Search results for: information security management system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31660

Search results for: information security management system

28000 Providing Additional Advantages for STATCOM in Power Systems by Integration of Energy Storage Device

Authors: Reza Sedaghati

Abstract:

The use of Flexible AC Transmission System (FACTS) devices in a power system can potentially overcome limitations of the present mechanically controlled transmission system. Also, the advance of technology makes possible to include new energy storage devices in the electrical power system. The integration of Superconducting Magnetic Energy Storage (SMES) into Static Synchronous Compensator (STATCOM) can lead to increase their flexibility in improvement of power system dynamic behaviour by exchanging both active and reactive powers with power grids. This paper describes structure and behaviour of SMES, specifications and performance principles of the STATCOM/SMES compensator. Moreover, the benefits and effectiveness of integrated SMES with STATCOM in power systems is presented. Also, the performance of the STATCOM/SMES compensator is evaluated using an IEEE 3-bus system through the dynamic simulation by PSCAD/EMTDC software.

Keywords: STATCOM/SMES compensator, chopper, converter, energy storage system, power systems

Procedia PDF Downloads 543
27999 Evolution of Sustainable Municipal Solid Waste Management in Nigeria: Lagos Case Study

Authors: Chinedu Bevis Dibia, Hom Nath Dhakal

Abstract:

Effective waste management in sub-Saharan Africa has been identified as a means of resolving the wicked problems posed by climate change. Municipal solid waste management in Nigeria could be argued to be ineffective and unsustainable, despite the tag of sustainable ascribed to most municipalities’ waste management. Relatively, few studies have enquired on the evolution of Sustainable Municipal Waste Management (SMWM) in Nigeria. The main objective of this research is to examine the evolution of SMWM in Nigeria using Lagos state as a case study. A qualitative method was used as methodology, soft systems analysis is the main tool of evaluation. Results indicated that effective policy implementation and management is the main challenge to the proper evolution of SMWM. These findings highlight the relevance of effective stakeholder’s engagement and management, policy consistency as major determinants in SMWM.

Keywords: high income localities, low middle income localities, SMWM, upper middle income localities, waste collection, waste disposal

Procedia PDF Downloads 141
27998 Securing Wireless Sensor Network From Rank Attack Using Fast Sensor Data Encryption and Decryption Protocol

Authors: Eden Teshome Hunde

Abstract:

Wireless sensor and actuator networks (WSANs) are of great significance in the realm of industrial automation systems. However, the aspect of security in WSANs has been somewhat overlooked. One particular security concern is the rank attack, where malicious actors actively manipulate the transmission of messages from neighboring nodes. This undermines the entire network's data collection and routing operations, resulting in a significant degradation of network performance. This attack adversely affects crucial metrics such as packet delivery ratio (PDR), latency, and power consumption, ultimately reducing the network's overall lifespan. In order to foster trust among nodes, ensure accurate delivery of data to end users, safeguard shared data in the cloud from security breaches, and prevent rank attacks within the network, it is crucial to protect the network against such malicious activities. This research paper aims to introduce an enhanced version of the Routing Protocol for Low-Power and Lossy Networks (RPL) protocol, specifically tailored to identify and eliminate rank attacks within existing WSANs. The effectiveness of the new protocol will be assessed through experimentation using Zolertia (Z1) sensors in the Cooja network simulator. To minimize network overhead on the sensors' side, the proposed scheme limits cryptographic operations to symmetric key-based mechanisms such as XORing, hash functions, and encryption. These operations will be implemented using a C-compiler and verified through the ModelSIM Altera SE edition 11.0 simulator.

Keywords: ModelSIM Altera SE, RPL, WSANs, Zolertia

Procedia PDF Downloads 20
27997 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence

Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang

Abstract:

This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.

Keywords: natural intelligence, artificial intelligence, creativity, information theory, restriction of creativity

Procedia PDF Downloads 359
27996 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 431
27995 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger

Authors: Tracy Smith-Carrier

Abstract:

In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.

Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights

Procedia PDF Downloads 98
27994 Cognitive Based Approach to Organizational Development

Authors: Tatiana V. Korsakova

Abstract:

The cognitive methodology in management is considered: Cognitive structuring - the formation of ideas about the functioning of a developing organization; Cognitive modeling - heuristic construction of existing actions (zone of successful actions); and Cognitive construct - the formation of filters for converting external information into specific events of managerial reality. The major findings of the study are the identification of areas of successful actions in the organization, harmonization of criteria for evaluating the effectiveness of company management, and the frame-description that indicates the connection of environmental elements with the elements of the organization. It is stated the development of specific events of managerial reality in the direction of the further development of the organization depends on the personal cognitive construct of the development-subjects when it is used in the zone of successful actions.

Keywords: cognitive construct, focus of applicability, knowledge corporate culture, zones of successful actions

Procedia PDF Downloads 280
27993 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: activity modeling, clustering, PLSA, video representation

Procedia PDF Downloads 377
27992 The Role of Flowering Pesticidal Plants for Sustainable Pest Management

Authors: Baltazar Ndakidemi

Abstract:

The resource-constrained farmers, especially those in sub-Saharan Africa, encounter significant challenges related to agriculture, notably diseases and pests. The sustainable means of pest management are not well known to farmers. As a result, some farmers use synthetic pesticides whose environmental impacts, ill health, and other negative impacts of synthetic pesticides on natural enemies have posed a great need for more sustainable means of pest management. Pesticidal plant resources can replace synthetic pesticides because their secondary metabolites can exhibit insecticidal activities such as deterrence, repellence, and pests' mortality. Additionally, the volatiles from these plants can have positive effects of attracting populations of natural enemies. Pesticidal plants can be grown as field margin plants or in strips for supporting natural enemies' populations. However, this is practically undetermined. Hence, there is a need to investigate the roles played by pesticidal plants in supporting natural enemies of pests and their applications in different cropping systems such as legumes. This study investigates different pesticidal plants with a high potential for pest control in agricultural fields. The information sheds light on potential plants that can be used for different crop pests.

Keywords: natural enemies, biological control, synthetic pesticides, pesticidal plants, predators, parasitoids

Procedia PDF Downloads 50
27991 Microbes in Aquaculture: New Trends and Application in Freshwater Fish Culture

Authors: Muhammad Younis Laghari

Abstract:

Microbial communities play the most important role in aquatic ecosystems. These microbes have a great role in fish growth and aquaculture production. Unfortunately, the farmers are unaware of these useful creatures. Nowadays, the trend of fish farming is developed to re-circulatory aquaculture system (RAS) to increase production and reduce the investment/management cost to increase the profit. However, sometimes, it has been observed that even the growth of fish is decreased in RAS without apparent changes in water quality. There is a great importance of microorganisms in aquaculture, where they occur naturally. However, they can be added artificially by applying different roles. Even these microbes play an important role in the degradation of organic matter and recycling nutrients, along with nutritional support to fish. Even some microorganisms may protect fish and larvae against diseases. But if not managed/utilized properly, they may cause to infect or kill the fish and their larvae. However, manipulating the microbes and monitoring them in aquaculture systems hold great potential to assess and improve the water quality as well as to control the development of microbial infections. While there is an utmost need for research to determine the microbiomes of healthy aquaculture systems, we also need to develop authentic methods for the successful manipulation of microbes as well as engineer these microbiomes. Hence, we should develop a plan to utilize and get full advantage from these microbial interactions for the successful management of aquaculture through advanced research and technology.

Keywords: aquaculture, ecology system, degradation, microbes, nutrient recycling, water quality

Procedia PDF Downloads 62
27990 Performance Analysis of the First-Order Characteristics of Polling System Based on Parallel Limited (K=1) Services Mode

Authors: Liu Yi, Bao Liyong

Abstract:

Aiming at the problem of low efficiency of pipelined scheduling in periodic query-qualified service, this paper proposes a system service resource scheduling strategy with parallel optimized qualified service polling control. The paper constructs the polling queuing system and its mathematical model; firstly, the first-order and second-order characteristic parameter equations are obtained by partial derivation of the probability mother function of the system state variables, and the complete mathematical, analytical expressions of each system parameter are deduced after the joint solution. The simulation experimental results are consistent with the theoretical calculated values. The system performance analysis shows that the average captain and average period of the system have been greatly improved, which can better adapt to the service demand of delay-sensitive data in the dense data environment.

Keywords: polling, parallel scheduling, mean queue length, average cycle time

Procedia PDF Downloads 20
27989 Employing GIS to Analyze Areas Prone to Flooding: Case Study of Thailand

Authors: Sanpachai Huvanandana, Settapong Malisuwan, Soparwan Tongyuak, Prust Pannachet, Anong Phoepueak, Navneet Madan

Abstract:

Many regions of Thailand are prone to flooding due to tropical climate. A commonly increasing precipitation in this continent results in risk of flooding. Many efforts have been implemented such as drainage control system, multiple dams, and irrigation canals. In order to decide where the drainages, dams, and canal should be appropriately located, the flooding risk area should be determined. This paper is aimed to identify the appropriate features that can be used to classify the flooding risk area in Thailand. Several features have been analyzed and used to classify the area. Non-supervised clustering techniques have been used and the results have been compared with ten years average actual flooding area.

Keywords: flood area clustering, geographical information system, flood features

Procedia PDF Downloads 276
27988 Ethics in the Islamic Political System

Authors: Djehich Mohamed Yousri

Abstract:

This research deals with an important issue in Islamic political thought, which is the relationship of ethics to the Islamic political system. This is done by following the legal politics books and analyzing their texts in order to reach the moral values on which the political system in Islam is based, starting from the concept of politics to the political principles and conditions of the ruler and the reasons for his removal and the conditions of those authorized to choose him, and ending with the ruler’s relationship with his people, and the relationship of the Islamic state with other countries. The research concluded that moral values are the basis of the political system in Islam, and the reason for this is due to the fact that Islam is a religion and a global and realistic human system that embraces morals and higher values in order to preserve its lofty message and calls for brotherhood, love, and justice and does not harm human morals. And if the reality of politics in the Islamic world today is not related to the moral values and the lofty message of Islam, this research tries to show the origins of political theory in Islam, and the purpose of the Islamic political system, towards the morality of politics.

Keywords: moral, politics, islam, political system, islamic political system

Procedia PDF Downloads 84
27987 Feasibility Study on the Use of HEMS for Thermal Comfort and Energy Saving in Japanese Residential Buildings

Authors: K. C. Rajan, H. B. Rijal, Kazui Yoshida, Masanori Shukuya

Abstract:

The electricity consumption in the Japanese household sector has increased with higher rate than that of other sectors. This may be because of aging and information oriented society that requires more electrical appliances to make the life better and easier, under this circumstances, energy saving is one of the essential necessity in Japanese society. To understand the way of energy use and demand response of the residential occupants, it is important to understand the structure of energy used. Home Energy Management System (HEMS) may be used for understanding the pattern and the structure of energy used. HEMS is a visualization system of the energy usage by connecting the electrical equipment in the home and thereby automatically control the energy use in each device, so that the energy saving is achieved. Therefore, the HEMS can provide with the easiest way to understand the structure of energy use. The HEMS has entered the mainstream of the Japanese market. The objective of this study is to understand the pattern of energy saving and cost saving in different regions including Japan during HEMS use. To observe thermal comfort level of HEMS managed residential buildings in Japan, the field survey was made and altogether, 1534 votes from 37 occupants related to thermal comfort, occupants’ behaviors and clothing insulation were collected and analyzed. According to the result obtained, approximately 17.9% energy saving and 8.9% cost saving is possible if HEMS is applied effectively. We found the thermal sensation and overall comfort level of the occupants is high in the studied buildings. The occupants residing in those HEMS buildings are satisfied with the thermal environment and they have accepted it. Our study concluded that the significant reduction in Japanese residential energy use can be achieved by the proper utilization of the HEMS. Better thermal comfort is also possible with the use of HEMS if energy use is managed in a rationally effective manner.

Keywords: energy reduction, thermal comfort, HEMS utility, thermal environment

Procedia PDF Downloads 264
27986 Bioeconomic Modelling for Barramundi (Lates calcarifer) in Queensland: Implications for Recreational Fishing Following Recent Gill Netting Closures

Authors: Sabiha S. Marine, Nicole Flint, John Rolfe

Abstract:

The Queensland state government introduced commercial gill net fishing closures in Cairns, Mackay, and Rockhampton in November 2015 to increase the recreational fishing opportunities, nature-based tourism, and economic benefits in these three regional areas. This management change is likely to improve the potential for more desirable stock structures through natural recruitment. Barramundi (Lates calcarifer) is one of the popular target fish for recreational and commercial fishers in Northern Australia. This investigation examines the effects of reduced commercial fishing from both biological and economic perspectives, particularly on the local Barramundi population of the Fitzroy River in Rockhampton, the largest river catchment flowing to the eastern coast of Australia. Data on different parameters of biological and economic aspects have been collated from secondary sources for analysis through a system simulation approach to identify the effectiveness of the commercial netting closures on recreational fishing effort, especially for the Barramundi population. The results have the potential to explain certain consequences of the netting closures in Queensland, which could serve to inform future fisheries management decisions. The study output as a whole will help in the better management of fisheries resources by evaluating recreational fishing opportunities in Queensland, where the potential for increases in recreation is high.

Keywords: Barramundi, bioeconomic model, fishery management, recreational fishing

Procedia PDF Downloads 155
27985 Overview of the Public Service Executive Training System in Hungary

Authors: Csilla Paksi-Petró

Abstract:

The Hungarian national public administration training system providing continuous, lifelong further training to some ten thousand executives in public administration was launched in 2014, adding skills and competency development to the previous training solutions, which had a mainly legal and professional approach. The executive training system is being continuously developed since tackling the existing qualitative, and quantitative challenges calls for the introduction of novel, innovative solutions. With a gap-filling character, this study presents, in brief, the last eight years of system of executive training in public administration, supported by the outcomes of the author's empirical research, makes suggestions for the possible directions of its further development. Through this article, the reader may obtain an overview of the current Hungarian civil service further training system, its institution system, the method of its application, its target groups, its results, and its development prospects. By reading the article, the reader will get acquainted with the good practices of the Hungarian civil service further training system.

Keywords: coaching, e-learning, executive development, further-training

Procedia PDF Downloads 103
27984 Electronic Patient Record (EPR) System in South Africa: Results of a Pilot Study

Authors: Temitope O. Tokosi, Visvanathan Naicker

Abstract:

Patient health records contain sensitive information for which an electronic patient record (EPR) system can safely secure and transmit amongst clinicians for use in improving health delivery. Clinician’s use of the behaviour of these systems is under scrutiny to assess their attributes towards health technology. South Africa (SA) clinicians responded to a pilot study survey to assess their understanding of EPR, what attributes are important towards technology use and more importantly streamlining the survey for a larger study. Descriptive statistics using mean scores was used because of the small sample size of 11 clinicians who completed the survey. Nine (9) constructs comprising 62 items were used and a Cronbach alpha score of 0.883 was obtained. Limitations and discussions conclude the study.

Keywords: EPR, clinicians, pilot study, South Africa

Procedia PDF Downloads 254
27983 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 41
27982 Mining User-Generated Contents to Detect Service Failures with Topic Model

Authors: Kyung Bae Park, Sung Ho Ha

Abstract:

Online user-generated contents (UGC) significantly change the way customers behave (e.g., shop, travel), and a pressing need to handle the overwhelmingly plethora amount of various UGC is one of the paramount issues for management. However, a current approach (e.g., sentiment analysis) is often ineffective for leveraging textual information to detect the problems or issues that a certain management suffers from. In this paper, we employ text mining of Latent Dirichlet Allocation (LDA) on a popular online review site dedicated to complaint from users. We find that the employed LDA efficiently detects customer complaints, and a further inspection with the visualization technique is effective to categorize the problems or issues. As such, management can identify the issues at stake and prioritize them accordingly in a timely manner given the limited amount of resources. The findings provide managerial insights into how analytics on social media can help maintain and improve their reputation management. Our interdisciplinary approach also highlights several insights by applying machine learning techniques in marketing research domain. On a broader technical note, this paper illustrates the details of how to implement LDA in R program from a beginning (data collection in R) to an end (LDA analysis in R) since the instruction is still largely undocumented. In this regard, it will help lower the boundary for interdisciplinary researcher to conduct related research.

Keywords: latent dirichlet allocation, R program, text mining, topic model, user generated contents, visualization

Procedia PDF Downloads 176
27981 Loss Analysis by Loading Conditions of Distribution Transformers

Authors: A. Bozkurt, C. Kocatepe, R. Yumurtaci, İ. C. Tastan, G. Tulun

Abstract:

Efficient use of energy, with the increase in demand of energy and also with the reduction of natural energy sources, has improved its importance in recent years. Most of the losses in the system from electricity produced until the point of consumption is mostly composed by the energy distribution system. In this study, analysis of the resulting loss in power distribution transformer and distribution power cable is realized which are most of the losses in the distribution system. Transformer losses in the real distribution system were analyzed by CYME Power Engineering Software program. These losses are disclosed for different voltage levels and different loading conditions.

Keywords: distribution system, distribution transformer, power cable, technical losses

Procedia PDF Downloads 633
27980 Challenges and Recommendations for Medical Device Tracking and Traceability in Singapore: A Focus on Nursing Practices

Authors: Zhuang Yiwen

Abstract:

The paper examines the challenges facing the Singapore healthcare system related to the tracking and traceability of medical devices. One of the major challenges identified is the lack of a standard coding system for medical devices, which makes it difficult to track them effectively. The paper suggests the use of the Unique Device Identifier (UDI) as a single standard for medical devices to improve tracking and reduce errors. The paper also explores the use of barcoding and image recognition to identify and document medical devices in nursing practices. In nursing practices, the use of barcodes for identifying medical devices is common. However, the information contained in these barcodes is often inconsistent, making it challenging to identify which segment contains the model identifier. Moreover, the use of barcodes may be improved with the use of UDI, but many subsidized accessories may still lack barcodes. The paper suggests that the readiness for UDI and barcode standardization requires standardized information, fields, and logic in electronic medical record (EMR), operating theatre (OT), and billing systems, as well as barcode scanners that can read various formats and selectively parse barcode segments. Nursing workflow and data flow also need to be taken into account. The paper also explores the use of image recognition, specifically the Tesseract OCR engine, to identify and document implants in public hospitals due to limitations in barcode scanning. The study found that the solution requires an implant information database and checking output against the database. The solution also requires customization of the algorithm, cropping out objects affecting text recognition, and applying adjustments. The solution requires additional resources and costs for a mobile/hardware device, which may pose space constraints and require maintenance of sterile criteria. The integration with EMR is also necessary, and the solution require changes in the user's workflow. The paper suggests that the long-term use of Systematized Nomenclature of Medicine Clinical Terms (SNOMED CT) as a supporting terminology to improve clinical documentation and data exchange in healthcare. SNOMED CT provides a standardized way of documenting and sharing clinical information with respect to procedure, patient and device documentation, which can facilitate interoperability and data exchange. In conclusion, the paper highlights the challenges facing the Singapore healthcare system related to the tracking and traceability of medical devices. The paper suggests the use of UDI and barcode standardization to improve tracking and reduce errors. It also explores the use of image recognition to identify and document medical devices in nursing practices. The paper emphasizes the importance of standardized information, fields, and logic in EMR, OT, and billing systems, as well as barcode scanners that can read various formats and selectively parse barcode segments. These recommendations could help the Singapore healthcare system to improve tracking and traceability of medical devices and ultimately enhance patient safety.

Keywords: medical device tracking, unique device identifier, barcoding and image recognition, systematized nomenclature of medicine clinical terms

Procedia PDF Downloads 63
27979 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 183
27978 Institutional Transformation in a Finnish University of Applied Sciences

Authors: Perttu Heino

Abstract:

Universities of applied sciences (UASs) were introduced as part of the Finnish higher education system in the early 1990’s. Research, development and innovation (RDI) were mentioned in the legislation on UASs from the very beginning, but very little attention was paid to it in the early years of UASs due to reasons that are easy to understand. Required changes in the organization of the UAS and its educational offering were a big challenge, and it took several years to get things in order. There were RDI projects already then, but their number was low and there was no systematical coordination or management of those activities. In this paper, the institutional transformation of UASs is discussed based on how Tampere University of Applied Sciences has transformed during the years from a traditional tertiary level school to a modern higher education institution with a strong RDI activity, characterized by lively university-industry interaction and tight integration to education.

Keywords: research, development, management, practices

Procedia PDF Downloads 27
27977 An Exploration of the Provision of Government-Subsidised Housing without Title Deeds: A Recipient’s Interpretation of Security of Tenure

Authors: Maléne Maria Magdalena Campbell, Jeremiah Mholo

Abstract:

Low-income households earning less than 3,500 ZAR (about 175 GBP) per month can apply to the South African government, through the National Housing Subsidy, for fully subsidised houses. An objective of this subsidy is to enable low-income households’ participation in the formal housing market; however, the beneficiaries received houses without title deeds. As such, if the beneficiaries did not have a secured tenure at the time of their death then surviving family may face possible eviction. Therefore, an aim of this research was to determine how these beneficiaries interpret tenure security. The research focused on government subsidised housing in the Dithlake settlement of a rural hamlet named Koffiefontein, in the Letsemeng Local Municipality of South Africa. Quantitative data on the beneficiaries were collected from the local municipality, while qualitative data were collected from a sample of 45 beneficiaries.

Keywords: low-income families, subsidised housing, titling, housing market

Procedia PDF Downloads 390
27976 Application of IF Rough Data on Knowledge Towards Malaria of Rural Tribal Communities in Tripura

Authors: Chhaya Gangwal, R. N. Bhaumik, Shishir Kumar

Abstract:

Handling uncertainty and impreciseness of knowledge appears to be a challenging task in Information Systems. Intuitionistic fuzzy (IF) and rough set theory enhances databases by allowing it for the management of uncertainty and impreciseness. This paper presents a new efficient query optimization technique for the multi-valued or imprecise IF rough database. The usefulness of this technique was illustrated on malaria knowledge from the rural tribal communities of Tripura where most of the information is multi-valued and imprecise. Then, the querying about knowledge on malaria is executed into SQL server to make the implementation of IF rough data querying simpler.

Keywords: intuitionistic fuzzy set, rough set, relational database, IF rough relational database

Procedia PDF Downloads 422
27975 Evaluation of Photovoltaic System with Different Research Methods of Maximum Power Point Tracking

Authors: Mehdi Ameur, Ahmed Essadki, Tamou Nasser

Abstract:

The purpose of this paper is the evaluation of photovoltaic system with MPPT techniques. This system is developed by combining the models of established solar module and DC-DC converter with the algorithms of perturbing and observing (P&O), incremental conductance (INC) and fuzzy logic controller (FLC). The system is simulated under different climate conditions and MPPT algorithms to determine the influence of these conditions on characteristic power-voltage of PV system. According to the comparisons of the simulation results, the photovoltaic system can extract the maximum power with precision and rapidity using the MPPT algorithms discussed in this paper.

Keywords: fuzzy logic controller, FLC, hill climbing, HC, incremental conductance (INC), perturb and observe (P&O), maximum power point, MPP, maximum power point tracking, MPPT

Procedia PDF Downloads 498
27974 Regional Pole Placement by Saturated Power System Stabilizers

Authors: Hisham M. Soliman, Hassan Yousef

Abstract:

This manuscript presents new results on design saturated power system stabilizers (PSS) to assign system poles within a desired region for achieving good dynamic performance. The regional pole placement is accomplished against model uncertainties caused by different load conditions. The design is based on a sufficient condition in the form of linear matrix inequalities (LMI) which forces the saturated nonlinear controller to lie within the linear zone. The controller effectiveness is demonstrated on a single machine infinite bus system.

Keywords: power system stabilizer, saturated control, robust control, regional pole placement, linear matrix inequality (LMI)

Procedia PDF Downloads 551
27973 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server

Authors: Ahmed Khattab, Bassem Shetta

Abstract:

Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.

Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay

Procedia PDF Downloads 246
27972 Smart Lean Manufacturing in the Context of Industry 4.0: A Case Study

Authors: M. Ramadan, B. Salah

Abstract:

This paper introduces a framework to digitalize lean manufacturing tools to enhance smart lean-based manufacturing environments or Lean 4.0 manufacturing systems. The paper discusses the integration between lean tools and the powerful features of recent real-time data capturing systems with the help of Information and Communication Technologies (ICT) to develop an intelligent real-time monitoring and controlling system of production operations concerning lean targets. This integration is represented in the Lean 4.0 system called Dynamic Value Stream Mapping (DVSM). Moreover, the paper introduces the practice of Radio Frequency Identification (RFID) and ICT to smartly support lean tools and practices during daily production runs to keep the lean system alive and effective. This work introduces a practical description of how the lean method tools 5S, standardized work, and poka-yoke can be digitalized and smartly monitored and controlled through DVSM. A framework of the three tools has been discussed and put into practice in a German switchgear manufacturer.

Keywords: lean manufacturing, Industry 4.0, radio frequency identification, value stream mapping

Procedia PDF Downloads 211
27971 System Dynamics Projections of Environmental Issues for Domestic Water and Wastewater Scenarios in Urban Area of India

Authors: Isha Sharawat, R. P. Dahiya, T. R. Sreekrishnan

Abstract:

One of the environmental challenges in India is urban wastewater management as regulations and infrastructural development has not kept pace with the urbanization and growing population. The quality of life of people is also improving with the rapid growth of the gross domestic product. This has contributed to the enhancement in the per capita water requirement and consumption. More domestic water consumption generates more wastewater. The scarcity of potable water is making the situation quite serious, and water supply has to be regulated in most parts of the country during summer. This requires elaborate and concerted efforts to efficiently manage the water resources and supply systems. In this article, a system dynamics modelling approach is used for estimating the water demand and wastewater generation in a district headquarter city of North India. Projections are made till the year 2035. System dynamics is a software tool used for formulation of policies. On the basis of the estimates, policy scenarios are developed for sustainable development of water resources in conformity with the growing population. Mitigation option curtailing the water demand and wastewater generation include population stabilization, water reuse and recycle and water pricing. The model is validated quantitatively, and sensitivity analysis tests are carried out to examine the robustness of the model.

Keywords: system dynamics, wastewater, water pricing, water recycle

Procedia PDF Downloads 248