Search results for: cross-border insolvency provisions in the 2016 code
2827 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms
Procedia PDF Downloads 912826 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade
Authors: Drutika Upadhyay
Abstract:
Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape
Procedia PDF Downloads 1302825 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code
Authors: Deborah Garcia-Magna
Abstract:
The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting
Procedia PDF Downloads 1942824 The Causes and Effects of Housing Project Abandonment in Malaysia
Authors: Abdul Aziz Abdullah, Anuar Alias, Khor Hooi Ting, Guan Ngah Mei
Abstract:
One of the major sectors which contribute significant growth to socio-economic development is the construction and development industry. This industry is most badly hurt during the 1997 and 2008 economic crisis thus causing many government and private projects to be deferred and abandoned. The purpose of this study is to examine the causes and effects of housing project abandonment in Malaysia. This objective is achieved through rigorous review of literatures and documents related to housing and abandoned housing project. The finding revealed there are several causes of housing project abandonment. The significant causes are: economic recession, inadequacy of finance, poor marketing and sales strategies, technical problems faced during construction, problems caused by compensations demanded by squatters for resettlement, insolvency of contractor, cost overrun and currency fluctuation amongst others. However the alarming effect of housing project is: house buyers of abandoned project have the monthly payment although the house is delivered to house buy. In other case house buyers have to entangle in many legal action with the financial institution. This finding provides the various ministries in the Government some insights on real causes and effects of abandoned project. Perhaps this finding can enhance the current solution the Ministry of Housing Local Government on addressing the prevailing issue of reviving existing abandoned project in the country.Keywords: abandoned project, abandonment, housing project, ministry of housing and local government, causes and effect
Procedia PDF Downloads 5402823 Electrochemotherapy of Portal Vein Tumor Thrombus as Dowstaging to Liver Transplantation
Authors: Luciano Tarantino, Emanuele Balzano, Paolo Tarantino, Riccardo Aurelio Nasto, Aurelio Nasto
Abstract:
Liver transplantation (OLT) is contraindicate in Portal Vein tumor Thrombosis (PVTT) from Hepatocellular Carcinoma at hepatic hilum(pH-HCC) Surgery,Thermal ablation and chemotherapy show poorer outcomes Electrochemotherapy (ECT) has been successfully used in patients with pH-HCC with PVTT. We report the results of ECT as downstaging aimed to definitive cure by OLT. F.P. 53 years HBV related Cirrhosis Child-Pugh B7 class; EGDS F2 aesophageal Varices. Diabetes. April 2016 : Enhanced Computed Tomography (CT) detected HCC(n.3 nodules in VII-VIII-VI;diameter range=25 cm) and PVTT of right portal vein. The patient was considered ineligible for OLT. May 2016: first ablation session with percutaneous Radiofrequency-ablation(RFA) of 3 HCC-nodules . August 2016: second ablation session with ECT of PVTT. CT october 2016: disappearance of PVTT and patent right portal vein. No intraparenchymal recurrence. CT march 2017: No recurrence in portal vein and in the left lobe. local recurrence in the VII-VIII segments. May 2017 : transarterial chemoembolization (TACE) of right lobe recurrences. CT October 2017: patent right portal vein. No recurrence. The patient was reconsidered for OLT. He underwent OLT in April 2018. At 36-months follow-up , no intrahepatic recurrence of HCC occurred. March 2021: enhanced CT and PET/CT detected a single small nodule (1.5 cm) uptaking tracer in the left upper pulmonary lobe, no hepatic recurrence . CT-guided FNB showed metastasis from HCC . June 2021: left lung upper lobectomy . At the current time the patient is alive and recurrence-free at 64 months follow-up. ECT Could be aneffective technique as pre-OLT dowstaging in HCC with PVTT.Keywords: liver tumor ablation, interventional ultrasound, electrochemotherapy, liver transplantation
Procedia PDF Downloads 1182822 Design and Development of Automatic Onion Harvester
Authors: P. Revathi, T. Mrunalini, K. Padma Priya, P. Ramya, R. Saranya
Abstract:
During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the 5 gestures will be detected when shown with their hands via a webcam which is placed for gesture detection. A personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.Keywords: onion harvesting, automatic pluging, camera, raspberry pi
Procedia PDF Downloads 1982821 The Effect of Corporate Governance on Financial Stability and Solvency Margin for Insurance Companies in Jordan
Authors: Ghadeer A.Al-Jabaree, Husam Aldeen Al-Khadash, M. Nassar
Abstract:
This study aimed at investigating the effect of well-designed corporate governance system on the financial stability of insurance companies listed in ASE. Further, this study provides a comprehensive model for evaluating and analyzing insurance companies' financial position and prospective for comparing the degree of corporate governance application provisions among Jordanian insurance companies. In order to achieve the goals of the study, a whole population that consist of (27) listed insurance companies was introduced through the variables of (board of director, audit committee, internal and external auditor, board and management ownership and block holder's identities). Statistical methods were used with alternative techniques by (SPSS); where descriptive statistical techniques such as means, standard deviations were used to describe the variables, while (F) test and ANOVA analysis of variance were used to test the hypotheses of the study. The study revealed the existence of significant effect of corporate governance variables except local companies that are not listed in ASE on financial stability within control variables especially debt ratio (leverage),where it's also showed that concentration in motor third party doesn't have significant effect on insurance companies' financial stability during study period. Moreover, the study concludes that Global financial crisis affect the investment side of insurance companies with insignificant effect on the technical side. Finally, some recommendations were presented such as enhancing the laws and regulation that help the appropriate application of corporate governance, and work on activating the transparency in the disclosures of the financial statements and focusing on supporting the technical provisions for the companies, rather than focusing only on profit side.Keywords: corporate governance, financial stability and solvency margin, insurance companies, Jordan
Procedia PDF Downloads 4892820 AI Ethical Values as Dependent on the Role and Perspective of the Ethical AI Code Founder- A Mapping Review
Authors: Moshe Davidian, Shlomo Mark, Yotam Lurie
Abstract:
With the rapid development of technology and the concomitant growth in the capability of Artificial Intelligence (AI) systems and their power, the ethical challenges involved in these systems are also evolving and increasing. In recent years, various organizations, including governments, international institutions, professional societies, civic organizations, and commercial companies, have been choosing to address these various challenges by publishing ethical codes for AI systems. However, despite the apparent agreement that AI should be “ethical,” there is debate about the definition of “ethical artificial intelligence.” This study investigates the various AI ethical codes and their key ethical values. From the vast collection of codes that exist, it analyzes and compares 25 ethical codes that were found to be representative of different types of organizations. In addition, as part of its literature review, the study overviews data collected in three recent reviews of AI codes. The results of the analyses demonstrate a convergence around seven key ethical values. However, the key finding is that the different AI ethical codes eventually reflect the type of organization that designed the code; i.e., the organizations’ role as regulator, user, or developer affects the view of what ethical AI is. The results show a relationship between the organization’s role and the dominant values in its code. The main contribution of this study is the development of a list of the key values for all AI systems and specific values that need to impact the development and design of AI systems, but also allowing for differences according to the organization for which the system is being developed. This will allow an analysis of AI values in relation to stakeholders.Keywords: artificial intelligence, ethical codes, principles, values
Procedia PDF Downloads 1072819 Automatic Fluid-Structure Interaction Modeling and Analysis of Butterfly Valve Using Python Script
Authors: N. Guru Prasath, Sangjin Ma, Chang-Wan Kim
Abstract:
A butterfly valve is a quarter turn valve which is used to control the flow of a fluid through a section of pipe. Generally, butterfly valve is used in wide range of applications such as water distribution, sewage, oil and gas plants. In particular, butterfly valve with larger diameter finds its immense applications in hydro power plants to control the fluid flow. In-lieu with the constraints in cost and size to run laboratory setup, analysis of large diameter values will be mostly studied by computational method which is the best and inexpensive solution. For fluid and structural analysis, CFD and FEM software is used to perform large scale valve analyses, respectively. In order to perform above analysis in butterfly valve, the CAD model has to recreate and perform mesh in conventional software’s for various dimensions of valve. Therefore, its limitation is time consuming process. In-order to overcome that issue, python code was created to outcome complete pre-processing setup automatically in Salome software. Applying dimensions of the model clearly in the python code makes the running time comparatively lower and easier way to perform analysis of the valve. Hence, in this paper, an attempt was made to study the fluid-structure interaction (FSI) of butterfly valves by varying the valve angles and dimensions using python code in pre-processing software, and results are produced.Keywords: butterfly valve, flow coefficient, automatic CFD analysis, FSI analysis
Procedia PDF Downloads 2412818 City Image of Rio De Janeiro as the Host City of 2016 Olympic Games
Authors: Luciana Brandao Ferreira, Janaina de Moura Engracia Giraldi, Fabiana Gondim Mariutti, Marina Toledo de Arruda Lourencao
Abstract:
Developing countries, such as BRICS (Brazil, Russia, India, China and South Africa) are hosting sports mega-events to promote socio-economic development and image enhancement. Thus, this paper aims to verify the image of Rio de Janeiro, in Brazil, as the host city of 2016 Olympic Games, considering the main cognitive and affective image dimensions. The research design uses exploratory factorial analysis to find the most important factors highlighted in the city image dimensions. The data were collected by structured questionnaires with an international respondents sample (n=274) with high international travel experience. The results show that Rio’s image as a sport mega-event host city has two main factors in each dimension: Cognitive ('General Infrastructure'; 'Services and Attractions') and Affective ('Positive Feelings'; 'Negative Feelings'). The most important factor related to cognitive dimension was 'Services and Attractions' which is more related to tourism activities. In the affective dimension 'Positive Feelings' was the most important factor, which means a good result considering that is a city in an emerging country with many unmet social demands.Keywords: Rio de Janeiro, 2016 olympic games, host city image, cognitive image dimension, affective image dimension
Procedia PDF Downloads 1472817 Assessment of Adequacy of Pile Load Determination Formulas
Authors: Ashraf Eid
Abstract:
Many formulas are set to estimate the pile load capacity based on the in-situ pile load tests. However, discrepancy is obvious between the results of these applications. Some formulas are more adequate than others with respect to soil formation and its characteristics. In this research, attempts were undertaken to evaluate the adequacy of the most well-known formulas based on a series of pile load tests carried out in Port Said city in the northeast of Egypt for major residential projects. Comparisons were undertaken between the different formulas supported by the results of in-situ Cone Penetration Tests (CPT). Based on this study, a guide for engineers for using the proper formula can be adopted with consideration of soil type and characteristics. The Egyptian Code which relies on the results of some formulas is involved in the study as a guiding aspect in the pile design.Keywords: pile load formula, load test of piles, CPT, Egyptian code
Procedia PDF Downloads 1522816 Detecting Logical Errors in Haskell
Authors: Vanessa Vasconcelos, Mariza A. S. Bigonha
Abstract:
In order to facilitate both processes, this paper presents HaskellFL, a tool that uses fault localization techniques to locate a logical error in Haskell code. The Haskell subset used in this work is sufficiently expressive for those studying functional programming to get immediate help debugging their code and to answer questions about key concepts associated with the functional paradigm. HaskellFL was tested against functional programming assignments submitted by students enrolled at the functional programming class at the Federal University of Minas Gerais and against exercises from the Exercism Haskell track that are publicly available on GitHub. Furthermore, the EXAM score was chosen to evaluate the tool’s effectiveness, and results showed that HaskellFL reduced the effort needed to locate an error for all tested scenarios. Results also showed that the Ochiai method was more effective than Tarantula.Keywords: debug, fault localization, functional programming, Haskell
Procedia PDF Downloads 2982815 Radiative Reactions Analysis at the Range of Astrophysical Energies
Authors: A. Amar
Abstract:
Analysis of the elastic scattering of protons on 10B nuclei has been done in the framework of the optical model and single folding model at the beam energies up to 17 MeV. We could enhance the optical potential parameters using Esis88 Code, as well as SPI GENOA Code. Linear relationship between volume real potential (V0) and proton energy (Ep) has been obtained. Also, surface imaginary potential WD is proportional to the proton energy (Ep) in the range 0.400 and 17 MeV. The radiative reaction 10B(p,γ)11C has been analyzed using potential model. A comparison between 10B(p,γ)11C and 6Li(p,γ)7Be has been made. Good agreement has been found between theoretical and experimental results in the whole range of energy. The radiative resonance reaction 7Li(p,γ)8Be has been studied.Keywords: elastic scattering of protons on 10B nuclei, optical potential parameters, potential model, radiative reaction
Procedia PDF Downloads 2112814 Crash Statistics Comparison for Riyadh, Eastern Province, and Qaseem for 2016 and 2017
Authors: Hassan M. Al-Ahmadi
Abstract:
The fatality index (deaths/100 K population) due to road traffic accidents in the Kingdom of Saudi Arabia (KSA) is over 25, according to the World Health Organization Statistics (WHO) statistics, which is much higher than in the neighboring Arab regions. The KSA has implemented measures to mitigate traffic accidents by enforcing road safety regulations. As a result, there has been a slight decline in the frequency of road traffic accidents within the Kingdom. This study was based on the variations in the accidents for three provinces of KSA, i.e., Riyadh, Eastern Province (EP), & Qaseem, for 2016 and 2017 using ANOVA method. Data appropriateness for the ANOVA method was confirmed by the normality and the randomness of residuals. Additionally, the half-normal plot was used to identify the significant terms for the ANOVA analysis. The analysis revealed that the accidents in the EP were significantly higher than in the other two provinces during the analysis period. The monthly variation showed a spike in the accidents from month 7th to 9th month in the EP region and a slight drop in the accidents in the Qaseem and the Riyadh region during the same period, which was attributed to the increased leisure travels from the other regions to the EP. Furthermore, most of the accidents were found to occur in the age group of 18+ and 30+, and also the major reduction of accidents in 2017 as compared to 2016 was found to have occurred in the same group. These findings can be beneficial for developing strategies to further reduce the number of accidents.Keywords: fatality index, emergency, road traffic accident, safety, leisure travels
Procedia PDF Downloads 342813 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 1982812 Biogas Control: Methane Production Monitoring Using Arduino
Authors: W. Ait Ahmed, M. Aggour, M. Naciri
Abstract:
Extracting energy from biomass is an important alternative to produce different types of energy (heat, electricity, or both) assuring low pollution and better efficiency. It is a new yet reliable approach to reduce green gas emission by extracting methane from industry effluents and use it to power machinery. We focused in our project on using paper and mill effluents, treated in a UASB reactor. The methane produced is used in the factory’s power supply. The aim of this work is to develop an electronic system using Arduino platform connected to a gas sensor, to measure and display the curve of daily methane production on processing. The sensor will send the gas values in ppm to the Arduino board so that the later sends the RS232 hardware protocol. The code developed with processing will transform the values into a curve and display it on the computer screen.Keywords: biogas, Arduino, processing, code, methane, gas sensor, program
Procedia PDF Downloads 3222811 Data-Driven Approach to Predict Inpatient's Estimated Discharge Date
Authors: Ayliana Dharmawan, Heng Yong Sheng, Zhang Xiaojin, Tan Thai Lian
Abstract:
To facilitate discharge planning, doctors are presently required to assign an Estimated Discharge Date (EDD) for each patient admitted to the hospital. This assignment of the EDD is largely based on the doctor’s judgment. This can be difficult for cases which are complex or relatively new to the doctor. It is hypothesized that a data-driven approach would be able to facilitate the doctors to make accurate estimations of the discharge date. Making use of routinely collected data on inpatient discharges between January 2013 and May 2016, a predictive model was developed using machine learning techniques to predict the Length of Stay (and hence the EDD) of inpatients, at the point of admission. The predictive performance of the model was compared to that of the clinicians using accuracy measures. Overall, the best performing model was found to be able to predict EDD with an accuracy improvement in Average Squared Error (ASE) by -38% as compared to the first EDD determined by the present method. It was found that important predictors of the EDD include the provisional diagnosis code, patient’s age, attending doctor at admission, medical specialty at admission, accommodation type, and the mean length of stay of the patient in the past year. The predictive model can be used as a tool to accurately predict the EDD.Keywords: inpatient, estimated discharge date, EDD, prediction, data-driven
Procedia PDF Downloads 1742810 Large-Scale Simulations of Turbulence Using Discontinuous Spectral Element Method
Authors: A. Peyvan, D. Li, J. Komperda, F. Mashayek
Abstract:
Turbulence can be observed in a variety fluid motions in nature and industrial applications. Recent investment in high-speed aircraft and propulsion systems has revitalized fundamental research on turbulent flows. In these systems, capturing chaotic fluid structures with different length and time scales is accomplished through the Direct Numerical Simulation (DNS) approach since it accurately simulates flows down to smallest dissipative scales, i.e., Kolmogorov’s scales. The discontinuous spectral element method (DSEM) is a high-order technique that uses spectral functions for approximating the solution. The DSEM code has been developed by our research group over the course of more than two decades. Recently, the code has been improved to run large cases in the order of billions of solution points. Running big simulations requires a considerable amount of RAM. Therefore, the DSEM code must be highly parallelized and able to start on multiple computational nodes on an HPC cluster with distributed memory. However, some pre-processing procedures, such as determining global element information, creating a global face list, and assigning global partitioning and element connection information of the domain for communication, must be done sequentially with a single processing core. A separate code has been written to perform the pre-processing procedures on a local machine. It stores the minimum amount of information that is required for the DSEM code to start in parallel, extracted from the mesh file, into text files (pre-files). It packs integer type information with a Stream Binary format in pre-files that are portable between machines. The files are generated to ensure fast read performance on different file-systems, such as Lustre and General Parallel File System (GPFS). A new subroutine has been added to the DSEM code to read the startup files using parallel MPI I/O, for Lustre, in a way that each MPI rank acquires its information from the file in parallel. In case of GPFS, in each computational node, a single MPI rank reads data from the file, which is specifically generated for the computational node, and send them to other ranks on the node using point to point non-blocking MPI communication. This way, communication takes place locally on each node and signals do not cross the switches of the cluster. The read subroutine has been tested on Argonne National Laboratory’s Mira (GPFS), National Center for Supercomputing Application’s Blue Waters (Lustre), San Diego Supercomputer Center’s Comet (Lustre), and UIC’s Extreme (Lustre). The tests showed that one file per node is suited for GPFS and parallel MPI I/O is the best choice for Lustre file system. The DSEM code relies on heavily optimized linear algebra operation such as matrix-matrix and matrix-vector products for calculation of the solution in every time-step. For this, the code can either make use of its matrix math library, BLAS, Intel MKL, or ATLAS. This fact and the discontinuous nature of the method makes the DSEM code run efficiently in parallel. The results of weak scaling tests performed on Blue Waters showed a scalable and efficient performance of the code in parallel computing.Keywords: computational fluid dynamics, direct numerical simulation, spectral element, turbulent flow
Procedia PDF Downloads 1332809 Electricity Market Reforms Towards Clean Energy Transition andnd Their Impact in India
Authors: Tarun Kumar Dalakoti, Debajyoti Majumder, Aditya Prasad Das, Samir Chandra Saxena
Abstract:
India’s ambitious target to achieve a 50 percent share of energy from non-fossil fuels and the 500-gigawatt (GW) renewable energy capacity before the deadline of 2030, coupled with the global pursuit of sustainable development, will compel the nation to embark on a rapid clean energy transition. As a result, electricity market reforms will emerge as critical policy instruments to facilitate this transition and achieve ambitious environmental targets. This paper will present a comprehensive analysis of the various electricity market reforms to be introduced in the Indian Electricity sector to facilitate the integration of clean energy sources and will assess their impact on the overall energy landscape. The first section of this paper will delve into the policy mechanisms to be introduced by the Government of India and the Central Electricity Regulatory Commission to promote clean energy deployment. These mechanisms include extensive provisions for the integration of renewables in the Indian Electricity Grid Code, 2023. The section will also cover the projection of RE Generation as highlighted in the National Electricity Plan, 2023. It will discuss the introduction of Green Energy Market segments, the waiver of Inter-State Transmission System (ISTS) charges for inter-state sale of solar and wind power, the notification of Promoting Renewable Energy through Green Energy Open Access Rules, and the bundling of conventional generating stations with renewable energy sources. The second section will evaluate the tangible impact of these electricity market reforms. By drawing on empirical studies and real-world case examples, the paper will assess the penetration rate of renewable energy sources in India’s electricity markets, the decline of conventional fuel-based generation, and the consequent reduction in carbon emissions. Furthermore, it will explore the influence of these reforms on electricity prices, the impact on various market segments due to the introduction of green contracts, and grid stability. The paper will also discuss the operational challenges to be faced due to the surge of RE Generation sources as a result of the implementation of the above-mentioned electricity market reforms, including grid integration issues, intermittency concerns with renewable energy sources, and the need for increasing grid resilience for future high RE in generation mix scenarios. In conclusion, this paper will emphasize that electricity market reforms will be pivotal in accelerating the global transition towards clean energy systems. It will underscore the importance of a holistic approach that combines effective policy design, robust regulatory frameworks, and active participation from market actors. Through a comprehensive examination of the impact of these reforms, the paper will shed light on the significance of India’s sustained commitment to a cleaner, more sustainable energy future.Keywords: renewables, Indian electricity grid code, national electricity plan, green energy market
Procedia PDF Downloads 422808 An Energy Efficient Spectrum Shaping Scheme for Substrate Integrated Waveguides Based on Spread Reshaping Code
Authors: Yu Zhao, Rainer Gruenheid, Gerhard Bauch
Abstract:
In the microwave and millimeter-wave transmission region, substrate-integrated waveguide (SIW) is a very promising candidate for the development of circuits and components. It facilitates the transmission at the data rates in excess of 200 Gbit/s. An SIW mimics a rectangular waveguide by approximating the closed sidewalls with a via fence. This structure suppresses the low frequency components and makes the channel of the SIW a bandpass or high pass filter. This channel characteristic impedes the conventional baseband transmission using non-return-to-zero (NRZ) pulse shaping scheme. Therefore, mixers are commonly proposed to be used as carrier modulator and demodulator in order to facilitate a passband transmission. However, carrier modulation is not an energy efficient solution, because modulation and demodulation at high frequencies consume a lot of energy. For the first time to our knowledge, this paper proposes a spectrum shaping scheme of low complexity for the channel of SIW, namely spread reshaping code. It aims at matching the spectrum of the transmit signal to the channel frequency response. It facilitates the transmission through the SIW channel while it avoids using carrier modulation. In some cases, it even does not need equalization. Simulations reveal a good performance of this scheme, such that, as a result, eye opening is achieved without any equalization or modulation for the respective transmission channels.Keywords: bandpass channel, eye-opening, switching frequency, substrate-integrated waveguide, spectrum shaping scheme, spread reshaping code
Procedia PDF Downloads 1602807 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 422806 OpenMP Parallelization of Three-Dimensional Magnetohydrodynamic Code FOI-PERFECT
Authors: Jiao F. Huang, Shi Chen, Shu C. Duan, Gang H. Wang
Abstract:
Due to its complex spatial structure as well as dynamic temporal evolution, an analytic solution of an X-pinch process is out of question, and numerical simulation becomes an important tool in X-pinch studies. Intrinsically, simulations of X-pinch are three-dimensional (3D) because of the specific structure of its load. Furthermore, in order to resolve both its μm-scales and ns-durations, fine spatial mesh grid and short time steps are usually adopted. The resulting large computational scales make the parallelization of codes a vital problem to be solved if any practical simulations are to be carried out. In this work, we report OpenMP parallelization of our 3D magnetohydrodynamic (MHD) code FOI-PERFECT. Results of test runs confirm that computational efficiency has been improved after parallelization, and both the sequential and parallel versions give the same physical results under the same initial conditions.Keywords: MHD simulation, OpenMP, parallelization, X-pinch
Procedia PDF Downloads 3402805 Applications for Accounting of Inherited Object-Oriented Class Members
Authors: Jehad Al Dallal
Abstract:
A class in an Object-Oriented (OO) system is the basic unit of design, and it encapsulates a set of attributes and methods. In OO systems, instead of redefining the attributes and methods that are included in other classes, a class can inherit these attributes and methods and only implement its unique attributes and methods, which results in reducing code redundancy and improving code testability and maintainability. Such mechanism is called Class Inheritance. However, some software engineering applications may require accounting for all the inherited class members (i.e., attributes and methods). This paper explains how to account for inherited class members and discusses the software engineering applications that require such consideration.Keywords: class flattening, external quality attribute, inheritance, internal quality attribute, object-oriented design
Procedia PDF Downloads 2722804 Abusing Business Rescue Proceedings by a Director and Its Impact on the Ethics of Good Corporate Governance
Authors: Simphiwe Phungula
Abstract:
In the past few years, the impact of Covid 19 in South Africa has given rise to the need for business rescue proceedings where businesses are financially distressed. Even more, the looting unrest and floods in certain parts of South Africa have also played an impact on businesses’ financial stress. To help financially distressed companies in South Africa, the Companies Act (“the Act”) has introduced a business rescue procedure aimed at helping those ailing companies. This mechanism is aimed at rehabilitating financially distressed companies so that they become solvent again and if it is not possible, results in a better return for the company’s creditors or shareholders than would result from the immediate liquidation of the company. Unfortunately, since the introduction of business rescue, evidence has shown that sometimes companies resort to business rescue proceedings to seek refuge from creditors even if the facts do not justify that the company should commence business rescue. In most cases, the abuse of business rescue is done by directors who pass a resolution that the company should embark on business rescue even if evidence shows that the company should not commence the proceedings. This is done notwithstanding the principles of King Code IV which requires ethics and good governance on the part of directors. This paper demonstrates how the abuse of business rescue can impact the principles of good governance and ethics of King Code IV. It argues that directors should rethink their corporate practices, and ethical standards when passing a resolution to commence business rescue proceedings.Keywords: business rescue, king code, corporate governance, ethics
Procedia PDF Downloads 1042803 Code-Switching among Local UCSI Stem and N-Stem Undergraduates during Knowledge Sharing
Authors: Adeela Abu Bakar, Minder Kaur, Parthaman Singh
Abstract:
In the Malaysian education system, a formal setting of English language learning takes place in a content-based classroom (CBC). Until recently, there is less study in Malaysia, which researched the effects of code-switching (CS) behaviour towards the students’ knowledge sharing (KS) with their peers. The aim of this study is to investigate the frequency, reasons, and effect that CS, from the English language to Bahasa Melayu, has among local STEM and N-STEM undergraduates towards KS in a content-based classroom. The study implies a mixed-method research design with questionnaire and interviews as the instruments. The data is collected through distribution of questionnaires and interviews with the undergraduates. The quantitative data is analysed using SPSS in simple frequencies and percentages, whereas qualitative data involves organizing the data into themes, followed by analysis. Findings found that N-STEM undergraduates code-switch more as compared to STEM undergraduates. In addition to that, both the STEM and N-STEM undergraduates agree that CS acts as a catalyst towards KS in a content-based classroom. However, they also acknowledge that excess use of CS can be a hindrance towards KS. The findings of the study can benefit STEM and N-STEM undergraduates, education policymakers, language teachers, university educators, and students with significant insights into the role of CS towards KS in a content-based classroom. Some of the recommendations that can be applied for future studies are that the number of participants can be increased, an observation to be included for the data collection.Keywords: switching, content-based classroom, content and language integrated learning, knowledge sharing, STEM and N-STEM undergraduates
Procedia PDF Downloads 1342802 Using TRACE and SNAP Codes to Establish the Model of Maanshan PWR for SBO Accident
Authors: B. R. Shen, J. R. Wang, J. H. Yang, S. W. Chen, C. Shih, Y. Chiang, Y. F. Chang, Y. H. Huang
Abstract:
In this research, TRACE code with the interface code-SNAP was used to simulate and analyze the SBO (station blackout) accident which occurred in Maanshan PWR (pressurized water reactor) nuclear power plant (NPP). There are four main steps in this research. First, the SBO accident data of Maanshan NPP were collected. Second, the TRACE/SNAP model of Maanshan NPP was established by using these data. Third, this TRACE/SNAP model was used to perform the simulation and analysis of SBO accident. Finally, the simulation and analysis of SBO with mitigation equipments was performed. The analysis results of TRACE are consistent with the data of Maanshan NPP. The mitigation equipments of Maanshan can maintain the safety of Maanshan in the SBO according to the TRACE predictions.Keywords: pressurized water reactor (PWR), TRACE, station blackout (SBO), Maanshan
Procedia PDF Downloads 1942801 An Ab Initio Study of Delafossite Transparent Conductive Oxides Cu(In, Ga)O2 and Absorbers Films Cu(In, Ga)S2 in Solar-Cell
Authors: Mokdad Sakhri, Youcef Bouhadda
Abstract:
Thin film chalcopyrite technology is thus nowadays a solid candidate for photovoltaic cells. The currently used window layer for the solar cell Cu(In,Ga)S2 is our interest point in this work. For this purpose, we have performed a first-principles study of structural, electronic and optical properties for both delafossite transparent conductive oxides Cu (In, Ga)O2 and absorbers films Cu(In,Ga)S2. The calculations have been carried out within the local density functional (LDA) and generalized gradient approximations (GGA) combined with the hubbard potential using norm-conserving pseudopotentials and a plane-wave basis with ABINIT code. We have found the energy gap is :1.6, 2.53, 3.6, 3.8 eV for CuInS2, CuGaS2, CuInO2 and CuGaO2 respectively. The results are in good agreement with experimental results.Keywords: ABINIT code, DFT, electronic and optical properties, solar-cell absorbers, delafossite transparent conductive oxides
Procedia PDF Downloads 5682800 Prevalence of Foodborne Pathogens in Pig and Cattle Carcass Samples Collected from Korean Slaughterhouses
Authors: Kichan Lee, Kwang-Ho Choi, Mi-Hye Hwang, Young Min Son, Bang-Hun Hyun, Byeong Yeal Jung
Abstract:
Recently, worldwide food safety authorities have been strengthening food hygiene in order to curb foodborne illness outbreaks. The hygiene status of Korean slaughterhouses has been monitored annually by Animal and Plant Quarantine Agency and provincial governments through foodborne pathogens investigation using slaughtered pig and cattle meats. This study presented the prevalence of food-borne pathogens from 2014 to 2016 in Korean slaughterhouses. Sampling, microbiological examinations, and analysis of results were performed in accordance with ‘Processing Standards and Ingredient Specifications for Livestock Products’. In total, swab samples from 337 pig carcasses (100 samples in 2014, 135 samples in 2015, 102 samples in 2016) and 319 cattle carcasses (100 samples in 2014, 119 samples in 2015, 100 samples in 2016) from twenty slaughterhouses were examined for Listeria monocytogenes, Campylobacter jejuni, Campylobacter coli, Salmonella spp., Staphylococcus aureus, Clostridium perfringens, Yersinia enterocolitica, Escherichia coli O157:H7 and non-O157 enterohemorrhagic E. coli (EHEC, serotypes O26, O45, O103, O104, O111, O121, O128 and O145) as foodborne pathogens. The samples were analyzed using cultural and PCR-based methods. Foodborne pathogens were isolated in 78 (23.1%) out of 337 pig samples. In 2014, S. aureus (n=17) was predominant, followed by Y. enterocolitica (n=7), C. perfringens (n=2) and L. monocytogenes (n=2). In 2015, C. coli (n=14) was the most prevalent, followed by L. monocytogenes (n=4), S. aureus (n=3), and C. perfringens (n=2). In 2016, S. aureus (n=16) was the most prevalent, followed by C. coli (n=13), L. monocytogenes (n=2) and C. perfringens (n=1). In case of cattle carcasses, foodborne bacteria were detected in 41 (12.9%) out of 319 samples. In 2014, S. aureus (n=16) was the most prevalent, followed by Y. enterocolitica (n=3), C. perfringens (n=3) and L. monocytogenes (n=2). In 2015, L. monocytogenes was isolated from 4 samples, S. aureus from three, C. perfringens, Y. enterocolitica and Salmonella spp. from one, respectively. In 2016, L. monocytogenes (n=6) was the most prevalent, followed by C. perfringens (n=3) C. jejuni (n=1), respectively. It was found that 10 carcass samples (4 cattle and 6 pigs) were contaminated with two bacterial pathogen tested. Interestingly, foodborne pathogens were more detected from pig carcasses than cattle carcasses. Although S. aureus was predominantly detected in this study, other foodborne pathogens were also isolated in slaughtered meats. Results of this study alerted the risk of foodborne pathogen infection for humans from slaughtered meats. Therefore, the authors insisted that it was important to enhance hygiene level of slaughterhouses according to Hazard Analysis and Critical Control Point.Keywords: carcass, cattle, foodborne, Korea, pathogen, pig
Procedia PDF Downloads 3442799 Didacticization of Code Switching as a Tool for Bilingual Education in Mali
Authors: Kadidiatou Toure
Abstract:
Mali has started experimentation of teaching the national languages at school through the convergent pedagogy in 1987. Then, it is in 1994 that it will become widespread with eleven of the thirteen former national languages used at primary school. The aim was to improve the Malian educational system because the use of French as the only medium of instruction was considered a contributing factor to the significant number of student dropouts and the high rate of repetition. The Convergent pedagogy highlights the knowledge acquired by children at home, their vision of the world and especially the knowledge they have of their mother tongue. That pedagogy requires the use of a specific medium only during classroom practices and teachers have been trained in this sense. The specific medium depends on the learning content, which sometimes is French, other times, it is the national language. Research has shown that bilingual learners do not only use the required medium in their learning activities, but they code switch. It is part of their learning processes. Currently, many scholars agree on the importance of CS in bilingual classes, and teachers have been told about the necessity of integrating it into their classroom practices. One of the challenges of the Malian bilingual education curriculum is the question of ‘effective languages management’. Theoretically, depending on the classrooms, an average have been established for each of the involved language. Following that, teachers make use of CS differently, sometimes, it favors the learners, other times, it contributes to the development of some linguistic weaknesses. The present research tries to fill that gap through a tentative model of didactization of CS, which simply means the practical management of the languages involved in the bilingual classrooms. It is to know how to use CS for effective learning. Moreover, the didactization of CS tends to sensitize the teachers about the functional role of CS so that they may overcome their own weaknesses. The overall goal of this research is to make code switching a real tool for bilingual education. The specific objectives are: to identify the types of CS used during classroom activities to present the functional role of CS for the teachers as well as the pupils. to develop a tentative model of code-switching, which will help the teachers in transitional classes of bilingual schools to recognize the appropriate moment for making use of code switching in their classrooms. The methodology adopted is a qualitative one. The study is based on recorded videos of teachers of 3rd year of primary school during their classroom activities and interviews with the teachers in order to confirm the functional role of CS in bilingual classes. The theoretical framework adopted is the typology of CS proposed by Poplack (1980) to identify the types of CS used. The study reveals that teachers need to be trained on the types of CS and the different functions they assume and on the consequences of inappropriate use of language alternation.Keywords: bilingual curriculum, code switching, didactization, national languages
Procedia PDF Downloads 712798 Seismic Response of Belt Truss System in Regular RC Frame Structure at the Different Positions of the Storey
Authors: Mohd Raish Ansari, Tauheed Alam Khan
Abstract:
This research paper is a comparative study of the belt truss in the Regular RC frame structure at the different positions of the floor. The method used in this research is the response spectrum method with the help of the ETABS Software, there are six models in this paper with belt truss. The Indian standard code used in this work are IS 456:2000, IS 800:2007, IS 875 part-1, IS 875 part-1, and IS 1893 Part-1:2016. The cross-section of the belt truss is the I-section, a grade of steel that is made up of Mild Steel. The basic model in this research paper is the same, only position of the belt truss is going to change, and the dimension of the belt truss is remain constant for all models. The plan area of all models is 24.5 meters x 28 meters, and the model has G+20, where the height of the ground floor is 3.5 meters, and all floor height is 3.0 meters remains constant. This comparative research work selected some important seismic parameters to check the stability of all models, the parameters are base shear, fundamental period, storey overturning moment, and maximum storey displacement.Keywords: belt truss, RC frames structure, ETABS, response spectrum analysis, special moment resisting frame
Procedia PDF Downloads 93