Search results for: scaling laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1168

Search results for: scaling laws

868 The Restrictions of the Householder’s ‘Double Two-Thirds Principles’ in Decision-Making for Elevators Addition to Existing Condominium

Authors: Haifeng Shi, Kun Song, Yili Zhao

Abstract:

In China, with the extensive promotion of the ‘aging in place’ pension policy as the background, most of the elders will choose to remain in their current homes and communities, finding out of preference or necessity that they will need to remodel their homes to fit their changing needs. This generation elder born in the 1960s to 1970s almost live in the same form of housing-condominium built from 1982 to 2012. Based on the survey of existing multi-family housing, especially in Tianjin, it is found that the current ‘double two-thirds principles’ is becoming the threshold for modification to existing house, particularly in the project of elevators addition to existing condominium (built from 1982 to 2016 without elevators below 6 floors according to the previous building code). Firstly, this article concludes the local policies of elevator addition nationwide, most of which has determined the importance and necessity of the community-based self-organization principle in the operation of the elevator addition. Secondly, by comparing the three existing community management systems (owners' congress, property management system and community committee) in instances, find that the community-based ‘two-thirds’ principle is not conducive to implement for multi-owned property renovation in the community or common accessibility modification in the building. However, analysis the property and other community management related laws, pointing out the shortcomings of the existing community-based ‘two-thirds’ decision-making norms. The analyzation showed that the unit-based and ‘100% principle’ method is more capable of common accessibility in the condominium in China. Differing from existing laws, the unit-based principle will be effective for the process of decision-making and ‘100% principle’ will protect closely profit-related householders for condominium modification in the multi-owned area. These three aspects of the analysis suggest that the establishment of the unit-based self-organization mechanism is a preferred and inevitable method to solve the problem of elevators addition to the existing condominium in China.

Keywords: aging in place, condominium, modification, multi own

Procedia PDF Downloads 137
867 “laws Drifting Off While Artificial Intelligence Thriving” – A Comparative Study with Special Reference to Computer Science and Information Technology

Authors: Amarendar Reddy Addula

Abstract:

Definition of Artificial Intelligence: Artificial intelligence is the simulation of mortal intelligence processes by machines, especially computer systems. Explicit operations of AI comprise expert systems, natural language processing, and speech recognition, and machine vision. Artificial Intelligence (AI) is an original medium for digital business, according to a new report by Gartner. The last 10 times represent an advance period in AI’s development, prodded by the confluence of factors, including the rise of big data, advancements in cipher structure, new machine literacy ways, the materialization of pall computing, and the vibrant open- source ecosystem. Influence of AI to a broader set of use cases and druggies and its gaining fashionability because it improves AI’s versatility, effectiveness, and rigidity. Edge AI will enable digital moments by employing AI for real- time analytics closer to data sources. Gartner predicts that by 2025, further than 50 of all data analysis by deep neural networks will do at the edge, over from lower than 10 in 2021. Responsible AI is a marquee term for making suitable business and ethical choices when espousing AI. It requires considering business and societal value, threat, trust, translucency, fairness, bias mitigation, explainability, responsibility, safety, sequestration, and nonsupervisory compliance. Responsible AI is ever more significant amidst growing nonsupervisory oversight, consumer prospects, and rising sustainability pretensions. Generative AI is the use of AI to induce new vestiges and produce innovative products. To date, generative AI sweats have concentrated on creating media content similar as photorealistic images of people and effects, but it can also be used for law generation, creating synthetic irregular data, and designing medicinals and accoutrements with specific parcels. AI is the subject of a wide- ranging debate in which there's a growing concern about its ethical and legal aspects. Constantly, the two are varied and nonplussed despite being different issues and areas of knowledge. The ethical debate raises two main problems the first, abstract, relates to the idea and content of ethics; the alternate, functional, and concerns its relationship with the law. Both set up models of social geste, but they're different in compass and nature. The juridical analysis is grounded on anon-formalistic scientific methodology. This means that it's essential to consider the nature and characteristics of the AI as a primary step to the description of its legal paradigm. In this regard, there are two main issues the relationship between artificial and mortal intelligence and the question of the unitary or different nature of the AI. From that theoretical and practical base, the study of the legal system is carried out by examining its foundations, the governance model, and the nonsupervisory bases. According to this analysis, throughout the work and in the conclusions, International Law is linked as the top legal frame for the regulation of AI.

Keywords: artificial intelligence, ethics & human rights issues, laws, international laws

Procedia PDF Downloads 79
866 An Analysis of the Role of Watchdog Civil Society Organisations in the Public Governance in Southern Africa: A study of South Africa and Zimbabwe

Authors: Julieth Gudo

Abstract:

The prevalence of corruption in African countries and persisting unsatisfactory distribution by governments of state resources among the citizens are clear indicators of a festering problem. Civil society organisations (CSOs) in Southern African countries, as citizen representatives, have been involved in challenging the ongoing corruption and poor governance in the public sector that have caused tensions between citizens and their governments. In doing so, civil society organisations demand accountability, transparency, and citizen participation in public governance. The problem is that CSOs’ role in challenging governments is not clearly defined in both law and literature. This uncertainty has resulted in an unsatisfying operating and legal environment for CSOs and a strained relationship between themselves and the governments. This paper examines civil society organisations' role in advancing good public governance in South Africa and Zimbabwe. The study will be conducted by means of a literature review and case studies. The state of public governance in Southern Africa will be discussed. The historical role of CSOs in the region of Southern Africa will be explored, followed by their role in public governance in contemporary South Africa and Zimbabwe. The relationship between state and civil society organisations will be examined. Furthermore, the legal frameworks that regulate and authoriseCSOs in their part in challenging poor governance in the public sector will be identified and discussed. Loopholes in such provisions will be identified, and measures that CSOs use to hold those responsible for poor governance accountable for their actions will be discussed, consequently closing the existing gap on the undefined role of CSOs in public governance in Southern Africa. The research demonstrates the need for an enabling operating environment through better cooperation, communication, and the relationship between governments and CSOs, the speedy and effective amendment of existing laws, and the introduction of legal provisions that give express authority to CSOs to challenge poor governance on the part of Southern African governments. Also critical is the enforcement of laws so that those responsible for poor governance and corruption in government are held accountable.

Keywords: civil society organisations, public governance, southern Africa, South Africa, zimbabwe

Procedia PDF Downloads 98
865 The Impact of Civil Disobedience on Tourist and Local Residents in Cameroon: Case Study the North West Region

Authors: Zita Fomukong Andam

Abstract:

Civil disobedience according to John Rawls (1971) is a public nonviolent and conscientious breach of laws undertaken with the aim of bringing about a change in government laws and policies. Thus individuals who engage themselves in such an act are aware and ready to accept the consequences of their actions. Cameroon more precisely the Northwest and the Southwest region which are the English part are considered as one of the societies facing this act of civil disobedience. It has been a tormenting issue in the country affecting its economy and the tourism sector. This is because these regions known as one of the best touristic sites of the country is not more considered as a destination to be visited by tourist because of its insecurities. Many commercial buildings have been burning down, leaving many young Cameroonians jobless. Education has been hindered, and youths are forced to relocate to nearby cities in order to continue their education. This crisis has created a lot of insecurity throughout the regions thus youths now have one common interest to travel abroad either to seek refuge or to continue their education and even search for jobs. The purpose of this research is to assess the issue of civil disobedience, trying to understand why it is affected only by a specific region in a country while the others are doing fine. A deep research discourse was conducted with randomly selected individuals aging between 15 to 40 years living both in the destination and abroad. Survey questionnaires and interviews were carried out as a method to collect data. The results show that this crisis has impacted the local residents psychologically and has injected a lot of fears into tourists and they are no more willing to visit the destination. In addition, it has brought a negative impact on the county’s economy since tourism is considered as the key sector in a country’s economy. On the other hand, the results showed that many local residents have remained jobless, others have lost family members, and the daily routine life has been affected. Understanding these results, the national government and international bodies might be able to propose possible and efficient solutions in order to attain stability and security in this region.

Keywords: civil disobedience, economic impact, local residents, tourist

Procedia PDF Downloads 98
864 Evaluating Problems Arose Due to Adoption of Dual Legal Framework in Regulating the Transactions under Islamic Capital Market with Special Reference to Malaysia

Authors: Rafikoddin Kazi

Abstract:

Almost all the major religions of the world condemn the transactions based on interest which promotes self-centered and materialistic thinking. Still, it is amazing to note that it has become the tradition of transaction at world level hence it is called traditional financial system. The main feature of this system is that it considers economic aspects of the transaction only. This system supports the economic development and not the welfare of humankind. However, it is worth mentioning the fact that, except Islamic financial system no other financial system stood in front of it as a viable alternative system. Although many countries have tried to create financial infrastructure and system, still the Malaysian Islamic financial system has got its own peculiarity. It has made tremendous progress in creating sound Islamic Financial system. However, the historical aspect of this country which has passed through Islamic and traditional financial system has got its own advantages and disadvantages. The advantageous factor is that, despite having mix and heterogeneous culture, it has succeeded in creating Islamic Financial System based on the dual legal system to satisfy the needs of multi-cultural factors. This fact has proved that Islamic Financial System does not need purely Muslim population. However, due to adoption of the dual legal system, several legal issues have been taken place. According to this system, the application of Islamic Law has been limited only up to some family and religious matters. The rest of the matters are being dealt with under the traditional laws, the principles and practices of which are different from that of the Islamic Legal System. The matter becomes all the more complicated when the cases are partially or simultaneously concerned with traditional vis-à-vis Islamic Laws as it requires expertise in both the legal systems. However, the educational principles and systems are different in respect of both the systems. To face this problem, Shariah Advisory Council has been established. But the Multiplicity of Shariah authorities without judicial power has created confusion at various levels. Therefore, some experts have stressed the need for improving, empowering the Islamic financial, legal system to make it more integrated and holistic. In view of the above, an endeavor has been made in this paper to throw some light on the matters related to the adoption of the dual legal system. The paper is conceptual in nature and the method adopted is the intensive survey of literature thereby all the information has been gathered from the secondary sources.

Keywords: Islamic financial system, Islamic legal system, Islamic capital market (ICM) , traditional financial system

Procedia PDF Downloads 183
863 Control and Control Systems of Administration in Nigeria

Authors: Inuwa Abdu Ibrahim

Abstract:

Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.

Keywords: Accountability, Fraud, Administration, Nigeria

Procedia PDF Downloads 339
862 A Comparative Density Functional Theory Study of Hydrocarbon Combustion on Metal Surfaces

Authors: Abas Mohsenzadeh, Mina Arya, Kim Bolton

Abstract:

Catalytic combustion of hydrocarbons is an important technology developed to produce energy with minimum pollutant formation. The catalyst plays a key role in this process which operates at lower temperatures compared to conventional flame combustion. The energetics of the direct combustion of hydrocarbons (CH → C + H) on a series of metal surfaces including Ag, Au, Al, Cu, Rh, Pt, Pd, Ni, Fe and Co were investigated using density functional theory (DFT). Brønsted-Evans-Polanyi (BEP) and transition state scaling (TSS) correlations were proposed based on DFT calculations on the Ag, Au, Al, Cu, Rh, Pt and Pd surfaces. These correlations were then used to estimate the energetics on Fe, Ni and Co surfaces. Results showed that the estimated reaction and activation energies by BEP and TSS correlations on Fe, Ni and Co surfaces are in an excellent agreement with those obtained by DFT calculations. Therefore these correlations can be efficiently used to predict energetics of similar reactions on these surfaces without doing computationally costly transition state calculations. It was found that the activation barrier for CH dissociation follows the order Ag ˃ Au ˃ Al ˃ Cu ˃ Pt ˃ Pd ˃ Ni > Co > Rh > Fe. Also, BEP (with R2 value of 0.96) and TSS correlations (with R2 value of 0.99) support the results.

Keywords: BEP, DFT, hydrocarbon combustion, metal surfaces, TSS

Procedia PDF Downloads 238
861 Packaging in the Design Synthesis of Novel Aircraft Configuration

Authors: Paul Okonkwo, Howard Smith

Abstract:

A study to estimate the size of the cabin and major aircraft components as well as detect and avoid interference between internally placed components and the external surface, during the conceptual design synthesis and optimisation to explore the design space of a BWB, was conducted. Sizing of components follows the Bradley cabin sizing and rubber engine scaling procedures to size the cabin and engine respectively. The interference detection and avoidance algorithm relies on the ability of the Class Shape Transform parameterisation technique to generate polynomial functions of the surfaces of a BWB aircraft configuration from the sizes of the cabin and internal objects using few variables. Interference detection is essential in packaging of non-conventional configuration like the BWB because of the non-uniform airfoil-shaped sections and resultant varying internal space. The unique configuration increases the need for a methodology to prevent objects from being placed in locations that do not sufficiently enclose them within the geometry.

Keywords: packaging, optimisation, BWB, parameterisation, aircraft conceptual design

Procedia PDF Downloads 449
860 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 39
859 Cloning and Expression of the ansZ Gene from Bacillus sp. CH11 Isolated from Chilca salterns in Peru

Authors: Stephy Saavedra, Annsy C. Arredondo, Gisele Monteiro, Adalberto Pessoa Jr, Carol N. Flores-Fernandez, Amparo I. Zavaleta

Abstract:

L-asparaginase from bacterial sources is used in leukemic treatment and food industry. This enzyme is classified based on its affinity towards L-asparagine and L-glutamine. Likewise, ansZ genes express L-asparaginase with higher affinity to L-asparagine. The aim of this work was to clone and express of ansZ gene from Bacillus sp. CH11 isolated from Chilca salterns in Peru. The gene encoding L-asparaginase was cloned into pET15b vector and transformed in Escherichia coli BL21 (DE3) pLysS. The expression was carried out in a batch culture using LB broth and 0.5 mM IPTG. The recombinant L-asparaginase showed a molecular weight of ~ 39 kDa by SDS PAGE and a specific activity of 3.19 IU/mg of protein. The cloning and expression of ansZ gene from this halotolerant Bacillus sp. CH11 allowed having a biological input to improve a future scaling-up.

Keywords: ansZ gene, Bacillus sp, Chilca salterns, recombinant L-asparaginase

Procedia PDF Downloads 160
858 Surrogacy: A Comparative, Legal, Children’s Rights Perspective

Authors: Ronli Sifris

Abstract:

The last Australian Parliamentary inquiry into surrogacy took place in 2016. Since then, a number of countries have reviewed their surrogacy laws, including countries such as New Zealand and the United Kingdom, which traditionally have invoked similar legal approaches to Australia on a broad range of issues. The time is ripe to reform Australia’s surrogacy laws with a view to putting in place a system that best protects the rights of all parties to a surrogacy arrangement, and especially the rights of the child. There are two specific, linked issues which tend to be particularly contentious in the surrogacy context. The first relates to legal parentage. There are questions around whether the surrogate or the intended parents should be deemed the legal parents of a child born through surrogacy and what should be the process for any transfer of parentage. The second key issue relates to compensation and whether a surrogate should be compensated for the reproductive labour inherent in conceiving, gestating, and birthing a child. This paper will invoke a comparative analysis with a view to considering how different countries are regulating surrogacy and which approach best protects the rights all parties involved in the surrogacy arrangement, especially the rights of the children born through surrogacy. The specific countries to be considered are Australia, Canada, and California (United States). I have selected these countries for the following reasons: Australia is the jurisdiction where the author is based, it is, therefore, the jurisdiction with which she has the most familiarity. It allows altruistic surrogacy only and post-birth parentage orders in favour of the intended parents of children born through altruistic surrogacy California, as a jurisdiction allowing for compensated surrogacy and pre-birth parentage orders in favour of the intended parents, sits at the other end of the spectrum to Australia thereby providing an interesting point of comparison. Canada sits somewhere in the middle; it ostensibly allows only altruistic surrogacy, but in practice, many aspects of the Canadian process resemble compensated surrogacy. In addition to conducting a comparative analysis with other countries, the paper will also consider international human rights law as its overarching framework for determining the approach that best protects the rights of a child born through surrogacy. Particular attention will be paid to the United Nations Convention on the Rights of the Child as the key children’s rights treaty. The European Court of Human Rights will also be extensively considered as it has decided a number of cases relating to the rights of children born through surrogacy.

Keywords: surrogacy, children’s rights, australia, compensation, parentage

Procedia PDF Downloads 107
857 Facial Pose Classification Using Hilbert Space Filling Curve and Multidimensional Scaling

Authors: Mekamı Hayet, Bounoua Nacer, Benabderrahmane Sidahmed, Taleb Ahmed

Abstract:

Pose estimation is an important task in computer vision. Though the majority of the existing solutions provide good accuracy results, they are often overly complex and computationally expensive. In this perspective, we propose the use of dimensionality reduction techniques to address the problem of facial pose estimation. Firstly, a face image is converted into one-dimensional time series using Hilbert space filling curve, then the approach converts these time series data to a symbolic representation. Furthermore, a distance matrix is calculated between symbolic series of an input learning dataset of images, to generate classifiers of frontal vs. profile face pose. The proposed method is evaluated with three public datasets. Experimental results have shown that our approach is able to achieve a correct classification rate exceeding 97% with K-NN algorithm.

Keywords: machine learning, pattern recognition, facial pose classification, time series

Procedia PDF Downloads 335
856 A Mixed-Methods Design and Implementation Study of ‘the Attach Project’: An Attachment-Based Educational Intervention for Looked after Children in Northern Ireland

Authors: Hannah M. Russell

Abstract:

‘The Attach Project’ (TAP), is an educational intervention aimed at improving educational and socio-emotional outcomes for children who are looked after. TAP is underpinned by Attachment Theory and is adapted from Dyadic Developmental Psychotherapy (DDP), which is a treatment for children and young people impacted by complex trauma and disorders of attachment. TAP has been implemented in primary schools in Northern Ireland throughout the 2018/19 academic year. During this time, a design and implementation study has been conducted to assess the promise of effectiveness for the future dissemination and ‘scaling-up’ of the programme for a larger, randomised control trial. TAP has been designed specifically for implementation in a school setting and is comprised of a whole school element and a more individualised Key Adult-Key Child pairing. This design and implementation study utilises a mixed-methods research design consisting of quantitative, qualitative, and observational measures with stakeholder input and involvement being considered an integral component. The use of quantitative measures, such as self-report questionnaires prior to and eight months following the implementation of TAP, enabled the analysis of the strengths and direction of relations between the various components of the programme, as well as the influence of implementation factors. The use of qualitative measures, incorporating semi-structured interviews and focus groups, enabled the assessment of implementation factors, identification of implementation barriers, and potential methods of addressing these issues. Observational measures facilitated the continual development and improvement of ‘TAP training’ for school staff. Preliminary findings have provided evidence of promise for the effectiveness of TAP and indicate the potential benefits of introducing this type of attachment-based intervention across other educational settings. This type of intervention could benefit not only children who are looked after but all children who may be impacted by complex trauma or disorders of attachment. Furthermore, findings from this study demonstrate that it is possible for children to form a secondary attachment relationship with a significant adult in school. However, various implementation factors which should be addressed were identified throughout the study, such as the necessity of protected time being introduced to facilitate the development of a positive Key Adult- Key Child relationship. Furthermore, additional ‘re-cap’ training is required in future dissemination of the programme, to maximise ‘attachment friendly practice’ in the whole staff team. Qualitative findings have also indicated that there is a general opinion across school staff that this type of Key Adult- Key Child pairing could be more effective if it was introduced as soon as children begin primary school. This research has provided ample evidence for the need to introduce relationally based interventions in schools, to help to ensure that children who are looked after, or who are impacted by complex trauma or disorders of attachment, can thrive in the school environment. In addition, this research has facilitated the identification of important implementation factors and barriers to implementation, which can be addressed prior to the ‘scaling-up’ of TAP for a robust, randomised controlled trial.

Keywords: attachment, complex trauma, educational interventions, implementation

Procedia PDF Downloads 160
855 Closing the Front Door of Child Protection: Rethinking Mandated Reporting

Authors: Miriam Itzkowitz, Katie Olson

Abstract:

Through an interdisciplinary and trauma-responsive lens, this article reviews the legal and social history of mandated reporting laws and family separation, examines the ethical conundrum of mandated reporting as it relates to evidence-based practice, and discusses alternatives to mandated reporting as a primary prevention strategy. Using existing and emerging data, the authors argue that mandated reporting as a universal strategy contributes to racial disproportionality in the child welfare system and that anti-racist practices should begin with an examination of our reliance on mandated reporting.

Keywords: child welfare, education, mandated reporting, racial disproportionality, trauma

Procedia PDF Downloads 319
854 A Geometrical Method for the Smoluchowski Equation on the Sphere

Authors: Adriano Valdes-Gomez, Francisco Javier Sevilla

Abstract:

We devise a numerical algorithm to simulate the diffusion of a Brownian particle restricted to the surface of a three-dimensional sphere when the particle is under the effects of an external potential that is coupled linearly. It is obtained using elementary geometry, yet, it converges, in the weak sense, to the solutions to the Smoluchowski equation. Rotations on the sphere, which are the analogs of linear displacements in euclidean spaces, are calculated using algebraic operations and then by a proper scaling, which makes the algorithm efficient and quite simple, especially to what may be the short-time propagator approach. Our findings prove that the global effects of curvature are taken into account in both dynamic and stationary processes, and it is not restricted to work in configuration space, neither restricted to the overdamped limit. We have generalized it successfully to simulate the Kramers or the Ornstein-Uhlenbeck process, where it is necessary to work directly in phase space, and it may be adapted to other two dimensional surfaces with non-constant curvature.

Keywords: diffusion on the sphere, Fokker-Planck equation on the sphere, non equilibrium processes on the sphere, numerical methods for diffusion on the sphere

Procedia PDF Downloads 169
853 Social and Political Economy of Paid and Unpaid Work: Work of Women Home Based Workers in National Capital Region (NCR), India

Authors: Sudeshna Sengupta

Abstract:

Women’s work lives weave a complex fabric of myriad work relations and complex structures. Lives, when seen from the lens of work, is a saga of conjugated oppression by intertwined structures that are vertically and horizontally interwoven in a very complex manner. Women interact with multiple institutions through their work. The interactions and interplay of institutions shape their organization of work. They intersperse productive work with reproductive work, unpaid economic activities with unpaid care work, and all kinds of activities with leisure and self-care. The proposed paper intends to understand how women working as home-based workers in the National Capital Region (NCR) of India are organizing their everyday work, and how the organization of work is influenced by the interplay of structures. Situating itself in a multidisciplinary theoretical framework, this paper brings out how the gendering of work is playing out in the political, economic and social domain and shaping the work-life within the family, and in the paid workspace. The paper will use a primary data source, which is qualitative in nature. It will comprise 15 qualitative interviews of women home-based workers from the National Capital Region. The research uses a life history approach. The sampling was purposive using snowballing as a method. The dataset is part of the primary data (qualitative) collected for the ongoing Ph.D. work in Gender Studies at Ambedkar University Delhi. The home-based workers interviewed were in “non-factory” wage relations based on piece rates with flexible working hours. Their workplaces were their own homes with no spatial divide between living spaces and workspaces. Home-based workers were recognized as a group in the domain of labor economics in the 1980s. When menial work was cheaper than machine work, the capital owners preferred to outsource work as home-based work to women. These production spaces are fragmented and the identity of gender is created within labor processes to favor material accumulation. Both the employers and employees acknowledged the material gain of the capital owner when work was subcontracted to women at home. Simultaneously the market reinforced women’s reproductive role by conforming to patriarchal ideology. The contractors played an important role in implementing localized control on workers and also in finding workers for fragmented, gendered production processes. Their presence helped the employers in bringing together multiple forms of oppression that ranged from creating a structure to flout laws by creating shadow employers. It created an intertwined social and economic structure as well as a workspace where the line between productive and reproductive work gets blurred. The state invisibilized itself either by keeping the sector out of the domain of laws or by not implementing its own laws regulating working conditions or social security. It allowed the local hierarchy to function and define localized working conditions. The productive reproductive continuum reveals a labor control that influenced both the productive and reproductive work of women.

Keywords: informal sector, paid work, women workers, labor processes

Procedia PDF Downloads 148
852 Crystallization of the US Supreme Court’s Role as an Arbiter of Constitutionality of Laws

Authors: Fethia Braik

Abstract:

This paper summarizes the history of the US Supreme Court. It did not enjoy today’s status. It did neither control legislation nor the executive power. It was until 1803, during Marshall’s term, that it gained the pride of ruling over the constitutionality of acts be they federal or local, congressional or presidential. The Chief Justice, whether intended or not, vested such power in the supreme judicial institution via the case of Marbury v. Madison. Such power, nevertheless, had not been exercised for many years, till the Dred Scott case.

Keywords: Judiciary Acts 1789, 1801, chief justice, associate justice, justice of peace, review of constitutionality of acts, Jay court, Ellsworth court, Marshall court

Procedia PDF Downloads 289
851 Motion Planning of SCARA Robots for Trajectory Tracking

Authors: Giovanni Incerti

Abstract:

The paper presents a method for a simple and immediate motion planning of a SCARA robot, whose end-effector has to move along a given trajectory; the calculation procedure requires the user to define in analytical form or by points the trajectory to be followed and to assign the curvilinear abscissa as function of the time. On the basis of the geometrical characteristics of the robot, a specifically developed program determines the motion laws of the actuators that enable the robot to generate the required movement; this software can be used in all industrial applications for which a SCARA robot has to be frequently reprogrammed, in order to generate various types of trajectories with different motion times.

Keywords: motion planning, SCARA robot, trajectory tracking, analytical form

Procedia PDF Downloads 300
850 Intelligent Path Tracking Hybrid Fuzzy Controller for a Unicycle-Type Differential Drive Robot

Authors: Abdullah M. Almeshal, Mohammad R. Alenezi, Muhammad Moaz

Abstract:

In this paper, we discuss the performance of applying hybrid spiral dynamic bacterial chemotaxis (HSDBC) optimisation algorithm on an intelligent controller for a differential drive robot. A unicycle class of differential drive robot is utilised to serve as a basis application to evaluate the performance of the HSDBC algorithm. A hybrid fuzzy logic controller is developed and implemented for the unicycle robot to follow a predefined trajectory. Trajectories of various frictional profiles and levels were simulated to evaluate the performance of the robot at different operating conditions. Controller gains and scaling factors were optimised using HSDBC and the performance is evaluated in comparison to previously adopted optimisation algorithms. The HSDBC has proven its feasibility in achieving a faster convergence toward the optimal gains and resulted in a superior performance.

Keywords: differential drive robot, hybrid fuzzy controller, optimization, path tracking, unicycle robot

Procedia PDF Downloads 448
849 Influence of Temperature on Properties of MOSFETs

Authors: Azizi Cherifa, O. Benzaoui

Abstract:

The thermal aspects in the design of power circuits often deserve as much attention as pure electric components aspects as the operating temperature has a direct influence on their static and dynamic characteristics. MOSFET is fundamental in the circuits, it is the most widely used device in the current production of semiconductor components using their honorable performance. The aim of this contribution is devoted to the effect of the temperature on the properties of MOSFETs. The study enables us to calculate the drain current as function of bias in both linear and saturated modes. The effect of temperature is evaluated using a numerical simulation, using the laws of mobility and saturation velocity of carriers as a function of temperature.

Keywords: temperature, MOSFET, mobility, transistor

Procedia PDF Downloads 334
848 Analysis of Scaling Effects on Analog/RF Performance of Nanowire Gate-All-Around MOSFET

Authors: Dheeraj Sharma, Santosh Kumar Vishvakarma

Abstract:

We present a detailed analysis of analog and radiofrequency (RF) performance with different gate lengths for nanowire cylindrical gate (CylG) gate-all-around (GAA) MOSFET. CylG GAA MOSFET not only suppresses the short channel effects (SCEs), it is also a good candidate for analog/RF device due to its high transconductance (gm) and high cutoff frequency (fT ). The presented work would be beneficial for a new generation of RF circuits and systems in a broad range of applications and operating frequency covering the RF spectrum. For this purpose, the analog/RF figures of merit for CylG GAA MOSFET is analyzed in terms of gate to source capacitance (Cgs), gate to drain capacitance (Cgd), transconductance generation factor gm = Id (where Id represents drain current), intrinsic gain, output resistance, fT, maximum frequency of oscillation (fmax) and gain bandwidth (GBW) product.

Keywords: Gate-All-Around MOSFET, GAA, output resistance, transconductance generation factor, intrinsic gain, cutoff frequency, fT

Procedia PDF Downloads 375
847 Evaluation of Robust Feature Descriptors for Texture Classification

Authors: Jia-Hong Lee, Mei-Yi Wu, Hsien-Tsung Kuo

Abstract:

Texture is an important characteristic in real and synthetic scenes. Texture analysis plays a critical role in inspecting surfaces and provides important techniques in a variety of applications. Although several descriptors have been presented to extract texture features, the development of object recognition is still a difficult task due to the complex aspects of texture. Recently, many robust and scaling-invariant image features such as SIFT, SURF and ORB have been successfully used in image retrieval and object recognition. In this paper, we have tried to compare the performance for texture classification using these feature descriptors with k-means clustering. Different classifiers including K-NN, Naive Bayes, Back Propagation Neural Network , Decision Tree and Kstar were applied in three texture image sets - UIUCTex, KTH-TIPS and Brodatz, respectively. Experimental results reveal SIFTS as the best average accuracy rate holder in UIUCTex, KTH-TIPS and SURF is advantaged in Brodatz texture set. BP neuro network works best in the test set classification among all used classifiers.

Keywords: texture classification, texture descriptor, SIFT, SURF, ORB

Procedia PDF Downloads 349
846 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation

Authors: Suman Podder

Abstract:

As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.

Keywords: consumer data right, innovation, open banking, privacy safeguards

Procedia PDF Downloads 128
845 The Development of Private Housing Schemes to Address the Housing Problem: A Case Study of Islamabad

Authors: Zafar Iqbal Zafar, Abdul Waheed

Abstract:

The Capital Development Authority (CDA) Ordinance 1960 requires CDA to acquire land for the provision of housing in Islamabad. However, the pace of residential development was slow and the demand for housing was increasing rapidly. To resolve the growing housing problem, CDA involved the private sector in the development of housing schemes. Detailed bye-laws for regulation of private housing schemes were prepared and these bylaws were called “Modalities & Procedures”. This paper explains how the Modalities and Procedures of CDA have been successful in regulating the development of private housing schemes in Islamabad.

Keywords: housing schemes, master plan, development works, zoning regulations

Procedia PDF Downloads 179
844 Coastal Hydraulic Modelling to Ascertain Stability of Rubble Mound Breakwater

Authors: Safari Mat Desa, Othman A. Karim, Mohd Kamarulhuda Samion, Saiful Bahri Hamzah

Abstract:

Rubble mound breakwater was one of the most popular designs in Malaysia, constructed at the river mouth to dissipate the incoming wave energy from the seaward. Geometrically characteristics in trapezoid, crest width, and bottom width will determine the hypotonus stability, whilst structural height was designed for wave overtopping consideration. Physical hydraulic modelling in two-dimensional facilities was instigated in the flume to test the stability as well as the overtopping rate complied with the method of similarity, namely kinematic, dynamic, and geometric. Scaling effects of wave characteristics were carried out in order to acquire significant interaction of wave height, wave period, and water depth. Results showed two-dimensional physical modelling has proven reliable capability to ascertain breakwater stability significantly.

Keywords: breakwater, geometrical characteristic, wave overtopping, physical hydraulic modelling, method of similarity, wave characteristic

Procedia PDF Downloads 95
843 Relay Mining: Verifiable Multi-Tenant Distributed Rate Limiting

Authors: Daniel Olshansky, Ramiro Rodrıguez Colmeiro

Abstract:

Relay Mining presents a scalable solution employing probabilistic mechanisms and crypto-economic incentives to estimate RPC volume usage, facilitating decentralized multitenant rate limiting. Network traffic from individual applications can be concurrently serviced by multiple RPC service providers, with costs, rewards, and rate limiting governed by a native cryptocurrency on a distributed ledger. Building upon established research in token bucket algorithms and distributed rate-limiting penalty models, our approach harnesses a feedback loop control mechanism to adjust the difficulty of mining relay rewards, dynamically scaling with network usage growth. By leveraging crypto-economic incentives, we reduce coordination overhead costs and introduce a mechanism for providing RPC services that are both geopolitically and geographically distributed.

Keywords: remote procedure call, crypto-economic, commit-reveal, decentralization, scalability, blockchain, rate limiting, token bucket

Procedia PDF Downloads 40
842 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 230
841 Multiple Images Stitching Based on Gradually Changing Matrix

Authors: Shangdong Zhu, Yunzhou Zhang, Jie Zhang, Hang Hu, Yazhou Zhang

Abstract:

Image stitching is a very important branch in the field of computer vision, especially for panoramic map. In order to eliminate shape distortion, a novel stitching method is proposed based on gradually changing matrix when images are horizontal. For images captured horizontally, this paper assumes that there is only translational operation in image stitching. By analyzing each parameter of the homography matrix, the global homography matrix is gradually transferred to translation matrix so as to eliminate the effects of scaling, rotation, etc. in the image transformation. This paper adopts matrix approximation to get the minimum value of the energy function so that the shape distortion at those regions corresponding to the homography can be minimized. The proposed method can avoid multiple horizontal images stitching failure caused by accumulated shape distortion. At the same time, it can be combined with As-Projective-As-Possible algorithm to ensure precise alignment of overlapping area.

Keywords: image stitching, gradually changing matrix, horizontal direction, matrix approximation, homography matrix

Procedia PDF Downloads 297
840 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 60
839 A Homogenized Mechanical Model of Carbon Nanotubes/Polymer Composite with Interface Debonding

Authors: Wenya Shu, Ilinca Stanciulescu

Abstract:

Carbon nanotubes (CNTs) possess attractive properties, such as high stiffness and strength, and high thermal and electrical conductivities, making them promising filler in multifunctional nanocomposites. Although CNTs can be efficient reinforcements, the expected level of mechanical performance of CNT-polymers is not often reached in practice due to the poor mechanical behavior of the CNT-polymer interfaces. It is believed that the interactions of CNT and polymer mainly result from the Van der Waals force. The interface debonding is a fracture and delamination phenomenon. Thus, the cohesive zone modeling (CZM) is deemed to give good capture of the interface behavior. The detailed, cohesive zone modeling provides an option to consider the CNT-matrix interactions, but brings difficulties in mesh generation and also leads to high computational costs. Homogenized models that smear the fibers in the ground matrix and treat the material as homogeneous are studied in many researches to simplify simulations. But based on the perfect interface assumption, the traditional homogenized model obtained by mixing rules severely overestimates the stiffness of the composite, even comparing with the result of the CZM with artificially very strong interface. A mechanical model that can take into account the interface debonding and achieve comparable accuracy to the CZM is thus essential. The present study first investigates the CNT-matrix interactions by employing cohesive zone modeling. Three different coupled CZM laws, i.e., bilinear, exponential and polynomial, are considered. These studies indicate that the shapes of the CZM constitutive laws chosen do not influence significantly the simulations of interface debonding. Assuming a bilinear traction-separation relationship, the debonding process of single CNT in the matrix is divided into three phases and described by differential equations. The analytical solutions corresponding to these phases are derived. A homogenized model is then developed by introducing a parameter characterizing interface sliding into the mixing theory. The proposed mechanical model is implemented in FEAP8.5 as a user material. The accuracy and limitations of the model are discussed through several numerical examples. The CZM simulations in this study reveal important factors in the modeling of CNT-matrix interactions. The analytical solutions and proposed homogenized model provide alternative methods to efficiently investigate the mechanical behaviors of CNT/polymer composites.

Keywords: carbon nanotube, cohesive zone modeling, homogenized model, interface debonding

Procedia PDF Downloads 114