Search results for: public order and security act
16007 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba E. J. D.
Abstract:
The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.Keywords: merged irregular transposition, error level, model estimation, message splitting
Procedia PDF Downloads 31616006 An Energy-Balanced Clustering Method on Wireless Sensor Networks
Authors: Yu-Ting Tsai, Chiun-Chieh Hsu, Yu-Chun Chu
Abstract:
In recent years, due to the development of wireless network technology, many researchers have devoted to the study of wireless sensor networks. The applications of wireless sensor network mainly use the sensor nodes to collect the required information, and send the information back to the users. Since the sensed area is difficult to reach, there are many restrictions on the design of the sensor nodes, where the most important restriction is the limited energy of sensor nodes. Because of the limited energy, researchers proposed a number of ways to reduce energy consumption and balance the load of sensor nodes in order to increase the network lifetime. In this paper, we proposed the Energy-Balanced Clustering method with Auxiliary Members on Wireless Sensor Networks(EBCAM)based on the cluster routing. The main purpose is to balance the energy consumption on the sensed area and average the distribution of dead nodes in order to avoid excessive energy consumption because of the increasing in transmission distance. In addition, we use the residual energy and average energy consumption of the nodes within the cluster to choose the cluster heads, use the multi hop transmission method to deliver the data, and dynamically adjust the transmission radius according to the load conditions. Finally, we use the auxiliary cluster members to change the delivering path according to the residual energy of the cluster head in order to its load. Finally, we compare the proposed method with the related algorithms via simulated experiments and then analyze the results. It reveals that the proposed method outperforms other algorithms in the numbers of used rounds and the average energy consumption.Keywords: auxiliary nodes, cluster, load balance, routing algorithm, wireless sensor network
Procedia PDF Downloads 28016005 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 6416004 An A-Star Approach for the Quickest Path Problem with Time Windows
Authors: Christofas Stergianos, Jason Atkin, Herve Morvan
Abstract:
As air traffic increases, more airports are interested in utilizing optimization methods. Many processes happen in parallel at an airport, and complex models are needed in order to have a reliable solution that can be implemented for ground movement operations. The ground movement for aircraft in an airport, allocating a path to each aircraft to follow in order to reach their destination (e.g. runway or gate), is one process that could be optimized. The Quickest Path Problem with Time Windows (QPPTW) algorithm has been developed to provide a conflict-free routing of vehicles and has been applied to routing aircraft around an airport. It was subsequently modified to increase the accuracy for airport applications. These modifications take into consideration specific characteristics of the problem, such as: the pushback process, which considers the extra time that is needed for pushing back an aircraft and turning its engines on; stand holding where any waiting should be allocated to the stand; and runway sequencing, where the sequence of the aircraft that take off is optimized and has to be respected. QPPTW involves searching for the quickest path by expanding the search in all directions, similarly to Dijkstra’s algorithm. Finding a way to direct the expansion can potentially assist the search and achieve a better performance. We have further modified the QPPTW algorithm to use a heuristic approach in order to guide the search. This new algorithm is based on the A-star search method but estimates the remaining time (instead of distance) in order to assess how far the target is. It is important to consider the remaining time that it is needed to reach the target, so that delays that are caused by other aircraft can be part of the optimization method. All of the other characteristics are still considered and time windows are still used in order to route multiple aircraft rather than a single aircraft. In this way the quickest path is found for each aircraft while taking into account the movements of the previously routed aircraft. After running experiments using a week of real aircraft data from Zurich Airport, the new algorithm (A-star QPPTW) was found to route aircraft much more quickly, being especially fast in routing the departing aircraft where pushback delays are significant. On average A-star QPPTW could route a full day (755 to 837 aircraft movements) 56% faster than the original algorithm. In total the routing of a full week of aircraft took only 12 seconds with the new algorithm, 15 seconds faster than the original algorithm. For real time application, the algorithm needs to be very fast, and this speed increase will allow us to add additional features and complexity, allowing further integration with other processes in airports and leading to more optimized and environmentally friendly airports.Keywords: a-star search, airport operations, ground movement optimization, routing and scheduling
Procedia PDF Downloads 23316003 Development of Enhanced Data Encryption Standard
Authors: Benjamin Okike
Abstract:
There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.Keywords: encryption, enhanced data encryption, encryption techniques, information security
Procedia PDF Downloads 15416002 The Potential for Maritime Tourism: An African Perspective
Authors: Lynn C. Jonas
Abstract:
The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes
Procedia PDF Downloads 2716001 Hegemonic Salaryman Masculinity: Case Study of Transitional Male Gender Roles in Today's Japan
Authors: D. Norton
Abstract:
This qualitative study focuses on the lived experience and displacement of young white-collar masculinities in Japan. In recent years, the salaryman lifestyle has undergone significant disruption - increased competition for regular employment, rise in non-regular structurings of labour across public/private sectors, and shifting role expectations within the home. Despite this, related scholarship hints at a continued reinforcement of the traditional male gender role - that the salaryman remains a key benchmark of Japanese masculine identity. For those in structural proximity to these more ‘normative’ performativities, interest lies their engagement with such narratives - how they make sense of their masculinity in response to stated changes. In light of the historical emphasis on labour and breadwinning logics, notions of respective security or precarity generated as a result remain unclear. Similarly, concern extends to developments within the private sphere - by what means young white-collar men construct ideas of singlehood and companionship according to traditional gender ideologies or more contemporary, flexible readings. The influence of these still-emergent status distinctions on the logics of the social group in question is yet to be explored in depth by gender scholars. This project, therefore, focuses on a salaryman archetype as hegemonic - its transformation amidst these changes and socialising mechanisms that continue to legitimate unequal gender hierarchies. For data collection, a series of ethnographic interviews were held over a period of 12 months with university-educated, white-collar male employees from both Osaka and the Greater Tokyo Area. Findings suggest a modern salaryman ideal reflecting both continuities and shifts within white-collar employment. Whilst receptive to more contemporary workplace practices, the narratives of those interviewed remain imbued with logics supporting patterns of internal hegemony. Regular/non-regular distinction emerged as the foremost variable for both material and discursive patterns of white-collar stratification, with variants of displacement for each social group. Despite the heightened valorisation of stable employment, regular workers articulated various concerns over a model of corporate masculinity seen to be incompatible with recent socioeconomic developments. Likewise, non-regular employees face detachment owing to a still-inflexible perception of their working masculinity as marginalized amidst economic precarity. In seeking to negotiate respective challenges, those interviewed demonstrated an engagement with various concurrent social changes that would often either accommodate, reinforce, or expand upon traditional role behaviours. Few of these narratives offered any notable transgression of said ideal, however, suggesting that within the spectre of white-collar employment in Japan for the near future, any substantive transformation of corporate masculinity remains dependant upon economic developments, less so the agency of those involved.Keywords: gender ideologies, hegemonic masculinity, Japan, white-collar employment
Procedia PDF Downloads 13116000 Impact of E-Commerce Logistics Service Quality on Online Customer Satisfaction in UAE
Authors: Leena Wanganoo
Abstract:
In this digital age with the mushrooming of online companies across the globe has led to an unprecedented new business model. The frequency of online purchasing varies across the globe, but trend shows a steep upward movement. From Generation X to the Millennial the consumer not only wants to order the product with the click of mouse but also very demanding service quality during pre to post-transaction stage. The existing research examines the impact of website quality on the on behavioral intentions in e-services customers and has not adequately recognized the quality of e-commerce logistics perceived by the customer.In order to address this gap, this study examines the relationship among the logistics service quality, satisfaction, and loyalty. Drawing upon a sample of 350 millennial customers from various regions of UAE will work within the framework of structural equation modeling (SEM). Finally, the study would use Importance-Performance analysis (IPA) to discuss the relations of the level of customers’ expected logistics service quality and level of customers’ perceived logistics serviced quality.Keywords: logistics service quality, customer satisfaction, loyalty, electronic commerce
Procedia PDF Downloads 17315999 Comparison of Different Methods to Produce Fuzzy Tolerance Relations for Rainfall Data Classification in the Region of Central Greece
Authors: N. Samarinas, C. Evangelides, C. Vrekos
Abstract:
The aim of this paper is the comparison of three different methods, in order to produce fuzzy tolerance relations for rainfall data classification. More specifically, the three methods are correlation coefficient, cosine amplitude and max-min method. The data were obtained from seven rainfall stations in the region of central Greece and refers to 20-year time series of monthly rainfall height average. Three methods were used to express these data as a fuzzy relation. This specific fuzzy tolerance relation is reformed into an equivalence relation with max-min composition for all three methods. From the equivalence relation, the rainfall stations were categorized and classified according to the degree of confidence. The classification shows the similarities among the rainfall stations. Stations with high similarity can be utilized in water resource management scenarios interchangeably or to augment data from one to another. Due to the complexity of calculations, it is important to find out which of the methods is computationally simpler and needs fewer compositions in order to give reliable results.Keywords: classification, fuzzy logic, tolerance relations, rainfall data
Procedia PDF Downloads 31815998 Second Order MIMO Sliding Mode Controller for Nonlinear Modeled Wind Turbine
Authors: Alireza Toloei, Ahmad R. Saffary, Reza Ghasemi
Abstract:
Due to the growing need for energy and limited fossil resources, the use of renewable energy, particularly wind is strongly favored. We all wind energy can’t be saved. Betz law, 59% of the total kinetic energy of the wind turbine is extracting. Therefore turbine control to achieve maximum performance and maintain stable conditions seem necessary. In this article, we plan for a horizontal axis wind turbine variable-speed variable-pitch nonlinear controller to obtain maximum output power. The model presented in this article, including a wide range of wind turbines are horizontal axis. However, the parameters used in this model is from Vestas V29 225 kW wind turbine. We designed second order sliding mode controller, which was robust in the face of changes in wind speed and it eliminated chattering by using of super twisting algorithm. Finally, using MATLAB software to simulate the results we considered the accuracy of the simulation results.Keywords: non linear controller, robust, sliding mode, kinetic energy
Procedia PDF Downloads 50415997 Re-Invent Corporate Governance - Ethical Way
Authors: Talha Sareshwala
Abstract:
The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.Keywords: business, entrepreneur, ethics, governance, transparency.
Procedia PDF Downloads 7915996 Enhancement of Raman Scattering using Photonic Nanojet and Whispering Gallery Mode of a Dielectric Microstructure
Authors: A. Arya, R. Laha, V. R. Dantham
Abstract:
We report the enhancement of Raman scattering signal by one order of magnitude using photonic nanojet (PNJ) of a lollipop shaped dielectric microstructure (LSDM) fabricated by a pulsed CO₂ laser. Here, the PNJ is generated by illuminating sphere portion of the LSDM with non-resonant laser. Unlike the surface enhanced Raman scattering (SERS) technique, this technique is simple, and the obtained results are highly reproducible. In addition, an efficient technique is proposed to enhance the SERS signal with the help of high quality factor optical resonance (whispering gallery mode) of a LSDM. From the theoretical simulations, it has been found that at least an order of magnitude enhancement in the SERS signal could be achieved easily using the proposed technique. We strongly believe that this report will enable the research community for improving the Raman scattering signals.Keywords: localized surface plasmons, photonic nanojet, SERS, whispering gallery mode
Procedia PDF Downloads 24915995 Raman Scattering Broadband Spectrum Generation in Compact Yb-Doped Fiber Laser
Authors: Yanrong Song, Zikai Dong, Runqin Xu, Jinrong Tian, Kexuan Li
Abstract:
Nonlinear polarization rotation (NPR) technique has become one of the main techniques to achieve mode-locked fiber lasers for its compactness, implementation, and low cost. In this paper, we demonstrate a compact mode-locked Yb-doped fiber laser based on NPR technique in the all normal dispersion (ANDi) regime. In the laser cavity, there are no physical filter and polarization controller in laser cavity. Mode-locked pulse train is achieved in ANDi regime based on NPR technique. The fiber birefringence induced filtering effect is the mainly reason for mode-locking. After that, an extra 20 m long single-mode fiber is inserted in two different positions, dissipative soliton operation and noise like pulse operations are achieved correspondingly. The nonlinear effect is obviously enhanced in the noise like pulse regime and broadband spectrum generated owing to enhanced stimulated Raman scattering effect. When the pump power is 210 mW, the central wavelength is 1030 nm, and the corresponding 1st order Raman scattering stokes wave generates and locates at 1075 nm. When the pump power is 370 mW, the 1st and 2nd order Raman scattering stokes wave generate and locate at 1080 nm, 1126 nm respectively. When the pump power is 600 mW, the Raman continuum is generated with cascaded multi-order stokes waves, and the spectrum extends to 1188 nm. The total flat spectrum is from 1000nm to 1200nm. The maximum output average power and pulse energy are 18.0W and 14.75nJ, respectively.Keywords: fiber laser, mode-locking, nonlinear polarization rotation, Raman scattering
Procedia PDF Downloads 22315994 A Brief Trauma Treatment Program for Survivors of Trauma: A Single-Case Design
Authors: Duane Booysen, Ashraf Kagee
Abstract:
There is a high prevalence of violent crime and trauma exposure in South African society. Considering the prevalence of continuous violent crimes and traumatization in South Africa, the public mental health sector is required to combat the burgeoning effect of traumatic stress in South Africa. Trauma counselors, especially, provide important mental health services at primary health care to persons affected by traumatic events. Therefore, the evaluation and implementation of evidence-based trauma therapies is essential at a primary health care level in treating traumatic stress. A single-case design was used to evaluate the treatment effect of a Brief Trauma Treatment Programme treating persons who present with symptoms of posttraumatic stress disorder at a primary care trauma centre in Cape Town, South Africa. The sample consisted of six adult participants who presented with symptoms of posttraumatic stress and were assessed at baseline, during treatment, post-intervention and at 3-month follow. All participants received six sessions of trauma therapy. Assessment measures included the posttraumatic stress disorder symptom scale interviews for Diagnostic and Statistical Manual fifth edition (DSM5), the posttraumatic disorder checklist for DSM5, Beck Depression Inventory and Beck Anxiety Inventory. Results demonstrate that participants had noticeable reduced symptoms for traumatic stress, anxiety and depression despite living in contexts of violent crime and trauma. In conclusion, the article critically reflects on the need to evaluate and implement evidence-based treatments for the South African context, and how evidence-based treatments are used in developing socio-economic and cultural diverse contexts with continuous levels of violence and traumatization.Keywords: psychological interventions, public mental health, traumatic stress, single-case design
Procedia PDF Downloads 15915993 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.Keywords: Linux system calls, web attack detection, interception, SQL
Procedia PDF Downloads 36015992 Presentation of HVA Faults in SONELGAZ Underground Network and Methods of Faults Diagnostic and Faults Location
Authors: I. Touaїbia, E. Azzag, O. Narjes
Abstract:
Power supply networks are growing continuously and their reliability is getting more important than ever. The complexity of the whole network comprises numerous components that can fail and interrupt the power supply for the end user. Underground distribution systems are normally exposed to permanent faults, due to specific construction characteristics. In these systems, visual inspection cannot be performed. In order to enhance service restoration, accurate fault location techniques must be applied. This paper describes the different faults that affect the underground distribution system of SONELGAZ (National Society of Electricity and Gas of Algeria), and cable fault location procedure with impulse reflection method (TDR), based in the analyses of the cable response of the electromagnetic impulse, allows cable fault prelocation. The results are obtained from real test in the underground distribution feeder from electrical network of energy distribution company of Souk-Ahras, in order to know the influence of cable characteristics in the types and frequency of faults.Keywords: distribution networks, fault location, TDR, underground cable
Procedia PDF Downloads 54515991 Factors Affecting and Impeding Teachers’ Use of Learning Management System in Kingdom of Saudi Arabia Universities
Authors: Omran Alharbi, Victor Lally
Abstract:
The advantages of the adoption of new technology such as learning management systems (LMSs) in education and teaching methods have been widely recognised. This has led a large number of universities to integrate this type of technology into their daily learning and teaching activities in order to facilitate the education process for both learners and teachers. On the other hand, in some developing countries such as Saudi Arabia, educators have seldom used this technology. As a result, this study was conducted in order to investigate the factors that impede teachers’ use of technology (LMSs) in their teaching in Saudi Arabian institutions. This study used a qualitative approach. Eight participants were invited to take part in this study, and they were asked to give their opinions about the most significant factors that prevented them from integrating technology into their daily activities. The results revealed that a lack of LMS skills, interest in and knowledge about the LMS among teachers were the most significant factors impeding them from using technology in their lessons. The participants suggested that incentive training should be provided to reduce these challenges.Keywords: LMS, factors, KSA, teachers
Procedia PDF Downloads 13315990 Urban Ethical Fashion Networks of Design, Production and Retail in Taiwan
Authors: WenYing Claire Shih, Konstantinos Agrafiotis
Abstract:
The circular economy has become one of the seven fundamental pillars of Taiwan’s economic development, as this is promulgated by the government. The model of the circular economy, with its fundamental premise of waste elimination, can transform the textile and clothing sectors from major pollutant industries to a much cleaner alternative for a better quality of all citizens’ lives. In a related vein, the notion of the creative economy and more specifically the fashion industry can prompt similar results in terms of jobs and wealth creation. The combining forces of the circular and creative economies and their beneficial output have resulted in the configuration of ethical urban networks which potentially may lead to sources of competitive advantage. All actors involved in the configuration of this urban ethical fashion network from public authorities to private enterprise can bring about positive changes in the urban setting. Preliminary results through action research show that this configuration is an attainable task in terms of circularity by reducing fabric waste produced from local textile mills and through innovative methods of design, production and retail around urban spaces where the network has managed to generate a stream of jobs and financial revenues for all participants. The municipal authorities as the facilitating platform have been of paramount importance in this public-private partnership. In the explorative pilot study conducted about a network of production, consumption in terms of circularity of fashion products, we have experienced a positive disposition. As the network will be fully functional by attracting more participant firms from the textile and clothing sectors, it can be beneficial to Taiwan’s soft power in the region and simultaneously elevate citizens’ awareness on circular methods of fashion production, consumption and disposal which can also lead to the betterment of urban lifestyle and may open export horizons for the firms.Keywords: the circular economy, the creative economy, ethical urban networks, action research
Procedia PDF Downloads 14215989 An Interlock Model of Friction and Superlubricity
Authors: Azadeh Malekan, Shahin Rouhani
Abstract:
Superlubricity is a phenomenon where two surfaces in contact show negligible friction;this may be because the asperities of the two surfaces do not interlock. Two rough surfaces, when pressed against each other, can get into a formation where the summits of asperities of one surface lock into the valleys of the other surface. The amount of interlock depends on the geometry of the two surfaces. We suggest the friction force may then be proportional to the amount of interlock; this explains Superlubricity as the situation where there is little interlock. Then the friction force will be directly proportional to the normal force as it is related to the work necessary to lift the upper surface in order to clear the interlock. To investigate this model, we simulate the contact of two surfaces. In order to validate our model, we first investigate Amontons‘ law. Assuming that asperities retain deformations in the time scale while the top asperity moves across the lattice spacing Amonton’s law is observed. Structural superlubricity is examined by the hypothesis that surfaces are very rigid and there is no deformation in asperities. This may happen at small normal forces. When two identical surfaces come into contact, rotating the top surface we observe a peak in friction force near the angle of orientation where the two surfaces can interlock.Keywords: friction, amonton`s law, superlubricity, contact model
Procedia PDF Downloads 15115988 Wheeled Robot Stable Braking Process under Asymmetric Traction Coefficients
Authors: Boguslaw Schreyer
Abstract:
During the wheeled robot’s braking process, the extra dynamic vertical forces act on all wheels: left, right, front or rear. Those forces are directed downward on the front wheels while directed upward on the rear wheels. In order to maximize the deceleration, therefore, minimize the braking time and braking distance, we need to calculate a correct torque distribution: the front braking torque should be increased, and rear torque should be decreased. At the same time, we need to provide better transversal stability. In a simple case of all adhesion coefficients being the same under all wheels, the torque distribution may secure the optimal (maximal) control of the robot braking process, securing the minimum braking distance and a minimum braking time. At the same time, the transversal stability is relatively good. At any time, we control the transversal acceleration. In the case of the transversal movement, we stop the braking process and re-apply braking torque after a defined period of time. If we correctly calculate the value of the torques, we may secure the traction coefficient under the front and rear wheels close to its maximum. Also, in order to provide an optimum braking control, we need to calculate the timing of the braking torque application and the timing of its release. The braking torques should be released shortly after the wheels passed a maximum traction coefficient (while a wheels’ slip increases) and applied again after the wheels pass a maximum of traction coefficient (while the slip decreases). The correct braking torque distribution secures the front and rear wheels, passing this maximum at the same time. It guarantees an optimum deceleration control, therefore, minimum braking time. In order to calculate a correct torque distribution, a control unit should receive the input signals of a rear torque value (which changes independently), the robot’s deceleration, and values of the vertical front and rear forces. In order to calculate the timing of torque application and torque release, more signals are needed: speed of the robot: angular speed, and angular deceleration of the wheels. In case of different adhesion coefficients under the left and right wheels, but the same under each pair of wheels- the same under right wheels and the same under left wheels, the Select-Low (SL) and select high (SH) methods are applied. The SL method is suggested if transversal stability is more important than braking efficiency. Often in the case of the robot, more important is braking efficiency; therefore, the SH method is applied with some control of the transversal stability. In the case that all adhesion coefficients are different under all wheels, the front-rear torque distribution is maintained as in all previous cases. However, the timing of the braking torque application and release is controlled by the rear wheels’ lowest adhesion coefficient. The Lagrange equations have been used to describe robot dynamics. Matlab has been used in order to simulate the process of wheeled robot braking, and in conclusion, the braking methods have been selected.Keywords: wheeled robots, braking, traction coefficient, asymmetric
Procedia PDF Downloads 17015987 Branding Good Corporate Governance: A Pathway to Strengthen Investors’ Perception and Brand Equity
Authors: Azaz Zaman, Imtiaz Uddin Chowdhury, Mohammad Shariful Islam
Abstract:
Corporate governance has become a crucial issue in both the business and academic world as a result of world-wide financial scandals and lack of trust in corporate practices. There is no doubt that in order to thrive and attain growth in the market, a company must earn the trust of its stakeholders by consistently delivering on its commitments. Directors of the companies thus comprehend the importance of upfront communication with relevant stakeholders to increase their confidence. The authors of this article argue that practicing good corporate governance is not enough in this highly competitive market place; corporate leaders need to market their good corporate governance practices in order to make the company more attractive to investors. This article also contends that the strength of corporate governance relies wholly upon the extent to which it is communicated simply, effectively and unceasingly to its stakeholders. The main objective of this study, therefore, is to explore the importance of branding good corporate governance in order to increase corporate brand equity, attract investors, and capture market share. A structured questionnaire comprising three sections and a total of 34 questions was prepared and surveyed by the authors among respondents residing in Bangladesh and who also have an academic and corporate background, to investigate the potential impact of branding good corporate governance in the market place. High mean values for individual questions and overall section depict that communicating and branding good corporate governance to the stakeholders will not only boost the investors’ confidence but also increase the corporate brand equity, yielding both profitable and sustainable business environment.Keywords: brand equity, investors’ preference, good corporate governance, sustainable business environment
Procedia PDF Downloads 11715986 Protection of Victims’ Rights in International Criminal Proceedings
Authors: Irina Belozerova
Abstract:
In the recent years, the number of crimes against peace and humanity has constantly been increasing. The development of the international community is inseparably connected to the compliance with the law which protects the rights and interests of citizens in all of their manifestations. The provisions of the law of criminal procedure are no exception. The rights of the victims of genocide, of the war crimes and the crimes against humanity, require particular attention. These crimes fall within the jurisdiction of the International Criminal Court governed by the Rome Statute of the International Criminal Court. These crimes have the following features. First, any such crime has a mass character and therefore requires specific regulation in the international criminal law and procedure and the national criminal law and procedure of different countries. Second, the victims of such crimes are usually children, women and old people; the entire national, ethnic, racial or religious groups are destroyed. These features influence the classification of victims by the age criterion. Article 68 of the Rome Statute provides for protection of the safety, physical and psychological well-being, dignity and privacy of victims and witnesses and thus determines the procedural status of these persons. However, not all the persons whose rights have been violated by the commission of these crimes acquire the status of victims. This is due to the fact that such crimes affect a huge number of persons and it is impossible to mention them all by name. It is also difficult to assess the entire damage suffered by the victims. While assessing the amount of damages it is essential to take into account physical and moral harm, as well as property damage. The procedural status of victims thus gains an exclusive character. In order to determine the full extent of the damage suffered by the victims it is necessary to collect sufficient evidence. However, it is extremely difficult to collect the evidence that would ensure the full and objective protection of the victims’ rights. While making requests for the collection of evidence, the International Criminal Court faces the problem of protection of national security information. Religious beliefs and the family life of victims are of great importance. In some Islamic countries, it is impossible to question a woman without her husband’s consent which affects the objectivity of her testimony. Finally, the number of victims is quantified by hundreds and thousands. The assessment of these elements demands time and highly qualified work. These factors justify the creation of a mechanism that would help to collect the evidence and establish the truth in the international criminal proceedings. This mechanism will help to impose a just and appropriate punishment for the persons accused of having committed a crime, since, committing the crime, criminals could not misunderstand the outcome of their criminal intent.Keywords: crimes against humanity, evidence in international criminal proceedings, international criminal proceedings, protection of victims
Procedia PDF Downloads 25215985 Study the Effect of Roughness on the Higher Order Moment to Extract Information about the Turbulent Flow Structure in an Open Channel Flow
Authors: Md Abdullah Al Faruque, Ram Balachandar
Abstract:
The present study was carried out to understand the extent of effect of roughness and Reynolds number in open channel flow (OCF). To this extent, four different types of bed surface conditions consisting smooth, distributed roughness, continuous roughness, natural sand bed and two different Reynolds number for each bed surfaces were adopted in this study. Particular attention was given on mean velocity, turbulence intensity, Reynolds shear stress, correlation, higher order moments and quadrant analysis. Further, the extent of influence of roughness and Reynolds number in the depth-wise direction also studied. Increasing Reynolds shear stress near rough beds are noticed due to arrays of discrete roughness elements and flow over these elements generating a series of wakes which contributes to the generation of significantly higher Reynolds shear stress.Keywords: bed roughness, ejection and sweep, open channel flow, Reynolds shear stress, turbulent boundary layer, velocity triple product
Procedia PDF Downloads 26015984 Automated Marker Filling System
Authors: Pinisetti Swami Sairam, Meera C. S.
Abstract:
Marker pens are widely used all over the world, mainly in educational institutions due to their neat, accurate and easily erasable nature. But refilling the ink in these pens is a tedious and time consuming job. Besides, it requires careful handling of the pens and ink bottle. A fully automated marker filling system is a solution developed to overcome this problem. The system comprises of pneumatics and electronics modules as well as PLC control. The system design is done in such a way that the empty markers are dumped in a marker container which then sent through different modules of the system in order to refill it automatically. The filled markers are then collected in a marker container. Refilling of ink takes place in different stages inside the system. An ink detecting system detects the colour of the marker which is to be filled and then refilling is done. The processes like capping and uncapping of the cap as well as screwing and unscrewing of the tip are done with the help of robotic arm and gripper. We make use of pneumatics in this system in order to get the precision while performing the capping, screwing, and refilling operations. Thus with the help of this system we can achieve cleanliness, accuracy, effective and time saving in the process of filling a marker.Keywords: automated system, market filling, information technology, control and automation
Procedia PDF Downloads 50315983 Dengue Death Review: A Tool to Adjudge the Cause of Dengue Mortality and Use of the Tool for Prevention of Dengue Deaths
Authors: Gagandeep Singh Grover, Vini Mahajan, Bhagmal, Priti Thaware, Jaspreet Takkar
Abstract:
Dengue is a mosquito-borne viral disease endemic in many countries in the tropics and sub-tropics. The state of Punjab in India shows cyclical and seasonal variation in dengue cases. The Case Fatality Rate of Dengue has ranged from 0.6 to 1.0 in the past years. The department has initiated a review of the cases that have died due to dengue in order to know the exact cause of the death in a case of dengue. The study has been undertaken to know the other associated co-morbidities and factors causing death in a case of dengue. The study used the predesigned proforma on which the records (medical and Lab) were recorded and reviewed by the expert committee of the doctors. This study has revealed that cases of dengue having co-morbidities have a longer stay in the hospital. Fluid overload and co-morbidities have been found as major factors leading to death, however, in a confirmed case of dengue hepatorenal shutdown was found to be a major cause of mortality. The data obtained will help in sensitizing the treating physicians in order to decrease the mortality due to dengue in future.Keywords: dengue, death, morbidities, DHF, DSS
Procedia PDF Downloads 31615982 Proactive Competence Management for Employees: A Bottom-up Process Model for Developing Target Competence Profiles Based on the Employee's Tasks
Authors: Maximilian Cedzich, Ingo Dietz Von Bayer, Roland Jochem
Abstract:
In order for industrial companies to continue to succeed in dynamic, globalized markets, they must be able to train their employees in an agile manner and at short notice in line with the exogenous conditions that arise. For this purpose, it is indispensable to operate a proactive competence management system for employees that recognizes qualification needs timely in order to be able to address them promptly through qualification measures. However, there are hardly any approaches to be found in the literature that includes systematic, proactive competence management. In order to help close this gap, this publication presents a process model that systematically develops bottom-up, future-oriented target competence profiles based on the tasks of the employees. Concretely, in the first step, the tasks of the individual employees are examined for assumed future conditions. In other words, qualitative scenarios are considered for the individual tasks to determine how they are likely to change. In a second step, these scenario-based future tasks are translated into individual future-related target competencies of the employee using a matrix of generic task properties. The final step pursues the goal of validating the target competence profiles formed in this way within the framework of a management workshop. This process model provides industrial companies with a tool that they can use to determine the competencies required by their own employees in the future and compare them with the actual prevailing competencies. If gaps are identified between the target and the actual, these qualification requirements can be closed in the short term by means of qualification measures.Keywords: dynamic globalized markets, employee competence management, industrial companies, knowledge management
Procedia PDF Downloads 19315981 Designing an Editorialization Environment for Repeatable Self-Correcting Exercises
Authors: M. Kobylanski, D. Buskulic, P.-H. Duron, D. Revuz, F. Ruggieri, E. Sandier, C. Tijus
Abstract:
In order to design a cooperative e-learning platform, we observed teams of Teacher [T], Computer Scientist [CS] and exerciser's programmer-designer [ED] cooperating for the conception of a self-correcting exercise, but without the use of such a device in order to catch the kind of interactions a useful platform might provide. To do so, we first run a task analysis on how T, CS and ED should be cooperating in order to achieve, at best, the task of creating and implementing self-directed, self-paced, repeatable self-correcting exercises (RSE) in the context of open educational resources. The formalization of the whole process was based on the “objectives, activities and evaluations” theory of educational task analysis. Second, using the resulting frame as a “how-to-do it” guide, we run a series of three contrasted Hackathon of RSE-production to collect data about the cooperative process that could be later used to design the collaborative e-learning platform. Third, we used two complementary methods to collect, to code and to analyze the adequate survey data: the directional flow of interaction among T-CS-ED experts holding a functional role, and the Means-End Problem Solving analysis. Fourth, we listed the set of derived recommendations useful for the design of the exerciser as a cooperative e-learning platform. Final recommendations underline the necessity of building (i) an ecosystem that allows to sustain teams of T-CS-ED experts, (ii) a data safety platform although offering accessibility and open discussion about the production of exercises with their resources and (iii) a good architecture allowing the inheritance of parts of the coding of any exercise already in the data base as well as fast implementation of new kinds of exercises along with their associated learning activities.Keywords: editorialization, open educational resources, pedagogical alignment, produsage, repeatable self-correcting exercises, team roles
Procedia PDF Downloads 12615980 Undoped and Fluorine Doped Zinc Oxide (ZnO:F) Thin Films Deposited by Ultrasonic Chemical Spray: Effect of the Solution on the Electrical and Optical Properties
Authors: E. Chávez-Vargas, M. de la L. Olvera-Amador, A. Jimenez-Gonzalez, A. Maldonado
Abstract:
Undoped and fluorine doped zinc oxide (ZnO) thin films were deposited on sodocalcic glass substrates by the ultrasonic chemical spray technique. As the main goal is the manufacturing of transparent electrodes, the effects of both the solution composition and the substrate temperature on both the electrical and optical properties of ZnO thin films were studied. As a matter of fact, the effect of fluorine concentration ([F]/[F+Zn] at. %), solvent composition (acetic acid, water, methanol ratios) and ageing time, regarding solution composition, were varied. In addition, the substrate temperature and the deposition time, regarding the chemical spray technique, were also varied. Structural studies confirm the deposition of polycrystalline, hexagonal, wurtzite type, ZnO. The results show that the increase of ([F]/[F+Zn] at. %) ratio in the solution, decreases the sheet resistance, RS, of the ZnO:F films, reaching a minimum, in the order of 1.6 Ωcm, at 60 at. %; further increase in the ([F]/[F+Zn]) ratio increases the RS of the films. The same trend occurs with the variation in substrate temperature, as a minimum RS of ZnO:F thin films was encountered when deposited at TS= 450 °C. ZnO:F thin films deposited with aged solution show a significant decrease in the RS in the order of 100 ΩS. The transmittance of the films was also favorable affected by the solvent ratio and, more significantly, by the ageing of the solution. The whole evaluation of optical and electrical characteristics of the ZnO:F thin films deposited under different conditions, was done under Haacke’s figure of Merit in order to have a clear and quantitative trend as transparent conductors application.Keywords: zinc oxide, ZnO:F, TCO, Haacke’s figure of Merit
Procedia PDF Downloads 31715979 Managing Polytechnic Education for Entrepreneurship Development in Nigeria
Authors: Oluwalola Felicia Kikelomo
Abstract:
The introduction of entrepreneurship education in polytechnics is seen as a measure to reduce the rate of unemployment and strategically position the economy for sustainable development in Nigeria. This paper discusses the roles of polytechnics in entrepreneurship development. It also examines the challenges of entrepreneurship education in Polytechnics. The paper recommends, among others, that the entrepreneurship education should be property funded by the government with the support of non-governmental organizations so that there would be adequate resources to organize and manage the education. In addition, drastic and serious awareness campaigns should be mounted to sensitize the public and the students on the need for entrepreneurship education.Keywords: education, polytechnic entrepreneurship development, education, human development
Procedia PDF Downloads 53015978 Key Transfer Protocol Based on Non-invertible Numbers
Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez
Abstract:
We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.Keywords: invertible, non-invertible, ring, key transfer
Procedia PDF Downloads 185