Search results for: hardware security evaluation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9499

Search results for: hardware security evaluation

6499 Information Technology Service Management System Measurement Using ISO20000-1 and ISO15504-8

Authors: Imam Asrowardi, Septafiansyah Dwi Putra, Eko Subyantoro

Abstract:

Process assessments can improve IT service management system (IT SMS) processes but the assessment method is not always transparent. This paper outlines a project to develop a solution- mediated process assessment tool to enable transparent and objective SMS process assessment. Using the international standards for SMS and process assessment, the tool is being developed following the International standard approach in collaboration and evaluate by expert judgment from committee members and ITSM practitioners.

Keywords: SMS, tools evaluation, ITIL, ISO service

Procedia PDF Downloads 480
6498 The Importance of Reflection and Collegial Support for Clinical Instructors When Evaluating Failing Students in a Clinical Nursing Course

Authors: Maria Pratt, Lynn Martin

Abstract:

Context: In nursing education, clinical instructors are crucial in assessing and evaluating students' performance in clinical courses. However, instructors often struggle when assigning failing grades to students at risk of failing. Research Aim: This qualitative study aims to understand clinical instructors' experiences evaluating students with unsatisfactory performance, including how reflection and collegial support impact this evaluation process. Methodology, Data Collection, and Analysis Procedures: This study employs Gadamer's Hermeneutic Inquiry as the research methodology. A purposive maximum variation sampling technique was used to recruit eight clinical instructors from a collaborative undergraduate nursing program in Southwestern Ontario. Semi-structured, open-ended, and audio-taped interviews were conducted with the participants. The hermeneutic analysis was applied to interpret the interview data to allow for a thorough exploration and interpretation of the instructors' experiences evaluating failing students. Findings: The main findings of this qualitative research indicate that evaluating failing students was emotionally draining for the clinical instructors who experienced multiple challenges, uncertainties, and negative feelings associated with assigning failing grades. However, the analysis revealed that ongoing reflection and collegial support played a crucial role in mitigating the challenges they experienced. Conclusion: This study contributes to the theoretical understanding of nursing education by shedding light on clinical instructors' challenges in evaluating failing students. It emphasizes the emotional toll associated with this process and the role that reflection and collegial support play in alleviating those challenges. The findings underscore the need for ongoing professional development and support for instructors in nursing education. By understanding and addressing clinical instructors' experiences, nursing education programs can better equip them to effectively evaluate struggling students and provide the necessary support for their professional growth.

Keywords: clinical instructor, student evaluation, nursing, reflection, support

Procedia PDF Downloads 93
6497 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 517
6496 Renovate to nZEB of an Existing Building in the Mediterranean Area: Analysis of the Use of Renewable Energy Sources for the HVAC System

Authors: M. Baratieri, M. Beccali, S. Corradino, B. Di Pietra, C. La Grassa, F. Monteleone, G. Morosinotto, G. Puglisi

Abstract:

The energy renovation of existing buildings represents an important opportunity to increase the decarbonization and the sustainability of urban environments. In this context, the work carried out has the objective of demonstrating the technical and economic feasibility of an energy renovate of a public building destined for offices located on the island of Lampedusa in the Mediterranean Sea. By applying the Italian transpositions of European Directives 2010/31/EU and 2009/28/EC, the building has been renovated from the current energy requirements of 111.7 kWh/m² to 16.4 kWh/m². The result achieved classifies the building as nZEB (nearly Zero Energy Building) according to the Italian national definition. The analysis was carried out using in parallel a quasi-stationary software, normally used in the professional field, and a dynamic simulation model often used in the academic world. The proposed interventions cover the components of the building’s envelope, the heating-cooling system and the supply of energy from renewable sources. In these latter points, the analysis has focused more on assessing two aspects that affect the supply of renewable energy. The first concerns the use of advanced logic control systems for air conditioning units in order to increase photovoltaic self-consumption. With these adjustments, a considerable increase in photovoltaic self-consumption and a decrease in the electricity exported to the Island's electricity grid have been obtained. The second point concerned the evaluation of the building's energy classification considering the real efficiency of the heating-cooling plant. Normally the energy plants have lower operational efficiency than the designed one due to multiple reasons; the decrease in the energy classification of the building for this factor has been quantified. This study represents an important example for the evaluation of the best interventions for the energy renovation of buildings in the Mediterranean Climate and a good description of the correct methodology to evaluate the resulting improvements.

Keywords: heat pumps, HVAC systems, nZEB renovation, renewable energy sources

Procedia PDF Downloads 451
6495 A Cost-Evaluation Study on the Use of Negative Pressure Wound Therapy with Instillation for Salvage of Infected Implant-Based Breast Reconstructions

Authors: S. Haque, M. Kanapathy, E. Bollen, I. Younis, A. Mosahebi

Abstract:

Background: Implant loss due to infection is the most devastating complication of implant-based breast reconstruction. The use of negative pressure wound therapy with instillation (NPWTi) for salvage of infected implant-based breast reconstructions has shown promising results to allow early reinsertion of a new implant as an alternative to current management of delayed reinsertion. This study compares the cost implication of NPWTi against current management of delayed reinsertion of infected breast implants. Methods: 20 cases of an infected breast implant treated with NPWTi (V.A.C. VERAFLO™ Therapy) followed by early re-insertion of a new implant were compared with 20 cases who had delayed reinsertion (non-NPWTi). Average cost per person was calculated using total operative expenses, cost of inpatient stay, cost of investigations, cost of antibiotics, and cost of outpatient visits. Results: Treatment with NPWTi allowed for earlier re-insertion of a new implant (NPWTi: 9.04 ± 2.92 days vs. non-NPWTi: 236.25 ± 123.89 days). The average cost per patient for NPWTi and non-NPWTi was £14,343.13 ± £2,786.70 and £8,920.31 ± £3,005.73 respectively. All patients treated with NPWTi had one admission and spent 11.9 ± 4.1days as an inpatient while non-NPWTi patients had 2.1 ± 0.3 admissions with total length of inpatient stay of 7.1 ± 5.8days. Patients treated with NPWTi had more surgeries (NPWTi: 3.35 ± 0.81 vs. non-NPWTi: 2.2 ± 0.41), however 3 non-NPWTi cases required flap reconstruction. Patients treated with NPWTi had fewer total outpatient visits (NPWTi: 12 ± 6 vs. non-NPWTi: 14.2 ± 6.3). Conclusion: Patients treated with NPWTi incurred higher average cost per patient, longer inpatient stay, and more procedures; however, had early re-insertion of new implants and fewer admissions and outpatient visits. A further study on patient-reported outcome is essential to compare cost against patient benefit.

Keywords: breast reconstruction, cost evaluation, infection, negative pressure wound therapy

Procedia PDF Downloads 125
6494 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 73
6493 Well Stability Analysis Based on Geomechanical Properties of Formations in One of the Wells of Haftgol Oil Field, Iran

Authors: Naser Ebadati

Abstract:

introductory statement: Drilling operations in oil wells often involve significant risks due to varying azimuths, slopes, and the passage through layers with different lithological properties. As a result, maintaining well stability is crucial. Instability in wells can lead to costly well losses, interrupted drilling operations, and halted production from reservoirs. Objective: One of the key challenges in drilling operations is ensuring the stability of the wellbore, particularly in loose and low-resistance formations. These factors make the analysis and evaluation of well stability essential. Therefore, building a geo mechanical model for a hydrocarbon field or reservoir requires both a stress field model and a mechanical properties model of the geological formations. Numerous studies have focused on analyzing the stability of well walls, an issue known as well instability. This study aims to analyze the stability and the safe mud weight window for drilling in one of the oil fields in southern Iran. Methodology: In wellbore stability analysis, it is essential to consider the stress field model, which includes values and directions of the three principal stresses, and the mechanical properties model, which covers elastic properties and rock fracture characteristics. Wellbore instability arises from mechanical failure of the rock. Well stability can be maintained by adjusting the drilling mud weight. This study investigates wellbore stability using field data. The lithological characteristics of the well mainly consist of limestone, dolomite, and shale, as determined from log data. Wellbore logging was conducted throughout the well to calculate the required drilling mud pressure using the Mohr-Coulomb criterion. Findings: The results indicate that the safe and stable drilling mud window ranges between 17.13 MPa and 27.80 MPa. By comparing and calculating induced stresses, it was determined that the wellbore wall primarily exhibits shear fractures in the form of wide shear fractures and tensile fractures in the form of radial tensile fractures.

Keywords: drilling mud weight, formation evaluation, sheer strees, safe window

Procedia PDF Downloads 4
6492 A 500 MWₑ Coal-Fired Power Plant Operated under Partial Oxy-Combustion: Methodology and Economic Evaluation

Authors: Fernando Vega, Esmeralda Portillo, Sara Camino, Benito Navarrete, Elena Montavez

Abstract:

The European Union aims at strongly reducing their CO₂ emissions from energy and industrial sector by 2030. The energy sector contributes with more than two-thirds of the CO₂ emission share derived from anthropogenic activities. Although efforts are mainly focused on the use of renewables by energy production sector, carbon capture and storage (CCS) remains as a frontline option to reduce CO₂ emissions from industrial process, particularly from fossil-fuel power plants and cement production. Among the most feasible and near-to-market CCS technologies, namely post-combustion and oxy-combustion, partial oxy-combustion is a novel concept that can potentially reduce the overall energy requirements of the CO₂ capture process. This technology consists in the use of higher oxygen content in the oxidizer that should increase the CO₂ concentration of the flue gas once the fuel is burnt. The CO₂ is then separated from the flue gas downstream by means of a conventional CO₂ chemical absorption process. The production of a higher CO₂ concentrated flue gas should enhance the CO₂ absorption into the solvent, leading to further reductions of the CO₂ separation performance in terms of solvent flow-rate, equipment size, and energy penalty related to the solvent regeneration. This work evaluates a portfolio of CCS technologies applied to fossil-fuel power plants. For this purpose, an economic evaluation methodology was developed in detail to determine the main economical parameters for CO₂ emission removal such as the levelized cost of electricity (LCOE) and the CO₂ captured and avoided costs. ASPEN Plus™ software was used to simulate the main units of power plant and solve the energy and mass balance. Capital and investment costs were determined from the purchased cost of equipment, also engineering costs and project and process contingencies. The annual capital cost and operating and maintenance costs were later obtained. A complete energy balance was performed to determine the net power produced in each case. The baseline case consists of a supercritical 500 MWe coal-fired power plant using anthracite as a fuel without any CO₂ capture system. Four cases were proposed: conventional post-combustion capture, oxy-combustion and partial oxy-combustion using two levels of oxygen-enriched air (40%v/v and 75%v/v). CO₂ chemical absorption process using monoethanolamine (MEA) was used as a CO₂ separation process whereas the O₂ requirement was achieved using a conventional air separation unit (ASU) based on Linde's cryogenic process. Results showed a reduction of 15% of the total investment cost of the CO₂ separation process when partial oxy-combustion was used. Oxygen-enriched air production also reduced almost half the investment costs required for ASU in comparison with oxy-combustion cases. Partial oxy-combustion has a significant impact on the performance of both CO₂ separation and O₂ production technologies, and it can lead to further energy reductions using new developments on both CO₂ and O₂ separation processes.

Keywords: carbon capture, cost methodology, economic evaluation, partial oxy-combustion

Procedia PDF Downloads 148
6491 A Support Vector Machine Learning Prediction Model of Evapotranspiration Using Real-Time Sensor Node Data

Authors: Waqas Ahmed Khan Afridi, Subhas Chandra Mukhopadhyay, Bandita Mainali

Abstract:

The research paper presents a unique approach to evapotranspiration (ET) prediction using a Support Vector Machine (SVM) learning algorithm. The study leverages real-time sensor node data to develop an accurate and adaptable prediction model, addressing the inherent challenges of traditional ET estimation methods. The integration of the SVM algorithm with real-time sensor node data offers great potential to improve spatial and temporal resolution in ET predictions. In the model development, key input features are measured and computed using mathematical equations such as Penman-Monteith (FAO56) and soil water balance (SWB), which include soil-environmental parameters such as; solar radiation (Rs), air temperature (T), atmospheric pressure (P), relative humidity (RH), wind speed (u2), rain (R), deep percolation (DP), soil temperature (ST), and change in soil moisture (∆SM). The one-year field data are split into combinations of three proportions i.e. train, test, and validation sets. While kernel functions with tuning hyperparameters have been used to train and improve the accuracy of the prediction model with multiple iterations. This paper also outlines the existing methods and the machine learning techniques to determine Evapotranspiration, data collection and preprocessing, model construction, and evaluation metrics, highlighting the significance of SVM in advancing the field of ET prediction. The results demonstrate the robustness and high predictability of the developed model on the basis of performance evaluation metrics (R2, RMSE, MAE). The effectiveness of the proposed model in capturing complex relationships within soil and environmental parameters provide insights into its potential applications for water resource management and hydrological ecosystem.

Keywords: evapotranspiration, FAO56, KNIME, machine learning, RStudio, SVM, sensors

Procedia PDF Downloads 69
6490 Monitoring Prospective Sites for Water Harvesting Structures Using Remote Sensing and Geographic Information Systems-Based Modeling in Egypt

Authors: Shereif. H. Mahmoud

Abstract:

Egypt has limited water resources, and it will be under water stress by the year 2030. Therefore, Egypt should consider natural and non-conventional water resources to overcome such a problem. Rain harvesting is one solution. This Paper presents a geographic information system (GIS) methodology - based on decision support system (DSS) that uses remote sensing data, filed survey, and GIS to identify potential RWH areas. The input into the DSS includes a map of rainfall surplus, slope, potential runoff coefficient (PRC), land cover/use, soil texture. In addition, the outputs are map showing potential sites for RWH. Identifying suitable RWH sites implemented in the ArcGIS model environment using the model builder of ArcGIS 10.1. Based on Analytical hierarchy process (AHP) analysis taking into account five layers, the spatial extents of RWH suitability areas identified using Multi-Criteria Evaluation (MCE). The suitability model generated a suitability map for RWH with four suitability classes, i.e. Excellent, Moderate, Poor, and unsuitable. The spatial distribution of the suitability map showed that the excellent suitable areas for RWH concentrated in the northern part of Egypt. According to their averages, 3.24% of the total area have excellent and good suitability for RWH, while 45.04 % and 51.48 % of the total area are moderate and unsuitable suitability, respectively. The majority of the areas with excellent suitability have slopes between 2 and 8% and with an intensively cultivated area. The major soil type in the excellent suitable area is loam and the rainfall range from 100 up to 200 mm. Validation of the used technique depends on comparing existing RWH structures locations with the generated suitability map using proximity analysis tool of ArcGIS 10.1. The result shows that most of exiting RWH structures categorized as successful.

Keywords: rainwater harvesting (RWH), geographic information system (GIS), analytical hierarchy process (AHP), multi-criteria evaluation (MCE), decision support system (DSS)

Procedia PDF Downloads 360
6489 Introduction of a Multimodal Intervention for People with Autism: 'ReAttach'

Authors: P. Weerkamp Bartholomeus

Abstract:

Autism treatment evaluation is crucial for monitoring the development of an intervention at an early stage. ‘ReAttach’ is a new intervention based on the principles of attachment and social cognitive training. Practical research suggests promising results on a variety of developmental areas. Five years after the first ReAttach sessions these findings can be extended with qualitative research by means of follow-up interviews. The potential impact of this treatment on daily life functioning and well-being of autistic persons becomes clear.

Keywords: autism, innovation, treatment, social cognitive training

Procedia PDF Downloads 291
6488 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 203
6487 Public Functions of Kazakh Modern Literature

Authors: Erkingul Soltanaeva, Omyrkhan Abdimanuly, Alua Temirbolat

Abstract:

In this article, the public and social functions of literature and art in the Republic of Kazakhstan were analyzed on the basis of formal and informal literary organizations. The external and internal, subjective and objective factors which influenced the modern literary process were determined. The literary forces, their consolidation, types of organization in the art of word were examined. The periods of the literary process as planning, organization, promotion, and evaluation and their leading forces and approaches were analyzed. The right point of view to the language and mentality of the society force will influence to the literary process. The Ministry of Culture, the Writers' Union of RK and various non-governmental organizations are having different events for the promotion of literary process and to glorify literary personalities in the entire territory of Kazakhstan. According to the cultural plan of different state administration, there was a big program in order to publish their literary encyclopedia, to glorify and distribute books of own poets and writers of their region to the country. All of these official measures will increase the reader's interest in the book and will also bring up people to the patriotic education and improve the status of the native language. The professional literary publications such as the newspaper ‘Kazakh literature’, magazine ‘Zhuldyz’, and journal ‘Zhalyn’ materials which were published in the periods 2013-2015 on the basis of statistical analysis of the Kazakh literature topical to the issues and the field of themes are identified and their level of connection with the public situations are defined. The creative freedom, relations between society and the individual, the state of the literature, the problems of advantages and disadvantages were taken into consideration in the same articles. The level of functions was determined through the public role of literature, social feature, personal peculiarities. Now the stages as the literature management planning, organization, motivation, as well as the evaluation are forming and developing in Kazakhstan. But we still need the development of literature management to satisfy the actual requirements of the today’s agenda.

Keywords: literature management, material, literary process, social functions

Procedia PDF Downloads 384
6486 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 314
6485 Good Practices for Model Structure Development and Managing Structural Uncertainty in Decision Making

Authors: Hossein Afzali

Abstract:

Increasingly, decision analytic models are used to inform decisions about whether or not to publicly fund new health technologies. It is well noted that the accuracy of model predictions is strongly influenced by the appropriateness of model structuring. However, there is relatively inadequate methodological guidance surrounding this issue in guidelines developed by national funding bodies such as the Australian Pharmaceutical Benefits Advisory Committee (PBAC) and The National Institute for Health and Care Excellence (NICE) in the UK. This presentation aims to discuss issues around model structuring within decision making with a focus on (1) the need for a transparent and evidence-based model structuring process to inform the most appropriate set of structural aspects as the base case analysis; (2) the need to characterise structural uncertainty (If there exist alternative plausible structural assumptions (or judgements), there is a need to appropriately characterise the related structural uncertainty). The presentation will provide an opportunity to share ideas and experiences on how the guidelines developed by national funding bodies address the above issues and identify areas for further improvements. First, a review and analysis of the literature and guidelines developed by PBAC and NICE will be provided. Then, it will be discussed how the issues around model structuring (including structural uncertainty) are not handled and justified in a systematic way within the decision-making process, its potential impact on the quality of public funding decisions, and how it should be presented in submissions to national funding bodies. This presentation represents a contribution to the good modelling practice within the decision-making process. Although the presentation focuses on the PBAC and NICE guidelines, the discussion can be applied more widely to many other national funding bodies that use economic evaluation to inform funding decisions but do not transparently address model structuring issues e.g. the Medical Services Advisory Committee (MSAC) in Australia or the Canadian Agency for Drugs and Technologies in Health.

Keywords: decision-making process, economic evaluation, good modelling practice, structural uncertainty

Procedia PDF Downloads 186
6484 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 57
6483 Design for Sustainability

Authors: Qiuying Li, Fan Chen

Abstract:

It is a shared opinion that sustainable development requires continuously updated, meaning that apparent changes in the way we usually produce our buildings are strongly needed. In China’s construction field, the associated environmental, health problems are quite prominent.Especially low sustainable performance (as opposed to Green creation) flooding the real estate boom and high-speed urban and rural urbanization. Currently, we urgently need to improve the existing design basis,objectives,scope and procedures,optimization design portfolio.More new evaluation system designed to facilitate the building to enhance the overall level.

Keywords: design for sustainability, design and materials, ecomaterials, sustainable architecture and urban design

Procedia PDF Downloads 521
6482 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 165
6481 Screening Ecological Risk Assessment at an Old Abandoned Mine in Northern Taiwan

Authors: Hui-Chen Tsai, Chien-Jen Ho, Bo-Wei Power Liang, Ying Shen, Yi-Hsin Lai

Abstract:

Former Taiwan Metal Mining Corporation and its associated 3 wasted flue gas tunnels, hereinafter referred to as 'TMMC', was contaminated with heavy metals, Polychlorinated biphenyls (PCBs) and Total Petroleum Hydrocarbons (TPHs) in soil. Since the contamination had been exposed and unmanaged in the environment for more than 40 years, the extent of the contamination area is estimated to be more than 25 acres. Additionally, TMMC is located in a remote, mountainous area where almost no residents are residing in the 1-km radius area. Thus, it was deemed necessary to conduct an ecological risk assessment in order to evaluate the details of future contaminated site management plan. According to the winter and summer, ecological investigation results, one type of endangered, multiple vulnerable and near threaten plant was discovered, as well as numerous other protected species, such as Crested Serpent Eagle, Crested Goshawk, Black Kite, Brown Shrike, Taiwan Blue Magpie were observed. Ecological soil screening level (Eco-SSLs) developed by USEPA was adopted as a reference to conduct screening assessment. Since all the protected species observed surrounding TMMC site were birds, screening ecological risk assessment was conducted on birds only. The assessment was assessed mainly based on the chemical evaluation, which the contamination in different environmental media was compared directly with the ecological impact levels (EIL) of each evaluation endpoints and the respective hazard quotient (HQ) and hazard index (HI) could be obtained. The preliminary ecological risk assessment results indicated HI is greater than 1. In other words, the biological stressors (birds) were exposed to the contamination, which was already exceeded the dosage that could cause unacceptable impacts to the ecological system. This result was mainly due to the high concentration of arsenic, metal and lead; thus it was suggested the above mention contaminants should be remediated as soon as possible or proper risk management measures should be taken.

Keywords: screening, ecological risk assessment, ecological impact levels, risk management

Procedia PDF Downloads 134
6480 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 150
6479 Policy Analysis and Program Evaluation: Need to Designate a Navigable Spatial Identity for Slums Dwellers in India to Maximize Accessibility and Policy Impact

Authors: Resham Badri

Abstract:

Cities today are unable to justify equitable distribution of theirsocio- economic and infrastructural benefits to the marginalized urban poor, and the emergence of a pressing pandemic like COVID-19 has amplified its impact. Lack of identity, vulnerability, and inaccessibility contribute to exclusion. Owing to systemic gaps in institutional processes, urban development policiesfail to represent and cater to the urban poor. This paper aims to be a roadmap for the Indian Government to understand the significance of the designation of a navigable spatial identity to slum dwellers in the form of a digital address, which can form the fundamental basis of identification to enable accessibility to not only basic servicesbut also other utilities. Capitalizing on such a granular and technology backed approach shall allow to target and reach out to the urban poor strategically andaid effective urban governance. This paper adopts a three-pronged approach;(i) Policy analysis- understanding gaps in existing urban policies of India, such as the Pradhan Mantri Awas Yojana, Swachh Bharat Mission, and Adhaar Card policy, (ii) Program Evaluation- analyzing a case study, where slum dwellers in Kolhapur city in India have been provided with navigable addresses using Google Plus Codes and have gained access to basic services, vaccinations, and other emergency deliveries in COVID-19 times, (iii) Policy recommendation. This designation of a navigable spatial identity has tremendous potential to form the foundation on which policies can further base their data collection and service delivery processes to not only provide basic services but also other infrastructural and social welfare initiatives. Hence, a massive window of opportunity lies in addressing the unaddressed to elevate their living standards and respond to their basic needs.

Keywords: policy analysis, urban poor, navigable spatial identity, accessibility

Procedia PDF Downloads 81
6478 Technology Roadmapping in Defense Industry

Authors: Sevgi Özlem Bulu, Arif Furkan Mendi, Tolga Erol, İzzet Gökhan Özbilgin

Abstract:

The rapid progress of technology in today's competitive conditions has also accelerated companies' technology development activities. As a result, companies are paying more attention to R&D studies and are beginning to allocate a larger share to R&D projects. A more systematic, comprehensive, target-oriented implementation of R&D studies is crucial for the company to achieve successful results. As a consequence, Technology Roadmap (TRM) is gaining importance as a management tool. It has critical prospects for achieving medium and long term success as it contains decisions about past business, future plans, technological infrastructure. When studies on TRM are examined, projects to be placed on the roadmap are selected by many different methods. Generally preferred methods are based on multi-criteria decision making methods. Management of selected projects becomes an important point after the selection phase of the projects. At this stage, TRM are used. TRM can be created in many different ways so that each institution can prepare its own Technology Roadmap according to their strategic plan. Depending on the intended use, there can be TRM with different layers at different sizes. In the evaluation phase of the R&D projects and in the creation of the TRM, HAVELSAN, Turkey's largest defense company in the software field, carries out this process with great care and diligence. At the beginning, suggested R&D projects are evaluated by the Technology Management Board (TMB) of HAVELSAN in accordance with the company's resources, objectives, and targets. These projects are presented to the TMB periodically for evaluation within the framework of certain criteria by board members. After the necessary steps have been passed, the approved projects are added to the time-based TRM, which is composed of four layers as market, product, project and technology. The use of a four-layered roadmap provides a clearer understanding and visualization of company strategy and objectives. This study demonstrates the benefits of using TRM, four-layered Technology Roadmapping and the possibilities for the institutions in the defense industry.

Keywords: technology roadmap, research and development project, project selection, research development in defense industry

Procedia PDF Downloads 179
6477 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 425
6476 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 19
6475 The Opinions of Nursing Students Regarding Humanized Care through Volunteer Activities at Boromrajonani College of Nursing, Chonburi

Authors: P. Phenpun, S. Wareewan

Abstract:

This qualitative study aimed to describe the opinions in relation to humanized care emerging from the volunteer activities of nursing students at Boromarajonani College of Nursing, Chonburi, Thailand. One hundred and twenty-seven second-year nursing students participated in this study. The volunteer activity model was composed of preparation, implementation, and evaluation through a learning log, in which students were encouraged to write their daily activities after completing practical training at the healthcare center. The preparation content included three main categories: service minded, analytical thinking, and client participation. The preparation process took over three days that accumulates up to 20 hours only. The implementation process was held over 10 days, but with a total of 70 hours only, with participants taking part in volunteer work activities at a healthcare center. A learning log was used for evaluation and data were analyzed using content analysis. The findings were as follows. With service minded, there were two subcategories that emerged from volunteer activities, which were service minded towards patients and within themselves. There were three categories under service minded towards patients, which were rapport, compassion, and empathy service behaviors, and there were four categories under service minded within themselves, which were self-esteem, self-value, management potential, and preparedness in providing good healthcare services. In line with analytical thinking, there were two components of analytical thinking, which were analytical skill for their works and analytical thinking for themselves. There were four subcategories under analytical thinking for their works, which were evidence based thinking, real situational thinking, cause analysis thinking, and systematic thinking, respectively. There were four subcategories under analytical thinking for themselves, which were comparative between themselves, towards their clients that leads to the changing of their service behaviors, open-minded thinking, modernized thinking, and verifying both verbal and non-verbal cues. Lastly, there were three categories under participation, which were mutual rapport relationship; reconsidering client’s needs services and providing useful health care information.

Keywords: humanized care service, volunteer activity, nursing student, learning log

Procedia PDF Downloads 307
6474 Re-Invent Corporate Governance - Ethical Way

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.

Keywords: business, entrepreneur, ethics, governance, transparency.

Procedia PDF Downloads 75
6473 Influence of an Octenidine Based Wound Gel on Postoperative Wound Healing and Scarring after Abdominoplasty

Authors: Johannes Matiasek

Abstract:

Introduction and Aims: Octenidine is a common antiseptic agent in the area of surgical interventions because of its antimicrobial efficacy and outstanding biocompatibility index. We investigate the direct postoperative application of octenilin® on typical procedures in the field of plastic surgery in a prospective, randomized controlled intervention study. The aim of this study is to determine the influence of a direct postoperative application of an octenidine-containing wound gel on wound healing and scarring after abdominoplasty. Material and Methods: In this study, we enrolled 33 patients who underwent abdominoplasty because of medical indications (e.g. Cutis laxa abdominis). To ensure an intraindividual comparison, each patient received both dressings (study-group: octenilin® wound gel; control-group: Omnistrip® dry plaster) immediately after surgery. We evaluate wound-healing tendency, pain during dressing changes and scar formation after two weeks, three, six and twelve months. Regarding scar-evaluation skin-elasticity, sebum on the skin, transepidermal waterloss, skin hydration, melanin content and erythema level were determined with special probes. Furthermore the Vancouver Scar Scale (VSS) and pain level during dressing change are determined. Results: At the time of surgery the mean patient’s age was 44.1 years. On average 5.6 dressing changes were necessary. Wound healing disorders occurred more often in the control-group. In the control-group (dry plaster Omnistrip®) patients reported significantly more pain and superficial skin injuries during dressing changes occurred. Objective scar-evaluation after 3, 6 and 12 months resulted in a significant higher skin-elasticity and significant lower transepidermal water loss in the octenilin® group which is confirmed in the VSS. Conclusion: The immediate postoperative application of the octenidine-containing hydrogel octenilin® after abdominoplasty results in favoured scar formation compared to our actual standard therapy. Less hypertrophic scar formation was observed in the study-group.

Keywords: abdominoplasty, octenidine, scarring, wound healing

Procedia PDF Downloads 202
6472 Basic Evaluation for Polyetherimide Membrane Using Spectroscopy Techniques

Authors: Hanan Alenezi

Abstract:

Membrane performance depends on the kind of solvent used in preparation. A membrane made by Polyetherimide (PEI) was evaluated for gas separation using X-Ray Diffraction (XRD), Scanning electron microscope (SEM), and Energy Dispersive X-Ray Spectroscopy (EDS). The purity and the thickness are detected to evaluate the membrane in order to optimize PEI membrane preparation.

Keywords: Energy Dispersive X-Ray Spectroscopy (EDS), Membrane, Polyetherimide PEI, Scanning electron microscope (SEM), Solvent, X-Ray Diffraction (XRD)

Procedia PDF Downloads 183
6471 Government of Ghana’s Budget: An Assessment of Its Compliance with Fundamental Budgeting Principles

Authors: Mohammed Sani Abdulai

Abstract:

Public sector budgeting, all over the world, is underpinned by some universally accepted principles of sound budget management such as budget unity, universality, annuality, and a balanced budget. These traditional principles, though fundamental, had, in recent years, been augmented by the more modern principles of budgeting within fiscal objective, alignment with medium-term strategic plans as well as the observance of such related concepts as transparency, openness and accessibility. In this paper, we have endeavored to shed light, from literature and practice, on the meaning and purposes of such fundamental budgeting principles. We have also assessed the extent to which the Government of Ghana’s budget complies with the four traditional principles of budget unity, universality, annuality, and a balanced budget and the three out of the ten modern principles of budgetary governance of Organisation for Economic Co-operation and Development (OECD). We did so by using a qualitative method of review and analysis of existing documents and the performance assessment reports on Ghana’s Public Financial Management (PFM) measured using such frameworks as the Public Expenditure and Financial Accountability (PEFA), the Open Budget Survey (OBS) and its Index (OBI), the reports and action plans of Open Government Partnership (OGP) and the Global Initiative for Fiscal Transparency (GIFT). Other performance assessment reports that were relied on included, but not limited to, the Joint Evaluation Report of PFM in Ghana, 2001-2010, and the Joint Evaluation of Budget Support to Ghana, 2005-2015. We have, through this paper, brought to the fore the lessons that could be learned on how those budgetary principles undergird the Government of Ghana’s budget formulation, execution, accounting, control, and oversight. These lessons include, but are not limited to, the need for both scholars and practitioners in the PFM space to be aware of the impact of those principles on public sector budgeting.

Keywords: annulaity, balanced budget, budget unity, budgetary principles, OECD’s principles on budgetary governance, open budget index, public expenditure and financial accountability, universality

Procedia PDF Downloads 199
6470 Multi-Objectives Genetic Algorithm for Optimizing Machining Process Parameters

Authors: Dylan Santos De Pinho, Nabil Ouerhani

Abstract:

Energy consumption of machine-tools is becoming critical for machine-tool builders and end-users because of economic, ecological and legislation-related reasons. Many machine-tool builders are seeking for solutions that allow the reduction of energy consumption of machine-tools while preserving the same productivity rate and the same quality of machined parts. In this paper, we present the first results of a project conducted jointly by academic and industrial partners to reduce the energy consumption of a Swiss-Type lathe. We employ genetic algorithms to find optimal machining parameters – the set of parameters that lead to the best trade-off between energy consumption, part quality and tool lifetime. Three main machining process parameters are considered in our optimization technique, namely depth of cut, spindle rotation speed and material feed rate. These machining process parameters have been identified as the most influential ones in the configuration of the Swiss-type machining process. A state-of-the-art multi-objective genetic algorithm has been used. The algorithm combines three fitness functions, which are objective functions that permit to evaluate a set of parameters against the three objectives: energy consumption, quality of the machined parts, and tool lifetime. In this paper, we focus on the investigation of the fitness function related to energy consumption. Four different energy consumption related fitness functions have been investigated and compared. The first fitness function refers to the Kienzle cutting force model. The second fitness function uses the Material Removal Rate (RMM) as an indicator of energy consumption. The two other fitness functions are non-deterministic, learning-based functions. One fitness function uses a simple Neural Network to learn the relation between the process parameters and the energy consumption from experimental data. Another fitness function uses Lasso regression to determine the same relation. The goal is, then, to find out which fitness functions predict best the energy consumption of a Swiss-Type machining process for the given set of machining process parameters. Once determined, these functions may be used for optimization purposes – determine the optimal machining process parameters leading to minimum energy consumption. The performance of the four fitness functions has been evaluated. The Tornos DT13 Swiss-Type Lathe has been used to carry out the experiments. A mechanical part including various Swiss-Type machining operations has been selected for the experiments. The evaluation process starts with generating a set of CNC (Computer Numerical Control) programs for machining the part at hand. Each CNC program considers a different set of machining process parameters. During the machining process, the power consumption of the spindle is measured. All collected data are assigned to the appropriate CNC program and thus to the set of machining process parameters. The evaluation approach consists in calculating the correlation between the normalized measured power consumption and the normalized power consumption prediction for each of the four fitness functions. The evaluation shows that the Lasso and Neural Network fitness functions have the highest correlation coefficient with 97%. The fitness function “Material Removal Rate” (MRR) has a correlation coefficient of 90%, whereas the Kienzle-based fitness function has a correlation coefficient of 80%.

Keywords: adaptive machining, genetic algorithms, smart manufacturing, parameters optimization

Procedia PDF Downloads 147