Search results for: maintenance of peace and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4550

Search results for: maintenance of peace and security

1100 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 409
1099 Vibroacoustic Modulation of Wideband Vibrations and its Possible Application for Windmill Blade Diagnostics

Authors: Abdullah Alnutayfat, Alexander Sutin, Dong Liu

Abstract:

Wind turbine has become one of the most popular energy productions. However, failure of blades and maintenance costs evolve into significant issues in the wind power industry, so it is essential to detect the initial blade defects to avoid the collapse of the blades and structure. This paper aims to apply modulation of high-frequency blade vibrations by low-frequency blade rotation, which is close to the known Vibro-Acoustic Modulation (VAM) method. The high-frequency wideband blade vibration is produced by the interaction of the surface blades with the environment air turbulence, and the low-frequency modulation is produced by alternating bending stress due to gravity. The low-frequency load of rotational wind turbine blades ranges between 0.2-0.4 Hz and can reach up to 2 Hz for strong wind. The main difference between this study and previous ones on VAM methods is the use of a wideband vibration signal from the blade's natural vibrations. Different features of the vibroacoustic modulation are considered using a simple model of breathing crack. This model considers the simple mechanical oscillator, where the parameters of the oscillator are varied due to low-frequency blade rotation. During the blade's operation, the internal stress caused by the weight of the blade modifies the crack's elasticity and damping. The laboratory experiment using steel samples demonstrates the possibility of VAM using a probe wideband noise signal. A cycle load with a small amplitude was used as a pump wave to damage the tested sample, and a small transducer generated a wideband probe wave. The received signal demodulation was conducted using the Detecting of Envelope Modulation on Noise (DEMON) approach. In addition, the experimental results were compared with the modulation index (MI) technique regarding the harmonic pump wave. The wideband and traditional VAM methods demonstrated similar sensitivity for earlier detection of invisible cracks. Importantly, employing a wideband probe signal with the DEMON approach speeds up and simplifies testing since it eliminates the need to conduct tests repeatedly for various harmonic probe frequencies and to adjust the probe frequency.

Keywords: vibro-acoustic modulation, detecting of envelope modulation on noise, damage, turbine blades

Procedia PDF Downloads 97
1098 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance

Authors: Kyle Phillips, Ndiko Ludidi

Abstract:

Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.

Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22

Procedia PDF Downloads 463
1097 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump

Authors: Merieleen Engtipi

Abstract:

India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.

Keywords: energy demand, energy cooperation, fossil fuels, technology transfer

Procedia PDF Downloads 250
1096 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 37
1095 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands

Authors: Francis Sichimba

Abstract:

Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.

Keywords: attachment, care, grand-parenting involvement, social economic status

Procedia PDF Downloads 719
1094 Energy Efficient Refrigerator

Authors: Jagannath Koravadi, Archith Gupta

Abstract:

In a world with constantly growing energy prices, and growing concerns about the global climate changes caused by increased energy consumption, it is becoming more and more essential to save energy wherever possible. Refrigeration systems are one of the major and bulk energy consuming systems now-a-days in industrial sectors, residential sectors and household environment. Refrigeration systems with considerable cooling requirements consume a large amount of electricity and thereby contribute greatly to the running costs. Therefore, a great deal of attention is being paid towards improvement of the performance of the refrigeration systems in this regard throughout the world. The Coefficient of Performance (COP) of a refrigeration system is used for determining the system's overall efficiency. The operating cost to the consumer and the overall environmental impact of a refrigeration system in turn depends on the COP or efficiency of the system. The COP of a refrigeration system should therefore be as high as possible. Slight modifications in the technical elements of the modern refrigeration systems have the potential to reduce the energy consumption, and improvements in simple operational practices with minimal expenses can have beneficial impact on COP of the system. Thus, the challenge is to determine the changes that can be made in a refrigeration system in order to improve its performance, reduce operating costs and power requirement, improve environmental outcomes, and achieve a higher COP. The opportunity here, and a better solution to this challenge, will be to incorporate modifications in conventional refrigeration systems for saving energy. Energy efficiency, in addition to improvement of COP, can deliver a range of savings such as reduced operation and maintenance costs, improved system reliability, improved safety, increased productivity, better matching of refrigeration load and equipment capacity, reduced resource consumption and greenhouse gas emissions, better working environment, and reduced energy costs. The present work aims at fabricating a working model of a refrigerator that will provide for effective heat recovery from superheated refrigerant with the help of an efficient de-superheater. The temperature of the refrigerant and water in the de-super heater at different intervals of time are measured to determine the quantity of waste heat recovered. It is found that the COP of the system improves by about 6% with the de-superheater and the power input to the compressor decreases by 4 % and also the refrigeration capacity increases by 4%.

Keywords: coefficiency of performance, de-superheater, refrigerant, refrigeration capacity, heat recovery

Procedia PDF Downloads 319
1093 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks

Authors: Yao-Hong Tsai

Abstract:

Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.

Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance

Procedia PDF Downloads 159
1092 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 145
1091 Canadian Business Leaders’ Phenomenological Online Education Expansion

Authors: Amna Khaliq

Abstract:

This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.

Keywords: strategic leadership, Canada, education, technology

Procedia PDF Downloads 62
1090 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 124
1089 Locus of Control and Sense of Happiness: A Mediating Role of Self-Esteem

Authors: Ivanna Shubina

Abstract:

Background/Objectives and Goals: Recent interest in positive psychology is reflected in a plenty of studies conducted on its basic constructs (e.g. self-esteem and happiness) in interrelation with personality features, social rules, business and technology development. The purpose of this study is to investigate the mediating role of self-esteem, exploring the relationships between self-esteem and happiness, self-esteem and locus of control (LOC). It hypothesizes that self-esteem may be interpreted as a predictor of happiness and mediator in the locus of control establishment. A plenty of various empirical studies results have been analyzed in order to collect data for this theoretical study, and some of the analysed results can be considered as arguable or incoherent. However, the majority of results indicate a strong relationship between three considered concepts: self-esteem, happiness, the locus of control. Methods: In particular, this study addresses the following broad research questions: i) Is self-esteem just an index of global happiness? ii) May happiness be possible or realizable without a healthy self-confidence and self-acceptance? iii) To what extent does self-esteem influence on the level of happiness? iv) Is high self-esteem a sufficient condition for happiness? v) Is self-esteem is a strong predictor of internal locus of control maintenance? vi) Is high self-esteem related to internal LOC, while low self-esteem to external LOC? In order to find the answers for listed questions, 60 reliable sources have been analyzed, results of what are discussed more detailed below. Expected Results/Conclusion/Contribution:It is recognized that the relationship between self-esteem, happiness, locus of control is complex: internal LOC is contributing to happiness, but it is not directly related to it; self-esteem is a powerful and important psychological factor in mental health and well-being; the feelings of being worthy and empowered are associated with significant achievements and high self-esteem; strong and appropriate self-esteem (when the discrepancy between “ideal” and “real” self is balanced) is correlated with more internal LOC (when the individual tends to believe that personal achievements depend on possessed features, vigor, and persistence). Despite the special attention paid to happiness, the locus of control and self-esteem, independently, theoretical and empirical equivocations within each literature foreclose many obvious predictions about the nature of their empirical distinction. In terms of theoretical framework, no model has achieved consensus as an ultimate theoretical background for any of the mentioned constructs. To be able to clarify the relationship between self-esteem, happiness, and locus of control more interdisciplinary studies have to take place in order to get data on heterogeneous samples, provided from various countries, cultures, and social groups.

Keywords: happiness, locus of control, self-esteem, mediation

Procedia PDF Downloads 243
1088 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor

Authors: Ibrahim Makram Ibrahim Salib

Abstract:

Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.

Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income

Procedia PDF Downloads 72
1087 Research on Resilience-Oriented Disintegration in System-of-System

Authors: Hang Yang, Jiahao Liu, Jichao Li, Kewei Yang, Minghao Li, Bingfeng Ge

Abstract:

The system-of-systems (SoS) are utilized to characterize networks formed by integrating individual complex systems that demonstrate interdependence and interconnectedness. Research on the disintegration issue in SoS is significant in improving network survivability, maintaining network security, and optimizing SoS architecture. Accordingly, this study proposes an integrated framework called resilience-oriented disintegration in SoS (SoSRD), for modeling and solving the issue of SoS disintegration. Firstly, a SoS disintegration index (SoSDI) is presented to evaluate the disintegration effect of SoS. This index provides a practical description of the disintegration process and is the first integration of the network disintegration model and resilience models. Subsequently, we propose a resilience-oriented disintegration method based on reinforcement learning (RDRL) to enhance the efficiency of SoS disintegration. This method is not restricted by the problem scenario as well as considering the coexistence of disintegration (node/link removal) and recovery (node/link addition) during the process of SoS disintegration. Finally, the effectiveness and superiority of the proposed SoSRD are demonstrated through a case study. We demonstrate that our proposed framework outperforms existing indexes and methods in both node and link disintegration scenarios, providing a fresh perspective on network disintegration. The findings provide crucial insights into dismantling harmful SoS and designing a more resilient SoS.

Keywords: system-of-systems, disintegration index, resilience, reinforcement learning

Procedia PDF Downloads 13
1086 Results of Three-Year Operation of 220kV Pilot Superconducting Fault Current Limiter in Moscow Power Grid

Authors: M. Moyzykh, I. Klichuk, L. Sabirov, D. Kolomentseva, E. Magommedov

Abstract:

Modern city electrical grids are forced to increase their density due to the increasing number of customers and requirements for reliability and resiliency. However, progress in this direction is often limited by the capabilities of existing network equipment. New energy sources or grid connections increase the level of short-circuit currents in the adjacent network, which can exceed the maximum rating of equipment–breaking capacity of circuit breakers, thermal and dynamic current withstand qualities of disconnectors, cables, and transformers. Superconducting fault current limiter (SFCL) is a modern solution designed to deal with the increasing fault current levels in power grids. The key feature of this device is its instant (less than 2 ms) limitation of the current level due to the nature of the superconductor. In 2019 Moscow utilities installed SuperOx SFCL in the city power grid to test the capabilities of this novel technology. The SFCL became the first SFCL in the Russian energy system and is currently the most powerful SFCL in the world. Modern SFCL uses second-generation high-temperature superconductor (2G HTS). Despite its name, HTS still requires low temperatures of liquid nitrogen for operation. As a result, Moscow SFCL is built with a cryogenic system to provide cooling to the superconductor. The cryogenic system consists of three cryostats that contain a superconductor part and are filled with liquid nitrogen (three phases), three cryocoolers, one water chiller, three cryopumps, and pressure builders. All these components are controlled by an automatic control system. SFCL has been continuously operating on the city grid for over three years. During that period of operation, numerous faults occurred, including cryocooler failure, chiller failure, pump failure, and others (like a cryogenic system power outage). All these faults were eliminated without an SFCL shut down due to the specially designed cryogenic system backups and quick responses of grid operator utilities and the SuperOx crew. The paper will describe in detail the results of SFCL operation and cryogenic system maintenance and what measures were taken to solve and prevent similar faults in the future.

Keywords: superconductivity, current limiter, SFCL, HTS, utilities, cryogenics

Procedia PDF Downloads 79
1085 Effective Validation Model and Use of Mobile-Health Apps for Elderly People

Authors: Leonardo Ramirez Lopez, Edward Guillen Pinto, Carlos Ramos Linares

Abstract:

The controversy brought about by the increasing use of mHealth apps and their effectiveness for disease prevention and diagnosis calls for immediate control. Although a critical topic in research areas such as medicine, engineering, economics, among others, this issue lacks reliable implementation models. However, projects such as Open Web Application Security Project (OWASP) and various studies have helped to create useful and reliable apps. This research is conducted under a quality model to optimize two mHealth apps for older adults. Results analysis on the use of two physical activity monitoring apps - AcTiv (physical activity) and SMCa (energy expenditure) - is positive and ideal. Through a theoretical and practical analysis, precision calculations and personal information control of older adults for disease prevention and diagnosis were performed. Finally, apps are validated by a physician and, as a result, they may be used as health monitoring tools in physical performance centers or any other physical activity. The results obtained provide an effective validation model for this type of mobile apps, which, in turn, may be applied by other software developers that along with medical staff would offer digital healthcare tools for elderly people.

Keywords: model, validation, effective, healthcare, elderly people, mobile app

Procedia PDF Downloads 217
1084 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 374
1083 Importance of Occupational Safety and Health in Dam Construction Site

Authors: Naci Büyükkaraciğan, Yildirim Akyol

Abstract:

Large plants that covering the back and accumulate water of a river valley for energy production, drinking, irrigation water supply, economic benefits that serve many purposes, such as regulation of flood protection, are called dams. Place, in which unites in order to achieve an optimum balance between manpower for Lowest cost and economic as belonging to that structure to create machines, materials and construction of the project, is called as the site. Dam construction sites are combined sites in together in many businesses. Therefore, there can be found in the many workers and machines are many accidents in this type of construction sites. The necessity of systematic and scientific studies due to various reasons arises in order to be protected from conditions that could damage the health, During the execution of the work on construction sites. Occupational health and safety of the study, called the case, also in the European Union has begun to be addressed by weight since the 1980s. In particular, issued in 1989 89/391/EEC on occupational health and safety directive, occupational health and adopted the Directive within the framework of the security field, and then exposed to a large number of individual directive within this framework on the basis of the directive. Turkey's Law No. 6331 entered into force in June 2012 on the subject. In this study, measures related to the construction site of the dam should be taken with occupational safety and health have been examined and tried to put forward recommendations on the subject.

Keywords: civil engineering, dam, occupational safety and health, site organizations

Procedia PDF Downloads 330
1082 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 462
1081 Secured Cancer Care and Cloud Services in Internet of Things /Wireless Sensor Network Based Medical Systems

Authors: Adeniyi Onasanya, Maher Elshakankiri

Abstract:

In recent years, the Internet of Things (IoT) has constituted a driving force of modern technological advancement, and it has become increasingly common as its impacts are seen in a variety of application domains, including healthcare. IoT is characterized by the interconnectivity of smart sensors, objects, devices, data, and applications. With the unprecedented use of IoT in industrial, commercial and domestic, it becomes very imperative to harness the benefits and functionalities associated with the IoT technology in (re)assessing the provision and positioning of healthcare to ensure efficient and improved healthcare delivery. In this research, we are focusing on two important services in healthcare systems, which are cancer care services and business analytics/cloud services. These services incorporate the implementation of an IoT that provides solution and framework for analyzing health data gathered from IoT through various sensor networks and other smart devices in order to improve healthcare delivery and to help health care providers in their decision-making process for enhanced and efficient cancer treatment. In addition, we discuss the wireless sensor network (WSN), WSN routing and data transmission in the healthcare environment. Finally, some operational challenges and security issues with IoT-based healthcare system are discussed.

Keywords: IoT, smart health care system, business analytics, (wireless) sensor network, cancer care services, cloud services

Procedia PDF Downloads 177
1080 Cultural Landscape Planning – A Case of Chettinad Village Clusters

Authors: Adhithy Menon E., Biju C. A.

Abstract:

In the 1960s, the concept of preserving heritage monuments was first introduced. During the 1990s, the concept of cultural landscapes gained importance, highlighting the importance of culture and heritage. Throughout this paper, we examine the second category of the cultural landscape, which is an organically evolving landscape as it represents a web of tangible, intangible, and ecological heritage and the ways in which they can be rejuvenated. Cultural landscapes in various regions, such as the Chettinad Village clusters, are in serious decline, which is identified through the Heritage Passport program of this area (2007). For this reason, it is necessary to conduct a detailed analysis of the factors that contribute to this degradation to ensure its protection in the future. An analysis of the cultural landscape of the Chettinad Village clusters and its impact on the community is presented in this paper. The paper follows the first objective, which is to understand cultural landscapes and their different criteria and categories. It is preceded by the study of various methods for protecting cultural landscapes. To identify a core area of intervention based on the parameters of Cultural Landscapes and Community Based Tourism, a study and analysis of the regional context of Chettinad village clusters considering tourism development must first be conducted. Lastly, planning interventions for integrating community-based tourism in Chettinad villages for the purpose of rejuvenating the cultural landscapes of the villages as well as their communities. The major findings include the importance of the local community in protecting cultural landscapes. The parameters identified to have an impact on Chettinad Village clusters are a community (community well-being, local maintenance, and enhancement, demand, alternative income for community, public participation, awareness), tourism (location and physical access, journey time, tourist attractions), integrity (natural factors, natural disasters, demolition of structures, deterioration of materials) authenticity (sense of place, living elements, building techniques, artistic expression, religious context) disaster management (natural disasters) and environmental impact (pollution). This area can be restored to its former glory and preserved as part of the cultural landscape for future generations by focusing on and addressing these parameters within the identified core area of the Chettinad Villages cluster (Kanadukathan TP, Kothamangalam, Kottaiyur, Athangudi, Karikudi, and Palathur).

Keywords: Chettinad village clusters, community, cultural landscapes, organically evolved.

Procedia PDF Downloads 81
1079 Electronic Health Record System: A Perspective to Improve the Value of Services Rendered to Patients in Healthcare Organization in Rwanda, Case of CHUB and Hopital De Nemba

Authors: Mugabe Nzarama Gabriel

Abstract:

In Rwanda, many healthcare organizations are still using a paper based patients’ data record system although it still present weaknesses to share health patients’ information across different services when necessary. In developed countries, the EHR has been put in place to revolutionize the paper based record system but still the EHR has some challenges related to privacy, security, or interoperability. The purpose of this research was to assess the existing patients’ data record system in healthcare sector in Rwanda, see what an EHR can improve to the system in place and assess the acceptance of EHR as system which is interoperable, very secure and interoperable and see whether stakeholders are ready to adopt the system. The case based methodology was used and TAM theoretical framework to design the questionnaire for the survey. A judgmental sample across two cases, CHUB and Hopital de Nemba, has been selected and SPSS has been used for descriptive statistics. After a qualitative analysis, the findings showed that the paper based record is useful, gives complete information about the patient, protects the privacy of patients but it is still less secure and less interoperable. The respondents shown that they are ready to use the proposed EHR System and want it secure, capable of enforcing the privacy but still they are not all ready for the interoperability. A conclusion has been formulated; recommendations and further research have been proposed.

Keywords: EHR system, healthcare service, TAM, privacy, interoperability

Procedia PDF Downloads 266
1078 Evaluation of Commercial Back-analysis Package in Condition Assessment of Railways

Authors: Shadi Fathi, Moura Mehravar, Mujib Rahman

Abstract:

Over the years,increased demands on railways, the emergence of high-speed trains and heavy axle loads, ageing, and deterioration of the existing tracks, is imposing costly maintenance actions on the railway sector. The need for developing a fast andcost-efficient non-destructive assessment method for the structural evaluation of railway tracksis therefore critically important. The layer modulus is the main parameter used in the structural design and evaluation of the railway track substructure (foundation). Among many recently developed NDTs, Falling Weight Deflectometer (FWD) test, widely used in pavement evaluation, has shown promising results for railway track substructure monitoring. The surface deflection data collected by FWD are used to estimate the modulus of substructure layers through the back-analysis technique. Although there are different commerciallyavailableback-analysis programs are used for pavement applications, there are onlya limited number of research-based techniques have been so far developed for railway track evaluation. In this paper, the suitability, accuracy, and reliability of the BAKFAAsoftware are investigated. The main rationale for selecting BAKFAA as it has a relatively straightforward user interfacethat is freely available and widely used in highway and airport pavement evaluation. As part of the study, a finite element (FE) model of a railway track section near Leominsterstation, Herefordshire, UK subjected to the FWD test, was developed and validated against available field data. Then, a virtual experimental database (including 218 sets of FWD testing data) was generated using theFE model and employed as the measured database for the BAKFAA software. This database was generated considering various layers’ moduli for each layer of track substructure over a predefined range. The BAKFAA predictions were compared against the cone penetration test (CPT) data (available from literature; conducted near to Leominster station same section as the FWD was performed). The results reveal that BAKFAA overestimatesthe layers’ moduli of each substructure layer. To adjust the BAKFA with the CPT data, this study introduces a correlation model to make the BAKFAA applicable in railway applications.

Keywords: back-analysis, bakfaa, railway track substructure, falling weight deflectometer (FWD), cone penetration test (CPT)

Procedia PDF Downloads 128
1077 Managing Crowds at Sports Mega Events: Examining the Impact of ‘Fan Parks’ at International Football Tournaments between 2002 and 2016

Authors: Joel Rookwood

Abstract:

Sports mega events have become increasingly significant in sporting, political and economic terms, with analysis often focusing on issues including resource expenditure, development, legacy and sustainability. Transnational tournaments can inspire interest from a variety of demographics, and the operational management of such events can involve contributions from a range of personnel. In addition to television audiences events also attract attending spectators, and in football contexts the temporary migration of fans from potentially rival nations and teams can present event organising committees and security personnel with various challenges in relation to crowd management. The behaviour, interaction and control of supporters has previously led to incidents of disorder and hooliganism, with damage to property as well as injuries and deaths proving significant consequences. The Heysel tragedy at the 1985 European Cup final in Brussels is a notable example, where 39 fans died following crowd disorder and mismanagement. Football disasters and disorder, particularly in the context of international competition, have inspired responses from police, law makers, event organisers, clubs and associations, including stadium improvements, legislative developments and crowd management practice to improve the effectiveness of spectator safety. The growth and internationalisation of fandom and developments in event management and tourism have seen various responses to the evolving challenges associated with hosting large numbers of visiting spectators at mega events. In football contexts ‘fan parks’ are a notable example. Since the first widespread introduction in European football competitions at the 2006 World Cup finals in Germany, these facilities have become a staple element of such mega events. This qualitative, longitudinal, multi-continent research draws on extensive semi-structured interview and observation data. As a frame of reference, this work considers football events staged before and after the development of fan parks. Research was undertaken at four World Cup finals (Japan 2002, Germany 2006, South Africa 2010 and Brazil 2014), four European Championships (Portugal 2004, Switzerland/Austria 2008, Poland/Ukraine 2012 and France 2016), four other confederation tournaments (Ghana 2008, Qatar 2011, USA 2011 and Chile 2015), and four European club finals (Istanbul 2005, Athens 2007, Rome 2009 and Basle 2016). This work found that these parks are typically temporarily erected, specifically located zones where supporters congregate together irrespective of allegiances to watch matches on large screens, and partake in other forms of organised on-site entertainment. Such facilities can also allow organisers to control the behaviour, confine the movement and monitor the alcohol consumption of supporters. This represents a notable shift in policy from previous football tournaments, when the widely assumed causal link between alcohol and hooliganism which frequently shaped legislative and police responses to disorder, also dissuaded some authorities from permitting fans to consume alcohol in and around stadia. It also reflects changing attitudes towards modern football fans. The work also found that in certain contexts supporters have increasingly engaged with such provision which impacts fan behaviour, but that this is relative to factors including location, facilities, management and security.

Keywords: event, facility, fan, management, park

Procedia PDF Downloads 311
1076 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 157
1075 Solar Photovoltaic Foundation Design

Authors: Daniel John Avutia

Abstract:

Solar Photovoltaic (PV) development is reliant on the sunlight hours available in a particular region to generate electricity. A potential area is assessed through its inherent solar radiation intensity measured in watts per square meter. Solar energy development involves the feasibility, design, construction, operation and maintenance of the relevant infrastructure, but this paper will focus on the design and construction aspects. Africa and Australasia have the longest sunlight hours per day and the highest solar radiation per square meter, 7 sunlight hours/day and 5 kWh/day respectively. Solar PV support configurations consist of fixed-tilt support and tracker system structures, the differentiation being that the latter was introduced to improve the power generation efficiency of the former due to the sun tracking movement capabilities. The installation of Solar PV foundations involves rammed piles, drilling/grout piles and shallow raft reinforced concrete structures. This paper presents a case study of 2 solar PV projects in Africa and Australia, discussing the foundation design consideration and associated construction cost implications of the selected foundations systems. Solar PV foundations represent up to one fifth of the civil works costs in a project. Therefore, the selection of the most structurally sound and feasible foundation for the prevailing ground conditions is critical towards solar PV development. The design wind speed measured by anemometers govern the pile embedment depth for rammed and drill/grout foundation systems. The lateral pile deflection and vertical pull out resistance of piles increase proportionally with the embedment depth for uniform pile geometry and geology. The pile driving rate may also be used to anticipate the lateral resistance and skin friction restraining the pile. Rammed pile foundations are the most structurally suitable due to the pile skin friction and ease of installation in various geological conditions. The competitiveness of solar PV projects within the renewable energy mix is governed by lowering capital expenditure, improving power generation efficiency and power storage technological advances. The power generation reliability and efficiency are areas for further research within the renewable energy niche.

Keywords: design, foundations, piles, solar

Procedia PDF Downloads 189
1074 Standardization of Solar Water Pumping System for Remote Areas in Indonesia

Authors: Danar Agus Susanto, Hermawan Febriansyah, Meilinda Ayundyahrini

Abstract:

The availability of spring water to meet people demand is often a problem, especially in tropical areas with very limited surface water sources, or very deep underground water. Although the technology and equipment of pumping system are available and easy to obtain, but in remote areas, the availability of pumping system is difficult, due to the unavailability of fuel or the lack of electricity. Solar Water Pumping System (SWPS) became one of the alternatives that can overcome these obstacles. In the tropical country, sunlight can be obtained throughout the year, even in remote areas. SWPS were already widely built in Indonesia, but many encounter problems during operations, such as decreased of efficiency; pump damaged, damaged of controllers or inverters, and inappropriate photovoltaic performance. In 2011, International Electrotechnical Commission (IEC) issued the IEC standard 62253:2011 titled Photovoltaic pumping systems - Design qualification and performance measurements. This standard establishes design qualifications and performance measurements related to the product of a solar water pumping system. National Standardization Agency of Indonesia (BSN) as the national standardization body in Indonesia, has not set the standard related to solar water pumping system. This research to study operational procedures of SWPS by adopting of IEC Standard 62253:2011 to be Indonesia Standard (SNI). This research used literature study and field observation for installed SWPS in Indonesia. Based on the results of research on SWPS already installed in Indonesia, IEC 62253: 2011 standard can improve efficiency and reduce operational failure of SWPS. SWPS installed in Indonesia still has GAP of 51% against parameters in IEC standard 62253: 2011. The biggest factor not being met is related to operating and maintenance handbooks for personnel that included operation and repair procedures. This may result in operator ignorance in installing, operating and maintaining the system. The Photovoltaic (PV) was also the most non-compliance factor of 71%, although there are 22 Indonesia Standard (SNI) for PV (modules, installation, testing, and construction). These research samples (installers, manufacturers/distributors, and experts) agreed on the parameter in the IEC standard 62253: 2011 able to improve the quality of SWPS in Indonesia. Recommendations of this study, that is required the adoption of IEC standard 62253:2011 into SNI to support the development of SWPS for remote areas in Indonesia.

Keywords: efficiency, inappropriate installation, remote areas, solar water pumping system, standard

Procedia PDF Downloads 197
1073 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 116
1072 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 44
1071 Performance Evaluation of On-Site Sewage Treatment System (Johkasou)

Authors: Aashutosh Garg, Ankur Rajpal, A. A. Kazmi

Abstract:

The efficiency of an on-site wastewater treatment system named Johkasou was evaluated based on its pollutant removal efficiency over 10 months. This system was installed at IIT Roorkee and had a capacity of treating 7 m3/d of sewage water, sufficient for a group of 30-50 people. This system was fed with actual wastewater through an equalization tank to eliminate the fluctuations throughout the day. Methanol and ammonium chloride was added into this equalization tank to increase the Chemical Oxygen Demand (COD) and ammonia content of the influent. The outlet from Johkasou is sent to a tertiary unit consisting of a Pressure Sand Filter and an Activated Carbon Filter for further treatment. Samples were collected on alternate days from Monday to Friday and the following parameters were evaluated: Chemical Oxygen Demand (COD), Biochemical Oxygen Demand (BOD), Total Suspended Solids (TSS), and Total Nitrogen (TN). The Average removal efficiency for Chemical Oxygen Demand (COD), Biochemical Oxygen Demand (BOD), Total Suspended Solids (TSS), and Total Nitrogen (TN) was observed as 89.6, 97.7, 96, and 80% respectively. The cost of treating the wastewater comes out to be Rs 23/m3 which includes electricity, cleaning and maintenance, chemical, and desludging costs. Tests for the coliforms were also performed and it was observed that the removal efficiency for total and fecal coliforms was 100%. The sludge generation rate is approximately 20% of the BOD removal and it needed to be removed twice a year. It also showed a very good response against the hydraulic shock load. We performed vacation stress analysis on the system to evaluate the performance of the system when there is no influent for 8 consecutive days. From the result of stress analysis, we concluded that system needs a recovery time of about 48 hours to stabilize. After about 2 days, the system returns again to original conditions and all the parameters in the effluent become within the limits of National Green Tribunal (NGT) standards. We also performed another stress analysis to save the electricity in which we turned the main aeration blower off for 2 to 12 hrs a day and the results showed that we can turn the blower off for about 4-6 hrs a day and this will help in reducing the electricity costs by about 25%. It was concluded that the Johkasou system can remove a sufficient amount of all the physiochemical parameters tested to satisfy the prescribed limit set as per Indian Standard.

Keywords: on-site treatment, domestic wastewater, Johkasou, nutrient removal, pathogens removal

Procedia PDF Downloads 112