Search results for: maritime security intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4317

Search results for: maritime security intelligence

1047 Importance of Occupational Safety and Health in Dam Construction Site

Authors: Naci Büyükkaraciğan, Yildirim Akyol

Abstract:

Large plants that covering the back and accumulate water of a river valley for energy production, drinking, irrigation water supply, economic benefits that serve many purposes, such as regulation of flood protection, are called dams. Place, in which unites in order to achieve an optimum balance between manpower for Lowest cost and economic as belonging to that structure to create machines, materials and construction of the project, is called as the site. Dam construction sites are combined sites in together in many businesses. Therefore, there can be found in the many workers and machines are many accidents in this type of construction sites. The necessity of systematic and scientific studies due to various reasons arises in order to be protected from conditions that could damage the health, During the execution of the work on construction sites. Occupational health and safety of the study, called the case, also in the European Union has begun to be addressed by weight since the 1980s. In particular, issued in 1989 89/391/EEC on occupational health and safety directive, occupational health and adopted the Directive within the framework of the security field, and then exposed to a large number of individual directive within this framework on the basis of the directive. Turkey's Law No. 6331 entered into force in June 2012 on the subject. In this study, measures related to the construction site of the dam should be taken with occupational safety and health have been examined and tried to put forward recommendations on the subject.

Keywords: civil engineering, dam, occupational safety and health, site organizations

Procedia PDF Downloads 327
1046 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 461
1045 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems

Authors: Adeniyi Onasanya, Maher Elshakankiri

Abstract:

In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.

Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services

Procedia PDF Downloads 173
1044 Electronic Health Record System: A Perspective to Improve the Value of Services Rendered to Patients in Healthcare Organization in Rwanda, Case of CHUB and Hopital De Nemba

Authors: Mugabe Nzarama Gabriel

Abstract:

In Rwanda, many healthcare organizations are still using a paper based patients’ data record system although it still present weaknesses to share health patients’ information across different services when necessary. In developed countries, the EHR has been put in place to revolutionize the paper based record system but still the EHR has some challenges related to privacy, security, or interoperability. The purpose of this research was to assess the existing patients’ data record system in healthcare sector in Rwanda, see what an EHR can improve to the system in place and assess the acceptance of EHR as system which is interoperable, very secure and interoperable and see whether stakeholders are ready to adopt the system. The case based methodology was used and TAM theoretical framework to design the questionnaire for the survey. A judgmental sample across two cases, CHUB and Hopital de Nemba, has been selected and SPSS has been used for descriptive statistics. After a qualitative analysis, the findings showed that the paper based record is useful, gives complete information about the patient, protects the privacy of patients but it is still less secure and less interoperable. The respondents shown that they are ready to use the proposed EHR System and want it secure, capable of enforcing the privacy but still they are not all ready for the interoperability. A conclusion has been formulated; recommendations and further research have been proposed.

Keywords: EHR system, healthcare service, TAM, privacy, interoperability

Procedia PDF Downloads 263
1043 Managing Crowds at Sports Mega Events: Examining the Impact of ‘Fan Parks’ at International Football Tournaments between 2002 and 2016

Authors: Joel Rookwood

Abstract:

Sports mega events have become increasingly significant in sporting, political and economic terms, with analysis often focusing on issues including resource expenditure, development, legacy and sustainability. Transnational tournaments can inspire interest from a variety of demographics, and the operational management of such events can involve contributions from a range of personnel. In addition to television audiences events also attract attending spectators, and in football contexts the temporary migration of fans from potentially rival nations and teams can present event organising committees and security personnel with various challenges in relation to crowd management. The behaviour, interaction and control of supporters has previously led to incidents of disorder and hooliganism, with damage to property as well as injuries and deaths proving significant consequences. The Heysel tragedy at the 1985 European Cup final in Brussels is a notable example, where 39 fans died following crowd disorder and mismanagement. Football disasters and disorder, particularly in the context of international competition, have inspired responses from police, law makers, event organisers, clubs and associations, including stadium improvements, legislative developments and crowd management practice to improve the effectiveness of spectator safety. The growth and internationalisation of fandom and developments in event management and tourism have seen various responses to the evolving challenges associated with hosting large numbers of visiting spectators at mega events. In football contexts ‘fan parks’ are a notable example. Since the first widespread introduction in European football competitions at the 2006 World Cup finals in Germany, these facilities have become a staple element of such mega events. This qualitative, longitudinal, multi-continent research draws on extensive semi-structured interview and observation data. As a frame of reference, this work considers football events staged before and after the development of fan parks. Research was undertaken at four World Cup finals (Japan 2002, Germany 2006, South Africa 2010 and Brazil 2014), four European Championships (Portugal 2004, Switzerland/Austria 2008, Poland/Ukraine 2012 and France 2016), four other confederation tournaments (Ghana 2008, Qatar 2011, USA 2011 and Chile 2015), and four European club finals (Istanbul 2005, Athens 2007, Rome 2009 and Basle 2016). This work found that these parks are typically temporarily erected, specifically located zones where supporters congregate together irrespective of allegiances to watch matches on large screens, and partake in other forms of organised on-site entertainment. Such facilities can also allow organisers to control the behaviour, confine the movement and monitor the alcohol consumption of supporters. This represents a notable shift in policy from previous football tournaments, when the widely assumed causal link between alcohol and hooliganism which frequently shaped legislative and police responses to disorder, also dissuaded some authorities from permitting fans to consume alcohol in and around stadia. It also reflects changing attitudes towards modern football fans. The work also found that in certain contexts supporters have increasingly engaged with such provision which impacts fan behaviour, but that this is relative to factors including location, facilities, management and security.

Keywords: event, facility, fan, management, park

Procedia PDF Downloads 310
1042 Improving Grade Control Turnaround Times with In-Pit Hyperspectral Assaying

Authors: Gary Pattemore, Michael Edgar, Andrew Job, Marina Auad, Kathryn Job

Abstract:

As critical commodities become more scarce, significant time and resources have been used to better understand complicated ore bodies and extract their full potential. These challenging ore bodies provide several pain points for geologists and engineers to overcome, poor handling of these issues flows downs stream to the processing plant affecting throughput rates and recovery. Many open cut mines utilise blast hole drilling to extract additional information to feed back into the modelling process. This method requires samples to be collected during or after blast hole drilling. Samples are then sent for assay with turnaround times varying from 1 to 12 days. This method is time consuming, costly, requires human exposure on the bench and collects elemental data only. To address this challenge, research has been undertaken to utilise hyperspectral imaging across a broad spectrum to scan samples, collars or take down hole measurements for minerals and moisture content and grade abundances. Automation of this process using unmanned vehicles and on-board processing reduces human in pit exposure to ensure ongoing safety. On-board processing allows data to be integrated into modelling workflows with immediacy. The preliminary results demonstrate numerous direct and indirect benefits from this new technology, including rapid and accurate grade estimates, moisture content and mineralogy. These benefits allow for faster geo modelling updates, better informed mine scheduling and improved downstream blending and processing practices. The paper presents recommendations for implementation of the technology in open cut mining environments.

Keywords: grade control, hyperspectral scanning, artificial intelligence, autonomous mining, machine learning

Procedia PDF Downloads 105
1041 Sexual Consent and Persons with Psychosocial Disabilities: Exploring Sexual Rights under Indian Laws

Authors: Sachin Sharma

Abstract:

Sexual consent is integral to every sexual relationship. It is a process to facilitate sexual autonomy and bodily integrity. It assures complete sexual personhood and allows an individual to explore her sexual expressions independently. But the said proposition is not true for people with psychosocial disabilities. Generally, they are considered seraphic or mephistophelic and denied access to sexual autonomy. This result in institutionalizing the sexuality of disabled persons, where the eugenics-ableist narrative defines assessment and access to consent. This way, sexuality and disability are distanced apart. It is primarily due to the stigmatized socio-cultural constructs of sexuality that define sex within a “standard” and “charmed” circle. Such stigmatized expression influences the law, as it considers people with psychosocial disabilities incapable of sexual consent. The approach of legal institutions is very narrow towards interpreting their sexual rights. It echoes the modernist-ableism and strangulates the sexual choices. This way, it reflects the repressive model of sex and denies space to people with psychosocial disabilities. Moreover, judicial courts follow old and conservative methods while dealing with sexual issues. For instance, courts still practice the “standardized” norm of intelligence quotient (IQ) for determining the credibility of persons with psychosocial disabilities. Further, there is still doubt about assistive communicative techniques. This paper will try to question the normative structure of sexual consent and related laws while specifically addressing the issues of sex as desire and abuse. Considering the commitment to the United Nations Convention on the Rights of Persons with Disabilities (herein referred to as UNCRPD) and common law experience, the paper will draw a comparative study on the legal position of sexual rights in India. The paper will also analyze the role of UNCRPD in addressing sexual rights. The author will examine the position of sexual rights of people with psychosocial disabilities after the drafting of UNCRPD and specific state laws. The paper primarily follows the doctrinal method.

Keywords: sexual autonomy, institutionalized choices, overregulated laws, violation of individuality

Procedia PDF Downloads 113
1040 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 41
1039 The Role of Celebrities in the Securitization and Desecuritization of Syrian Migrants on Social Media in Turkiye

Authors: Yelda Yenel, Orkut Acele

Abstract:

This research aims to examine the role of celebrities in the securitization and desecuritization of Syrian migrants in Türkiye on social media platforms. Traditionally, the securitization process has been driven by political actors and mainstream media. However, with the rise of social media, celebrities have emerged as influential actors, contributing to these processes. The topic of Syrian migrants, particularly those arriving in Türkiye after 2011, has sparked national debates, framing them both as a security threat and as a humanitarian issue, thereby dividing public opinion.The primary objective of this study is to analyze celebrities’ discourses about migrants on social media and to explore how these narratives contribute to the processes of securitization (presenting migrants as a threat) and desecuritization (framing migrants within a humanitarian context). This research will focus on social media platforms such as Twitter and Instagram, examining celebrities' posts and analyzing the narratives produced through content and discourse analysis techniques.By investigating how celebrities frame the migrant issue and how these frames resonate with the public, this study seeks to explore the impact of celebrity discourse on the securitization and desecuritization processes. Additionally, it will examine the influence of celebrities on social media users, offering a new perspective on how securitization theory is shaped by the role of celebrities in the digital age.

Keywords: securitization, desecuritization, celebrities, Syrian migrants, social media discourse

Procedia PDF Downloads 13
1038 Image Processing techniques for Surveillance in Outdoor Environment

Authors: Jayanth C., Anirudh Sai Yetikuri, Kavitha S. N.

Abstract:

This paper explores the development and application of computer vision and machine learning techniques for real-time pose detection, facial recognition, and number plate extraction. Utilizing MediaPipe for pose estimation, the research presents methods for detecting hand raises and ducking postures through real-time video analysis. Complementarily, facial recognition is employed to compare and verify individual identities using the face recognition library. Additionally, the paper demonstrates a robust approach for extracting and storing vehicle number plates from images, integrating Optical Character Recognition (OCR) with a database management system. The study highlights the effectiveness and versatility of these technologies in practical scenarios, including security and surveillance applications. The findings underscore the potential of combining computer vision techniques to address diverse challenges and enhance automated systems for both individual and vehicular identification. This research contributes to the fields of computer vision and machine learning by providing scalable solutions and demonstrating their applicability in real-world contexts.

Keywords: computer vision, pose detection, facial recognition, number plate extraction, machine learning, real-time analysis, OCR, database management

Procedia PDF Downloads 14
1037 Insecurity as a Challenge to Nutritional Status of Children and Mothers in Dansadau, Maru Local Government Area Zamfara State, North Western Nigeria

Authors: Mohammed Hussaini

Abstract:

This paper discusses insecurity as a challenge to the nutritional Status of children and mothers in Dansadau, Maru Local Government area of Zamfara state, Northwestern Nigeria. A Descriptive survey design was used in the study. Objectives of the study were formulated to guide the study. 20 Health workers and 100 mothers were used as population of the study; the instrument validation for data collection was interview. The interview structure was validated by 3 experts, the data collected was analyzed and presented using descriptive standard score (Z-score). The study revealed that, Nutritional Status of children and mothers in Northwest Nigeria specifically Zamfara state is low. This mostly affect children and mother as a result of serious insecurity challenge in the region, consisting of banditry and kidnapping, killing of farmers, destruction of farmland, burning of farm products. The study recommended that the focus is on implementing strong communication strategies to enhance short-term relief initiatives, both governmental and non-governmental organizations should actively play a role in initiating lasting change, especially when tackling issues of insecurity and effectively addressing the rise of armed banditry and other security concerns requires a sophisticated and nuanced strategy.

Keywords: insecurity, malnutrition, children, mothers

Procedia PDF Downloads 51
1036 Chemical Warfare Agent Simulant by Photocatalytic Filtering Reactor: Effect of Operating Parameters

Authors: Youcef Serhane, Abdelkrim Bouzaza, Dominique Wolbert, Aymen Amin Assadi

Abstract:

Throughout history, the use of chemical weapons is not exclusive to combats between army corps; some of these weapons are also found in very targeted intelligence operations (political assassinations), organized crime, and terrorist organizations. To improve the speed of action, important technological devices have been developed in recent years, in particular in the field of protection and decontamination techniques to better protect and neutralize a chemical threat. In order to assess certain protective, decontaminating technologies or to improve medical countermeasures, tests must be conducted. In view of the great toxicity of toxic chemical agents from (real) wars, simulants can be used, chosen according to the desired application. Here, we present an investigation about using a photocatalytic filtering reactor (PFR) for highly contaminated environments containing diethyl sulfide (DES). This target pollutant is used as a simulant of CWA, namely of Yperite (Mustard Gas). The influence of the inlet concentration (until high concentrations of DES (1200 ppmv, i.e., 5 g/m³ of air) has been studied. Also, the conversion rate was monitored under different relative humidity and different flow rates (respiratory flow - standards: ISO / DIS 8996 and NF EN 14387 + A1). In order to understand the efficacity of pollutant neutralization by PFR, a kinetic model based on the Langmuir–Hinshelwood (L–H) approach and taking into account the mass transfer step was developed. This allows us to determine the adsorption and kinetic degradation constants with no influence of mass transfer. The obtained results confirm that this small configuration of reactor presents an extremely promising way for the use of photocatalysis for treatment to deal with highly contaminated environments containing real chemical warfare agents. Also, they can give birth to an individual protection device (an autonomous cartridge for a gas mask).

Keywords: photocatalysis, photocatalytic filtering reactor, diethylsulfide, chemical warfare agents

Procedia PDF Downloads 101
1035 Study of the Economic Development of Border Areas Malinau District

Authors: Indri Nilam Sari, Aris Subagiyo, Nindya Sari

Abstract:

Malinau Regency border area is an area which is based on the RTRWN and the development priority. But, in real border area Malinau Regency placed as backyard from Indonesian area and caused development lag that is fairly large compared by town area in Malinau Regency. This research aimed to know the condition of the gap in the Malinau Regency border and its influence on the development of the border region as well as knowing the problems related to the economy development of society in the area of the border district of Malinau. Methods of analysis are used in namely descriptive analysis that represent analysis of land use and analysis of movement activities of the population, level analysis facility and infrastructure, economy analysis that represent top commodity determination analysis (LQ and Growth Share) and accessibility. The results of the study showed that the condition of the Malinau Regency border come within the gap as seen from the contributions of infrastructure repair facilities and accessibility advocates, communities, scattered seed commodities come within the borders and human resources with the condition of the most Upstream Bahau town in the backwaters of the town more. There are a few problems that cause the condition area of the border experiencing inequality, lack of human resources, poor infrastructure, lack of accessibility and low levels of security so that it brings development recommendations was the development of the flagship commodities and infrastructure as well as supporting community economic infrastructure, as well as human resources.

Keywords: border, economy, development, Malinau

Procedia PDF Downloads 449
1034 Greed and Grievance Revisisted: The Case of ISIL

Authors: Amjed Rasheed

Abstract:

Rebellions are driven by several incentives. They do not often occur because of historical grievances or political exclusion. They can be driven by the desire to control over natural resources, or by both. In the case of the Islamic State (ISIL), greed and grievance are both drive this radical group to operate in Iraq and Syria. This article aims to show that grievance was the trigger to the emergence of ISIL. It also aims to demonstrate that ISIL is using oil as a tool, to implements its political ends, than a purpose per se. In other words, the emergence of ISIL is based on socio-political conditions, which are domestically driven, and oil is not ISIL’s aim but a source of revenue to finance its activities. This paper applies conflict analysis methodology to analyse the conflict in Iraq and Syria, with a specific highlight to ISIL. By doing so, it gives ahistorical background on emergence of ISIL. It also provides an insightful explanation on the main dynamics and the tactics this organisation applies. It also delivers a sufficient explanation on how it recruits its members, both local and international. It concludes that tackling ISIL needs a more sophisticated approach than the one Obama administration has adopted. It is more a political issue to be tackled by political means, than a military one to be tackled by military means. The current war is an Intra-Sunni war, and therefore, Sunni states have to be on board to crackdown ISIL. Besides, the article finishes with the argument that democratisation is not necessarily the key answer to bring stability to the region, but a sort of governance that provides security and material needs to individuals.

Keywords: ISIL, Iraq, domestic politics, Islamic radicalisation

Procedia PDF Downloads 360
1033 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict

Authors: Zhao Xinlei

Abstract:

The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.

Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition

Procedia PDF Downloads 76
1032 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology

Authors: Ted Gournelos

Abstract:

Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.

Keywords: social enterprise, strategy, innovation, social media

Procedia PDF Downloads 317
1031 Effect of Improved Potato Varieties Adoption on Farmers' Income in Ethiopia: An Endogenous Switching Approach

Authors: Tsion Tekalegn

Abstract:

In Ethiopia, improved potato varieties are essential for food security, but smallholders' adoption of improved technologies limits their productivity. For this study, data was collected based on a structured questionnaire randomly collected from the 329 sample farmers (158 adopters and 171 non-adopters). We estimate the adoption of improved variety and causal impact using Endogenous Switching Regression (ESR), and a propensity Score Matching (PSM) was used to test the treatment effect. This helps us estimate the effect of improved potato variety on smallholder farmer income by controlling for the role of the selection bias problem stemming from both observed and unobserved heterogeneity. According to the result, key determinants influencing adoption include livestock ownership, access to extension services, and farming experience, which positively affect the likelihood of adopting improved varieties. In contrast, access to irrigation negatively correlates with adoption, suggesting that farmers with reliable water sources perceive less need for improved varieties. The ESR model result confirmed that improved potato variety adoption increases the smallholder farmer income with an estimated gain of 8.77%. Thus, to improve the potato variety of the farming households, the government should give due emphasis to potato production, and the extension services need to be strengthened.

Keywords: adoption, improved potato varieties, endogenous switching regression, Ethiopia

Procedia PDF Downloads 23
1030 Numerical Simulation for a Shallow Braced Excavation of Campus Building

Authors: Sao-Jeng Chao, Wen-Cheng Chen, Wei-Humg Lu

Abstract:

In order to prevent encountering unpredictable factors, geotechnical engineers always conduct numerical analysis for braced excavation design. Simulation work in advance can predict the response of subsequent excavation and thus will be designed to increase the security coefficient of construction. The parameters that are considered include geological conditions, soil properties, soil distributions, loading types, and the analysis and design methods. National Ilan University is located on the LanYang plain, mainly deposited by clayey soil and loose sand, and thus is vulnerable to external influence displacement. National Ilan University experienced a construction of braced excavation with a complete program of monitoring excavation. This study takes advantage of a one-dimensional finite element method RIDO to simulate the excavation process. The predicted results from numerical simulation analysis are compared with the monitored results of construction to explore the differences between them. Numerical simulation analysis of the excavation process can be used to analyze retaining structures for the purpose of understanding the relationship between the displacement and supporting system. The resulting deformation and stress distribution from the braced excavation cab then be understand in advance. The problems can be prevented prior to the construction process, and thus acquire all the affected important factors during design and construction.

Keywords: excavation, numerical simulation, RIDO, retaining structure

Procedia PDF Downloads 258
1029 Grid and Market Integration of Large Scale Wind Farms using Advanced Predictive Data Mining Techniques

Authors: Umit Cali

Abstract:

The integration of intermittent energy sources like wind farms into the electricity grid has become an important challenge for the utilization and control of electric power systems, because of the fluctuating behaviour of wind power generation. Wind power predictions improve the economic and technical integration of large amounts of wind energy into the existing electricity grid. Trading, balancing, grid operation, controllability and safety issues increase the importance of predicting power output from wind power operators. Therefore, wind power forecasting systems have to be integrated into the monitoring and control systems of the transmission system operator (TSO) and wind farm operators/traders. The wind forecasts are relatively precise for the time period of only a few hours, and, therefore, relevant with regard to Spot and Intraday markets. In this work predictive data mining techniques are applied to identify a statistical and neural network model or set of models that can be used to predict wind power output of large onshore and offshore wind farms. These advanced data analytic methods helps us to amalgamate the information in very large meteorological, oceanographic and SCADA data sets into useful information and manageable systems. Accurate wind power forecasts are beneficial for wind plant operators, utility operators, and utility customers. An accurate forecast allows grid operators to schedule economically efficient generation to meet the demand of electrical customers. This study is also dedicated to an in-depth consideration of issues such as the comparison of day ahead and the short-term wind power forecasting results, determination of the accuracy of the wind power prediction and the evaluation of the energy economic and technical benefits of wind power forecasting.

Keywords: renewable energy sources, wind power, forecasting, data mining, big data, artificial intelligence, energy economics, power trading, power grids

Procedia PDF Downloads 512
1028 Energy Efficient Microgrid Design with Hybrid Power Systems

Authors: Pedro Esteban

Abstract:

Today’s electrical networks, including microgrids, are evolving into smart grids. The smart grid concept brings the idea that the power comes from various sources (continuous or intermittent), in various forms (AC or DC, high, medium or low voltage, etc.), and it must be integrated into the electric power system in a smart way to guarantee a continuous and reliable supply that complies with power quality and energy efficiency standards and grid code requirements. This idea brings questions for the different players like how the required power will be generated, what kind of power will be more suitable, how to store exceeding levels for short or long-term usage, and how to combine and distribute all the different generation power sources in an efficient way. To address these issues, there has been lots of development in recent years on the field of on-grid and off-grid hybrid power systems (HPS). These systems usually combine one or more modes of electricity generation together with energy storage to ensure optimal supply reliability and high level of energy security. Hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.

Keywords: microgrids, hybrid power systems, energy storage, power quality improvement

Procedia PDF Downloads 135
1027 Argumentation Frameworks and Theories of Judging

Authors: Sonia Anand Knowlton

Abstract:

With the rise of artificial intelligence, computer science is becoming increasingly integrated in virtually every area of life. Of course, the law is no exception. Through argumentation frameworks (AFs), computer scientists have used abstract algebra to structure the legal reasoning process in a way that allows conclusions to be drawn from a formalized system of arguments. In AFs, arguments compete against each other for logical success and are related to one another through the binary operation of the attack. The prevailing arguments make up the preferred extension of the given argumentation framework, telling us what set of arguments must be accepted from a logical standpoint. There have been several developments of AFs since its original conception in the early 90’s in efforts to make them more aligned with the human reasoning process. Generally, these developments have sought to add nuance to the factors that influence the logical success of competing arguments (e.g., giving an argument more logical strength based on the underlying value it promotes). The most cogent development was that of the Extended Argumentation Framework (EAF), in which attacks can themselves be attacked by other arguments, and the promotion of different competing values can be formalized within the system. This article applies the logical structure of EAFs to current theoretical understandings of judicial reasoning to contribute to theories of judging and to the evolution of AFs simultaneously. The argument is that the main limitation of EAFs, when applied to judicial reasoning, is that they require judges to themselves assign values to different arguments and then lexically order these values to determine the given framework’s preferred extension. Drawing on John Rawls’ Theory of Justice, the examination that follows is whether values are lexical and commensurable to this extent. The analysis that follows then suggests a potential extension of the EAF system with an approach that formalizes different “planes of attack” for competing arguments that promote lexically ordered values. This article concludes with a summary of how these insights contribute to theories of judging and of legal reasoning more broadly, specifically in indeterminate cases where judges must turn to value-based approaches.

Keywords: computer science, mathematics, law, legal theory, judging

Procedia PDF Downloads 58
1026 Autonomous Exploration, Navigation and Mapping Payload Integrated on a Quadruped Robot

Authors: Julian Y. Raheema, Michael R. Hess, Raymond C. Provost, Mark Bilinski

Abstract:

The world is rapidly moving towards advancing and utilizing artificial intelligence and autonomous robotics. The ground-breaking Boston Dynamics quadruped robot, SPOT, was designed for industrial and commercial tasks requiring limited autonomous navigation. Out of the box, SPOT has route memorization and playback – it can repeat a path that it has been manually piloted through, but it cannot autonomously navigate an area that has not been previously explored. The presented SPOT payload package is built on ROS framework to support autonomous navigation and mapping of an unexplored environment. The package is fully integrated with SPOT to take advantage of motor controls and collision avoidance that comes natively with the robot. The payload runs all computations onboard, takes advantage of visual odometry SLAM and uses an Intel RealSense depth camera and Velodyne LiDAR sensor to generate 2D and 3D maps while in autonomous navigation mode. These maps are fused into the navigation stack to generate a costmap to enable the robot to safely navigate the environment without causing damage to the surroundings or the robot. The operator defines the operational zone and start location and then sends the explore command to have SPOT explore, generate 2D and 3D maps of the environment and return to the start location to await the operator's next command. The benefit of the presented package is that it is much lighter weight and less expensive than previous approaches and, importantly, operates in GPS-denied scenarios, which is ideal for indoor mapping. There are numerous applications that are hazardous to humans for SPOT enhanced with the autonomy payload, including disaster response, nuclear inspection, mine inspection, and so on. Other less extreme uses cases include autonomous 3D and 2D scanning of facilities for inspection, engineering and construction purposes.

Keywords: autonomous, SLAM, quadruped, mapping, exploring, ROS, robotics, navigation

Procedia PDF Downloads 81
1025 Value Chain Analysis of Melon “Egusi” (Citrullus lanatus Thunb. Mansf) among Rural Farm Enterprises in South East, Nigeria

Authors: Chigozirim Onwusiribe, Jude Mbanasor

Abstract:

Egusi Melon (Citrullus Lanatus Thunb. Mansf ) is a very important oil seed that serves a major ingredient in the diet of most of the households in Nigeria. Egusi Melon is very nutritious and very important in meeting the food security needs of Nigerians. Egusi Melon is cultivated in most farm enterprise in South East Nigeria but the profitability of its value chain needs to be investigated. This study analyzed the profitability of the Egusi Melon value chain. Specifically this study developed a value chain map for Egusi Melon, analysed the profitability of each stage of the Egusi Melon Value chain and analysed the determinants of the profitability of the Egusi Melon at each stage of the value chain. Multi stage sampling technique was used to select 125 farm enterprises with similar capacity and characteristics. Questionnaire and interview were used to elicit the required data while descriptive statistics, Food and Agriculture Organization Value Chain Analysis Tool, profitability ratios and multiple regression analysis were used for the data analysis. One of the findings showed that the stages of the Egusi Melon value chain are very profitable. Based on the findings, we recommend the provision of grants by government and donor agencies to the farm enterprises through their cooperative societies, this will provide the necessary funds for the local fabrication of value addition and processing equipment to suit their unique value addition needs not met by the imported equipment.

Keywords: value, chain, melon, farm, enterprises

Procedia PDF Downloads 129
1024 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 432
1023 Modelling the Impact of Installation of Heat Cost Allocators in District Heating Systems Using Machine Learning

Authors: Danica Maljkovic, Igor Balen, Bojana Dalbelo Basic

Abstract:

Following the regulation of EU Directive on Energy Efficiency, specifically Article 9, individual metering in district heating systems has to be introduced by the end of 2016. These directions have been implemented in member state’s legal framework, Croatia is one of these states. The directive allows installation of both heat metering devices and heat cost allocators. Mainly due to bad communication and PR, the general public false image was created that the heat cost allocators are devices that save energy. Although this notion is wrong, the aim of this work is to develop a model that would precisely express the influence of installation heat cost allocators on potential energy savings in each unit within multifamily buildings. At the same time, in recent years, a science of machine learning has gain larger application in various fields, as it is proven to give good results in cases where large amounts of data are to be processed with an aim to recognize a pattern and correlation of each of the relevant parameter as well as in the cases where the problem is too complex for a human intelligence to solve. A special method of machine learning, decision tree method, has proven an accuracy of over 92% in prediction general building consumption. In this paper, a machine learning algorithms will be used to isolate the sole impact of installation of heat cost allocators on a single building in multifamily houses connected to district heating systems. Special emphasises will be given regression analysis, logistic regression, support vector machines, decision trees and random forest method.

Keywords: district heating, heat cost allocator, energy efficiency, machine learning, decision tree model, regression analysis, logistic regression, support vector machines, decision trees and random forest method

Procedia PDF Downloads 246
1022 Perception of Safety of Workers with Different Job Levels at Construction Sites

Authors: Muhammad Dawood Idrees, Arsalan Ansari

Abstract:

Construction industry is considered as one of the most dangerous industry because workers' safety is always a major concern due to extensive number of accidents, injuries, and casualties at worksites. There are various causes of accidents at construction sites, several factors are influencing on the perception of safety of workers and psychological factors are one of them. Perception of safety varies from region to region and it also varies by demographics of workers, such as gender, age, education, job level, etc. However, research on different level of workers, such as labor and managerial staff to evaluate the impact of psychological factor is limited. Objective of this research is to evaluate the effect of psychological factors with different job level of workers. An extensive literature review was conducted to find the casual relationship between psychological factors and perception of safety, and a hypothetical structure model was developed based upon literature review. A survey instrument based upon psychological factors was developed and data was obtained from several construction sites. Structure Equation Modeling (SEM) technique was adopted in order to examine the effect of psychological factors on the perception of safety of workers with different job levels of workers. The results of this analysis reveal that job security and organizational relationships are most affecting factors in labor staff, therefore job satisfaction, mental stress, and workload are dominant in managerial staff.

Keywords: accidents, job level of workers, perception of safety, structural equation modeling

Procedia PDF Downloads 155
1021 Contribution of Supply Chain Management Practices for Enhancing Healthcare Service Quality: A Quantitative Analysis in Delhi’s Healthcare Sector

Authors: Chitrangi Gupta, Arvind Bhardwaj

Abstract:

This study seeks to investigate and quantify the influence of various dimensions of supply chain management (namely, supplier relationships, compatibility, specifications and standards, delivery processes, and after-sales service) on distinct dimensions of healthcare service quality (specifically, responsiveness, trustworthiness, and security) within the operational framework of XYZ Superspeciality Hospital, situated in Delhi. The name of the Hospital is not being mentioned here because of the privacy policy of the hospital. The primary objective of this research is to elucidate the impact of supply chain management practices on the overall quality of healthcare services offered within hospital settings. Employing a quantitative research design, this study utilizes a hypothesis-testing approach to systematically discern the relationship between supply chain management dimensions and the quality of health services. The findings of this study underscore the significant influence exerted by supply chain management dimensions, specifically supplier relationships, specifications and standards, delivery processes, and after-sales service, on the enhancement of healthcare service quality. Moreover, the study's results reveal that demographic factors such as gender, qualifications, age, and experience do not yield discernible disparities in the relationship between supply chain management and healthcare service quality.

Keywords: supply chain management, healthcare, hospital operations, service delivery

Procedia PDF Downloads 64
1020 Independence of the Judiciary in South Africa: An Assessment After Twenty Years of Democracy

Authors: Serges Djoyou Kamga, Gerard Emmanuel Kamdem Kamga

Abstract:

Any serious constitutionalism entails a system of government characterised by the separation of powers between the executive, the legislature, and the judiciary. The latter is generally in charge of upholding the rule of law and the respect for human rights which are vital for the functioning of any democracy. Therefore, for the judiciary to play its role as a watchdog, it should be independent from other branches of government. The aim of this paper is to examine the independence of the judiciary in South Africa after 20 of democracy. Defining judicial independence as the courts’ ability ‘to decide cases on the basis of established law and the merits of the case, without interference from other political or governmental agents’, the paper examines the extent to which the South African judiciary is independent after twenty years of democracy. As part of assessing the independence of the judiciary, the paper begins by looking at the situation during apartheid, then proceeds with an examination of the post-apartheid legal order. It also examines the institutional independence of the judiciary by looking into its day to day activities which revolve around its self-governance, or administrative and financial independence. In addition, the paper assesses the judges’ individual independence by examining whether judicial appointment, security of tenure, judges’ remuneration and disciplinary actions and the removal of judges from office do not contain loopholes that can hinder judicial independence. Ultimately, the chapter argues that although the South African model of judicial independence is yet to be perfect, it is a good practice that can be emulated by other African countries.

Keywords: judical independence, South Africa, democracy, separation of powers

Procedia PDF Downloads 410
1019 The Impact of Artificial Intelligence on Student’s Behavior and Mind

Authors: Makarios Mosaad Thabet Ibrahim

Abstract:

the existing context paper targets to give the important position of ‘scholar voice’ and the track trainer inside the study room, which contributes to greater scholar-focused song training. The goal is to consciousness at the capabilities of the scholar voice via the tune spectrum, which has been born in the music school room, and the instructor’s methodologies and techniques used within the song classroom. The tune curriculum, the principles of pupil-centered song schooling, and the function of students and teachers as tune ambassadors have been taken into consideration the essential song parameters of scholar voice. The scholar- voice is a well worth-mentioning factor of a scholar-focused training, and all instructors have to take into account and sell its life in their lecture room. student affairs services play a critical function in contributing to the wholistic development and success of college students as they progress through their educational careers. The examine incorporates a multifaceted examination of student affairs carrier offerings among 10 personal and three public Baghdad universities. scholar affairs administrators (thirteen) have been surveyed together with over 300 students to determine university-subsidized services and pupil pride and attention. The pupil affairs service studies findings various drastically among non-public and public establishments and people that observed a country wide and international curriculum. Universities need to persist to conform to changing demographics and technological improvements to enhance students' private and academic successes, and pupil affairs services are key to preparing graduates to thrive in a diverse international world.

Keywords: college student-athletes, self-concept, use of social media training, social networking student affairs, student success, higher education, Iraq, universities, Baghdad student's voice, student-centered education, music ambassadors, music teachers

Procedia PDF Downloads 26
1018 Bullying Perpetration and Victimization in Juvenile Institutions

Authors: Nazirah Hassan, Andrew Kendrick

Abstract:

This study investigates the prevalence of perpetration behavior and victimization in juvenile correctional institutions. It investigates the dimensions of institutional environments and explores which environmental features relate to perpetration behaviors. The project focused on two hundred and eighty nine male and female young offenders aged 12 to 21 years old, in eight juvenile institutions in Malaysia. The research collected quantitative and qualitative data using a mixed-method approach. All participants completed the scale version of Direct and Indirect Prisoner behavior Checklist (DIPC-SCALED) and the Measuring the Quality of Prison life (MQPL). In addition, twenty-four interviews were carried out which involved sixteen residents and eight institutional staff. The findings showed that 95 per cent reported at least one behavior indicative of perpetration, and 99 per cent reported at least one behavior indicative of victimization in the past month. The DIPC-SCALED scored significantly higher on the verbal sub-scale. In addition, factors such as harmony, staff professionalism, security, family and wellbeing showed significant relation to the perpetration behavior. In the interviews, the residents identified circumstances, which affected their behavior within the institutions. This reflected the choices and decisions about how to confront the institutional life. These findings are discussed in terms of existing literature and their practical implications are considered.

Keywords: juvenile institutions, incarcerated offenders, perpetration, victimization

Procedia PDF Downloads 298