Search results for: derivative security price
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4212

Search results for: derivative security price

1092 Detection Kit of Type 1 Diabetes Mellitus with Autoimmune Marker GAD65 (Glutamic Acid Decarboxylase)

Authors: Aulanni’am Aulanni’am

Abstract:

Incidence of Diabetes Mellitus (DM) progressively increasing it became a serious problem in Indonesia and it is a disease that government is priority to be addressed. The longer a person is suffering from diabetes the more likely to develop complications particularly diabetic patients who are not well maintained. Therefore, Incidence of Diabetes Mellitus needs to be done in the early diagnosis of pre-phase of the disease. In this pre-phase disease, already happening destruction of pancreatic beta cells and declining in beta cell function and the sign autoimmunity reactions associated with beta cell destruction. Type 1 DM is a multifactorial disease triggered by genetic and environmental factors, which leads to the destruction of pancreatic beta cells. Early marker of "beta cell autoreactivity" is the synthesis of autoantibodies against 65-kDa protein, which can be a molecule that can be detected early in the disease pathomechanism. The importance of early diagnosis of diabetic patients held in the phase of pre-disease is to determine the progression towards the onset of pancreatic beta cell destruction and take precautions. However, the price for this examination is very expensive ($ 150/ test), the anti-GAD65 abs examination cannot be carried out routinely in most or even in all laboratories in Indonesia. Therefore, production-based Rapid Test Recombinant Human Protein GAD65 with "Reverse Flow Immunchromatography Technique" in Indonesia is believed to reduce costs and improve the quality of care of patients with diabetes in Indonesia. Rapid Test Product innovation is very simple and suitable for screening and routine inspection of GAD65 autoantibodies. In the blood serum of patients with diabetes caused by autoimmunity, autoantibody-GAD65 is a major serologic marker to detect autoimmune reaction because their concentration level of stability.GAD65 autoantibodies can be found 10 years before clinical symptoms of diabetes. Early diagnosis is more focused to detect the presence autontibodi-GAD65 given specification and high sensitivity. Autoantibodies- GAD65 that circulates in the blood is a major indicator of the destruction of the islet cells of the pancreas. Results of research in collaboration with Biofarma has produced GAD65 autoantibodies based Rapid Test had conducted the soft launch of products and has been tested with the results of a sensitivity of 100 percent and a specificity between 90 and 96% compared with the gold standard (import product) which worked based on ELISA method.

Keywords: diabetes mellitus, GAD65 autoantibodies, rapid test, sensitivity, specificity

Procedia PDF Downloads 268
1091 The Effect of Ambient Temperature on the Performance of the Simple and Modified Cycle Gas Turbine Plants

Authors: Ogbe E. E., Ossia. C. V., Saturday. E. G., Ezekwe M. C.

Abstract:

The disparity in power output between a simple and a modified gas turbine plant is noticeable when the gas turbine functions under local environmental conditions that deviate from the standard ISO specifications. Extensive research and literature have demonstrated a well-known direct correlation between ambient temperature and the power output of a gas turbine plant. In this study, the Omotosho gas turbine plant was modified into three different configurations. The reason for the modification is to improve its performance and reduce the fuel consumption and emission rate. Aspen Hysys software was used to simulate both the simple (Omotosho) and the three modified gas turbine plants. The input parameters considered include ambient temperature, air mass flow rate, fuel mass flow rate, water mass flow rate, turbine inlet temperature, compressor efficiency, and turbine efficiency, while the output parameters considered are thermal efficiency, specific fuel consumption, heat rate, emission rate, compressor power, turbine power and power output. The three modified gas turbine power plants incorporate an inlet air cooling system and a heat recovery steam generator. The variations between the modifications are due to additional components or enhancements alongside the inlet air cooling system and heat recovery steam generator incorporated; the first modification has an additional turbine, the second modification has an additional combustion chamber, and the third modification has an additional turbine and combustion chamber. This paper clearly shows ambient temperature effects on both the simple and three modified gas turbine plants. for every 10-degree kelvin increase in ambient temperature, there is an approximate reduction of 3977 kW, 4795 kW, 4681 kW, and 4793 kW of the power output for the simple gas turbine, first, second, and third modifications, respectively. Also, for every 10-degree kelvin increase in temperature, there is a thermal efficiency decrease of 1.22%, 1.45%, 1.43%, and 1.44% for the simple gas turbine, first, second, and third modifications respectively. Low ambient temperature will help save fuel; looking at the high price of fuel presently in Nigeria for every 10 degrees kelvin increase in temperature, there is a specific fuel consumption increase of 0.0074 kg/kWh, 0.0051 kg/kWh, 0.0061 kg/kWh, and 0.0057 kg/kWh for the simple gas turbine, first, second, and third modifications respectively. These findings will aid in accurately evaluating local power generating plants, particularly in hotter regions, for installing gas turbine inlet air cooling (GTIAC) systems.

Keywords: Aspen HYSYS software, Brayton Cycle, modified gas turbine, power plant, simple gas turbine, thermal efficiency.

Procedia PDF Downloads 31
1090 Affordable Housing and Economic Sustainability: The Case of the Poorest of the Poor Housing in Debre Markos City

Authors: Michael Menberu

Abstract:

Housing affordability is a crucial policy objective. Incorporating economic sustainability in affordable housing in the development of the poorest of the poor's housing programs has become a major concern. This paper examines the affordability and economic sustainability of the poorest of the poor affordable housing in Debre Markos city. To address this, this study uses both quantitative and qualitative methods, Using a questionnaire survey, Interviews, field observation, household survey, and Pearson correlation analysis. The findings show that households in the expansion area have lower monthly incomes than in the past, but they are satisfied with the housing quality, rental pricing, and tenure security of their homes. This demonstrates in providing affordable housing for the poorest of the poor the location of the houses must be considered in order to have affordable and economically sustainable development. The findings show that housing is not truly affordable if it is in an inaccessible place with a long commute to work, high transportation expenditures, and land use that is homogeneous. Increasing the supply of affordable housing in accessible locations helps the poorest of the poor achieve multiple planning objectives: it reduces transportation costs, improves incomes, provides infrastructure, and reduces the distance to the work area.

Keywords: housing, affordable housing, economic sustainability, the poorest of the poor housing

Procedia PDF Downloads 50
1089 Mind Care Assistant - Companion App

Authors: Roshani Gusain, Deep Sinha, Karan Nayal, Anmol Kumar Mishra, Manav Singh

Abstract:

In this research paper, we introduce "Mind Care Assistant - Companion App", which is a Flutter and Firebase-based mental health monitor. The app wants to improve and monitor the mental health of its users, it uses noninvasive ways to check for a change in their emotional state. By responding to questions, the app will provide individualized suggestions ᅳ tasks and mindfulness exercises ᅳ for users who are depressed or anxious. The app features a chat-bot that incorporates cognitive behavioural therapy (CBT) principles and combines natural language processing with machine learning to develop personalised responses. The feature of the app that makes it easy for us to choose between iOS and Android is cross-platform, which allows users from both mobile systems to experience almost no changes in their interfaces. With Firebase integration synchronized and real-time data storage, security is easily possible. The paper covers the architecture of the app, how it was developed and some important features. The primary research result presents the promise of a "Mind Care Assistant" in mental health care using new wait-for-health technology, proposing a full stack application to be able to manage depression/anxiety and overall Mental well-being very effectively.

Keywords: mental health, mobile application, flutter, firebase, Depression, Anxiety

Procedia PDF Downloads 12
1088 Exploring the Social Factors of a Country that Influence International Migration: A Sociological Perspective

Authors: Md. Shahriar Sabuz

Abstract:

Different social factors influence individuals to migrate from their native lands. This qualitative study was designed to analyze the main social factors that have a significant role in the movement of people across borders. In this study, two research questions, i.e., ‘Which social factors of a country significantly influence the persons' decision to migrate from their homeland?’ and ’2: do different social factors of a country influence the process of international migration?" were formulated and relevant data were analyzed to get the logical answer to these two questions. Data analysis revealed that people migrate in large numbers due to deplorable and unsafe social conditions in their home countries. Sometimes migration occurs due to a lack of basic facilities in native countries. It is quite significant to know that these social conditions create a sense of deprivation and insecurity in individuals, and they move to other lands to get a sense of achievement and greater security for themselves and their whole families. This study is significant and distinct from previous studies in that it provides comprehensive information about the major social factors responsible for international migrations and their role in influencing an individual's proclivity to migrate. Besides this, it greatly opens new horizons of research and analysis for other researchers working on the agenda of international migration.

Keywords: International migration, social factors, income inequality, social discrimination

Procedia PDF Downloads 72
1087 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 153
1086 Influence and Depiction of Power in an Urban Space

Authors: Kalpeshkumar Patel, Nikita Manvi

Abstract:

The paper is an attempt to understand the influence and depiction of power in an urban space by throwing light across a few examples across the architectural timeline. Power has been the medium through which ideologies function, as witnessed across the timeline. The center to understand this ideology is to apprehend how power is formed, captured, owned, traded, and distorted. Every urban space has power embedded in it, either for the people who are imposing it or for the public who are receiving it. The most fundamental question in the issue of power is who – who will judge, whose tastes will matter and whose interests are being served. Power is expressed and reinforced by regular means, a boundary and gates, a parade route, a dominant landmark, play of shape or scale in elevation, ceremonial axis, boulevards and avenues, the vista, bilateral symmetry, or regular order. Even if people accept the psychological efficacy of these forms, the way they perceive them may vary depending on the subject. They are cold devices of power used to make some people submit to others. Yet it is also true that these symbolic forms are attractive because they speak to the deep emotions of people. They do indeed give us a sense of security, stability and continuity, awe and pride. The Urban Space for mass assembly is an idea that continues to seduce dictators and democracies. It is a tradition as old as an agora and as manipulative as Baroque Rome.

Keywords: urban space, aggrandization, city planning, landscape, supremacy, democratic

Procedia PDF Downloads 127
1085 Safety Culture Implementation Based on Occupational Health and Safety Assessment

Authors: Nyambayar Davaadorj, Ichiro Koshijima

Abstract:

Safety or the state of being safe can be described as a condition of being not dangerous or not harmful. It is necessary for an individual to avoid dangerous situations every day. Also, an organization is subject to legal requirements for the health and safety of persons inside and around the immediate workplace, or who are exposed to the workplace activities. Although it might be difficult to keep a situation where complete safety is ensured, efforts must nonetheless be made to consider ways of removing any potential danger within an organization. In order to ensure a safe working environment, the capability of responding (i.e., resilience) to signals (i.e., information concerning events that could pose future problems that must be taken into account) that occur in and around corporations is necessary. The ability to evaluate this essential point is thus one way in which safety and security can be managed. This study focuses on OHSAS18001, an internationally applied standard for the construction and operation of occupational health and safety management systems, by using IDEF0 for Function Modeling (IDEF0) and the Resilience Matrix originally made by Bracco. Further, this study discusses a method for evaluating a manner in which Occupational Health and Safety Assessment Series (OHSAS) systematically functions within corporations. Based on the findings, this study clarifies the potential structural objection for corporations when implementing and operating the OHSAS standard.

Keywords: OHSAS18001, IDEF0, resilience engineering, safety culture

Procedia PDF Downloads 240
1084 Scaling out Sustainable Land Use Systems in Colombia: Some Insights and Implications from Two Regional Case Studies

Authors: Martha Lilia Del Rio Duque, Michelle Bonatti, Katharina Loehr, Marcos Lana, Tatiana Rodriguez, Stefan Sieber

Abstract:

Nowadays, most agricultural practices can reduce the ability of ecosystems to provide goods and services. To enhance environmentally friendly food production and to maximize social and economic benefits, sustainable land use systems (SLUS) are one of the most critical strategies increasingly/strongly promoted by donors organizations, international agencies, and policymakers. This process involves the question of how SLUS can be scaled out also large-scale landscapes and not merely isolated experiments. As SLUS are context-specific strategies, diffusion and replication of successful SLUS in Colombia required the identification of main factors that facilitate this scaling out process. We applied a case study approach to investigate the scaling out process of SLUS in cocoa and livestock sector within peacebuilding territories in Colombia, specifically, in Cesar and Caqueta region. These two regions are contrasting, but both have a current trend of increasing land degradation. Presently in Colombia, Caqueta is one of the most deforested departments, and Cesar has some most degraded soils. Following a qualitative research approach, 19 semi-structured interviews and 2 focus groups were conducted with agroforestry experts in both regions to analyze (1) what does it mean a sustainable land use system in Cocoa/Livestock, specifically in Caqueta or Cesar and (2) to identify the key elements at the level of the following dimensions: biophysical, economic and profitability, market, social, policy and institutions that can explain how and why SLUS are replicated and spread among more producers. The Interviews were coded and analyzed using MAXQDA to identify, analyze and report patterns (themes) within data. As the results show, key themes, among which: premium market, solid regional markets and price stability, water availability and management, generational renewal, land use knowledge and diversification, producer organization and certifications are crucial to understand how the SLUS can have an impact across large-scale landscapes and how the scaling out process can be set up best in order to be successful across different contexts. The analysis further reveals which key factors might affect SLUS efficiency.

Keywords: agroforestry, cocoa sector, Colombia, livestock sector, sustainable land use system

Procedia PDF Downloads 160
1083 Moroccan Human Ecological Behavior: Grounded Theory Approach

Authors: Dalal Tarfaoui, Salah Zkim

Abstract:

Today, environmental sustainability is everyone’s concern as it contributes in many aspects to a country's development. Morocco is also aware of the increasing threats to its natural resources. Accordingly, many projects and research have been discussed pointing mainly to water security, pollution, desertification, and land degradation, but few studies bothered to dig into the human demeanor to disclose its ecological behavior. Human behavior is accountable for environment deterioration in the first place, but we keep fighting the symptoms instead of limiting the root causes. In the conceptual framework highlighted in the present article, semi-structured interviews have been conducted using a grounded theory approach. Initially this study will serve as a pilot study and a cornerstone to approve a bigger project now in progress. Beyond the existing general ecological measures (GEM), this study has chosen the grounded theory approach to bring out firsthand insights, and probe to which extent an ecological dimension exists in Morocco as a developing country. The discourse of the ecological behavior within the Moroccan context is seen in more realist, social, and community philosophy. The study has revealed an appreciative ecological behavior that is unfortunately repressed by variables beyond people’s control, which would prevent the people’s environmental good intentions to be translated into real ecological actions.

Keywords: ecological behavior, ecological dimension, variables beyond people’s control, Morocco

Procedia PDF Downloads 495
1082 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 393
1081 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm

Authors: Swati Kishor Zode, Rahul Ambekar

Abstract:

Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.

Keywords: classification, homomorphic encryption, clinical decision support, privacy

Procedia PDF Downloads 330
1080 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 294
1079 Coping with Climate Change in Agriculture: Perception of Farmers in Oman

Authors: B. S. Choudri

Abstract:

Introduction: Climate change is a major threat to rural livelihoods and to food security in the developing world, including Oman. The aim of this study is to provide a basis for policymakers and researchers in order to understand the impacts of climate change on agriculture and developing adaptation strategies in Oman. Methodology: The data was collected from different agricultural areas across the country with the help of a questionnaire survey among farmers, discussion with community, and observations at the field level. Results: The analysis of data collected from different areas within the country shows a shift in the sowing period of major crops and increased temperatures over recent years. Farmer community is adopting through diversification of crops, use of heat-tolerant species, and improved measures of soil and water conservation. Agriculture has been the main livelihood for most of the farmer communities in rural areas in the country. Conclusions: In order to reduce the effects of climate change at the local and farmer communities, risk reduction would be important along with an in-depth analysis of the vulnerability. Therefore, capacity building of local farmers and providing them with scientific knowledge, mainstreaming adaptation into development activities would be essential with additional funding and subsidies.

Keywords: agriculture, climate change, vulnerability, adaptation

Procedia PDF Downloads 123
1078 The Long – Term Effects of a Prevention Program on the Number of Critical Incidents and Sick Leave Days: A Decade Perspective

Authors: Valerie Isaak

Abstract:

Background: This study explores the effectiveness of refresher training sessions of an intervention program at reducing the employees’ risk of injury due to patient violence in a forensic psychiatric hospital. Methods: The original safety intervention program that consisted of a 3 days’ workshop was conducted in the maximum-security ward of a psychiatric hospital in Israel. Ever since the original intervention, annual refreshers were conducted, highlighting one of the safety elements covered in the original intervention. The study examines the effect of the intervention program along with the refreshers over a period of 10 years in four wards. Results: Analysis of the data demonstrates that beyond the initial reduction following the original intervention, refreshers seem to have an additional positive long-term effect, reducing both the number of violent incidents and the number of actual employee injuries in a forensic psychiatric hospital. Conclusions: We conclude that such an intervention program followed by refresher training would promote employees’ wellbeing. A healthy work environment is part of management’s commitment to improving employee wellbeing at the workplace.

Keywords: wellbeing, violence at work, intervention program refreshers, public sector mental healthcare

Procedia PDF Downloads 137
1077 Food Security and Mental Health: A Qualitative Exploration of Mediating Factors in Rural and Urban Ghana

Authors: Emma Mathias

Abstract:

The aim of this study was to explore the role of food insecurity as a mediator of mental health in sub-Saharan Africa, taking Ghana as a case study. Although a quantitative correlation has recently been established between food insecurity and mental illness in Ghana, the nature and validity of this correlation remains unclear. A qualitative exploration was employed to investigate this correlation further. During the data collection period, twelve semi-structured interviews and five focus groups were conducted with a total of 124 individuals who were diagnosed with mental illnesses and their primary carers throughout rural and urban areas in Ghana. Interviews and focus groups were transcribed, translated, and analysed using thematic analysis. Preliminary results suggest that food insecurity may plays a role in mental illness in rural areas of Ghana where communities are reliant on agriculture for their livelihoods, but may play a lesser role in urban areas where communities are more reliant on petty trade as a source of livelihood. These results support psychosocial theories which suggest that the social and cultural factors involved in food production and consumption may be the key mediators between food insecurity and mental health.

Keywords: Food insecurity, Ghana, Mental health, Phenomenology

Procedia PDF Downloads 141
1076 The Principle of the Protection of Legitimate Expectation: Analysis the Adjudications of Thailand Court

Authors: Paiboon Chuwatthanakij

Abstract:

In reference to the legal state in the Thai legal system, most people understand the minor principles of the legal state form, which are the principles that can be explained and understood easily and the results can be seen clearly, especially in the legitimacy of administrative acts. Therefore, there is no awareness of justice, which is the fundamental value of Thai law. The legitimacy of administrative acts requires the administration to adhere to the constitution and legislative laws in enforcement of the laws. If it appears that the administrative acts are illegitimate, the administrative court, as the court of justice, will revoke those acts as if they had never been set in the legal system, this will affect people’s trust as they are unaware as to whether the administrative acts that appoint their lives are legitimate or not. Regarding the revocation of administrative orders by the administrative court as if those orders had never existed, the common individual surely cannot be expected to comprehend the security of their juristic position. Therefore, the legal state does not require a revocation of the government’s acts to terminate its legal results merely because those acts are illegitimate, but there should be considerations and realizations regarding the “The Principle of the Protection of Legitimate Expectation,” which is a minor principle in the legal state’s content that focuses on supporting and protecting legitimate expectations of the juristic position of an individual and maintaining justice, which is the fundamental value of Thai law

Keywords: legal state, rule of law, protection of legitimate, adjudication

Procedia PDF Downloads 392
1075 The Impact of Artificial Intelligence on Textiles Technology

Authors: Ramy Kamel Fekrey Gadelrab

Abstract:

Textile sensors have gained a lot of interest in recent years as it is instrumental in monitoring physiological and environmental changes, for a better diagnosis that can be useful in various fields like medical textiles, sports textiles, protective textiles, agro textiles, and geo-textiles. Moreover, with the development of flexible textile-based wearable sensors, the functionality of smart clothing is augmented for a more improved user experience when it comes to technical textiles. In this context, conductive textiles using new composites and nanomaterials are being developed while considering its compatibility with the textile manufacturing processes. This review aims to provide a comprehensive and detailed overview of the contemporary advancements in textile-based wearable physical sensors, used in the field of medical, security, surveillance, and protection, from a global perspective. The methodology used is through analysing various examples of integration of wearable textile-based sensors with clothing for daily use, keeping in mind the technological advances in the same. By comparing various case studies, it come across various challenges textile sensors, in terms of stability, the comfort of movement, and reliable sensing components to enable accurate measurements, in spite of progress in the engineering of the wearable. Addressing such concerns is critical for the future success of wearable sensors.

Keywords: nanoparticles, enzymes, immobilization, textilesconductive yarn, e-textiles, smart textiles, thermal analysisflexible textile-based wearable sensors, contemporary advancements, conductive textiles, body conformal design

Procedia PDF Downloads 49
1074 Statistical Randomness Testing of Some Second Round Candidate Algorithms of CAESAR Competition

Authors: Fatih Sulak, Betül A. Özdemir, Beyza Bozdemir

Abstract:

In order to improve symmetric key research, several competitions had been arranged by organizations like National Institute of Standards and Technology (NIST) and International Association for Cryptologic Research (IACR). In recent years, the importance of authenticated encryption has rapidly increased because of the necessity of simultaneously enabling integrity, confidentiality and authenticity. Therefore, at January 2013, IACR announced the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR Competition) which will select secure and efficient algorithms for authenticated encryption. Cryptographic algorithms are anticipated to behave like random mappings; hence, it is important to apply statistical randomness tests to the outputs of the algorithms. In this work, the statistical randomness tests in the NIST Test Suite and the other recently designed randomness tests are applied to six second round algorithms of the CAESAR Competition. It is observed that AEGIS achieves randomness after 3 rounds, Ascon permutation function achieves randomness after 1 round, Joltik encryption function achieves randomness after 9 rounds, Morus state update function achieves randomness after 3 rounds, Pi-cipher achieves randomness after 1 round, and Tiaoxin achieves randomness after 1 round.

Keywords: authenticated encryption, CAESAR competition, NIST test suite, statistical randomness tests

Procedia PDF Downloads 315
1073 System of Quality Automation for Documents (SQAD)

Authors: R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D. B. Hari Prakash, S. Jayanth, T. Kumar, N. Vijayarangan

Abstract:

Document automation is the design of systems and workflows, assembling repetitive documents to meet the specific business needs. In any organization or institution, documenting employee’s information is very important for both employees as well as management. It shows an individual’s progress to the management. Many documents of the employee are in the form of papers, so it is very difficult to arrange and for future reference we need to spend more time in getting the exact document. Also, it is very tedious to generate reports according to our needs. The process gets even more difficult on getting approvals and hence lacks its security aspects. This project overcomes the above-stated issues. By storing the details in the database and maintaining the e-documents, the automation system reduces the manual work to a large extent. Then the approval process of some important documents can be done in a much-secured manner by using Digital Signature and encryption techniques. Details are maintained in the database and e-documents are stored in specific folders and generation of various kinds of reports is possible. Moreover, an efficient search method is implemented is used in the database. Automation supporting document maintenance in many aspects is useful for minimize data entry, reduce the time spent on proof-reading, avoids duplication, and reduce the risks associated with the manual error, etc.

Keywords: e-documents, automation, digital signature, encryption

Procedia PDF Downloads 391
1072 Economic Analysis of Domestic Combined Heat and Power System in the UK

Authors: Thamo Sutharssan, Diogo Montalvao, Wen-Chung Wang, Yong Chen, Claudia Pisac

Abstract:

A combined heat and power (CHP) system is an efficient and clean way to generate power (electricity). Heat produced by the CHP system can be used for water and space heating. The CHP system which uses hydrogen as fuel produces zero carbon emission. Its’ efficiency can reach more than 80% whereas that of a traditional power station can only reach up to 50% because much of the thermal energy is wasted. The other advantages of CHP systems include that they can decentralize energy generation, improve energy security and sustainability, and significantly reduce the energy cost to the users. This paper presents the economic benefits of using a CHP system in the domestic environment. For this analysis, natural gas is considered as potential fuel as the hydrogen fuel cell based CHP systems are rarely used. UK government incentives for CHP systems are also considered as the added benefit. Results show that CHP requires a significant initial investment in return it can reduce the annual energy bill significantly. Results show that an investment may be paid back in 7 years. After the back period, CHP can run for about 3 years as most of the CHP manufacturers provide 10-year warranty.

Keywords: combined heat and power, clean energy, hydrogen fuel cell, economic analysis of CHP, zero emission

Procedia PDF Downloads 385
1071 Common Caper (Capparis Spinosa L.) From Oblivion and Neglect to the Interface of Medicinal Plants

Authors: Ahmad Alsheikh Kaddour

Abstract:

Herbal medicine has been a long-standing phenomenon in Arab countries since ancient times because of its breadth and moderate temperament. Therefore, it possesses a vast natural and economic wealth of medicinal and aromatic herbs. This prompted ancient Egyptians and Arabs to discover and exploit them. The economic importance of the plant is not only from medicinal uses; it is a plant of high economic value for its various uses, especially in food, cosmetic and aromatic industries. It is also an ornamental plant and soil stabilization. The main objective of this research is to study the chemical changes that occur in the plant during the growth period, as well as the production of plant buds, which were previously considered unwanted plants. The research was carried out in the period 2021-2022 in the valley of Al-Shaflah (common caper), located in Qumhana village, 7 km north of Hama Governorate, Syria. The results of the research showed a change in the percentage of chemical components in the plant parts. The ratio of protein content and the percentage of fatty substances in fruits and the ratio of oil in the seeds until the period of harvesting of these plant parts improved, but the percentage of essential oils decreased with the progress of the plant growth, while the Glycosides content where improved with the plant aging. The production of buds is small, with dimensions as 0.5×0.5 cm, which is preferred for commercial markets, harvested every 2-3 days in quantities ranging from 0.4 to 0.5 kg in one cut/shrubs with 3 years’ age as average for the years 2021-2022. The monthly production of a shrub is between 4-5 kg per month. The productive period is 4 months approximately. This means that the seasonal production of one plant is 16-20 kg and the production of 16-20 tons per year with a plant density of 1,000 shrubs per hectare, which is the optimum rate of cultivation in the unit of mass, given the price of a kg of these buds is equivalent to 1 US $; however, this means that the annual output value of the locally produced hectare ranges from 16,000 US $ to 20,000 US $ for farmers. The results showed that it is possible to transform the cultivation of this plant from traditional random to typical areas cultivation, with a plant density of 1,000-1,100 plants per hectare according to the type of soil to obtain production of medicinal and nutritious buds, as well as, the need to pay attention to this national wealth and invest in the optimal manner, which leads to the acquisition of hard currency through export to support the national income.

Keywords: common caper, medicinal plants, propagation, medical, economic importance

Procedia PDF Downloads 72
1070 Implementing Community Policing in Nigeria: Problems and Prospects

Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule

Abstract:

This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.

Keywords: community, policing, problems, prospects, problem solving

Procedia PDF Downloads 76
1069 The Learning Process in Future Preparations: Middle-Aged and Older Adults' Experiences

Authors: Ya-Hui Lee, Ching-Yi Lu

Abstract:

Taiwan will become an aging society in 2018. The method to face the challenges related to the aging population has become an important topic. Purpose: This study aims to understand the future preparation of middle-age and older adults, and how they prepared themselves to face the problems of aging, and how they took actions to plan and cope with their future life. Moreover, how did they generate the process of learning action, so that they would be able to live a more active and meaningful life when they entered into their older age? Method: We conducted semi-structure interviews with 10 middle-aged and older adults who had taken actions to prepare for their future. We examined the interviewees’ consciousness and learning actions in their future preparation. Preliminary Results: 1. The triggering factors of the interviewees’ consciousness to prepare for the future included: family events, the desire to maintain active social lives after retirement, the continuation of the interviewees’ professional careers after retirement, and the aspiration for participation in volunteer services. 2. 'Health problems' and 'economic security' were issued of the utmost concern for the interviewees’ future. However, they would transform these worries to learning actions, comprising of active participation in learning, finding relevant information through learning; thus, accumulating more resources to cope with their future needs.

Keywords: middle-age and older adults, preparing for future, older adult learning

Procedia PDF Downloads 230
1068 Application of Aerogeomagnetic and Ground Magnetic Surveys for Deep-Seated Kimberlite Pipes in Central India

Authors: Utkarsh Tripathi, Bikalp C. Mandal, Ravi Kumar Umrao, Sirsha Das, M. K. Bhowmic, Joyesh Bagchi, Hemant Kumar

Abstract:

The Central India Diamond Province (CIDP) is known for the occurrences of primary and secondary sources for diamonds from the Vindhyan platformal sediments, which host several kimberlites, with one operating mine. The known kimberlites are Neo-Proterozoic in age and intrude into the Kaimur Group of rocks. Based on the interpretation of areo-geomagnetic data, three potential zones were demarcated in parts of Chitrakoot and Banda districts, Uttar Pradesh, and Satna district, Madhya Pradesh, India. To validate the aero-geomagnetic interpretation, ground magnetic coupled with a gravity survey was conducted to validate the anomaly and explore the possibility of some pipes concealed beneath the Vindhyan sedimentary cover. Geologically the area exposes the milky white to buff-colored arkosic and arenitic sandstone belonging to the Dhandraul Formation of the Kaimur Group, which are undeformed and unmetamorphosed providing almost transparent media for geophysical exploration. There is neither surface nor any geophysical indication of intersections of linear structures, but the joint patterns depict three principal joints along NNE-SSW, ENE-WSW, and NW-SE directions with vertical to sub-vertical dips. Aeromagnetic data interpretation brings out three promising zones with the bi-polar magnetic anomaly (69-602nT) that represent potential kimberlite intrusive concealed below at an approximate depth of 150-170m. The ground magnetic survey has brought out the above-mentioned anomalies in zone-I, which is congruent with the available aero-geophysical data. The magnetic anomaly map shows a total variation of 741 nT over the area. Two very high magnetic zones (H1 and H2) have been observed with around 500 nT and 400 nT magnitudes, respectively. Anomaly zone H1 is located in the west-central part of the area, south of Madulihai village, while anomaly zone H2 is located 2km apart in the north-eastern direction. The Euler 3D solution map indicates the possible existence of the ultramafic body in both the magnetic highs (H1 and H2). The H2 high shows the shallow depth, and H1 shows a deeper depth solution. In the reduced-to-pole (RTP) method, the bipolar anomaly disappears and indicates the existence of one causative source for both anomalies, which is, in all probabilities, an ultramafic suite of rock. The H1 magnetic high represents the main body, which persists up to depths of ~500m, as depicted through the upward continuation derivative map. Radially Averaged Power Spectrum (RAPS) shows the thickness of loose sediments up to 25m with a cumulative depth of 154m for sandstone overlying the ultramafic body. The average depth range of the shallower body (H2) is 60.5-86 meters, as estimated through the Peters half slope method. Magnetic (TF) anomaly with BA contour also shows high BA value around the high zones of magnetic anomaly (H1 and H2), which suggests that the causative body is with higher density and susceptibility for the surrounding host rock. The ground magnetic survey coupled with the gravity confirms a potential target for further exploration as the findings are co-relatable with the presence of the known diamondiferous kimberlites in this region, which post-date the rocks of the Kaimur Group.

Keywords: Kaimur, kimberlite, Euler 3D solution, magnetic

Procedia PDF Downloads 75
1067 An Empirical Study on Employees’ Theft Behavior in Insurance Industry

Authors: B. Khorsandi Talab, M. Kordi

Abstract:

It is highly deplorable that every year, theft behavior among employees of the insurance industry is growing throughout the world. A very significant source of contraction (despite many costly technological and widespread security measures) needs to be addressed and prevented. Employee and agent theft cannot be ignored as it causes significant losses to employers. This study investigates the workplace factors that affect the insurance employee and agent theft behavior. Although identifying theft is difficult, this study will help employers to further understand employees’ theft behavior. This study was conducted in two service small and medium organizations (two branches of insurance companies) in ALBORZ’s capital city, KARAJ. Data has been collected via questionnaire from 30 employees and agents consisting employees and supervisors of branches and agencies. According to the results, it must be acknowledged that compensation, organizational justice, internal control systems, penalties and personal characteristics were associated with employees' theft behavior, it is despite the fact that, no effect could be assumed for organizational ethics and requirement in this case. Nevertheless, poor financial status cannot be considered as the driving factor in pushing employees to steal property as well as increasing their theft behavior. As mentioned earlier, the purpose of this study was to determine the factors contributing to employees’ theft (insurance employees and agencies) behavior in insurance organizations in Karaj.

Keywords: service theft, employee theft behavior, work theft, insurance agency, SMEs

Procedia PDF Downloads 437
1066 Global Modeling of Drill String Dragging and Buckling in 3D Curvilinear Bore-Holes

Authors: Valery Gulyayev, Sergey Glazunov, Elena Andrusenko, Nataliya Shlyun

Abstract:

Enhancement of technology and techniques for drilling deep directed oil and gas bore-wells are of essential industrial significance because these wells make it possible to increase their productivity and output. Generally, they are used for drilling in hard and shale formations, that is why their drivage processes are followed by the emergency and failure effects. As is corroborated by practice, the principal drilling drawback occurring in drivage of long curvilinear bore-wells is conditioned by the need to obviate essential force hindrances caused by simultaneous action of the gravity, contact and friction forces. Primarily, these forces depend on the type of the technological regime, drill string stiffness, bore-hole tortuosity and its length. They can lead to the Eulerian buckling of the drill string and its sticking. To predict and exclude these states, special mathematic models and methods of computer simulation should play a dominant role. At the same time, one might note that these mechanical phenomena are very complex and only simplified approaches (‘soft string drag and torque models’) are used for their analysis. Taking into consideration that now the cost of directed wells increases essentially with complication of their geometry and enlargement of their lengths, it can be concluded that the price of mistakes of the drill string behavior simulation through the use of simplified approaches can be very high and so the problem of correct software elaboration is very urgent. This paper deals with the problem of simulating the regimes of drilling deep curvilinear bore-wells with prescribed imperfect geometrical trajectories of their axial lines. On the basis of the theory of curvilinear flexible elastic rods, methods of differential geometry, and numerical analysis methods, the 3D ‘stiff-string drag and torque model’ of the drill string bending and the appropriate software are elaborated for the simulation of the tripping in and out regimes and drilling operations. It is shown by the computer calculations that the contact and friction forces can be calculated and regulated, providing predesigned trouble-free modes of operation. The elaborated mathematic models and software can be used for the emergency situations prognostication and their exclusion at the stages of the drilling process design and realization.

Keywords: curvilinear drilling, drill string tripping in and out, contact forces, resistance forces

Procedia PDF Downloads 146
1065 Contested Visions of Exploration in IR: Theoretical Engagements, Reflections and New Agendas on the Dynamics of Global Order

Authors: Ananya Sharma

Abstract:

International Relations is a discipline of paradoxes. The State is the dominant political institution, with mainstream analysis theorizing the State, but theory remains at best a reactionary monolith. Critical Theorists have been pushing the envelope and to that extent, there has been a clear shift in the dominant discourse away from State-centrism to individuals and group-level behaviour. This paradigm shift has been accompanied with more nuanced conceptualizations of other variables at play–power, security, and trust, to name a few. Yet, the ambit of “what is discussed” remains primarily embedded in realist conceptualizations. With this background in mind, this paper will attempt to understand, juxtapose and evaluate how “order” has been conceptualized in International Relations theory. This paper is a tentative attempt to present a “state of the art” and in the process, set the stage for a deeper study to draw attention to what the author feels is a gaping lacuna in IR theory. The paper looks at how different branches of international relations theory envisage world order and the silences embedded therein. Further, by locating order and disorder inhabiting the same reality along a continuum, alternative readings of world orders are drawn from the critical theoretical traditions, in which various articulations of justice impart the key normative pillar to the world order.

Keywords: global justice, international relations theory, legitimacy, world order

Procedia PDF Downloads 346
1064 Economic Evaluation of Degradation by Corrosion of an On-Grid Battery Energy Storage System: A Case Study in Algeria Territory

Authors: Fouzia Brihmat

Abstract:

Economic planning models, which are used to build microgrids and distributed energy resources, are the current norm for expressing such confidence (DER). These models often decide both short-term DER dispatch and long-term DER investments. This research investigates the most cost-effective hybrid (photovoltaic-diesel) renewable energy system (HRES) based on Total Net Present Cost (TNPC) in an Algerian Saharan area, which has a high potential for solar irradiation and has a production capacity of 1GW/h. Lead-acid batteries have been around much longer and are easier to understand, but have limited storage capacity. Lithium-ion batteries last longer, are lighter, but generally more expensive. By combining the advantages of each chemistry, we produce cost-effective high-capacity battery banks that operate solely on AC coupling. The financial implications of this research describe the corrosion process that occurs at the interface between the active material and grid material of the positive plate of a lead-acid battery. The best cost study for the HRES is completed with the assistance of the HOMER Pro MATLAB Link. Additionally, during the course of the project's 20 years, the system is simulated for each time step. In this model, which takes into consideration decline in solar efficiency, changes in battery storage levels over time, and rises in fuel prices above the rate of inflation. The trade-off is that the model is more accurate, but it took longer to compute. As a consequence, the model is more precise, but the computation takes longer. We initially utilized the Optimizer to run the model without MultiYear in order to discover the best system architecture. The optimal system for the single-year scenario is the Danvest generator, which has 760 kW, 200 kWh of the necessary quantity of lead-acid storage, and a somewhat lower COE of $0.309/kWh. Different scenarios that account for fluctuations in the gasified biomass generator's production of electricity have been simulated, and various strategies to guarantee the balance between generation and consumption have been investigated. The technological optimization of the same system has been finished and is being reviewed in a recent paper study.

Keywords: battery, corrosion, diesel, economic planning optimization, hybrid energy system, lead-acid battery, multi-year planning, microgrid, price forecast, PV, total net present cost

Procedia PDF Downloads 88
1063 Real Time Traffic Performance Study over MPLS VPNs with DiffServ

Authors: Naveed Ghani

Abstract:

With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.

Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2

Procedia PDF Downloads 426