized in the Internet-architecture in WWS-configuration (Web-browser / Web-server / SQL-server). Advantage of use 'Humanitariana' is in the possibility of combining the resources of several organizations. Scholars and research groups may work in a local network mode and in distributed IT environments with ability to appeal to resources of any participating organizations servers. Paper discusses some specific cases of the contextual knowledge explication with the use of the e-library services and focuses on possibilities of new types of the contextual knowledge. Experimental research base are science texts about 'e-government' and 'computer games'. An analysis of the subject-themed texts trends allowed to propose the content analysis methodology, that combines a full-text search with automatic construction of 'terminogramma' and expert analysis of the selected contexts. 'Terminogramma' is made out as a table that contains a column with a frequency-ranked list of words (nouns), as well as columns with an indication of the absolute frequency (number) and the relative frequency of occurrence of the word (in %% ppm). The analysis of 'e-government' materials showed, that the state takes a dominant position in the processes of the electronic interaction between the authorities and society in modern Russia. The media credited the main role in these processes to the government, which provided public services through specialized portals. Factor analysis revealed two factors statistically describing the used terms: human interaction (the user) and the state (government, processes organizer); interaction management (public officer, processes performer) and technology (infrastructure). Isolation of these factors will lead to changes in the model of electronic interaction between government and society. In this study, the dominant social problems and the prevalence of different categories of subjects of computer gaming in science papers from 2005 to 2015 were identified. Therefore, there is an evident identification of several types of contextual knowledge: micro context; macro context; dynamic context; thematic collection of queries (interactive contextual knowledge expanding a composition of e-library information resources); multimodal context (functional integration of iconographic and full-text resources through hybrid quasi-semantic algorithm of search). Further studies can be pursued both in terms of expanding the resource base on which they are held, and in terms of the development of appropriate tools.

Keywords: contextual knowledge, contextual search, e-library services, frequency-ranked query, paragraph-oriented query, technologies of the contextual knowledge extraction

Procedia PDF Downloads 359
38415 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 134
38414 Strategies and Approaches for Curriculum Development and Training of Faculty in Cybersecurity Education

Authors: Lucy Tsado

Abstract:

As cybercrime and cyberattacks continue to increase, the need to respond will follow suit. When cybercrimes occur, the duty to respond sometimes falls on law enforcement. However, criminal justice students are not taught concepts in cybersecurity and digital forensics. There is, therefore, an urgent need for many more institutions to begin teaching cybersecurity and related courses to social science students especially criminal justice students. However, many faculty in universities, colleges, and high schools are not equipped to teach these courses or do not have the knowledge and resources to teach important concepts in cybersecurity or digital forensics to criminal justice students. This research intends to develop curricula and training programs to equip faculty with the skills to meet this need. There is a current call to involve non-technical fields to fill the cybersecurity skills gap, according to experts. There is a general belief among non-technical fields that cybersecurity education is only attainable within computer science and technologically oriented fields. As seen from current calls, this is not entirely the case. Transitioning into the field is possible through curriculum development, training, certifications, internships and apprenticeships, and competitions. There is a need to identify how a cybersecurity eco-system can be created at a university to encourage/start programs that will lead to an interest in cybersecurity education as well as attract potential students. A short-term strategy can address this problem through curricula development, while a long-term strategy will address developing training faculty to teach cybersecurity and digital forensics. Therefore this research project addresses this overall problem in two parts, through curricula development for the criminal justice discipline; and training of faculty in criminal justice to teaching the important concepts of cybersecurity and digital forensics.

Keywords: cybersecurity education, criminal justice, curricula development, nontechnical cybersecurity, cybersecurity, digital forensics

Procedia PDF Downloads 105
38413 Rhythmic Sound: Presence and Significance: A Study of the Yue Drum Used in the Han Chinese Shigong Ritual in Guangxi, China

Authors: Li-Jun Zheng

Abstract:

The use of drums as an accompanying instrument is a common phenomenon in traditional Chinese folk rituals and musical culture. Especially, some folk rituals construct ritual-related sounds and give them ritual-specific symbolic and meaningful systems through the combination and use of multiple percussion instruments. The Yue drum(岳鼓), an asymmetrically shaped thin waist drum, is currently used in Han Chinese Shigong(师公)rituals in Guangxi, China, and is an important ritual instrument in Shigong rituals. This paper examines the use of the Yue drum and other percussion instruments in Han Chinese Shigong rituals in Guangxi, China, and shows the current status of combining instrumental accompaniment forms with human voices in Shigong rituals. Through further analysis of the musical and dance forms of Han Chinese Shigong rituals, this paper shows how Han Chinese Shigong ritual performers construct the ritual field through "sound-human-dance" and further explains the relationship between the existing and fictitious performance fields in the rituals. In addition, this paper demonstrates the relationship between Han Chinese Shigong rituals and the religious beliefs they involve, such as Taoism and Buddhism. And it further explores how performers in Han Chinese Shigong rituals use Yue drums for the dual purpose of "entertaining the gods" and "entertaining the people".

Keywords: sound research, the Han Chinese Shigong ritual, the thin waist drum, folk beliefs, ritual music

Procedia PDF Downloads 65
38412 Comparative Study of Vertical and Horizontal Triplex Tube Latent Heat Storage Units

Authors: Hamid El Qarnia

Abstract:

This study investigates the impact of the eccentricity of the central tube on the thermal and fluid characteristics of a triplex tube used in latent heat energy storage technologies. Two triplex tube orientations are considered in the proposed study: vertical and horizontal. The energy storage material, which is a phase change material (PCM), is placed in the space between the inside and outside tubes. During the thermal energy storage period, a heat transfer fluid (HTF) flows inside the two tubes, transmitting the heat to the PCM through two heat exchange surfaces instead of one heat exchange surface as it is the case for double tube heat storage systems. A CFD model is developed and validated against experimental data available in the literature. The mesh independency study is carried out to select the appropriate mesh. In addition, different time steps are examined to determine a time step ensuring accuracy of the numerical results and reduction in the computational time. The numerical model is then used to conduct numerical investigations of the thermal behavior and thermal performance of the storage unit. The effects of eccentricity of the central tube and HTF mass flow rate on thermal characteristics and performance indicators are examined for two flow arrangements: co-current and counter current flows. The results are given in terms of isotherm plots, streamlines, melting time and thermal energy storage efficiency.

Keywords: energy storage, heat transfer, melting, solidification

Procedia PDF Downloads 56
38411 Recognition and Enforcement of International Commercial Arbitral Awards in Sri Lanka, A Lesson from Singapore

Authors: Kahandawala Arachchige Thani Chathurika Kahandawala

Abstract:

This research is attempted to analyse, Sri Lanka’s current situation regarding the recognition and enforcement of international commercial arbitration awards. Sri Lanka has been involved with commercial arbitration for a long time period. But there are good and bad legal practices in place in proceedings in Sri Lanka legal system. The common perception and reality of Sri Lanka’s arbitration law and practices regarding recognition and enforcement of international arbitral awards is far behind the international standards. Therefore arbitration as a dispute resolution method has become a time-consuming and costly method in Sri Lanka. This research is employed with the qualitative method based on both primary and secondary resources. This carried out the comparative analysis of recognition and enforcement in international arbitration laws established jurisdiction in Singapore and the United Kingdom, which are known as best counties as a seat of arbitration in Asia and Europe. International conventions, act and all the legal proceedings regarding recognition and enforcement of an international arbitral award in Sri Lanka are going to be discussed in the research. In the Jurisdiction of Sri Lanka, critically need to value an international arbitral award in the domestic legal system. Therefore an award has to be recognised in Sri Lanka. Otherwise, it doesn’t have any value. After recognizing it, court can enforce it. This research intends to provide a comparative analysis to overcome the drawbacks.

Keywords: arbitration, alternative dispute method, recognition and enforcement, foreign arbitral awards, Sri Lankan legal system, arbitral award in Singapore

Procedia PDF Downloads 171
38410 Improving Access to Palliative Care for Heart Failure Patients in England Using a Health Systems Approach

Authors: Alex Hughes

Abstract:

Patients with advanced heart failure develop specific palliative care needs due to the progressive symptom burden and unpredictable disease trajectory. NICE guidance advises that palliative care should be provided to patients with both cancer and non-cancer conditions as and when required. However, there is some way to go before this guidance is consistently and effectively implemented nationwide in conditions such as heart failure. The Ambitions for Palliative and End of Life Care: A national framework for local action in England provides a set of foundations and ambitions which outline a vision for what high-quality palliative and end-of-life care look like in England. This poster aims to critically consider how to improve access to palliative care for heart failure patients in England by analysing the foundations taken from this framework to generate specific recommendations using Soft Systems Methodology (SSM). The eight foundations analysed are: ‘Personalised care planning’, ‘Shared records’, ‘Evidence and information’, ‘Involving, supporting and caring for those important to the dying Person’, ‘Education and training’, ‘24/7 access’, ‘Co-design’ and ‘Leadership.’ A number of specific recommendations have been generated which highlight a need to close the evidence-policy gap and implement policy with sufficient evidence. These recommendations, alongside the creation of an evidence-based national strategy for palliative care and heart failure, should improve access to palliative care for heart failure patients in England. Once implemented, it will be necessary to evaluate the effect of these proposals to understand if access to palliative care for heart failure patients actually improves.

Keywords: access, health systems, heart failure, palliative care

Procedia PDF Downloads 128
38409 Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries

Authors: Bruno Vilić Belina, Ivan Župan

Abstract:

Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration, and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in service level agreements (SLAs), customer relationship management (CRM) relations, trends, and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.

Keywords: cybersecurity, critical infrastructure, smart industries, digital platform

Procedia PDF Downloads 106
38408 Design of an Ultra High Frequency Rectifier for Wireless Power Systems by Using Finite-Difference Time-Domain

Authors: Felipe M. de Freitas, Ícaro V. Soares, Lucas L. L. Fortes, Sandro T. M. Gonçalves, Úrsula D. C. Resende

Abstract:

There is a dispersed energy in Radio Frequencies (RF) that can be reused to power electronics circuits such as: sensors, actuators, identification devices, among other systems, without wire connections or a battery supply requirement. In this context, there are different types of energy harvesting systems, including rectennas, coil systems, graphene and new materials. A secondary step of an energy harvesting system is the rectification of the collected signal which may be carried out, for example, by the combination of one or more Schottky diodes connected in series or shunt. In the case of a rectenna-based system, for instance, the diode used must be able to receive low power signals at ultra-high frequencies. Therefore, it is required low values of series resistance, junction capacitance and potential barrier voltage. Due to this low-power condition, voltage multiplier configurations are used such as voltage doublers or modified bridge converters. Lowpass filter (LPF) at the input, DC output filter, and a resistive load are also commonly used in the rectifier design. The electronic circuits projects are commonly analyzed through simulation in SPICE (Simulation Program with Integrated Circuit Emphasis) environment. Despite the remarkable potential of SPICE-based simulators for complex circuit modeling and analysis of quasi-static electromagnetic fields interaction, i.e., at low frequency, these simulators are limited and they cannot model properly applications of microwave hybrid circuits in which there are both, lumped elements as well as distributed elements. This work proposes, therefore, the electromagnetic modelling of electronic components in order to create models that satisfy the needs for simulations of circuits in ultra-high frequencies, with application in rectifiers coupled to antennas, as in energy harvesting systems, that is, in rectennas. For this purpose, the numerical method FDTD (Finite-Difference Time-Domain) is applied and SPICE computational tools are used for comparison. In the present work, initially the Ampere-Maxwell equation is applied to the equations of current density and electric field within the FDTD method and its circuital relation with the voltage drop in the modeled component for the case of lumped parameter using the FDTD (Lumped-Element Finite-Difference Time-Domain) proposed in for the passive components and the one proposed in for the diode. Next, a rectifier is built with the essential requirements for operating rectenna energy harvesting systems and the FDTD results are compared with experimental measurements.

Keywords: energy harvesting system, LE-FDTD, rectenna, rectifier, wireless power systems

Procedia PDF Downloads 131
38407 Impact Assessment of Plum Research Investments in South Africa

Authors: Precious M. Tshabalala, Thula S. Dlamini, Frikkie Liebenberg, Johann Kirsten

Abstract:

Numerous studies have been conducted, and the evidence has been unambiguous showing that investing in agricultural research and development increases productivity. Continued investments in agricultural research have led to the development of over 26 successful plum cultivars since 1980 at the Agricultural Research Council’s (ARC) Infruitec/Nietvoorbij in South Africa, and more continue to be developed to meet the specific needs of both producers and consumers. Yet very little is known about the returns on any of these research initiatives. The objective of the study was determine the economic impact of plum research investments at the ARC-the main plum breeding research organization in the country. The rate of return to plum research is estimated by estimating parameters in plum production and expressing research investment as an explanatory variable. The marginal rate of return is then determined to be 14.23 per cent. The rate of return to investment being this high is indicative of an under investment in plum research.

Keywords: Agricultural research investments, productivity and rate of return, plum

Procedia PDF Downloads 486
38406 A Neurosymbolic Learning Method for Uplink LTE-A Channel Estimation

Authors: Lassaad Smirani

Abstract:

In this paper we propose a Neurosymbolic Learning System (NLS) as a channel estimator for Long Term Evolution Advanced (LTE-A) uplink. The proposed system main idea based on Neural Network has modules capable of performing bidirectional information transfer between symbolic module and connectionist module. We demonstrate various strengths of the NLS especially the ability to integrate theoretical knowledge (rules) and experiential knowledge (examples), and to make an initial knowledge base (rules) converted into a connectionist network. Also to use empirical knowledge witch by learning will have the ability to revise the theoretical knowledge and acquire new one and explain it, and finally the ability to improve the performance of symbolic or connectionist systems. Compared with conventional SC-FDMA channel estimation systems, The performance of NLS in terms of complexity and quality is confirmed by theoretical analysis and simulation and shows that this system can make the channel estimation accuracy improved and bit error rate decreased.

Keywords: channel estimation, SC-FDMA, neural network, hybrid system, BER, LTE-A

Procedia PDF Downloads 394
38405 Traditional Knowledge on Living Fences in Andean Linear Plantations

Authors: German Marino Rivera

Abstract:

Linear plantations are a common practice in several countries as living fences (LF) delimiting agroecosystems. They are composed of multipurpose perennial woods that provide assets, protection, and supply services. However, not much is known in some traditional communities like the Andean region, including the species composition and the social and ecological benefits of the species used. In the High Andean Colombian region, LF seems to be very typical and diverse. This study aimed to analyze the traditional knowledge about LF systems, including the species composition and their uses in rural communities of Alto Casanare, Colombia. Field measurements, interviews, guided tours, and species sampling were carried out in order to describe traditional practices and the species used in the LF systems. The use values were estimated through the Coefficient of Importance of the Species (CIS). A total of 26 farms engage in LF practices, covering an area of 9283.3 m. In these systems, 30 species were identified, belonging to 23 families. Alnus acuminata was the specie with the highest CIS. The species presented multipurpose uses for both economic and ecological purposes. The transmission of knowledge (TEK) about the used species is very heterogeneous among the farmers. Many species used were not documented, with reciprocal gaps between the literature and traditional species uses. Exchanging this information would increase the species' versatility, the socioeconomic aspects of these communities, increases the agrobiodiversity and ecological services provided by LF. The description of the TEK on LF provides a better understanding of the relationship of these communities with the natural resources, pointing out creative approaches to achieve local environment conservation in these agroecosystems and promoting socioeconomic development.

Keywords: ethnobotany, living fences, traditional communities, agroecology

Procedia PDF Downloads 93
38404 Exploration of Critical Success Factors in Business and Management in Artificial Intelligence Era

Authors: Najah Kalifah Almazmomi

Abstract:

In the time of artificial intelligence (AI), there is a need to know the determinants of success in business management, which are taking on a new dimension. This research purports to scrutinize the Critical Success Factors (CSFs) that drive and ignite the fire of success to help uncover the subtle and profound dynamics that might be operative in organizations. By means of a systematic literature review and a number of empirical methods, the paper is aimed at determining and assessing the key aspects of CSFs, putting emphasis on their role and meaning in the context of AI technology adoption. Some central features such as leadership ways, innovation models, strategic thinking methodologies, organizational culture transformations, and human resource management approaches are compared and contrasted with the AI-driven revolution. Additionally, this research will explore the interactive effects of these factors and their joint impact on the success, survival, and flexibility of a business in the current environment, which is changing due to AI development. Through the use of different qualitative and quantitative methodologies, the research concludes that the findings are significant in understanding the relative roles of individual CSFs and in studying the interactions between them in such an AI-enabled business environment.

Keywords: critical success factors, business and management, artificial intelligence, leadership strategies

Procedia PDF Downloads 37
38403 An Investigation on Organisation Cyber Resilience

Authors: Arniyati Ahmad, Christopher Johnson, Timothy Storer

Abstract:

Cyber exercises used to assess the preparedness of a community against cyber crises, technology failures and critical information infrastructure (CII) incidents. The cyber exercises also called cyber crisis exercise or cyber drill, involved partnerships or collaboration of public and private agencies from several sectors. This study investigates organisation cyber resilience (OCR) of participation sectors in cyber exercise called X Maya in Malaysia. This study used a principal based cyber resilience survey called C-Suite Executive checklist developed by World Economic Forum in 2012. To ensure suitability of the survey to investigate the OCR, the reliability test was conducted on C-Suite Executive checklist items. The research further investigates the differences of OCR in ten Critical National Infrastructure Information (CNII) sectors participated in the cyber exercise. The One Way ANOVA test result showed a statistically significant difference of OCR among ten CNII sectors participated in the cyber exercise.

Keywords: critical information infrastructure, cyber resilience, organisation cyber resilience, reliability test

Procedia PDF Downloads 359
38402 Study on the Retaining Sleeve Structure for the Reduction of Eddy Current in SPMSM

Authors: Hyun-Woo Jun, In-Gun Kim, Hyun Seok Hong, Dong-Woo Kang, Ju Lee

Abstract:

In high-speed SPMSM design, the rotor-retaining sleeve is inserted into rotor to prevent permanent magnet’s damage. It is quite efficient way considering manufacturability, but the sleeve becomes major source of ohm loss in high-speed operation. In this paper, the high-speed motor for turbo-blower at the rating of 100kW was introduced. To improve its efficiency, the retaining sleeve’s optimal design was needed. Within the range of satisfies the mechanical safety, sleeve’s some design variables have been changed. The effect of changing design variables of the sleeve was studied. This paper presents the optimized sleeve’s advantages in electrical efficiency from the result of electromagnetic FEA (finite element analysis) software. Finally, it suggests the optimal sleeve design to reduce eddy current loss, which is related to motor shape.

Keywords: SPMSM, sleeve, eddy current, high efficiency

Procedia PDF Downloads 424
38401 Multi-Criteria Evaluation of Integrated Renewable Energy Systems for Community-Scale Applications

Authors: Kuanrong Qiu, Sebnem Madrali, Evgueniy Entchev

Abstract:

To achieve the satisfactory objectives in deploying integrated renewable energy systems, it is crucial to consider all the related parameters affecting the design and decision-making. The multi-criteria evaluation method is a reliable and efficient tool for achieving the most appropriate solution. The approach considers the influential factors and their relative importance in prioritizing the alternatives. In this paper, a multi-criteria decision framework, based on the criteria including technical, economic, environmental and reliability, is developed to evaluate and prioritize renewable energy technologies and configurations of their integrated systems for community applications, identify their viability, and thus support the adoption of the clean energy technologies and the decision-making regarding energy transitions and transition patterns. Case studies for communities in Canada show that resource availability and the configurations of the integrated systems significantly impact the economic performance and environmental performance.

Keywords: multi-criteria, renewables, integrated energy systems, decision-making, model

Procedia PDF Downloads 93
38400 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 127
38399 DeepNIC a Method to Transform Each Tabular Variable into an Independant Image Analyzable by Basic CNNs

Authors: Nguyen J. M., Lucas G., Ruan S., Digonnet H., Antonioli D.

Abstract:

Introduction: Deep Learning (DL) is a very powerful tool for analyzing image data. But for tabular data, it cannot compete with machine learning methods like XGBoost. The research question becomes: can tabular data be transformed into images that can be analyzed by simple CNNs (Convolutional Neuron Networks)? Will DL be the absolute tool for data classification? All current solutions consist in repositioning the variables in a 2x2 matrix using their correlation proximity. In doing so, it obtains an image whose pixels are the variables. We implement a technology, DeepNIC, that offers the possibility of obtaining an image for each variable, which can be analyzed by simple CNNs. Material and method: The 'ROP' (Regression OPtimized) model is a binary and atypical decision tree whose nodes are managed by a new artificial neuron, the Neurop. By positioning an artificial neuron in each node of the decision trees, it is possible to make an adjustment on a theoretically infinite number of variables at each node. From this new decision tree whose nodes are artificial neurons, we created the concept of a 'Random Forest of Perfect Trees' (RFPT), which disobeys Breiman's concepts by assembling very large numbers of small trees with no classification errors. From the results of the RFPT, we developed a family of 10 statistical information criteria, Nguyen Information Criterion (NICs), which evaluates in 3 dimensions the predictive quality of a variable: Performance, Complexity and Multiplicity of solution. A NIC is a probability that can be transformed into a grey level. The value of a NIC depends essentially on 2 super parameters used in Neurops. By varying these 2 super parameters, we obtain a 2x2 matrix of probabilities for each NIC. We can combine these 10 NICs with the functions AND, OR, and XOR. The total number of combinations is greater than 100,000. In total, we obtain for each variable an image of at least 1166x1167 pixels. The intensity of the pixels is proportional to the probability of the associated NIC. The color depends on the associated NIC. This image actually contains considerable information about the ability of the variable to make the prediction of Y, depending on the presence or absence of other variables. A basic CNNs model was trained for supervised classification. Results: The first results are impressive. Using the GSE22513 public data (Omic data set of markers of Taxane Sensitivity in Breast Cancer), DEEPNic outperformed other statistical methods, including XGBoost. We still need to generalize the comparison on several databases. Conclusion: The ability to transform any tabular variable into an image offers the possibility of merging image and tabular information in the same format. This opens up great perspectives in the analysis of metadata.

Keywords: tabular data, CNNs, NICs, DeepNICs, random forest of perfect trees, classification

Procedia PDF Downloads 125
38398 Characteristics of the Long-Term Regional Tourism Development in Georgia

Authors: Valeri Arghutashvili, Mari Gogochuri

Abstract:

Tourism industry development is one of the key priorities in Georgia, as it has positive influence on economic activities. Its contribution is very important for the different regions, as well as for the national economy. Benefits of the tourism industry include new jobs, service development, and increasing tax revenues, etc. The main aim of this research is to review and analyze the potential of the Georgian tourism industry with its long-term strategy and current challenges. To plan activities in a long-term development, it is required to evaluate several factors on the regional and on the national level. Factors include activities, transportation, services, lodging facilities, infrastructure and institutions. The major research contributions are practical estimates about regional tourism development which plays an important role in the integration process with global markets.

Keywords: regional tourism, tourism industry, tourism in Georgia, tourism benefits

Procedia PDF Downloads 831