Search results for: national food security strategy
9887 Hybrid Heat Pump for Micro Heat Network
Authors: J. M. Counsell, Y. Khalid, M. J. Stewart
Abstract:
Achieving nearly zero carbon heating continues to be identified by UK government analysis as an important feature of any lowest cost pathway to reducing greenhouse gas emissions. Heat currently accounts for 48% of UK energy consumption and approximately one third of UK’s greenhouse gas emissions. Heat Networks are being promoted by UK investment policies as one means of supporting hybrid heat pump based solutions. To this effect the RISE (Renewable Integrated and Sustainable Electric) heating system project is investigating how an all-electric heating sourceshybrid configuration could play a key role in long-term decarbonisation of heat. For the purposes of this study, hybrid systems are defined as systems combining the technologies of an electric driven air source heat pump, electric powered thermal storage, a thermal vessel and micro-heat network as an integrated system. This hybrid strategy allows for the system to store up energy during periods of low electricity demand from the national grid, turning it into a dynamic supply of low cost heat which is utilized only when required. Currently a prototype of such a system is being tested in a modern house integrated with advanced controls and sensors. This paper presents the virtual performance analysis of the system and its design for a micro heat network with multiple dwelling units. The results show that the RISE system is controllable and can reduce carbon emissions whilst being competitive in running costs with a conventional gas boiler heating system.Keywords: gas boilers, heat pumps, hybrid heating and thermal storage, renewable integrated and sustainable electric
Procedia PDF Downloads 4189886 Mobilizing Resources for Social Entrepreneurial Opportunity: A Framework of Engagement Strategy
Authors: Balram Bhushan
Abstract:
The emergence of social entrepreneurship challenges the strict categorization of not-for-profit, for-profit and hybrid organizations. Although the blurring of boundaries helps social entrepreneurial organizations (SEOs) make better use of emerging opportunities, it poses a significant challenge while mobilizing money from different sources. Additionally, for monetary resources, the legal framework of the host country may further complicate the issue by imposing strict accounting standards. Under such circumstances, the resource providers fail to recognize the suitable engagement strategy with the SEO of their choice. Based on the process of value creation and value capture, this paper develops a guiding framework for resource providers to design an appropriate mix of engagement with the identified SEOs. Essentially, social entrepreneurship creates value at the societal level, but value capture is a characteristic of an organization. Additionally, SEOs prefer value creation over value capture. The paper argued that the nature of the relationship between value creation and value capture determines the extent of blurred boundaries of the organization. Accordingly, synergistic, antagonistic and sequential relationships were proposed between value capture and value creation. When value creation is synergistically associated with value creation, the preferred nature of such action falls within the nature of for-profit organizations within the strictest legal framework. Banks offering micro-loans are good examples of this category. Opposite to this, the antagonist relationship between value creation and value capture, where value capture opportunities are sacrificed for value creation, dictates non-profit organizational structure. Examples of this category include non-government organizations and charity organizations. Finally, the sequential relationship between value capture opportunities is followed for value creation opportunities and guides the action closer to the hybrid structure. Examples of this category include organizations where a non-for-profit unit controls for-profit units of the organization either legally or structurally. As an SEO may attempt to utilize multiple entrepreneurial opportunities falling across any of the three relationships between value creation and value capture, the resource providers need to evaluate an appropriate mix of these relationships before designing their engagement strategies. The paper suggests three guiding principles for the engagement strategy. First, the extent of investment should be proportional to the synergistic relationship between value capture and value creation. Second, the subsidized support should be proportional to the sequential relationship. Finally, the funding (charity contribution) should be proportional to the antagonistic relationship. Finally, the resource providers are needed to keep a close watch on the evolving relationship between value creation and value capture for introducing appropriate changes in their engagement strategy.Keywords: social entrepreneurship, value creation, value capture, entrepreneurial opportunity
Procedia PDF Downloads 1299885 The Collagen and Glycosaminoglycnas Isolated from Salmo Salar Skin
Authors: Beata Kaczmarek-Szczepańska, Lidia Zasada
Abstract:
Marine collagens such as fish skin, bone, cartilage, and scales, including both marine vertebrates and invertebrates sources, are more bioavailable compared to bovine or porcine collagen and have a higher absorption capability and more rapid bloodstream circulation due to their low molecular weight and small particle size. Fish skin may be used as a source of bioactive compounds. The advantage is that fish skin is a by-product of the food industry. The subject of the study is a lyophilizate consisting of a mixture of compounds from the group of glycosaminoglycans and collagen obtained as a result of processing fish skins. Bioactive compounds may find biomedical use in the production of dressing materials for wounds or in tissue engineering for the production of scaffolds for cells. Collagen and glycosaminoglycans were isolated from Salmo salar skin. The final mixture was obtained by the freeze-drying method. In the obtained lyophilizate, the content of amino acids was studied as well as the presence of polysaccharides. The studies showed the presence of glycine, proline, and hydroxyproline, which are the main amino acids of collagen. The HPLC analysis showed the presence of glucose which is a product of polysaccharides hydrolyzation and then reduction of glucuronic acid. It may be assumed that the lyophilizate contains both collagen and polysaccharide, which is probably hyaluronic acid. Acknowledgment: This work was carried out as a result of research project no. TANGO-V-A/0020/2021 financed by the National Centre for Research and Development.Keywords: collagen, glycosaminoglycans, bioactive compounds, fish skin
Procedia PDF Downloads 1129884 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 3969883 On the Translation of Thai Culture-Specific Terms of Address into English
Authors: Supannee Pinmanee
Abstract:
This article focuses on the strategies in the translation of terms of address for both referential and vocative functions from Thai to English from a cultural perspective. The discussion concerns the culture-specific ways in which Thai people use address terms that depend largely on social and conventional contexts, including pragmatic factors, for example, relationships between people, levels of formality, and attitudes. Examples used to illustrate the problems and proposed solutions were drawn from the media, the internet, the novels and the language used by Thai native speakers in expressing Thai address terms. The terms used in this area show very well not only the differences in language but also the different cultures and world views of the speakers of Thai and those of English. Thai has developed its own set of address terms, particularly kinship terms for non-relatives and the Thai royal terms. Some of Newmark’s procedures (1995) are used in the article to illustrate the task of translating Thai terms into English, a language that embodies a very different culture with its own set of address terms. However, no one strategy can be applied to serve all purposes and to translate all the intended senses. One particular term can be translated by several strategies, and which strategy to choose depends largely on one’s purposes and what requirement one needs to fulfill.Keywords: translation, terms of address, Thai-English translation, Thai culture-specific terms of address, translation strategies
Procedia PDF Downloads 2009882 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints
Authors: Zongjie Wang, Zhizhong Guo
Abstract:
While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.Keywords: optimal power flow, time period, security, economy
Procedia PDF Downloads 4489881 Diversification of Sweet Potato Blends and Utilization for Malnutrition and Poverty Alleviation
Authors: Ladele Ademola A., Nkiru T. Meludu, Olufunke Ezekiel, Olaoye Taye F., Okanlowan Oluwatoyin M.
Abstract:
Value addition to agricultural produce is of possible potential in reducing poverty, improving food security and malnutrition, therefore the need to develop small and micro-enterprises of sweet potato production. The study was carried out in Nigeria to determine the acceptability of blends sweet potato (Ipomea batatas) and commodities yellow maize (Zea mays), millet (Pennisetum glaucum), soybean (Glycine max), bambara groundnut (Vigna subterranean), guinea corn (Sorghum vulgare), wheat (Triticum aestivum), and roselle (Hibiscus sabdariffa) through sensory evaluation. Sweet potato (Ipomea batatas) roots were processed using two methods. The first method involved the use of a fabricated gas powered cabinet dryer to dry sulphited chips and the second method was the use of traditional sun drying method without the addition of the chemical. The blends were also assessed in terms of functional, chemical and color properties. Most acceptable blends include BAW (80:20 of sweet potato/wheat), BBC (80:20 of sweet potato/guinea corn), AAB (60:40 of sweet potato/guinea corn), YTE (100% soybean), TYG (100% sweet potato), KTN (100% wheat flour), XGP (80:20 of sweet potato/soybean), XAX (60:40 of sweet potato/wheat), LSS (100% Roselle), CHK (100% Guinea corn), and ABC (60:40% of sweet potato/ yellow maize). In addition, chemical analysis carried out revealed that sweet potato has high percentage of vitamins A and C, potassium (K), manganese (Mn), calcium (Ca), magnesium (Mg) and iron (Fe) and fibre content. There is also an increase of vitamin A and Iron in the blended products.Keywords: blends, diversification, sensory evaluation, sweet potato, utilization
Procedia PDF Downloads 5059880 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 3619879 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 559878 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective
Authors: Mike Omilusi
Abstract:
Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.Keywords: corruption, rule of law, human rights, prosecution, commonwealth
Procedia PDF Downloads 2029877 A Supply Chain Risk Management Model Based on Both Qualitative and Quantitative Approaches
Authors: Henry Lau, Dilupa Nakandala, Li Zhao
Abstract:
In today’s business, it is well-recognized that risk is an important factor that needs to be taken into consideration before a decision is made. Studies indicate that both the number of risks faced by organizations and their potential consequences are growing. Supply chain risk management has become one of the major concerns for practitioners and researchers. Supply chain leaders and scholars are now focusing on the importance of managing supply chain risk. In order to meet the challenge of managing and mitigating supply chain risk (SCR), we must first identify the different dimensions of SCR and assess its relevant probability and severity. SCR has been classified in many different ways, and there are no consistently accepted dimensions of SCRs and several different classifications are reported in the literature. Basically, supply chain risks can be classified into two dimensions namely disruption risk and operational risk. Disruption risks are those caused by events such as bankruptcy, natural disasters and terrorist attack. Operational risks are related to supply and demand coordination and uncertainty, such as uncertain demand and uncertain supply. Disruption risks are rare but severe and hard to manage, while operational risk can be reduced through effective SCM activities. Other SCRs include supply risk, process risk, demand risk and technology risk. In fact, the disorganized classification of SCR has created confusion for SCR scholars. Moreover, practitioners need to identify and assess SCR. As such, it is important to have an overarching framework tying all these SCR dimensions together for two reasons. First, it helps researchers use these terms for communication of ideas based on the same concept. Second, a shared understanding of the SCR dimensions will support the researchers to focus on the more important research objective: operationalization of SCR, which is very important for assessing SCR. In general, fresh food supply chain is subject to certain level of risks, such as supply risk (low quality, delivery failure, hot weather etc.) and demand risk (season food imbalance, new competitors). Effective strategies to mitigate fresh food supply chain risk are required to enhance operations. Before implementing effective mitigation strategies, we need to identify the risk sources and evaluate the risk level. However, assessing the supply chain risk is not an easy matter, and existing research mainly use qualitative method, such as risk assessment matrix. To address the relevant issues, this paper aims to analyze the risk factor of the fresh food supply chain using an approach comprising both fuzzy logic and hierarchical holographic modeling techniques. This novel approach is able to take advantage the benefits of both of these well-known techniques and at the same time offset their drawbacks in certain aspects. In order to develop this integrated approach, substantial research work is needed to effectively combine these two techniques in a seamless way, To validate the proposed integrated approach, a case study in a fresh food supply chain company was conducted to verify the feasibility of its functionality in a real environment.Keywords: fresh food supply chain, fuzzy logic, hierarchical holographic modelling, operationalization, supply chain risk
Procedia PDF Downloads 2409876 An Optimized Method for 3D Magnetic Navigation of Nanoparticles inside Human Arteries
Authors: Evangelos G. Karvelas, Christos Liosis, Andreas Theodorakakos, Theodoros E. Karakasidis
Abstract:
In the present work, a numerical method for the estimation of the appropriate gradient magnetic fields for optimum driving of the particles into the desired area inside the human body is presented. The proposed method combines Computational Fluid Dynamics (CFD), Discrete Element Method (DEM) and Covariance Matrix Adaptation (CMA) evolution strategy for the magnetic navigation of nanoparticles. It is based on an iteration procedure that intents to eliminate the deviation of the nanoparticles from a desired path. Hence, the gradient magnetic field is constantly adjusted in a suitable way so that the particles’ follow as close as possible to a desired trajectory. Using the proposed method, it is obvious that the diameter of particles is crucial parameter for an efficient navigation. In addition, increase of particles' diameter decreases their deviation from the desired path. Moreover, the navigation method can navigate nanoparticles into the desired areas with efficiency approximately 99%.Keywords: computational fluid dynamics, CFD, covariance matrix adaptation evolution strategy, discrete element method, DEM, magnetic navigation, spherical particles
Procedia PDF Downloads 1399875 Optimizing Load Shedding Schedule Problem Based on Harmony Search
Authors: Almahd Alshereef, Ahmed Alkilany, Hammad Said, Azuraliza Abu Bakar
Abstract:
From time to time, electrical power grid is directed by the National Electricity Operator to conduct load shedding, which involves hours' power outages on the area of this study, Southern Electrical Grid of Libya (SEGL). Load shedding is conducted in order to alleviate pressure on the National Electricity Grid at times of peak demand. This approach has chosen a set of categories to study load-shedding problem considering the effect of the demand priorities on the operation of the power system during emergencies. Classification of category region for load shedding problem is solved by a new algorithm (the harmony algorithm) based on the "random generation list of category region", which is a possible solution with a proximity degree to the optimum. The obtained results prove additional enhancements compared to other heuristic approaches. The case studies are carried out on SEGL.Keywords: optimization, harmony algorithm, load shedding, classification
Procedia PDF Downloads 3949874 Weak Electric Fields Enhance Growth and Nutritional Quality of Kale
Authors: So-Ra Lee, Myung-Min Oh
Abstract:
Generally, plants growing on the earth are under the influence of natural electric fields and may even require exposure of the electric field to survive. Electric signals have been observed within plants and seem to play an important role on various metabolic processes, but their role is not fully understood. In this study, we attempted to explore the response of plants under external electric fields in kale (Brassica oleracea var. acephala). The plants were hydroponically grown for 28 days in a plant factory. Electric currents at 10, 50 and 100 mA were supplied to nutrient solution for 3 weeks. Additionally, some of the plants were cultivated in a Faraday cage to remove the natural electric field. Kale plants exposed to electric fields had higher fresh weight than the control and plants in Faraday cage. Absence of electric field caused a significant decrease in shoot dry weight and root growth. Leaf area also showed a similar response with shoot fresh weight. Supplying weak electric stimulation enhanced nutritional quality including total phenolic content and antioxidant capacity. This work provides basic information on the effects of electric fields on plants and is a meaningful attempt for developing a new economical technology to increase crop productivity and quality by applying an electric field. This work was supported by Korea Institute of Planning and Evaluation for Technology in Food, Agriculture, Forestry and Fisheries (IPET) through Agriculture, Food and Rural Affairs Research Center Support Program, funded by Ministry of Agriculture, Food and Rural Affairs (MAFRA) (717001-07-02-HD240).Keywords: electroculture, electric signal, faraday cage, electric field
Procedia PDF Downloads 2909873 Self-Regulation in Composition Writing: The Case of Variation of Self-Regulation Dispositions in Opinion Essay and Technical Writing
Authors: Dave Kenneth Tayao Cayado, Carlo P. Magno, Venice Cristine Dangaran
Abstract:
The present study determines whether there will be differences in the self-regulation dispositions that learners utilize when writing different types of composition. There were 7 self-regulation factors that were used to develop a scale in this study such as memory strategy, goal setting, self-evaluation, seeking assistance, learning responsibility, environmental structuring, and organizing. The scale was made specific for writing a composition. The researcher-made scale was administered to 150 participants who all came from a university in the Philippines. The participants were asked to write two compositions namely opinion essay and research introduction/review of related literature. The zero-order correlation revealed that all the factors of self-regulation are correlated with one another. However, only seeking assistance and self-evaluation are correlated with opinion essay and technical writing is not correlated to any of the self-regulation factors. However, when path analysis was used, it was shown that seeking assistance can predict opinion essay scores whereas memory strategy, self-evaluation, and organizing can predict technical writing scores.Keywords: opinion essay, self-regulation, technical writing, writing skills
Procedia PDF Downloads 1799872 Selection of Qualitative Research Strategy for Bullying and Harassment in Sport
Authors: J. Vveinhardt, V. B. Fominiene, L. Jeseviciute-Ufartiene
Abstract:
Relevance of Research: Qualitative research is still regarded as highly subjective and not sufficiently scientific in order to achieve objective research results. However, it is agreed that a qualitative study allows revealing the hidden motives of the research participants, creating new theories, and highlighting the field of problem. There is enough research done to reveal these qualitative research aspects. However, each research area has its own specificity, and sport is unique due to the image of its participants, who are understood as strong and invincible. Therefore, a sport participant might have personal issues to recognize himself as a victim in the context of bullying and harassment. Accordingly, researcher has a dilemma in general making to speak a victim in sport. Thus, ethical aspects of qualitative research become relevant. The plenty fields of sport make a problem determining the sample size of research. Thus, the corresponding problem of this research is which and why qualitative research strategies are the most suitable revealing the phenomenon of bullying and harassment in sport. Object of research is qualitative research strategy for bullying and harassment in sport. Purpose of the research is to analyze strategies of qualitative research selecting suitable one for bullying and harassment in sport. Methods of research were scientific research analyses of qualitative research application for bullying and harassment research. Research Results: Four mane strategies are applied in the qualitative research; inductive, deductive, retroductive, and abductive. Inductive and deductive strategies are commonly used researching bullying and harassment in sport. The inductive strategy is applied as quantitative research in order to reveal and describe the prevalence of bullying and harassment in sport. The deductive strategy is used through qualitative methods in order to explain the causes of bullying and harassment and to predict the actions of the participants of bullying and harassment in sport and the possible consequences of these actions. The most commonly used qualitative method for the research of bullying and harassment in sports is semi-structured interviews in speech and in written. However, these methods may restrict the openness of the participants in the study when recording on the dictator or collecting incomplete answers when the participant in the survey responds in writing because it is not possible to refine the answers. Qualitative researches are more prevalent in terms of technology-defined research data. For example, focus group research in a closed forum allows participants freely interact with each other because of the confidentiality of the selected participants in the study. The moderator can purposefully formulate and submit problem-solving questions to the participants. Hence, the application of intelligent technology through in-depth qualitative research can help discover new and specific information on bullying and harassment in sport. Acknowledgement: This research is funded by the European Social Fund according to the activity ‘Improvement of researchers’ qualification by implementing world-class R&D projects of Measure No. 09.3.3-LMT-K-712.Keywords: bullying, focus group, harassment, narrative, sport, qualitative research
Procedia PDF Downloads 1789871 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs
Authors: Nourah Almulhim
Abstract:
This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.Keywords: xenophobia, blogs, identity, critical discourse analysis
Procedia PDF Downloads 929870 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy
Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang
Abstract:
The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device
Procedia PDF Downloads 1289869 The Impact of Window Opening Occupant Behavior Models on Building Energy Performance
Authors: Habtamu Tkubet Ebuy
Abstract:
Purpose Conventional dynamic energy simulation tools go beyond the static dimension of simplified methods by providing better and more accurate prediction of building performance. However, their ability to forecast actual performance is undermined by a low representation of human interactions. The purpose of this study is to examine the potential benefits of incorporating information on occupant diversity into occupant behavior models used to simulate building performance. The co-simulation of the stochastic behavior of the occupants substantially increases the accuracy of the simulation. Design/methodology/approach In this article, probabilistic models of the "opening and closing" behavior of the window of inhabitants have been developed in a separate multi-agent platform, SimOcc, and implemented in the building simulation, TRNSYS, in such a way that the behavior of the window with the interconnectivity can be reflected in the simulation analysis of the building. Findings The results of the study prove that the application of complex behaviors is important to research in predicting actual building performance. The results aid in the identification of the gap between reality and existing simulation methods. We hope this study and its results will serve as a guide for researchers interested in investigating occupant behavior in the future. Research limitations/implications Further case studies involving multi-user behavior for complex commercial buildings need to more understand the impact of the occupant behavior on building performance. Originality/value This study is considered as a good opportunity to achieve the national strategy by showing a suitable tool to help stakeholders in the design phase of new or retrofitted buildings to improve the performance of office buildings.Keywords: occupant behavior, co-simulation, energy consumption, thermal comfort
Procedia PDF Downloads 1019868 Impact of Alternative Fuel Feeding on Fuel Cell Performance and Durability
Authors: S. Rodosik, J. P. Poirot-Crouvezier, Y. Bultel
Abstract:
With the expansion of the hydrogen economy, Proton Exchange Membrane Fuel Cell (PEMFC) systems are often presented as promising energy converters suitable for transport applications. However, reaching a durability of 5000 h recommended by the U.S. Department of Energy and decreasing system cost are still major hurdles to their development. In order to increase the system efficiency and simplify the system without affecting the fuel cell lifetime, an architecture called alternative fuel feeding has been developed. It consists in a fuel cell stack divided into two parts, alternatively fed, implemented on a 5-kW system for real scale testing. The operation strategy can be considered close to Dead End Anode (DEA) with specific modifications to avoid water and nitrogen accumulation in the cells. The two half-stacks are connected in series to enable each stack to be alternatively fed. Water and nitrogen accumulated can be shifted from one half-stack to the other one according to the alternative feeding frequency. Thanks to the homogenization of water vapor along the stack, water management was improved. The operating conditions obtained at system scale are close to recirculation without the need of a pump or an ejector. In a first part, a performance comparison with the DEA strategy has been performed. At high temperature and low pressure (80°C, 1.2 bar), performance of alternative fuel feeding was higher, and the system efficiency increased. In a second part, in order to highlight the benefits of the architecture on the fuel cell lifetime, two durability tests, lasting up to 1000h, have been conducted. A test on the 5-kW system has been compared to a reference test performed on a test bench with a shorter stack, conducted with well-controlled operating parameters and flow-through hydrogen strategy. The durability test is based upon the Fuel Cell Dynamic Load Cycle (FC-DLC) protocol but adapted to the system limitations: without OCV steps and a maximum current density of 0.4 A/cm². In situ local measurements with a segmented S++® plate performed all along the tests, showed a more homogeneous distribution of the current density with alternative fuel feeding than in flow-through strategy. Tests performed in this work enabled the understanding of this architecture advantages and drawbacks. Alternative fuel feeding architecture appeared to be a promising solution to ensure the humidification function at the anode side with a simplified fuel cell system.Keywords: automotive conditions, durability, fuel cell system, proton exchange membrane fuel cell, stack architecture
Procedia PDF Downloads 1409867 Enhancing Child Diets in Food-Insecure Rural Ethiopia
Authors: Tigist mamo, Beryl Oranga, Precious Mubanga
Abstract:
High rates of child undernutrition in Ethiopia place children at significant risk, highlighting the need for low-cost, nutritious diets starting at six months of age. These diets should be diverse and rich in essential nutrients like proteins, vitamins, and minerals. However, many rural households participating in the Productive Safety Net Program (PSNP) struggle to afford fortified foods and often rely on low-protein, cereal-based diets, leading to micronutrient deficiencies. In addition, fasting practices further restrict the consumption of animal-source foods for 190 to 250 days each year, limiting dietary diversity even more. Addressing these challenges requires solutions beyond nutrition counseling, focusing on factors such as seasonality, food perishability, and safety to promote better health outcomes for children. The program's main objective is to empower caregivers with practical recipes for complementary feeding for children aged 6 to 23 months by enhancing meals with affordable ingredients like cereal, legumes, dried vegetables, and meat. The ongoing implementation research within the SPIR-II program is centered on developing a cost-effective mixed flour and exploring drying techniques to extend shelf life, ultimately addressing the delayed introduction of complementary foods and increasing nutrient-rich options in households. Saleswomen participating in the SPIR-II program have been empowered to produce easy-to-use local complementary flour and conduct door-to-door sales in their neighborhoods. Caregivers who have purchased and fed this flour to their children have reported significant improvements in their nutritional status. Additionally, SPIR-II is testing low-tech drying methods suitable for rural Ethiopian contexts to reduce food loss and promote the inclusion of nutrient-dense foods in children's diets. The paper will highlight the primary outcomes of these initiatives as they are being implemented.Keywords: food preservation, easy-to-use mixed flour, complementary feeding, drying techniques
Procedia PDF Downloads 69866 Prioritizing Forest Conservation Strategies Using a Multi-Attribute Decision Model to Address Concerns with the Survival of the Endangered Dragon Tree (Dracaena ombet Kotschy and Peyr.)
Authors: Tesfay Gidey, Emiru Birhane, Ashenafi Manaye, Hailemariam Kassa, Tesfay Atsbha, Negasi Solomon, Hadgu Hishe, Aklilu Negussie, Petr Madera, Jose G. Borges
Abstract:
The globally endangered Dracaena ombet is one of the ten dragon multipurpose tree species in arid ecosystems. Anthropogenic and natural factors are now impacting the sustainability of the species. This study was conducted to prioritize criteria and alternative strategies for the conservation of the species using the analytical hierarchy process (AHP) model by involving all relevant stakeholders in the Desa'a dry Afromontane forest in northern Ethiopia. Information about the potential alternative strategies and the criteria for their evaluation was first collected from experts, personal experiences, and literature reviews. Afterward, they were validated using stakeholders' focus group discussions. Five candidate strategies with three evaluation criteria were considered for prioritization using the AHP techniques. The overall priority ranking value of the stakeholders showed that the ecological criterion was deemed as the most essential factor for the choice of alternative strategies, followed by the economic and social criteria. The minimum cut-off strategy, combining exclosures with the collection of only 5% of plant parts from the species, soil and water conservation, and silviculture interventions, was selected as the best alternative strategy for sustainable D. ombet conservation. The livelihood losses due to the selected strategy should be compensated by the collection of non-timber forest products, poultry farming, home gardens, rearing small ruminants, beekeeping, and agroforestry. This approach may be extended to study other dragon tree species and explore strategies for the conservation of other arid ecosystems.Keywords: conservation strategies, analytical hierarchy process model, Desa'a forest, endangered species, Ethiopia, overexploitation
Procedia PDF Downloads 909865 Efficiency of PCR-RFLP for the Identification of Adulteries in Meat Formulation
Authors: Hela Gargouri, Nizar Moalla, Hassen Hadj Kacem
Abstract:
Meat adulteration affecting the safety and quality of food is becoming one of the main concerns of public interest across the world. The drastic consequences on the meat industry highlighted the urgent necessity to control the products' quality and to point out the complexity of both supply and processing circuits. Due to the expansion of this problem, the authentic testing of foods, particularly meat and its products, is deemed crucial to avoid unfair market competition and to protect consumers from fraudulent practices of meat adulteration. The adoption of authentication methods by the food quality-control laboratories is becoming a priority issue. However, in some developing countries, the number of food tests is still insignificant, although a variety of processed and traditional meat products are widely consumed. Little attention has been paid to provide an easy, fast, reproducible, and low-cost molecular test, which could be conducted in a basic laboratory. In the current study, the 359 bp fragment of the cytochrome-b gene was mapped by PCR-RFLP using firstly fresh biological supports (DNA and meat) and then turkey salami as an example of commercial processed meat. This technique has been established through several optimizations, namely: the selection of restriction enzymes. The digestion with BsmAI, SspI, and TaaI succeed to identify the seven included animal species when meat is formed by individual species and when the meat is a mixture of different origin. In this study, the PCR-RFLP technique using universal primer succeed to meet our needs by providing an indirect sequencing method identifying by restriction enzymes the specificities characterizing different species on the same amplicon reducing the number of potential tests.Keywords: adulteration, animal species, authentication, meat, mtDNA, PCR-RFLP
Procedia PDF Downloads 1119864 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 2519863 The Political Economy of Fiscal and Monetary Interactions in Brazil
Authors: Marcos Centurion-Vicencio
Abstract:
This study discusses the idea of ‘dominance’ in economic policy and its practical influence over monetary decisions. The discretionary use of repurchase agreements in Brazil over the period 2006-2016 and its effects on the overall price level are the specific issues we will be focusing on. The set of in-depth interviews carried out with public servants at the Brazilian central bank and national treasury, alongside data collected from the National Institution of Statistics (IBGE), suggest that monetary and fiscal dominance do not differ in nature once the assumption of depoliticized central bankers is relaxed. In both regimes, the pursuit of private gains via public institutions affects price stability. While short-sighted politicians in the latter are at the origin of poor monetary decisions, the action of short-sighted financial interest groups is likely to generate a similar outcome in the former. This study then contributes to rethinking monetary policy theory as well as the nature of public borrowing.Keywords: fiscal and monetary interactions, interest groups, monetary capture, public borrowing
Procedia PDF Downloads 1339862 Isolation and Screening of Laccase Producing Basidiomycetes via Submerged Fermentations
Authors: Mun Yee Chan, Sin Ming Goh, Lisa Gaik Ai Ong
Abstract:
Approximately 10,000 different types of dyes and pigments are being used in various industrial applications yearly, which include the textile and printing industries. However, these dyes are difficult to degrade naturally once they enter the aquatic system. Their high persistency in natural environment poses a potential health hazard to all form of life. Hence, there is a need for alternative dye removal strategy in the environment via bioremediation. In this study, fungi laccase is investigated via commercial agar dyes plates and submerged fermentation to explore the application of fungi laccase in textile dye wastewater treatment. Two locally isolated basidiomycetes were screened for laccase activity using media added with commercial dyes such as 2, 2-azino-bis (3-ethylbenzothiazoline-6-sulfonic acid (ABTS), guaiacol and Remazol Brillant Blue R (RBBR). Isolate TBB3 (1.70±0.06) and EL2 (1.78±0.08) gave the highest results for ABTS plates with the appearance of greenish halo on around the isolates. Submerged fermentation performed on Isolate TBB3 with the productivity 3.9067 U/ml/day, whereas the laccase activity for Isolate EL2 was much lower (0.2097 U/ml/day). As isolate TBB3 showed higher laccase production, it was subjected to molecular characterization by DNA isolation, PCR amplification and sequencing of ITS region of nuclear ribosomal DNA. After being compared with other sequences in National Center for Biotechnology Information (NCBI database), isolate TBB3 is probably from species Trametes hirsutei. Further research work can be performed on this isolate by upscale the production of laccase in order to meet the demands of the requirement for higher enzyme titer for the bioremediation of textile dyes.Keywords: bioremediation, dyes, fermentation, laccase
Procedia PDF Downloads 3509861 Analysis of Productivity and Poverty Status among Users of Improved Sorghum Varieties in Kano State, Nigeria
Authors: Temitope Adefunsho Olatoye, Julius Olabode Elega
Abstract:
Raising agricultural productivity is an important policy goal for governments and development agencies, and this is central to growth, income distribution, improved food security, and poverty alleviation among practitioners. This study analyzed the productivity and poverty status among users of improved sorghum varieties in Kano State, Nigeria. A multistage sampling technique was adopted in the selection of 131 sorghum farmers who were users of improved sorghum varieties. Data collected were analyzed using both descriptive (frequency distribution and percentage) and inferential (productivity index and FGT model) statistics. The result of the socioeconomic characteristics of the sorghum farmers showed a mean age of 40 years, with about 93.13% of the sorghum farmers being male. Also, as indicated by the result, the majority (82.44%) of the farmers were married, with most of them having qur’anic education with a mean farm size of 3.6 ha, as reported in the study area. Furthermore, the result showed that the mean farming experience of the sorghum farmers in the study area was 19 years, with an average monthly income of about ₦48,794, as reported in the study area. The result of the productivity index showed a ratio of 192,977kg/ha, while the result of poverty status shows that 62.88% were in the non-poor category, 21.21% were poor, and 15.91% were very poor, respectively. The result also showed that the incidence of poverty for sorghum farmers was 16%, indicating that the incidence of poverty was prevalent in the study area. Based on the findings of this study, it was therefore recommended that seed companies should facilitate the spread of improved sorghum varieties as it has an impact on the productivity and poverty status of sorghum farmers in the study area.Keywords: Foster Greer Thorbecke model, improved sorghum varieties, productivity, poverty status
Procedia PDF Downloads 719860 Utilization of Functionalized Biochar from Water Hyacinth (Eichhornia crassipes) as Green Nano-Fertilizers
Authors: Adewale Tolulope Irewale, Elias Emeka Elemike, Christian O. Dimkpa, Emeka Emmanuel Oguzie
Abstract:
As the global population steadily approaches the 10billion mark, the world is currently faced with two major challenges among others – accessing sustainable and clean energy, and food security. Accessing cleaner and sustainable energy sources to drive global economy and technological advancement, and feeding the teeming human population require sustainable, innovative, and smart solutions. To solve the food production problem, producers have relied on fertilizers as a way of improving crop productivity. Commercial inorganic fertilizers, which is employed to boost agricultural food production, however, pose significant ecological sustainability and economic problems including soil and water pollution, reduced input efficiency, development of highly resistant weeds, micronutrient deficiency, soil degradation, and increased soil toxicity. These ecological and sustainability concerns have raised uncertainties about the continued effectiveness of conventional fertilizers. With the application of nanotechnology, plant biomass upcycling offers several advantages in greener energy production and sustainable agriculture through reduction of environmental pollution, increasing soil microbial activity, recycling carbon thereby reducing GHG emission, and so forth. This innovative technology has the potential for a circular economy and creating a sustainable agricultural practice. Nanomaterials have the potential to greatly enhance the quality and nutrient composition of organic biomass which in turn, allows for the conversion of biomass into nanofertilizers that are potentially more efficient. Water hyacinth plant harvested from an inland water at Warri, Delta State Nigeria were air-dried and milled into powder form. The dry biomass were used to prepare biochar at a pre-determined temperature in an oxygen deficient atmosphere. Physicochemical analysis of the resulting biochar was carried out to determine its porosity and general morphology using the Scanning Transmission Electron Microscopy (STEM). The functional groups (-COOH, -OH, -NH2, -CN, -C=O) were assessed using the Fourier Transform InfraRed Spectroscopy (FTIR) while the heavy metals (Cr, Cu, Fe, Pb, Mg, Mn) were analyzed using Inductively Coupled Plasma – Optical Emission Spectrometry (ICP-OES). Impregnation of the biochar with nanonutrients were achieved under varied conditions of pH, temperature, nanonutrient concentrations and resident time to achieve optimum adsorption. Adsorption and desorption studies were carried out on the resulting nanofertilizer to determine kinetics for the potential nutrients’ bio-availability to plants when used as green fertilizers. Water hyacinth (Eichhornia crassipes) which is an aggressively invasive aquatic plant known for its rapid growth and profusion is being examined in this research to harness its biomass as a sustainable feedstock to formulate functionalized nano-biochar fertilizers, offering various benefits including water hyacinth biomass upcycling, improved nutrient delivery to crops and aquatic ecosystem remediation. Altogether, this work aims to create output values in the three dimensions of environmental, economic, and social benefits.Keywords: biochar-based nanofertilizers, eichhornia crassipes, greener agriculture, sustainable ecosystem, water hyacinth
Procedia PDF Downloads 649859 Irbid National University Students’ Beliefs about English Language Learning
Authors: Khaleel Bader Bataineh
Abstract:
Past studies have maintained that the Arab learners' beliefs about language learning hold vital effects on their performance. Thus, this study was carried out to investigate the language learning beliefs of Irbid National University students. It aimed at identifying the language learning beliefs according to gender. This study is a descriptive design that employed survey questionnaire of Language Learning Beliefs Inventory (BALLI). The data were elicited from 83 English major students during the class sessions. The data were analyzed using an SPSS program in which frequency analysis and t-test were performed to examine the students’ responses. Thus, the major findings of this research indicated that there is a variation in responses with regards to the subjects’ beliefs about English learning. Also, the findings show significant differences in four questionnaire items according to gender. It is hoped that the findings provide valuable insights to educators about the learners’ beliefs which assist them to develop the teaching and learning English language process in Jordan universities.Keywords: foreign language, students’ beliefs, language learning, Arab students
Procedia PDF Downloads 4869858 Structured Tariff Calculation to Promote Geothermal for Energy Security
Authors: Siti Mariani, Arwin DW Sumari, Retno Gumilang Dewi
Abstract:
This paper analyzes the necessity of a structured tariff calculation for geothermal electricity in Indonesia. Indonesia is blessed with abundant natural resources and a choices of energy resources to generate electricity among other are coal, gas, biomass, hydro to geothermal, creating a fierce competition in electricity tariffs. While geothermal is inline with energy security principle and green growth initiative, it requires a huge capital funding. Geothermal electricity development consists of phases of project with each having its own financial characteristics. The Indonesian government has set a support in the form of ceiling price of geothermal electricity tariff by 11 U.S cents / kWh. However, the government did not set a levelized cost of geothermal, as an indication of lower limit capacity class, to which support is given. The government should establish a levelized cost of geothermal energy to reflect its financial capability in supporting geothermal development. Aside of that, the government is also need to establish a structured tariff calculation to reflect a fair and transparent business cooperation.Keywords: load fator, levelized cost of geothermal, geothermal power plant, structured tariff calculation
Procedia PDF Downloads 438