Search results for: Address Malata
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2919

Search results for: Address Malata

2439 Development of Gold Nanoparticles-Antibody System for the Selective Photothermal Destruction of Multidrug Resistant Bacteria

Authors: Teodora Mocan, Lucian Mocan, Cornel Iancu, Flaviu A. Tabaran, Bartos Dana, Matea Cristian

Abstract:

Antimicrobial resistance, which threatens the efficacy of the existing antibiotics represents a worldwide public health issue. At the current time, vancomycin is the only responsive treatment although has significant cytotoxicity, is partially effective and it is poorly retained by infected tissues. From a clinical point of view, attractive alternative approaches for treating such Meticillin-Resistant Staphylococcus Aureus (MRSA) strains would be using agents that cause physical damage to the bacteria. Modular nanopharmaceuticals systems are being designed to address all of these multifunctional capabilities for the ideal bacterial treatment, with the ability to mix and match appropriate functions. Here we present a novel method of selective laser photothermal ablation of MRSA bacteria mediated by gold nanoparticles bound to PBP antibody against PBP protein located on the MRSA surface.

Keywords: MRSA, laser, nanoparticle, antibody

Procedia PDF Downloads 267
2438 Mapping Poverty in the Philippines: Insights from Satellite Data and Spatial Econometrics

Authors: Htet Khaing Lin

Abstract:

This study explores the relationship between a diverse set of variables, encompassing both environmental and socio-economic factors, and poverty levels in the Philippines for the years 2012, 2015, and 2018. Employing Ordinary Least Squares (OLS), Spatial Lag Models (SLM), and Spatial Error Models (SEM), this study delves into the dynamics of key indicators, including daytime and nighttime land surface temperature, cropland surface, urban land surface, rainfall, population size, normalized difference water, vegetation, and drought indices. The findings reveal consistent patterns and unexpected correlations, highlighting the need for nuanced policies that address the multifaceted challenges arising from the interplay of environmental and socio-economic factors.

Keywords: poverty analysis, OLS, spatial lag models, spatial error models, Philippines, google earth engine, satellite data, environmental dynamics, socio-economic factors

Procedia PDF Downloads 83
2437 Climate Change Law and Transnational Corporations

Authors: Manuel Jose Oyson

Abstract:

The Intergovernmental Panel on Climate Change (IPCC) warned in its most recent report for the entire world “to both mitigate and adapt to climate change if it is to effectively avoid harmful climate impacts.” The IPCC observed “with high confidence” a more rapid rise in total anthropogenic greenhouse gas emissions (GHG) emissions from 2000 to 2010 than in the past three decades that “were the highest in human history”, which if left unchecked will entail a continuing process of global warming and can alter the climate system. Current efforts, however, to respond to the threat of global warming, such as the United Nations Framework Convention on Climate Change and the Kyoto Protocol, have focused on states, and fail to involve Transnational Corporations (TNCs) which are responsible for a vast amount of GHG emissions. Involving TNCs in the search for solutions to climate change is consistent with an acknowledgment by contemporary international law that there is an international role for other international persons, including TNCs, and departs from the traditional “state-centric” response to climate change. Putting the focus of GHG emissions away from states recognises that the activities of TNCs “are not bound by national borders” and that the international movement of goods meets the needs of consumers worldwide. Although there is no legally-binding instrument that covers TNC activities or legal responsibilities generally, TNCs have increasingly been made legally responsible under international law for violations of human rights, exploitation of workers and environmental damage, but not for climate change damage. Imposing on TNCs a legally-binding obligation to reduce their GHG emissions or a legal liability for climate change damage is arguably formidable and unlikely in the absence a recognisable source of obligation in international law or municipal law. Instead a recourse to “soft law” and non-legally binding instruments may be a way forward for TNCs to reduce their GHG emissions and help in addressing climate change. Positive effects have been noted by various studies to voluntary approaches. TNCs have also in recent decades voluntarily committed to “soft law” international agreements. This development reflects a growing recognition among corporations in general and TNCs in particular of their corporate social responsibility (CSR). While CSR used to be the domain of “small, offbeat companies”, it has now become part of mainstream organization. The paper argues that TNCs must voluntarily commit to reducing their GHG emissions and helping address climate change as part of their CSR. One, as a serious “global commons problem”, climate change requires international cooperation from multiple actors, including TNCs. Two, TNCs are not innocent bystanders but are responsible for a large part of GHG emissions across their vast global operations. Three, TNCs have the capability to help solve the problem of climate change. Assuming arguendo that TNCs did not strongly contribute to the problem of climate change, society would have valid expectations for them to use their capabilities, knowledge-base and advanced technologies to help address the problem. It would seem unthinkable for TNCs to do nothing while the global environment fractures.

Keywords: climate change law, corporate social responsibility, greenhouse gas emissions, transnational corporations

Procedia PDF Downloads 337
2436 Use of Extended Conversation to Boost Vocabulary Knowledge and Soft Skills in English for Employment Classes

Authors: James G. Matthew, Seonmin Huh, Frank X. Bennett

Abstract:

English for Specific Purposes, ESP, aims to equip learners with necessary English language skills. Many ESP programs address language skills for job performance, including reading job related documents and oral proficiency. Within ESP is English for occupational purposes, EOP, which centers around developing communicative competence for the globalized workplace. Many ESP and EOP courses lack the content needed to assist students to progress at work, resulting in the need to create lexical compilation for different professions. It is important to teach communicative competence and soft skills for real job-related problem situations and address the complexities of the real world to help students to be successful in their professions. ESP and EOP research is therefore trying to balance both profession-specific educational contents as well as international multi-disciplinary language skills for the globalized workforce. The current study will build upon the existing discussion by developing pedagogy to assist students in their career through developing a strong practical command of relevant English vocabulary. Our research question focuses on the pedagogy two professors incorporated in their English for employment courses. The current study is a qualitative case study on the modes of teaching delivery for EOP in South Korea. Two foreign professors teaching at two different universities in South Korea volunteered for the study to explore their teaching practices. Both professors’ curriculums included the components of employment-related concept vocabulary, business presentations, CV/resume and cover letter preparation, and job interview preparation. All the pre-made recorded video lectures, live online class sessions with students, teachers’ lesson plans, teachers’ class materials, students’ assignments, and midterm and finals video conferences were collected for data analysis. The study then focused on unpacking representative patterns in their teaching methods. The professors used their strengths as native speakers to extend the class discussion from narrow and restricted conversations to giving students broader opportunities to practice authentic English conversation. The methods of teaching utilized three main steps to extend the conversation. Firstly, students were taught concept vocabulary. Secondly, the vocabulary was then combined in speaking activities where students had to solve scenarios, and the students were required to expand on the given forms of words and language expressions. Lastly, the students had conversations in English, using the language learnt. The conversations observed in both classes were those of authentic, expanded English communication and this way of expanding concept vocabulary lessons into extended conversation is one representative pedagogical approach that both professors took. Extended English conversation, therefore, is crucial for EOP education.

Keywords: concept vocabulary, english as a foreign language, english for employment, extended conversation

Procedia PDF Downloads 86
2435 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 85
2434 The Nexus between Social Media Usage and Overtourism: A Survey Study Applied to Hangzhou in China

Authors: Song Qingfeng

Abstract:

This research aims to seek the relationship between social media usage and overtourism from the perspective of tourists based on the theory of Maslow’s hierarchy needs. A questionnaire is formulated to collect data from 400 tourists who have visited the Hangzhou city in China in the last 12 months. Structural Equation Model (SEM) is employed to analysis data. The finding is that social media usage aggravates overtourism. Specifically, social media is used by tourists to information-seeking, entertainment, self-presentation, and socialization for traveling. These roles of social media would evoke the traveling intention to a specific destination at a certain time, which further influences the tourist flow. When the tourist flow concentrate, the overtourism would be aggravated. This study contributes to the destination managers to deep-understand the cause-effect relationship between social media and overtourism in order to address this problem.

Keywords: social media, overtourism, tourist flow, SEM, Maslow’s hierarchy of needs, Hangzhou

Procedia PDF Downloads 129
2433 Enabling Quantitative Urban Sustainability Assessment with Big Data

Authors: Changfeng Fu

Abstract:

Sustainable urban development has been widely accepted a common sense in the modern urban planning and design. However, the measurement and assessment of urban sustainability, especially the quantitative assessment have been always an issue obsessing planning and design professionals. This paper will present an on-going research on the principles and technologies to develop a quantitative urban sustainability assessment principles and techniques which aim to integrate indicators, geospatial and geo-reference data, and assessment techniques together into a mechanism. It is based on the principles and techniques of geospatial analysis with GIS and statistical analysis methods. The decision-making technologies and methods such as AHP and SMART are also adopted to address overall assessment conclusions. The possible interfaces and presentation of data and quantitative assessment results are also described. This research is based on the knowledge, situations and data sources of UK, but it is potentially adaptable to other countries or regions. The implementation potentials of the mechanism are also discussed.

Keywords: urban sustainability assessment, quantitative analysis, sustainability indicator, geospatial data, big data

Procedia PDF Downloads 347
2432 Adapting Built Heritage to Address Climate Change: A Perspective from the Maltese Islands

Authors: Nadia Theuma

Abstract:

Climate change is a reality that has started to leave an impact on the physical environment as well as on the built environment, in particular built heritage. This paper explores the argument that climate change is also a trigger which can lead to identifying a number of creative solutions that can transform built heritage into sustainable buildings. Using the Maltese Islands, and in particular the city of Valletta which is also a World Heritage Site, this paper illustrates some of the innovative solutions that are being developed to make heritage buildings more sustainable and in doing so, mitigating the negative impacts of climate change. The paper looks in detail at the most notable initiatives being developed, their implementation and application, which at times is not easy considering the restrictions within protected built heritage areas and the positive impacts that they will have on visitor experience and overall sustainability of the Maltese tourism product. The paper will conclude by outlining how these solutions can be adapted to buildings with similar climatic conditions.

Keywords: built heritage, creative solutions, climate change, Maltese Islands

Procedia PDF Downloads 274
2431 Utilizing Quantum Chemistry for Nanotechnology: Electron and Spin Movement in Molecular Devices

Authors: Mahsa Fathollahzadeh

Abstract:

The quick advancement of nanotechnology necessitates the creation of innovative theoretical approaches to elucidate complex experimental findings and forecast novel capabilities of nanodevices. Therefore, over the past ten years, a difficult task in quantum chemistry has been comprehending electron and spin transport in molecular devices. This thorough evaluation presents a comprehensive overview of current research and its status in the field of molecular electronics, emphasizing the theoretical applications to various device types and including a brief introduction to theoretical methods and their practical implementation plan. The subject matter includes a variety of molecular mechanisms like molecular cables, diodes, transistors, electrical and visual switches, nano detectors, magnetic valve gadgets, inverse electrical resistance gadgets, and electron tunneling exploration. The text discusses both the constraints of the method presented and the potential strategies to address them, with a total of 183 references.

Keywords: chemistry, nanotechnology, quantum, molecule, spin

Procedia PDF Downloads 27
2430 Digital Skepticism In A Legal Philosophical Approach

Authors: dr. Bendes Ákos

Abstract:

Digital skepticism, a critical stance towards digital technology and its pervasive influence on society, presents significant challenges when analyzed from a legal philosophical perspective. This abstract aims to explore the intersection of digital skepticism and legal philosophy, emphasizing the implications for justice, rights, and the rule of law in the digital age. Digital skepticism arises from concerns about privacy, security, and the ethical implications of digital technology. It questions the extent to which digital advancements enhance or undermine fundamental human values. Legal philosophy, which interrogates the foundations and purposes of law, provides a framework for examining these concerns critically. One key area where digital skepticism and legal philosophy intersect is in the realm of privacy. Digital technologies, particularly data collection and surveillance mechanisms, pose substantial threats to individual privacy. Legal philosophers must grapple with questions about the limits of state power and the protection of personal autonomy. They must consider how traditional legal principles, such as the right to privacy, can be adapted or reinterpreted in light of new technological realities. Security is another critical concern. Digital skepticism highlights vulnerabilities in cybersecurity and the potential for malicious activities, such as hacking and cybercrime, to disrupt legal systems and societal order. Legal philosophy must address how laws can evolve to protect against these new forms of threats while balancing security with civil liberties. Ethics plays a central role in this discourse. Digital technologies raise ethical dilemmas, such as the development and use of artificial intelligence and machine learning algorithms that may perpetuate biases or make decisions without human oversight. Legal philosophers must evaluate the moral responsibilities of those who design and implement these technologies and consider the implications for justice and fairness. Furthermore, digital skepticism prompts a reevaluation of the concept of the rule of law. In an increasingly digital world, maintaining transparency, accountability, and fairness becomes more complex. Legal philosophers must explore how legal frameworks can ensure that digital technologies serve the public good and do not entrench power imbalances or erode democratic principles. Finally, the intersection of digital skepticism and legal philosophy has practical implications for policy-making. Legal scholars and practitioners must work collaboratively to develop regulations and guidelines that address the challenges posed by digital technology. This includes crafting laws that protect individual rights, ensure security, and promote ethical standards in technology development and deployment. In conclusion, digital skepticism provides a crucial lens for examining the impact of digital technology on law and society. A legal philosophical approach offers valuable insights into how legal systems can adapt to protect fundamental values in the digital age. By addressing privacy, security, ethics, and the rule of law, legal philosophers can help shape a future where digital advancements enhance, rather than undermine, justice and human dignity.

Keywords: legal philosophy, privacy, security, ethics, digital skepticism

Procedia PDF Downloads 28
2429 Improved Active Constellation Extension for the PAPR Reduction of FBMC-OQAM Signals

Authors: Mounira Laabidi, Rafik Zayani, Ridha Bouallegue, Daniel Roviras

Abstract:

The Filter Bank multicarrier with Offset Quadrature Amplitude Modulation (FBMC-OQAM) has been introduced to overcome the poor spectral characteristics and the waste in both bandwidth and energy caused by the use of the cyclic prefix. However, the FBMC-OQAM signals suffer from the high Peak to Average Power Ratio (PAPR) problem. Due to the overlapping structure of the FBMC-OQAM signals, directly applying the PAPR reduction schemes conceived for the OFDM one turns out to be ineffective. In this paper, we address the problem of PAPR reduction for FBMC-OQAM systems by suggesting a new scheme based on an improved version of Active Constellation Extension scheme (ACE) of OFDM. The proposed scheme, named Rolling Window ACE, takes into consideration the overlapping naturally emanating from the FBMC-OQAM signals.

Keywords: ACE, FBMC, OQAM, OFDM, PAPR, rolling-window

Procedia PDF Downloads 534
2428 Mapping Vulnerabilities: A Social and Political Study of Disasters in Eastern Himalayas, Region of Darjeeling

Authors: Shailendra M. Pradhan, Upendra M. Pradhan

Abstract:

Disasters are perennial features of human civilization. The recurring earthquakes, floods, cyclones, among others, that result in massive loss of lives and devastation, is a grim reminder of the fact that, despite all our success stories of development, and progress in science and technology, human society is perennially at risk to disasters. The apparent threat of climate change and global warming only severe our disaster risks. Darjeeling hills, situated along Eastern Himalayan region of India, and famous for its three Ts – tea, tourism and toy-train – is also equally notorious for its disasters. The recurring landslides and earthquakes, the cyclone Aila, and the Ambootia landslides, considered as the largest landslide in Asia, are strong evidence of the vulnerability of Darjeeling hills to natural disasters. Given its geographical location along the Hindu-Kush Himalayas, the region is marked by rugged topography, geo-physically unstable structure, high-seismicity, and fragile landscape, making it prone to disasters of different kinds and magnitudes. Most of the studies on disasters in Darjeeling hills are, however, scientific and geographical in orientation that focuses on the underlying geological and physical processes to the neglect of social and political conditions. This has created a tendency among the researchers and policy-makers to endorse and promote a particular type of discourse that does not consider the social and political aspects of disasters in Darjeeling hills. Disaster, this paper argues, is a complex phenomenon, and a result of diverse factors, both physical and human. The hazards caused by the physical and geological agents, and the vulnerabilities produced and rooted in political, economic, social and cultural structures of a society, together result in disasters. In this sense, disasters are as much a result of political and economic conditions as it is of physical environment. The human aspect of disasters, therefore, compels us to address intricating social and political challenges that ultimately determine our resilience and vulnerability to disasters. Set within the above milieu, the aims of the paper are twofold: a) to provide a political and sociological account of disasters in Darjeeling hills; and, b) to identify and address the root causes of its vulnerabilities to disasters. In situating disasters in Darjeeling Hills, the paper adopts the Pressure and Release Model (PAR) that provides a theoretical insight into the study of social and political aspects of disasters, and to examine myriads of other related issues therein. The PAR model conceptualises risk as a complex combination of vulnerabilities, on the one hand, and hazards, on the other. Disasters, within the PAR framework, occur when hazards interact with vulnerabilities. The root causes of vulnerability, in turn, could be traced to social and political structures such as legal definitions of rights, gender relations, and other ideological structures and processes. In this way, the PAR model helps the present study to identify and unpack the root causes of vulnerabilities and disasters in Darjeeling hills that have largely remained neglected in dominant discourses, thereby providing a more nuanced and sociologically sensitive understanding of disasters.

Keywords: Darjeeling, disasters, PAR, vulnerabilities

Procedia PDF Downloads 263
2427 A Geoprocessing Tool for Early Civil Work Notification to Optimize Fiber Optic Cable Installation Cost

Authors: Hussain Adnan Alsalman, Khalid Alhajri, Humoud Alrashidi, Abdulkareem Almakrami, Badie Alguwaisem, Said Alshahrani, Abdullah Alrowaished

Abstract:

Most of the cost of installing a new fiber optic cable is attributed to civil work-trenching-cost. In many cases, information technology departments receive project proposals in their eReview system, but not all projects are visible to everyone. Additionally, if there was no IT scope in the proposed project, it is not likely to be visible to IT. Sometimes it is too late to add IT scope after project budgets have been finalized. Finally, the eReview system is a repository of PDF files for each project, which commits the reviewer to manual work and limits automation potential. This paper details a solution to address the late notification of the eReview system by integrating IT Sites GIS data-sites locations-with land use permit (LUP) data-civil work activity, which is the first step before securing the required land usage authorizations and means no detailed designs for any relevant project before an approved LUP request. To address the manual nature of eReview system, both the LUP System and IT data are using ArcGIS Desktop, which enables the creation of a geoprocessing tool with either Python or Model Builder to automate finding and evaluating potentially usable LUP requests to reduce trenching between two sites in need of a new FOC. To achieve this, a weekly dump was taken from LUP system production data and loaded manually onto ArcMap Desktop. Then a custom tool was developed in model builder, which consisted of a table of two columns containing all the pairs of sites in need of new fiber connectivity. The tool then iterates all rows of this table, taking the sites’ pair one at a time and finding potential LUPs between them, which satisfies the provided search radius. If a group of LUPs was found, an iterator would go through each LUP to find the required civil work between the two sites and the LUP Polyline feature and the distance through the line, which would be counted as cost avoidance if an IT scope had been added. Finally, the tool will export an Excel file named with sites pair, and it will contain as many rows as the number of LUPs, which met the search radius containing trenching and pulling information and cost. As a result, multiple projects have been identified – historical, missed opportunity, and proposed projects. For the proposed project, the savings were about 75% ($750,000) to install a new fiber with the Euclidean distance between Abqaiq GOSP2 and GOSP3 DCOs. In conclusion, the current tool setup identifies opportunities to bundle civil work on single projects at a time and between two sites. More work is needed to allow the bundling of multiple projects between two sites to achieve even more cost avoidance in both capital cost and carbon footprint.

Keywords: GIS, fiber optic cable installation optimization, eliminate redundant civil work, reduce carbon footprint for fiber optic cable installation

Procedia PDF Downloads 209
2426 Strategies for the Oral Delivery of Oligonucleotides

Authors: Venkat Garigapati

Abstract:

To date, more than a dozen oligonucleotide products are approved as injectable products for clinical use. However, there is no single oligo nucleotide product approved for clinical use. Oral delivery of oligo nucleotides is patient friendly administration however, many challenges involved in the development of oral formulation. Over the course of last twenty plus years, the research in this space aimed to address these challenges. This paper describes the issues involved in solubility, stability, enzymatic (nuclease) induced degradation, and permeation of nucleotides in the Gastrointestinal (GI) and how to overcome these challenges. Also, the translation of in vitro data to in vivo models hinders the formulation development. This paper describes the challenges involved in the development of Oligo Nucleotide products for oral administration. It also discusses the chemistry and formulation strategies for oral administration of oligonucleotides.

Keywords: oral adminstration, oligo nucleotides, stability, permeation, gastrointestinal tract

Procedia PDF Downloads 62
2425 Academic Staff Development: A Lever to Address the Challenges of the 21st Century University Classroom

Authors: Severino Machingambi

Abstract:

Most academics entering Higher education as lecturers in South Africa do not have qualifications in Education or teaching. This creates serious problems since they are not sufficiently equipped with pedagogical approaches and theories that inform their facilitation of learning strategies. This, arguably, is one of the reasons why higher education institutions are experiencing high student failure rate. In order to mitigate this problem, it is critical that higher education institutions devise internal academic staff development programmes to capacitate academics with pedagogical skills and competencies so as to enhance the quality of student learning. This paper reported on how the Teaching and Learning Development Centre of a university used design-based research methodology to conceptualise and implement an academic staff development programme for new academics at a university of technology. This approach revolves around the designing, testing and refining of an educational intervention. Design-based research is an important methodology for understanding how, when, and why educational innovations work in practice. The need for a professional development course for academics arose due to the fact that most academics at the university did not have teaching qualifications and many of them were employed straight from industry with little understanding of pedagogical approaches. This paper examines three key aspects of the programme namely, the preliminary phase, the teaching experiment and the retrospective analysis. The preliminary phase is the stage in which the problem identification takes place. The problem that this research sought to address relates to the unsatisfactory academic performance of the majority of the students in the institution. It was therefore hypothesized that the problem could be dealt with by professionalising new academics through engagement in an academic staff development programme. The teaching experiment phase afforded researchers and participants in the programme the opportunity to test and refine the proposed intervention and the design principles upon which it was based. The teaching experiment phase revolved around the testing of the new academics professional development programme. This phase created a platform for researchers and academics in the programme to experiment with various activities and instructional strategies such as case studies, observations, discussions and portfolio building. The teaching experiment phase was followed by the retrospective analysis stage in which the research team looked back and tried to give a trustworthy account of the teaching/learning process that had taken place. A questionnaire and focus group discussions were used to collect data from participants that helped to evaluate the programme and its implementation. One of the findings of this study was that academics joining university really need an academic induction programme that inducts them into the discourse of teaching and learning. The study also revealed that existing academics can be placed on formal study programmes in which they acquire educational qualifications with a view to equip them with useful classroom discourses. The study, therefore, concludes that new and existing academics in universities should be supported through induction programmes and placement on formal studies in teaching and learning so that they are capacitated as facilitators of learning.

Keywords: academic staff, pedagogy, programme, staff development

Procedia PDF Downloads 120
2424 Numeric Modeling of Condensation of Water Vapor from Humid Air in a Room

Authors: Nguyen Van Que, Nguyen Huy The

Abstract:

This paper presents combined natural and forced convection of humid air flow. The film condensation of water vapour on a cold floor was investigated using ANSYS Fluent software. User-defined Functions(UDFs) were developed and added to address the issue of film condensation at the surface of the floor. Those UDFs were validated by analytical results on a flat plate. The film condensation model based on mass transfer was used to solve phase change. On the floor, condensation rate was obtained by mass fraction change near the floor. The study investigated effects of inlet velocity, inlet relative humidity and cold floor temperature on the condensation rate. The simulations were done in both 2D and 3D models to show the difference and need for 3D modeling of condensation.

Keywords: heat and mass transfer, convection, condensation, relative humidity, user-defined functions

Procedia PDF Downloads 314
2423 Managing Multiple Change Projects in Supply Chains: A Case Study of a Moroccan Multi-Technical Services Company

Authors: Abdelouahab Errida, Bouchra Lotfi, Elalami Semma

Abstract:

In this paper, we try to address the topic of multiple change management by adopting an engineered research methodology, conducted within a Moroccan company during its implementation of several change projects that aim at improving its supply chain management performance. Firstly, we present the key concepts related to our research, namely change management, multiproject management and supply chain management. Then, we try to assess how the change management and multi-project management are applied in this company. Finally, we try to propose an approach that will help managers in dealing with multiple change projects. This approach proposes to integrate change management, project management and multi-project management for managing change projects according to three organizational levels: executive level, project portfolio level and change project level.

Keywords: change management, multi-project management, project management, change portfolio, supply chain management,

Procedia PDF Downloads 221
2422 Refactoring Object Oriented Software through Community Detection Using Evolutionary Computation

Authors: R. Nagarani

Abstract:

An intrinsic property of software in a real-world environment is its need to evolve, which is usually accompanied by the increase of software complexity and deterioration of software quality, making software maintenance a tough problem. Refactoring is regarded as an effective way to address this problem. Many refactoring approaches at the method and class level have been proposed. But the extent of research on software refactoring at the package level is less. This work presents a novel approach to refactor the package structures of object oriented software using genetic algorithm based community detection. It uses software networks to represent classes and their dependencies. It uses a constrained community detection algorithm to obtain the optimized community structures in software networks, which also correspond to the optimized package structures. It finally provides a list of classes as refactoring candidates by comparing the optimized package structures with the real package structures.

Keywords: community detection, complex network, genetic algorithm, package, refactoring

Procedia PDF Downloads 406
2421 Global Based Histogram for 3D Object Recognition

Authors: Somar Boubou, Tatsuo Narikiyo, Michihiro Kawanishi

Abstract:

In this work, we address the problem of 3D object recognition with depth sensors such as Kinect or Structure sensor. Compared with traditional approaches based on local descriptors, which depends on local information around the object key points, we propose a global features based descriptor. Proposed descriptor, which we name as Differential Histogram of Normal Vectors (DHONV), is designed particularly to capture the surface geometric characteristics of the 3D objects represented by depth images. We describe the 3D surface of an object in each frame using a 2D spatial histogram capturing the normalized distribution of differential angles of the surface normal vectors. The object recognition experiments on the benchmark RGB-D object dataset and a self-collected dataset show that our proposed descriptor outperforms two others descriptors based on spin-images and histogram of normal vectors with linear-SVM classifier.

Keywords: vision in control, robotics, histogram, differential histogram of normal vectors

Procedia PDF Downloads 267
2420 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management

Authors: Fatemehsadat Mousaviabarbekouh

Abstract:

Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.

Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting

Procedia PDF Downloads 91
2419 Eco-Infrastructures: A Multidimensional System Approach for Urban Ecology

Authors: T. A. Mona M. Salem, Ali F. Bakr

Abstract:

Given the potential devastation associated with future climate change related disasters, it is vital to change the way we build and manage our cities, through new strategies to reconfigure them and their infrastructures in ways that help secure their reproduction. This leads to a kaleidoscopic view of the city that recognizes the interrelationships of energy, water, transportation, and solid waste. These interrelationships apply across sectors and with respect to the built form of the city. The paper aims at a long-term climate resilience of cities and their critical infrastructures, and sets out an argument for including an eco-infrastructure-based approach in strategies to address climate change. As these ecosystems have a critical role to play in building resilience and reducing vulnerabilities in cities, communities and economies at risk, the enhanced protection and management of ecosystems, biological resources and habitats can mitigate impacts and contribute to solutions as nations and cities strive to adapt to climate change.

Keywords: ecology, ecosystem, infrastructure, climate change, urban

Procedia PDF Downloads 295
2418 Challenge of Net-Zero Carbon Construction and Measurement of Energy Consumption and Carbon Emission Reduction to Climate Change, Economy and Job Growths in Hong Kong and Australia

Authors: Kwok Tak Kit

Abstract:

Under the Paris Agreement 2015, the countries committed to address and combat the climate change and its negative impacts and agree to the target of reducing the global greenhouse gas (GHG) emission substantially by limiting the global temperature to 20C above the pre-industrial level in this century. A internationally Submit named “ 26th United Nations Climate Conference” (COP26) was held in Glasgow in 2021 with all committed countries agreed to the finalize the outstanding element in Paris Agreement and Glasgow Climate Pact to keep 1.50C. In this paper, we will focus on the basic approach of waste strategy, recycling policy, circular economy strategy, net-zero strategy and sustainability strategy and the importance of the elements which affect the carbon emission, waste generation and energy conservation will be further reviewed with recommendation for future study.

Keywords: net-zero carbon, climate change, carbon emission, energy consumption

Procedia PDF Downloads 171
2417 Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime

Authors: Vrince Vimal, Madhav J. Nigam

Abstract:

Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime.

Keywords: Wireless Sensor network (WSN), Random Deployment, Clustering, Isolated Nodes, Networks Lifetime

Procedia PDF Downloads 325
2416 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Authors: Abdullah Al Mamun, Tarek R. Sheltami

Abstract:

Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.

Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN

Procedia PDF Downloads 325
2415 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 129
2414 Text Similarity in Vector Space Models: A Comparative Study

Authors: Omid Shahmirzadi, Adam Lugowski, Kenneth Younge

Abstract:

Automatic measurement of semantic text similarity is an important task in natural language processing. In this paper, we evaluate the performance of different vector space models to perform this task. We address the real-world problem of modeling patent-to-patent similarity and compare TFIDF (and related extensions), topic models (e.g., latent semantic indexing), and neural models (e.g., paragraph vectors). Contrary to expectations, the added computational cost of text embedding methods is justified only when: 1) the target text is condensed; and 2) the similarity comparison is trivial. Otherwise, TFIDF performs surprisingly well in other cases: in particular for longer and more technical texts or for making finer-grained distinctions between nearest neighbors. Unexpectedly, extensions to the TFIDF method, such as adding noun phrases or calculating term weights incrementally, were not helpful in our context.

Keywords: big data, patent, text embedding, text similarity, vector space model

Procedia PDF Downloads 159
2413 The Effect of Spatial Variability on Axial Pile Design of Closed Ended Piles in Sand

Authors: Cormac Reale, Luke J. Prendergast, Kenneth Gavin

Abstract:

While significant improvements have been made in axial pile design methods over recent years, the influence of soils natural variability has not been adequately accounted for within them. Soil variability is a crucial parameter to consider as it can account for large variations in pile capacity across the same site. This paper seeks to address this knowledge deficit, by demonstrating how soil spatial variability can be accommodated into existing cone penetration test (CPT) based pile design methods, in the form of layered non-homogeneous random fields. These random fields model the scope of a given property’s variance and define how it varies spatially. A Monte Carlo analysis of the pile will be performed taking into account parameter uncertainty and spatial variability, described using the measured scales of fluctuation. The results will be discussed in light of Eurocode 7 and the effect of spatial averaging on design capacities will be analysed.

Keywords: pile axial design, reliability, spatial variability, CPT

Procedia PDF Downloads 234
2412 Sexual and Reproductive Health for Women in Africa: Adopting a Human Rights Based Approach to Overcome Cultural Barriers

Authors: Seraphina Bakta

Abstract:

In many societies in Africa, it is a taboo to speak, let alone to practice or in any way to engage in matters relating to sexual and reproductive health. For instance, girls using contraceptives may be labeled prostitutes, and married women using family planning methods may be divorced on account that they are disobedient to their husbands as they do not want to bear children. As such, sexual and reproductive health as a right is still very far from reality to many men and women. To a large extent, the objections are mainly backed up in culture, which is deeply rooted in many African traditions. While such culture have both the good and bad side, the African Charter on Human and Peoples Rights has identified the bad ones as’ harmful cultural practices. This paper argues that, while cultural norms may hinder the realization of human rights, adopting a human rights based approach to address harmful cultural practices is likely, the best approach to realizing women’s rights to sexual and reproductive health rights in Africa.

Keywords: rights, culture, health, women

Procedia PDF Downloads 111
2411 Application of Blockchain on Manufacturing Process Control and Pricing Policy

Authors: Chieh Lee

Abstract:

Today, supply chain managers face extensive disruptions in raw material pricing, transportation block, and quality issue due to product complexity. While digitalization might help managers to mitigate the disruption risk and increase supply chain resilience by sharing information between sellers and buyers through the supply chain, entities are reluctant to build such a system. The main reason is it is not clear what information should be shared and who has access to the stored information. In this research, we propose a smart contract built by blockchain technology. This contract helps both buyer and seller to identify the type of information, the access to the information, and how to trace the information. This contract helps managers control their orders through the supply chain and address any disruption they see fit. Furthermore, with the same smart contract, the supplier can track the production process of an order and increase production efficiency by eliminating waste.

Keywords: blockchain, production process, smart contract, supply chain resilience

Procedia PDF Downloads 68
2410 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 312