Search results for: maritime connectivity
217 US-China Competition in South China Sea and International Law
Authors: Mubashra Shaheen
Abstract:
The conflict over the South China Sea (SCS) is a complex imbroglio spanning over several territorial and maritime claims involving two major island groups, the Paracels and the Spratlys. It has become a major source of geopolitical competition between the United States and China. The study's overall objective is to understand China's land reclamations and assertive behavior in the South China Sea, which lies between both the Western Pacific and the Indian Ocean. Over half of global commerce passes through these waterways, which host a great amount of marine life and hydrocarbon deposits. China's sand-filling and island-building strategy in the South China Sea is motivated by its goal of privatizing all these riches as well as the routes. It would raise China to the pinnacle of world power status as well as allow it to threaten the dominance of the U.S. The study will examine China's assertive behavior and modernization plans as well as the United States' quest for supremacy through the lens of realists. While using a qualitative method of analysis, the study will examine China's nine-dash line claims and Exclusive Economic Zones (EEZs), UNCLOS, and U.S.-China divergence over international law considerations to pacify the tensions in the South China Sea. This paper is intended to explore the possible answers to the following questions: (1) Why does China’s rise necessitate the US's efforts to contain and encircle it through the lending of a hand to strategic partners and allies in the South China Sea? (2) Why South China Sea dispute is so complex imbroglio? (3) What are US-China international law considerations regarding the South China Sea? The study will further follow the bellow research procedure: 1: Comparative Legal Method: This method simply chalk-outs the follow of few steps that discarnate the positive and negative effects of the great power competitions. 2: Conceptualization: The conceptualization of the policies of containment defines and differentiates two different problems behind the persuasive means of hegemony and dominance in the strategic milieu.Keywords: us, china, south china sea, unclos
Procedia PDF Downloads 89216 A Study on Micro-Renewal of Mountainous Urban Communities Based on Child-Friendliness
Authors: Zipei Yin
Abstract:
Community space is the main place for children's daily outdoor activities. The mountain community space has the typical characteristics of a closed natural environment, a scattered population layout with height differences, and a relatively independent group structure. This has resulted in special limitations on children's outdoor activities in terms of safety, accessibility, and appropriateness, which urgently makes it necessary to explore how to construct children's activity spaces in mountainous societies under the special limitations. This study investigated the activity spaces for children aged 3-11 years old in typical old communities in Chongqing and evaluated them based on the dimensions of spatial characteristics, environmental safety, and connectivity to summarise three typical patterns of children's outdoor activity spaces in old communities in mountainous cities. Then, under the framework of the appeal of the child-friendly urban environment, taking advantage of the characteristics of the old community in mountain cities compared with the plain urban community, such as complex social form, diversified functional positioning, and good foundation of autonomy, this paper explores the micro-renewal path and strategy of the compound utilization of community public space from the two levels of design and governance, so as to further promote the research and practice of the healthy development of mountain urban community environment.Keywords: child-friendly, healthy community, community public space, mountainous urban community, community renewal
Procedia PDF Downloads 61215 Analyzing of Speed Disparity in Mixed Vehicle Technologies on Horizontal Curves
Authors: Tahmina Sultana, Yasser Hassan
Abstract:
Vehicle technologies rapidly evolving due to their multifaceted advantages. Adapted different vehicle technologies like connectivity and automation on the same roads with conventional vehicles controlled by human drivers may increase speed disparity in mixed vehicle technologies. Identifying relationships between speed distribution measures of different vehicles and road geometry can be an indicator of speed disparity in mixed technologies. Previous studies proved that speed disparity measures and traffic accidents are inextricably related. Horizontal curves from three geographic areas were selected based on relevant criteria, and speed data were collected at the midpoint of the preceding tangent and starting, ending, and middle point of the curve. Multiple linear mixed effect models (LME) were developed using the instantaneous speed measures representing the speed of vehicles at different points of horizontal curves to recognize relationships between speed variance (standard deviation) and road geometry. A simulation-based framework (Monte Carlo) was introduced to check the speed disparity on horizontal curves in mixed vehicle technologies when consideration is given to the interactions among connected vehicles (CVs), autonomous vehicles (AVs), and non-connected vehicles (NCVs) on horizontal curves. The Monte Carlo method was used in the simulation to randomly sample values for the various parameters from their respective distributions. Theresults show that NCVs had higher speed variation than CVs and AVs. In addition, AVs and CVs contributed to reduce speed disparity in the mixed vehicle technologies in any penetration rates.Keywords: autonomous vehicles, connected vehicles, non-connected vehicles, speed variance
Procedia PDF Downloads 145214 Experimental Simulations of Aerosol Effect to Landfalling Tropical Cyclones over Philippine Coast: Virtual Seeding Using WRF Model
Authors: Bhenjamin Jordan L. Ona
Abstract:
Weather modification is an act of altering weather systems that catches interest on scientific studies. Cloud seeding is a common form of weather alteration. On the same principle, tropical cyclone mitigation experiment follows the methods of cloud seeding with intensity to account for. This study will present the effects of aerosol to tropical cyclone cloud microphysics and intensity. The framework of Weather Research and Forecasting (WRF) model incorporated with Thompson aerosol-aware scheme is the prime host to support the aerosol-cloud microphysics calculations of cloud condensation nuclei (CCN) ingested into the tropical cyclones before making landfall over the Philippine coast. The coupled microphysical and radiative effects of aerosols will be analyzed using numerical data conditions of Tropical Storm Ketsana (2009), Tropical Storm Washi (2011), and Typhoon Haiyan (2013) associated with varying CCN number concentrations per simulation per typhoon: clean maritime, polluted, and very polluted having 300 cm-3, 1000 cm-3, and 2000 cm-3 aerosol number initial concentrations, respectively. Aerosol species like sulphates, sea salts, black carbon, and organic carbon will be used as cloud nuclei and mineral dust as ice nuclei (IN). To make the study as realistic as possible, investigation during the biomass burning due to forest fire in Indonesia starting October 2015 as Typhoons Mujigae/Kabayan and Koppu/Lando had been seeded with aerosol emissions mainly comprises with black carbon and organic carbon, will be considered. Emission data that will be used is from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS). The physical mechanism/s of intensification or deintensification of tropical cyclones will be determined after the seeding experiment analyses.Keywords: aerosol, CCN, IN, tropical cylone
Procedia PDF Downloads 296213 Interface Problems in Construction Projects
Authors: Puti F. Marzuki, Adrianto Oktavianus, Almerinda Regina
Abstract:
Interface problems among interacting parties in Indonesian construction projects have most often led to low productivity and completion delay. In the midst of this country’s needs to accelerate construction of public infrastructure providing connectivity among regions and supporting economic growth as well as better living quality, project delays have to be seriously addressed. This paper identifies potential causes factors of interface problems experienced by construction projects in Indonesia. Data are collected through a survey involving the main actors of six important public infrastructure construction projects including railway, LRT, sports stadiums, apartment, and education building construction projects. Five of these projects adopt the design-build project delivery method and one applies the design-bid-build scheme. Interface problems’ potential causes are categorized into contract, management, technical experience, coordination, financial, and environmental factors. Research results reveal that, especially in railway and LRT projects, potential causes of interface problems are mainly technical and managerial in nature. These relate to complex construction execution in highly congested areas. Meanwhile, coordination cause factors are mainly found in the education building construction project with loan from a foreign donor. All of the six projects have to resolve interface problems caused by incomplete or low-quality contract documents. This research also shows that the design-bid-build delivery method involving more parties in construction projects tends to induce more interface problem cause factors than the design-build scheme.Keywords: cause factors, construction delays, project delivery method, contract documents
Procedia PDF Downloads 255212 Social Media Resignation the Only Way to Protect User Data and Restore Cognitive Balance, a Literature Review
Authors: Rajarshi Motilal
Abstract:
The birth of the Internet and the rise of social media marked an important chapter in the history of humankind. Often termed the fourth scientific revolution, the Internet has changed human lives and cognisance. The birth of Web 2.0, followed by the launch of social media and social networking sites, added another milestone to these technological advancements where connectivity and influx of information became dominant. With billions of individuals using the internet and social media sites in the 21st century, “users” became “consumers”, and orthodox marketing reshaped itself to digital marketing. Furthermore, organisations started using sophisticated algorithms to predict consumer purchase behaviour and manipulate it to sustain themselves in such a competitive environment. The rampant storage and analysis of individual data became the new normal, raising many questions about data privacy. The excessive usage of the Internet among individuals brought in other problems of them becoming addicted to it, scavenging for societal approval and instant gratification, subsequently leading to a collective dualism, isolation, and finally, depression. This study aims to determine the relationship between social media usage in the modern age and the rise of psychological and cognitive imbalances in human minds. The literature review is positioned timely as an addition to the existing work at a time when the world is constantly debating on whether social media resignation is the only way to protect user data and restore the decaying cognitive balance.Keywords: social media, digital marketing, consumer behaviour, internet addiction, data privacy
Procedia PDF Downloads 76211 Child Homicide Victimization and Community Context: A Research Note
Authors: Bohsiu Wu
Abstract:
Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.Keywords: child homicide, deprivation, empowerment, isolation
Procedia PDF Downloads 194210 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics
Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky
Abstract:
With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities
Procedia PDF Downloads 166209 Influence of Sr(BO2)2 Doping on Superconducting Properties of (Bi,Pb)-2223 Phase
Authors: N. G. Margiani, I. G. Kvartskhava, G. A. Mumladze, Z. A. Adamia
Abstract:
Chemical doping with different elements and compounds at various amounts represents the most suitable approach to improve the superconducting properties of bismuth-based superconductors for technological applications. In this paper, the influence of partial substitution of Sr(BO2)2 for SrO on the phase formation kinetics and transport properties of (Bi,Pb)-2223 HTS has been studied for the first time. Samples with nominal composition Bi1.7Pb0.3Sr2-xCa2Cu3Oy[Sr(BO2)2]x, x=0, 0.0375, 0.075, 0.15, 0.25, were prepared by the standard solid state processing. The appropriate mixtures were calcined at 845 oC for 40 h. The resulting materials were pressed into pellets and annealed at 837 oC for 30 h in air. Superconducting properties of undoped (reference) and Sr(BO2)2-doped (Bi,Pb)-2223 compounds were investigated through X-ray diffraction (XRD), resistivity (ρ) and transport critical current density (Jc) measurements. The surface morphology changes in the prepared samples were examined by scanning electron microscope (SEM). XRD and Jc studies have shown that the low level Sr(BO2)2 doping (x=0.0375-0.075) to the Sr-site promotes the formation of high-Tc phase and leads to the enhancement of current carrying capacity in (Bi,Pb)-2223 HTS. The doped sample with x=0.0375 has the best performance compared to other prepared samples. The estimated volume fraction of (Bi,Pb)-2223 phase increases from ~25 % for reference specimen to ~70 % for x=0.0375. Moreover, strong increase in the self-field Jc value was observed for this dopant amount (Jc=340 A/cm2), compared to an undoped sample (Jc=110 A/cm2). Pronounced enhancement of superconducting properties of (Bi,Pb)-2223 superconductor can be attributed to the acceleration of high-Tc phase formation as well as the improvement of inter-grain connectivity by small amounts of Sr(BO2)2 dopant.Keywords: bismuth-based superconductor, critical current density, phase formation, Sr(BO₂)₂ doping
Procedia PDF Downloads 244208 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward
Authors: Ahmad Almaududy Amri
Abstract:
Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.Keywords: piracy, Southeast Asia, maritime security, legal frameworks
Procedia PDF Downloads 503207 Low Complexity Carrier Frequency Offset Estimation for Cooperative Orthogonal Frequency Division Multiplexing Communication Systems without Cyclic Prefix
Authors: Tsui-Tsai Lin
Abstract:
Cooperative orthogonal frequency division multiplexing (OFDM) transmission, which possesses the advantages of better connectivity, expanded coverage, and resistance to frequency selective fading, has been a more powerful solution for the physical layer in wireless communications. However, such a hybrid scheme suffers from the carrier frequency offset (CFO) effects inherited from the OFDM-based systems, which lead to a significant degradation in performance. In addition, insertion of a cyclic prefix (CP) at each symbol block head for combating inter-symbol interference will lead to a reduction in spectral efficiency. The design on the CFO estimation for the cooperative OFDM system without CP is a suspended problem. This motivates us to develop a low complexity CFO estimator for the cooperative OFDM decode-and-forward (DF) communication system without CP over the multipath fading channel. Especially, using a block-type pilot, the CFO estimation is first derived in accordance with the least square criterion. A reliable performance can be obtained through an exhaustive two-dimensional (2D) search with a penalty of heavy computational complexity. As a remedy, an alternative solution realized with an iteration approach is proposed for the CFO estimation. In contrast to the 2D-search estimator, the iterative method enjoys the advantage of the substantially reduced implementation complexity without sacrificing the estimate performance. Computer simulations have been presented to demonstrate the efficacy of the proposed CFO estimation.Keywords: cooperative transmission, orthogonal frequency division multiplexing (OFDM), carrier frequency offset, iteration
Procedia PDF Downloads 266206 Human Factors Considerations in New Generation Fighter Planes to Enhance Combat Effectiveness
Authors: Chitra Rajagopal, Indra Deo Kumar, Ruchi Joshi, Binoy Bhargavan
Abstract:
Role of fighter planes in modern network centric military warfare scenarios has changed significantly in the recent past. New generation fighter planes have multirole capability of engaging both air and ground targets with high precision. Multirole aircraft undertakes missions such as Air to Air combat, Air defense, Air to Surface role (including Air interdiction, Close air support, Maritime attack, Suppression and Destruction of enemy air defense), Reconnaissance, Electronic warfare missions, etc. Designers have primarily focused on development of technologies to enhance the combat performance of the fighter planes and very little attention is given to human factor aspects of technologies. Unique physical and psychological challenges are imposed on the pilots to meet operational requirements during these missions. Newly evolved technologies have enhanced aircraft performance in terms of its speed, firepower, stealth, electronic warfare, situational awareness, and vulnerability reduction capabilities. This paper highlights the impact of emerging technologies on human factors for various military operations and missions. Technologies such as ‘cooperative knowledge-based systems’ to aid pilot’s decision making in military conflict scenarios as well as simulation technologies to enhance human performance is also studied as a part of research work. Current and emerging pilot protection technologies and systems which form part of the integrated life support systems in new generation fighter planes is discussed. System safety analysis application to quantify the human reliability in military operations is also studied.Keywords: combat effectiveness, emerging technologies, human factors, systems safety analysis
Procedia PDF Downloads 142205 Terrorism: Impact on Nigeria’s Foreign Policy, 1999-2015
Authors: Omolaja Akolade Oluwaseunfunmi
Abstract:
This study seeks to ascertain the origin and history of terrorism in Nigeria, determine the causes of terrorism in Nigeria, examine Nigeria’s foreign policies from 1999 to 2015, evaluate how terrorist groups like Boko Haram and the Indigenous People of Biafra (IPOB) have affected Nigeria’s foreign policies in the international arena; ascertain the measures taken by the government in tackling terrorist acts in Nigeria and give recommendations on how to tackle this menace. The methodology used in this research is the analytical method. The study derives its data from both primary and secondary sources. Findings from fieldwork showed that terrorism has also become one of the most important fundamentals of Nigeria’s foreign policies and relations; respondents from the people interviewed showed that terrorism is a menace and that terrorism must be adequately tackled in other to achieve Nigeria’s foreign policy. Furthermore, results revealed that the fight against the scourge has increasingly gained legitimacy and justification among the international community particularly as many countries consider it to be their international obligation to support the global movement to ameliorate or eliminate the menace. In conclusion, this research made, among other recommendations, that the Nigerian government should ensure the provision of a good life for its citizens, the inter-connectivity of terrorist organizations must be defeated, the government should undergo a foreign policy drive designed at rebuilding its image in the international environment, and also the promotion of peace education among various government, religious institutions, private sector, and civil society groups should be encouraged.Keywords: foreign policy, Boko Haram, movement for the emancipation of Niger delta (MEND), terrorism
Procedia PDF Downloads 27204 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network
Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar
Abstract:
Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.Keywords: Bitcoin network, propagation delay, clustering, scalability
Procedia PDF Downloads 116203 Localization of Frontal and Temporal Speech Areas in Brain Tumor Patients by Their Structural Connections with Probabilistic Tractography
Authors: B.Shukir, H.Woo, P.Barzo, D.Kis
Abstract:
Preoperative brain mapping in tumors involving the speech areas has an important role to reduce surgical risks. Functional magnetic resonance imaging (fMRI) is the gold standard method to localize cortical speech areas preoperatively, but its availability in clinical routine is difficult. Diffusion MRI based probabilistic tractography is available in head MRI. It’s used to segment cortical subregions by their structural connectivity. In our study, we used probabilistic tractography to localize the frontal and temporal cortical speech areas. 15 patients with left frontal tumor were enrolled to our study. Speech fMRI and diffusion MRI acquired preoperatively. The standard automated anatomical labelling atlas 3 (AAL3) cortical atlas used to define 76 left frontal and 118 left temporal potential speech areas. 4 types of tractography were run according to the structural connection of these regions to the left arcuate fascicle (FA) to localize those cortical areas which have speech functions: 1, frontal through FA; 2, frontal with FA; 3, temporal to FA; 4, temporal with FA connections were determined. Thresholds of 1%, 5%, 10% and 15% applied. At each level, the number of affected frontal and temporal regions by fMRI and tractography were defined, the sensitivity and specificity were calculated. At the level of 1% threshold showed the best results. Sensitivity was 61,631,4% and 67,1523,12%, specificity was 87,210,4% and 75,611,37% for frontal and temporal regions, respectively. From our study, we conclude that probabilistic tractography is a reliable preoperative technique to localize cortical speech areas. However, its results are not feasible that the neurosurgeon rely on during the operation.Keywords: brain mapping, brain tumor, fMRI, probabilistic tractography
Procedia PDF Downloads 166202 Synergistic Effect of Zr-Modified Cu-ZnO-Al₂O₃ and Bio-Templated HZSM-5 Catalysts in CO₂ Hydrogenation to Methanol and DME
Authors: Abrar Hussain, Kuen-Song Lin, Sayed Maeen Badshah, Jamshid Hussain
Abstract:
The conversion of CO₂ into versatile, useful compounds such as fuels and other chemicals remains a challenging frontier in research, demanding the innovation of increasingly effective catalysts. In the present work, a catalyst-incorporating zirconium (Zr) modification within CuO–ZnO–Al₂O₃ (CZA) was synthesized via a co-precipitation method to convert CO₂ into methanol. Furthermore, bio-HZSM-5 was used to promote methanol dehydration to produce dimethyl ether (DME). We prepared the porous hierarchy bio-HZSM-5 with remarkable pore connectivity by utilizing an economical loofah sponge and rice husks as biotemplates. The synthesized catalysts were characterized using Field Emission Scanning Electron Microscopy (FE-SEM), X–ray diffraction (XRD), N₂ adsorption (BET), temperature-programmed desorption (NH₃-TPD) and thermogravimetric analysis (TGA). The Zr addition improved the performance of the CZZA catalyst as a structural promoter, leading to increased DME selectivity and total carbon conversion by enhancing active sites, surface area, and the synergistic interfaces between CuO and ZnO. The presence of silicon in the biomass, notably from the loofah sponge (0.016 wt %) and rice husks (8.3 wt %), also performed a pivotal role in the preparation of bio-HZSM-5. Furthermore, contrasted to the CZZA/com-ZSM-5 catalyst, the integration of CZZA with bio-HZSM-5-L bifunctional catalyst achieved the highest DME yield (12.1 %), DME selectivity (58.6%), CO₂ conversion (22.5%) at 280 °C and 30 bar. The payback time for 5 and 10-tons per day (5 and10-TPD) DME formation using the catalytic process of CO₂ from petrochemical refinery plant waste gas emissions was 2.98 and 2.44 years, respectively.Keywords: Cost assessment, Dimethyl ether, low-cost bio-HZSM-5, CZZA catalyst, CO₂ hydrogenation
Procedia PDF Downloads 11201 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity
Procedia PDF Downloads 44200 Influence of Processing Parameters in Selective Laser Melting on the Microstructure and Mechanical Properties of Ti/Tin Composites With in-situ and ex-situ Reinforcement
Authors: C. Sánchez de Rojas Candela, A. Riquelme, P. Rodrigo, M. D. Escalera-Rodríguez, B. Torres, J. Rams
Abstract:
Selective laser melting is one of the most commonly used AM techniques. In it, a thin layer of metallic powder is deposited, and a laser is used to melt selected zones. The accumulation of layers, each one molten in the preselected zones, gives rise to the formation of a 3D sample with a nearly arbitrary design. To ensure that the properties of the final parts match those of the powder, all the process is carried out in an inert atmosphere, preferentially Ar, although this gas could be substituted. Ti6Al4V alloy is widely used in multiple industrial applications such as aerospace, maritime transport and biomedical, due to its properties. However, due to the demanding requirements of these applications, greater hardness and wear resistance are necessary, together with a better machining capacity, which currently limits its commercialization. To improve these properties, in this study, Selective Laser Melting (SLM) is used to manufacture Ti/TiN metal matrix composites with in-situ and ex-situ titanium nitride reinforcement where the scanning speed is modified (from 28.5 up to 65 mm/s) to study the influence of the processing parameters in SLM. A one-step method of nitriding the Ti6Al4V alloy is carried out to create in-situ TiN reinforcement in a reactive atmosphere and it is compared with ex-situ composites manufactured by previous mixture of both the titanium alloy powder and the ceramic reinforcement particles. The microstructure and mechanical properties of the different Ti/TiN composite materials have been analyzed. As a result, the existence of a similar matrix has been confirmed in in-situ and ex-situ fabrications and the growth mechanisms of the nitrides have been studied. An increase in the mechanical properties with respect to the initial alloy has been observed in both cases and related to changes in their microstructure. Specifically, a greater improvement (around 30.65%) has been identified in those manufactured by the in-situ method at low speeds although other properties such as porosity must be improved for their future industrial applicability.Keywords: in-situ reinforcement, nitriding reaction, selective laser melting, titanium nitride
Procedia PDF Downloads 79199 Meditation Aided with 40 Hz Binaural Beats Enhances the Cognitive Function and Mood State
Authors: Rubina Shakya, Srijana Dangol, Dil Islam Mansur
Abstract:
The exposure of constant stress stimuli in our daily lives is causing deterioration of neural connectivity in the brain. Interestingly, the improvement in larger-scale neural communication has been argued to rely on brain rhythms, which might be sensitive to binaural beats of particular frequency bands. The theoretical idea behind neural entrainment is that the rhythmic oscillatory activity within and between different brain regions can enhance cognitive function and mood state. So, we aimed to investigate whether the binaural beats of 40 Hz could enhance the cognition and the mood stability of the medical students at Kathmandu University of age 18-25 years old, which possibly, in the long run, might help to enhance their work productivity. The participants were asked to focus on the auditory stimuli of binaural beats with 200 Hz on the right side and 240 Hz on the left side of the headset for 15 minutes, every alternative day of three consecutive weeks. The Stroop’s test and the Brunel Mood Scale (BRUMS) were applied to assess the cognitive function and the mood state, respectively. The binaural beats significantly decreased the reaction time for the incoherent component of Stroop’s test in both male and female participants. For the mood state, scores of all positive emotions except ‘Calmness’ were significantly increased in the case of males. Whereas, scores of all positive emotions except ‘Vigor’ were significantly increased in the case of females. The results suggested that the meditation aided by binaural beats of 40 Hz helps in improving cognition and mood states to some extent.Keywords: binaural beats, cognitive function, gamma neural oscillation, mood states
Procedia PDF Downloads 141198 Protecting the Democracy of Children through Sustainable Risk Management: An Investigation into Risk Assessment and Nature-Based Play
Authors: Molly Gerrish
Abstract:
This work explores the physical, emotional, social, and cognitive risks and benefits related to nature-based teaching and highlights the importance of promoting a sustainable workforce within early childhood programs. Assessing and managing risks can help programs reimagine their approach to teaching, learning, recruitment, family connectivity, and staff motivation. The importance of staff sustainability and motivation/engagement related to social justice and the environment will be discussed. We will explore ways to manage fears and limitations faced by early childhood programs regarding nature experiences and risky play in a variety of locations using a lens of place-based learning. We will also examine the alignment of sustainability and social-emotional development, mental health supports, social awareness, and risk assessment. The work will discuss the varied perceptions of risk in diverse areas and the impact on the early childhood workforce. Motivational theory and compassion resiliency are hallmarks of both recruiting and retaining high-quality early childhood educators; the work will discuss how to balance programmatic constraints and healthy motivation for students and teachers while empowering individuals to advocate for their mental health and well-being. Finally, the work will highlight the positive impact of nature-based teaching practices and the overall benefit to young children and their educators.Keywords: child’s rights, inclusion, nature-based education, risk assessment
Procedia PDF Downloads 60197 Integrated Free Space Optical Communication and Optical Sensor Network System with Artificial Intelligence Techniques
Authors: Yibeltal Chanie Manie, Zebider Asire Munyelet
Abstract:
5G and 6G technology offers enhanced quality of service with high data transmission rates, which necessitates the implementation of the Internet of Things (IoT) in 5G/6G architecture. In this paper, we proposed the integration of free space optical communication (FSO) with fiber sensor networks for IoT applications. Recently, free-space optical communications (FSO) are gaining popularity as an effective alternative technology to the limited availability of radio frequency (RF) spectrum. FSO is gaining popularity due to flexibility, high achievable optical bandwidth, and low power consumption in several applications of communications, such as disaster recovery, last-mile connectivity, drones, surveillance, backhaul, and satellite communications. Hence, high-speed FSO is an optimal choice for wireless networks to satisfy the full potential of 5G/6G technology, offering 100 Gbit/s or more speed in IoT applications. Moreover, machine learning must be integrated into the design, planning, and optimization of future optical wireless communication networks in order to actualize this vision of intelligent processing and operation. In addition, fiber sensors are important to achieve real-time, accurate, and smart monitoring in IoT applications. Moreover, we proposed deep learning techniques to estimate the strain changes and peak wavelength of multiple Fiber Bragg grating (FBG) sensors using only the spectrum of FBGs obtained from the real experiment.Keywords: optical sensor, artificial Intelligence, Internet of Things, free-space optics
Procedia PDF Downloads 63196 Waste Heat Recovery System
Authors: A. Ramkumar, Anvesh Sagar, Preetham P. Karkera
Abstract:
Globalization in the modern era is dependent on the International logistics, the economic and reliable means is provided by the ocean going merchant vessel. The propulsion system which drives this massive vessels has gone through leaps and bounds of evolution. Most reliable system of propulsion adopted by the majority of vessels is by marine diesel engine. Since the first oil crisis of 1973, there is demand in increment of efficiency of main engine. Due to increase in the oil prices ship-operators explores for reduction in the operational cost of ship. And newly adopted IMO’s EEDI & SEEMP rules calls for the effective measures taken in this regard. The main engine of a ship suffers a lot of thermal losses, they mainly occur due to exhaust gas waste heat, radiation and cooling. So to increase the overall efficiency of system, we have to look into the solution to harnessing this waste energy of main engine to increase the fuel economy. During the course of research, engine manufacturers have developed many waste heat recovery systems. In our paper we see about additional options to harness this waste heat. The exhaust gas of engine coming out from the turbocharger still holds enough heat to go to the exhaust gas economiser to produce steam. This heat of exhaust gas can be used to heat a liquid of less boiling point after coming out from the turbocharger. The vapour of this secondary liquid can be superheated by a bypass exhaust or exhaust of turbocharger. This vapour can be utilized to rotate the turbine which is coupled to a generator. And the electric power for ship service can be produced with proper configuration of system. This can be included in PMS of ship. In this paper we seek to concentrate on power generation with use of exhaust gas. Thereby taking out the load on the main generator and increasing the efficiency of the system. This will help us to comply with the new rules of IMO. Our method helps to develop clean energy.Keywords: EEDI–energy efficiency design index, IMO–international maritime organization PMS-power management system, SEEMP–ship energy efficiency management plan
Procedia PDF Downloads 381195 The Teaching and Learning Process and Information and Communication Technologies from the Remote Perspective
Authors: Rosiris Maturo Domingues, Patricia Luissa Masmo, Cibele Cavalheiro Neves, Juliana Dalla Martha Rodriguez
Abstract:
This article reports the experience of the pedagogical consultants responsible for the curriculum development of Senac São Paulo courses when facing the emergency need to maintain the pedagogical process in their schools in the face of the Covid-19 pandemic. The urgent adjustment to distance education resulted in the improvement of the process and the adoption of new teaching and learning strategies mediated by technologies. The processes for preparing and providing guidelines for professional education courses were also readjusted. Thus, a bank of teaching-learning strategies linked to digital resources was developed, categorized, and identified by their didactic-pedagogical potential, having as an intersection didactic planning based on learning objectives based on Bloom's taxonomy (revised), given its convergence with the competency approach adopted by Senac. Methodologically, a relationship was established between connectivity and digital networks and digital evolution in school environments, culminating in new paradigms and processes of educational communication and new trends in teaching and learning. As a result, teachers adhered to the use of digital tools in their practices, transposing face-to-face classroom methodologies and practices to online media, whose criticism was the use of ICTs in an instrumental way, reducing methodologies and practices to teaching only transmissive. There was recognition of the insertion of technology as a facilitator of the educational process in a non-palliative way and the development of a web curriculum, now and fully, carried out in contexts of ubiquity.Keywords: technologies, education, teaching-learning strategies, Bloom taxonomy
Procedia PDF Downloads 89194 Social Distancing as a Population Game in Networked Social Environments
Authors: Zhijun Wu
Abstract:
While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments
Procedia PDF Downloads 133193 Nigeria’s Tempestuous Voyage to DB2023 via the Multimodal Route: Adjusting the Sails to Contemporary Trade Winds and Policies
Authors: Dike Ibegbulem
Abstract:
This paper interrogates the chances of Nigeria achieving its target of making the list of the first 70 countries in World Bank’s Ease of Doing Business (EoDB) rankings by the year 2023. That is, in light of existing conflicts in policies relating to the door-to-door carriage of goods and multimodal transport operations (MTOs) in the country. Drawing on the famed Legal Origins theory plus data from World Bank; and using Singapore as a touchstone, the paper unveils how amongst the top-ranked Commonwealth jurisdictions, positive correlations have been recorded over the past years between certainty in their policies on MTOs on the one hand; and their Enforcing Contracts (EC) and Doing Business (DB) indices on the other. The paper postulates that to increase Nigeria’s chances of achieving her DB2023 objective, legislative and curial policies on MTOs and door-to-door carriage of goods have to be realigned in line with prevailing policies in highly-ranked Commonwealth jurisdictions of the Global North. Her appellate courts, in particular, will need some unshackling from English pedigrees which still delimit admiralty jurisdiction to port-to-port shipping, to the exclusion of door-to-door carriage of goods beyond navigable waters. The paper identifies continental and domestic instruments, plus judicial precedents, which provide bases for expanding admiralty jurisdiction to adjudication of claims derived from door-to-door or multimodal transport contracts and other allied maritime-plus contracts. It prescribes synergy between legislative and curial policies on MTOs and door-to-door carriage of goods as species of admiralty – an emerging trend in top-ranked Commonwealth jurisdictions of the Global North.Keywords: admiralty jurisdiction, legal origins, world bank, ease of doing business, enforcing contracts, multimodal transport operation, door-to-door, carriage of goods by sea, combined transport shipping
Procedia PDF Downloads 79192 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 41191 Urban Design as a Tool to Address Safety in a Crime Ridden Area: A Case Study of Malviya Nagar, New Delhi
Authors: Shramana Mondal
Abstract:
As a city is growing in population, sprawl, and complexity, use of public spaces increases variably and thus ensuring safety for the people becomes an utmost priority. While active monitoring measures may be necessary in some places, urban design can play a major role in devising self-policing and encourage active public life. This paper aims to explore the various spatial and psychological reasons for the occurrence of crime and the role of ‘urban design’ to address this issue. In this research, the principles of urban design are examined, as well as projected on actual site by addressing the issue with urban design principles. In this review the sociological, psychological, typological and morphological factors are addressed which affect the safety of a space and the possible framing guidelines, controls and urban design strategies are explored to address a safe neighborhood. On the basis of statistical survey, the residential and street network of Malviya Nagar in Delhi is chosen as the area of demonstration. The programs inhibit a safe neighborhood and a movement network that are addressed based on the four principles of natural surveillance, territoriality, community building, and connectivity. The paper concludes with a discussion of the urban design as an effective tool by creating an intense active zone with mixed use feature to ensure throughout activity and also ensuring safe pedestrian zone by introducing sense of community feeling and territoriality thus achieving active, useful and public friendly space.Keywords: crime, public life, safety, urban design
Procedia PDF Downloads 399190 Methods and Techniques for Lower Danube Sturgeon Monitoring Used for the Assessment of Anthropic Activities Pressures and the Quantification of Risks on These Species
Authors: Gyorgy Deak, Marius C. Raischi, Lucian P. Georgescu, Tiberius M. Danalache, Elena Holban, Madalina G. Boboc, Monica Matei, Catalina Iticescu, Marius V. Olteanu, Stefan Zamfir, Gabriel Cornateanu
Abstract:
At present, on the Lower Danube, different types of pressures have been identified that affect the anadromous sturgeons stocks with an impact that leads to their decline. This paper presents techniques and procedures used by Romanian experts in the tagging and monitoring of anadromous sturgeons, as well as unique results at international level obtained on the basis of an informational volume collected in over 7 years of monitoring on these species behavior (both for adults as well as for ultrasonically tagged juveniles) on the Lower Danube. The local impact of hydrotechnical constructions (bottom sill, maritime navigation channel), the global impact of the poaching phenomenon and the impact of the restocking programs with sturgeon juveniles were assessed. Thus, the bottom sill impact on the Bala branch, the Bastroe Channel (cross-border impact) and the poaching phenomenon at the level of the Lower Danube was analyzed on the basis of a unique informational volume obtained through the use of patented monitoring systems by the Romanian experts (DKTB respectively, DKMR-01T). At the same time, the results from the monitoring of ultrasonically tagged sturgeon juveniles from the 2015 repopulation program are presented. Conclusions resulting from research can ensure favorable premises for finding some conservation solutions for CITES-protected sturgeon species that have survived for millions of years, currently being 1 species on the brink of extinction - Russian sturgeon, 2 species in danger of extinction - Beluga sturgeon and Stellate sturgeon and 2 species already extinct from the Lower Danube, namely common sturgeon and ship sturgeon.Keywords: Lower Danube, sturgeons monitoring (adults and juveniles), tagging, impact on conservation
Procedia PDF Downloads 240189 Perception of Faculties Towards Online Teaching-Learning Activities during COVID-19 Pandemic: A Cross-Sectional Study at a Tertiary Care Center in Eastern Nepal
Authors: Deependra Prasad Sarraf, Gajendra Prasad Rauniar, Robin Maskey, Rajiv Maharjan, Ashish Shrestha, Ramayan Prasad Kushwaha
Abstract:
Objectives: To assess the perception of faculties towards online teaching-learning activities conducted during the COVID-19 pandemic and to identify barriers and facilitators to conducting online teaching-learning activities in our context. Methods: A cross-sectional study was conducted among faculties at B. P. Koirala Institute of Health Sciences using a 26-item semi-structured questionnaire. A Google Form was prepared, and its link was sent to the faculties via email. Descriptive statistics were calculated, and findings were presented as tables and graphs. Results: Out of 158 faculties, the majority were male (66.46%), medical faculties (85.44%), and assistant professors (46.84%). Only 16 (10.13%) faculties had received formal training regarding preparing and/or delivering online teaching learning activities. Out of 158, 133 (84.18%) faculties faced technical and internet issues. The most common advantage and disadvantage of online teaching learning activities perceived by the faculties were ‘not limited to time or place’ (94.30%) and ‘lack of interaction with the students’ (82.28%), respectively. Majority (94.3%) of them had a positive perception towards online teaching-learning activities conducted during COVID-19 pandemic. Slow internet connection (91.77%) and frequent electricity interruption (82.91%) were the most common perceived barriers to online teaching-learning. Conclusions: Most of the faculties had a positive perception towards online teaching-learning activities. Academic leaders and stakeholders should provide uninterrupted internet and electricity connectivity, training on online teaching-learning platform, and timely technical support.Keywords: COVID-19 pandemic, faculties, medical education, perception
Procedia PDF Downloads 175188 Improving Fault Tolerance and Load Balancing in Heterogeneous Grid Computing Using Fractal Transform
Authors: Saad M. Darwish, Adel A. El-Zoghabi, Moustafa F. Ashry
Abstract:
The popularity of the Internet and the availability of powerful computers and high-speed networks as low-cost commodity components are changing the way we use computers today. These technical opportunities have led to the possibility of using geographically distributed and multi-owner resources to solve large-scale problems in science, engineering, and commerce. Recent research on these topics has led to the emergence of a new paradigm known as Grid computing. To achieve the promising potentials of tremendous distributed resources, effective and efficient load balancing algorithms are fundamentally important. Unfortunately, load balancing algorithms in traditional parallel and distributed systems, which usually run on homogeneous and dedicated resources, cannot work well in the new circumstances. In this paper, the concept of a fast fractal transform in heterogeneous grid computing based on R-tree and the domain-range entropy is proposed to improve fault tolerance and load balancing algorithm by improve connectivity, communication delay, network bandwidth, resource availability, and resource unpredictability. A novel two-dimension figure of merit is suggested to describe the network effects on load balance and fault tolerance estimation. Fault tolerance is enhanced by adaptively decrease replication time and message cost while load balance is enhanced by adaptively decrease mean job response time. Experimental results show that the proposed method yields superior performance over other methods.Keywords: Grid computing, load balancing, fault tolerance, R-tree, heterogeneous systems
Procedia PDF Downloads 491