Search results for: effective laws
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9910

Search results for: effective laws

9370 Current Zonal Isolation Regulation and Standards: A Compare and Contrast Review in Plug and Abandonment

Authors: Z. A. Al Marhoon, H. S. Al Ramis, C. Teodoriu

Abstract:

Well-integrity is one of the major elements considered for drilling geothermal, oil, and gas wells. Well-integrity is minimizing the risk of unplanned fluid flow in the well bore throughout the well lifetime. Well integrity is maximized by applying technical concepts along with practical practices and strategic planning. These practices are usually governed by standardization and regulation entities. Practices during well construction can affect the integrity of the seal at the time of abandonment. On the other hand, achieving a perfect barrier system is impracticable due to the needed cost. This results in a needed balance between regulations requirements and practical applications. The guidelines are only effective when they are attainable in practical applications. Various governmental regulations and international standards have different guidelines on what constitutes high-quality isolation from unwanted flow. Each regulating or standardization body differ in requirements based on the abandonment objective. Some regulation account more for the environmental impact, water table contamination, and possible leaks. Other regulation might lean towards driving more economical benefits while achieving an acceptable isolation criteria. The research methodology used in this topic is derived from a literature review method combined with a compare and contrast analysis. The literature review on various zonal isolation regulations and standards has been conducted. A review includes guidelines from NORSOK (Norwegian governing entity), BSEE (USA offshore governing entity), API (American Petroleum Institute) combined with ISO (International Standardization Organization). The compare and contrast analysis is conducted by assessing the objective of each abandonment regulations and standardization. The current state of well barrier regulation is in balancing action. From one side of this balance, the environmental impact and complete zonal isolation is considered. The other side of the scale is practical application and associated cost. Some standards provide a fair amount of details concerning technical requirements and are often flexible with the needed associated cost. These guidelines cover environmental impact with laws that prevent major or disastrous environmental effects of improper sealing of wells. Usually these regulations are concerned with the near future of sealing rather than long-term. Consequently, applying these guidelines become more feasible from a cost point of view to the required plugging entities. On the other hand, other regulation have well integrity procedures and regulations that lean toward more restrictions environmentally with an increased associated cost requirements. The environmental impact is detailed and covered with its entirety, including medium to small environmental impact in barrier installing operations. Clear and precise attention to long-term leakage prevention is present in these regulations. The result of the compare and contrast analysis of the literature showed that there are various objectives that might tip the scale from one side of the balance (cost) to the other (sealing quality) especially in reference to zonal isolation. Furthermore, investing in initial well construction is a crucial part of ensuring safe final well abandonment. The safety and the cost saving at the end of the well life cycle is dependent upon a well-constructed isolation systems at the beginning of the life cycle. Long term studies on zonal isolation using various hydraulic or mechanical materials need to take place to further assess permanently abandoned wells to achieve the desired balance. Well drilling and isolation techniques will be more effective when they are operationally feasible and have reasonable associated cost to aid the local economy.

Keywords: plug and abandon, P&A regulation, P&A standards, international guidelines, gap analysis

Procedia PDF Downloads 117
9369 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 66
9368 Nanoenergetic Materials as Effective Heat Energy Sources for Enhanced Gas Generators

Authors: Sang Beom Kim, Kyung Ju Kim, Myung Hoon Cho, Ji Hoon Kim, Soo Hyung Kim

Abstract:

In this study, we systematically investigated the effect of nanoscale energetic materials in formulations of aluminum nanoparticles (Al NPs; heat source)/copper oxide nanoparticles (CuO NPs; oxidizer) on the combustion and gas-generating properties of sodium azide microparticles (NaN3 MPs; gas-generating agent) for potential applications in gas generators. The burn rate of the NaN3 MP/CuO NP composite powder was only ~0.3 m/s. However, the addition of Al NPs to the NaN3 MP/CuO NP matrix caused the rates to reach ~5.3 m/s, respectively. In addition, the N2 gas volume flow rate generated by the ignition of the NaN3 MP/CuO NP composite powder was only ~0.6 L/s, which was significantly increased to ~3.9 L/s by adding Al NPs to the NaN3 MP/CuO NP composite powder. This suggested that the highly reactive NPs, with the assistance of CuO NPs, were effective heat-generating sources enabling the complete thermal decomposition of NaN3 MPs upon ignition. Al NPs were highly effective in the gas generators because of the increased reactivity induced by the reduced particle size. Finally, we successfully demonstrated that a homemade airbag with a specific volume of ~140 mL could be rapidly and fully inflated by the thermal activation of nanoscale energetic material-added gas-generating agents (i.e., NaN3 MP/Al NP/CuO NP composites) within the standard time of ~50 ms for airbag inflation.

Keywords: nanoenergetic materials, aluminum nanoparticles, copper oxide nanoparticles, gas generators

Procedia PDF Downloads 354
9367 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 385
9366 The Speech Act Responses of Students on the Teacher’s Request in the EFL Classroom

Authors: Agis Andriani

Abstract:

To create an effective teaching condition, the teacher requests the students as the instruction to guide the them interactively in the learning activities in the classroom. This study involves 160 Indonesian students who study English in the university, as participants in the discourse completion test, and ten of them are interviewed. The result shows that when the students response the teacher’s request, it realizes assertives, directives, commisives, expressives, and declaratives. These indicate that the students are active, motivated, and responsive in the learning process, although in the certain condition these responses are to prevent their faces from the shyness of their silence in interaction. Therefore, it needs the teacher’s creativity to give the conducive atmosphere in order to support the students’ participation in learning English.

Keywords: discourse completion test, effective teaching, request, teacher’s creativity

Procedia PDF Downloads 403
9365 A Study on Numerical Modelling of Rigid Pavement: Temperature and Thickness Effect

Authors: Amin Chegenizadeh, Mahdi Keramatikerman, Hamid Nikraz

Abstract:

Pavement engineering plays a significant role to develop cost effective and efficient highway and road networks. In general, pavement regarding structure is categorized in two core group namely flexible and rigid pavements. There are various benefits in application of rigid pavement. For instance, they have a longer life and lower maintenance costs in compare with the flexible pavement. In rigid pavement designs, temperature and thickness are two effective parameters that could widely affect the total cost of the project. In this study, a numerical modeling using Kenpave-Kenslab was performed to investigate the effect of these two important parameters in the rigid pavement.   

Keywords: rigid pavement, Kenpave, Kenslab, thickness, temperature

Procedia PDF Downloads 347
9364 Smart Structures for Cost Effective Cultural Heritage Preservation

Authors: Tamara Trček Pečak, Andrej Mohar, Denis Trček

Abstract:

This article investigates the latest technological means, which deploy smart structures that are based on (advanced) wireless sensors technologies and ubiquitous computing in general in order to support the above mentioned decision making. Based on two years of in-field research experiences it gives their analysis for these kinds of purposes and provides appropriate architectures and architectural solutions. Moreover, the directions for future research are stated, because these technologies are currently the most promising ones to enable cost-effective preservation of cultural heritage not only in uncontrolled places, but also in general.

Keywords: smart structures, wireless sensors, sensors networks, green computing, cultural heritage preservation, monitoring, cost effectiveness

Procedia PDF Downloads 426
9363 Enhancing Teacher Wellbeing through Trauma-Informed Practices: An Exploratory Case Study Utilizing an Accessible Trauma-Informed Wellness Program

Authors: Ashleigh Cicconi

Abstract:

Teachers may not have access to necessary and effective strategies for managing stress, trauma, and emotional exhaustion, which can lead to burnout. This practice-based research focused on the exploration of teacher well-being through participation in a wellness program in order to mitigate high stress levels and feelings of burnout. The purpose of this qualitative research was to explore how a multimodal, trauma-informed yoga and arts-based mindfulness program impacted stress levels and overall well-being for teachers in a school setting. The case study approach was used to investigate participant perceptions of interactions between multimodal accessibility, a trauma-informed wellness program, and teacher well-being. A sample size of 10 teachers employed full-time at a public high school in the Mid-Atlantic region were recruited via email correspondence to participate in the eight-week wellness program. Data were triangulated across semi-structured interviews, journal entries, and focus group guided questions, and transcripts were uploaded into the NVivo software application for thematic analysis. Data showed perceptions of improvements in overall well-being from participation in the wellness program and that utilizing trauma-informed practices may be an effective coping skill for stress. The multimodal design of the program was perceived to positively impact participation and accessibility to wellness strategies. Findings from this study suggest that the inclusion of trauma-informed practices within a wellness program may be effective for managing stress and trauma experienced by teachers, thereby aiding in improvement in overall well-being. Findings also suggest that multimodality may be effective for increasing participation in and accessibility to wellness strategies.

Keywords: trauma informed practices, wellness program, teacher wellbeing, accessible program, multimodal

Procedia PDF Downloads 34
9362 An Adaptive Application of Emotionally Focused Couple Therapy with Trans and Nonbinary Couples

Authors: Reihaneh Mahdavishahri, Dumayi Gutierrez

Abstract:

Emotionally focused couple therapy (EFCT) is one of the most effective and evidence-based approaches to couple therapy. Yet, literature is scarce of its effective application with trans and non-binary couples. It is estimated that 1.4 million trans adults live in the United Stated, with about 40% of these individuals experiencing serious psychological distress within the past month. Trans and nonbinary adults are significantly likely to experience discrimination, harassment, family rejection, and relationship challenges throughout the course of their lives. As systemic therapists, applying an informed lens when working with trans and nonbinary couples can contribute to providing effective mental health care to these individuals. This paper aims to provide a comprehensive, intersectional, and culturally informed application of EFCT with trans and nonbinary couples. We will address the current literature on applications of EFCT with diverse couples, EFCT’s strengths and limitations on cultural humility, and the gaps within current systems of care for trans and nonbinary couples. We will then provide an adaptive application of EFCT to help trans, and nonbinary couples recover from potential attachment injuries in their relationships, intersecting gender minority stressors, and achieve healing and restoration in their interpersonal dynamics.

Keywords: attachment, culturally informed care, emotionally focused couple therapy, trans and nonbinary couples

Procedia PDF Downloads 59
9361 The Microstructural Evolution of X45CrNiW189 Valve Steel during Hot Deformation

Authors: A. H. Meysami

Abstract:

In this paper, the hot compression tests were carried on X45CrNiW189 valve steel (X45) in the temperature range of 1000–1200°C and the strain rate range of 0.004–0.5 s^(-1) in order to study the high temperature softening behavior of the steel. For the exact prediction of flow stress, the effective stress - effective strain curves were obtained from experiments under various conditions. On the basis of experimental results, the dynamic recrystallization fraction (DRX), AGS, hot deformation and activation energy behavior were investigated. It was found that the calculated results were in a good agreement with the experimental flow stress and microstructure of the steel for different conditions of hot deformation.

Keywords: X45CrNiW189, valve steel, hot compression test, dynamic recrystallization, hot deformation

Procedia PDF Downloads 259
9360 The Routes of Human Suffering: How Point-Source and Destination-Source Mapping Can Help Victim Services Providers and Law Enforcement Agencies Effectively Combat Human Trafficking

Authors: Benjamin Thomas Greer, Grace Cotulla, Mandy Johnson

Abstract:

Human trafficking is one of the fastest growing international crimes and human rights violations in the world. The United States Department of State (State Department) approximates some 800,000 to 900,000 people are annually trafficked across sovereign borders, with approximately 14,000 to 17,500 of these people coming into the United States. Today’s slavery is conducted by unscrupulous individuals who are often connected to organized criminal enterprises and transnational gangs, extracting huge monetary sums. According to the International Labour Organization (ILO), human traffickers collect approximately $32 billion worldwide annually. Surpassed only by narcotics dealing, trafficking of humans is tied with illegal arms sales as the second largest criminal industry in the world and is the fastest growing field in the 21st century. Perpetrators of this heinous crime abound. They are not limited to single or “sole practitioners” of human trafficking, but rather, often include Transnational Criminal Organizations (TCO), domestic street gangs, labor contractors, and otherwise seemingly ordinary citizens. Monetary gain is being elevated over territorial disputes and street gangs are increasingly operating in a collaborative effort with TCOs to further disguise their criminal activity; to utilizing their vast networks, in an attempt to avoid detection. Traffickers rely on a network of clandestine routes to sell their commodities with impunity. As law enforcement agencies seek to retard the expansion of transnational criminal organization’s entry into human trafficking, it is imperative that they develop reliable trafficking mapping of known exploitative routes. In a recent report given to the Mexican Congress, The Procuraduría General de la República (PGR) disclosed, from 2008 to 2010 they had identified at least 47 unique criminal networking routes used to traffic victims and that Mexico’s estimated domestic victims number between 800,000 adults and 20,000 children annually. Designing a reliable mapping system is a crucial step to effective law enforcement response and deploying a successful victim support system. Creating this mapping analytic is exceedingly difficult. Traffickers are constantly changing the way they traffic and exploit their victims. They swiftly adapt to local environmental factors and react remarkably well to market demands, exploiting limitations in the prevailing laws. This article will highlight how human trafficking has become one of the fastest growing and most high profile human rights violations in the world today; compile current efforts to map and illustrate trafficking routes; and will demonstrate how the proprietary analytical mapping analysis of point-source and destination-source mapping can help local law enforcement, governmental agencies and victim services providers effectively respond to the type and nature of trafficking to their specific geographical locale. Trafficking transcends state and international borders. It demands an effective and consistent cooperation between local, state, and federal authorities. Each region of the world has different impact factors which create distinct challenges for law enforcement and victim services. Our mapping system lays the groundwork for a targeted anti-trafficking response.

Keywords: human trafficking, mapping, routes, law enforcement intelligence

Procedia PDF Downloads 360
9359 Entropy Generation Analysis of Heat Recovery Vapor Generator for Ammonia-Water Mixture

Authors: Chul Ho Han, Kyoung Hoon Kim

Abstract:

This paper carries out a performance analysis based on the first and second laws of thermodynamics for heat recovery vapor generator (HRVG) of ammonia-water mixture when the heat source is low-temperature energy in the form of sensible heat. In the analysis, effects of the ammonia mass concentration and mass flow ratio of the binary mixture are investigated on the system performance including the effectiveness of heat transfer, entropy generation, and exergy efficiency. The results show that the ammonia concentration and the mass flow ratio of the mixture have significant effects on the system performance of HRVG.

Keywords: entropy, exergy, ammonia-water mixture, heat exchanger

Procedia PDF Downloads 382
9358 Building an E-Platform for Virtual Research Teams in Educational Science

Authors: Hanan A. Abdulhameed, Huda Y. Alyami

Abstract:

The study presents a new international direction to conduct collaborative educational research. It follows a qualitative and quantitative methodology in investigating the main requirements to build an e-platform for Virtual Research Teams (VRTs). The e-platform considers three main components: First, the human and cultural structure, second, the institutional/organizational structure, and third, the technological structure. The study mainly focuses on the third component, the technological structure (the e-platform), and studies how to incorporate the other components: The human/cultural structure and the institutional/organizational structure in order to build an effective e-platform. The importance of the study is that it presents a comprehensive study about VRTs in terms of definition, types, structure, and main challenges. In addition, it suggests a practical way that benefits from the information and communication technology to conduct collaborative educational research by building and managing virtual research teams through an effective e-platform. The study draws the main framework to build an e-platform for collaborative educational research teams in Arab World. Thus, it tackles mainly the theoretical aspects, the framework of an effective e-platform. Then, it presents the evaluation of 18 Arab educational experts' to the proposed e-platform.

Keywords: collaborative research, educational science, E-platform, social research networks sites (SRNS), virtual research teams (VRTs)

Procedia PDF Downloads 440
9357 Comparison of the Use of Vaccines or Drugs against Parasitic Diseases

Authors: H. Al-Khalaifa, A. Al-Nasser

Abstract:

The viewpoint towards the use of drugs or vaccines against avian parasitic diseases is one of the most striking challenges in avian medical parasitology. This includes many difficulties associated with drug resistance and in developing prophylactic vaccines. In many instances, the potential success of a vaccination in controlling parasitic diseases in poultry is well-documented. However, some medical, technical and financial limitations are still paramount. On the other hand, chemotherapy is not very well-recommended due to a number of medical limitations. But in the absence of an effective vaccine, drugs are used against parasitic diseases. This paper sheds light on some the advantages and disadvantages of using vaccination and drugs in controlling parasitic diseases in poultry species. The usage of chemotherapeutic drugs is discussed with some examples. Then, more light will be shed on using vaccines as a potentially effective and promising control tool.

Keywords: drugs, parasitology, poultry, vaccines

Procedia PDF Downloads 181
9356 Characteristics of Pore Pressure and Effective Stress Changes in Sandstone Reservoir Due to Hydrocarbon Production

Authors: Kurniawan Adha, Wan Ismail Wan Yusoff, Luluan Almanna Lubis

Abstract:

Preventing hazardous events during oil and gas operation is an important contribution of accurate pore pressure data. The availability of pore pressure data also contribute in reducing the operation cost. Suggested methods in pore pressure estimation were mostly complex by the many assumptions and hypothesis used. Basic properties which may have significant impact on estimation model are somehow being neglected. To date, most of pore pressure determinations are estimated by data model analysis and rarely include laboratory analysis, stratigraphy study or core check measurement. Basically, this study developed a model that might be applied to investigate the changes of pore pressure and effective stress due to hydrocarbon production. In general, this paper focused velocity model effect of pore pressure and effective stress changes due to hydrocarbon production with illustrated by changes in saturation. The core samples from Miri field from Sarawak Malaysia ware used in this study, where the formation consists of sandstone reservoir. The study area is divided into sixteen (16) layers and encompassed six facies (A-F) from the outcrop that is used for stratigraphy sequence model. The experimental work was firstly involving data collection through field study and developing stratigraphy sequence model based on outcrop study. Porosity and permeability measurements were then performed after samples were cut into 1.5 inch diameter core samples. Next, velocity was analyzed using SONIC OYO and AutoLab 500. Three (3) scenarios of saturation were also conducted to exhibit the production history of the samples used. Results from this study show the alterations of velocity for different saturation with different actions of effective stress and pore pressure. It was observed that sample with water saturation has the highest velocity while dry sample has the lowest value. In comparison with oil to samples with oil saturation, water saturated sample still leads with the highest value since water has higher fluid density than oil. Furthermore, water saturated sample exhibits velocity derived parameters, such as poisson’s ratio and P-wave velocity over S-wave velocity (Vp/Vs) The result shows that pore pressure value ware reduced due to the decreasing of fluid content. The decreasing of pore pressure result may soften the elastic mineral frame and have tendency to possess high velocity. The alteration of pore pressure by the changes in fluid content or saturation resulted in alteration of velocity value that has proportionate trend with the effective stress.

Keywords: pore pressure, effective stress, production, miri formation

Procedia PDF Downloads 271
9355 Herschel-Bulkley Fluid Flow through Narrow Tubes

Authors: Santhosh Nallapu, G. Radhakrishnamacharya

Abstract:

A two-fluid model of Herschel-Bulkley fluid flow through tubes of small diameters is studied. It is assumed that the core region consists of Herschel-Bulkley fluid and Newtonian fluid in the peripheral region. The analytical solutions for velocity, flow flux, effective viscosity, core hematocrit and mean hematocrit have been derived and the effects of various relevant parameters on these flow variables have been studied. It has been observed that the effective viscosity and mean hematocrit increase with yield stress, power-law index, hematocrit and tube radius. Further, the core hematocrit decreases with hematocrit and tube radius.

Keywords: two-layered model, non-Newtonian fluid, hematocrit, Fahraeus-Lindqvist effect, plug flow

Procedia PDF Downloads 456
9354 Multiscale Edge Detection Based on Nonsubsampled Contourlet Transform

Authors: Enqing Chen, Jianbo Wang

Abstract:

It is well known that the wavelet transform provides a very effective framework for multiscale edges analysis. However, wavelets are not very effective in representing images containing distributed discontinuities such as edges. In this paper, we propose a novel multiscale edge detection method in nonsubsampled contourlet transform (NSCT) domain, which is based on the dominant multiscale, multidirection edge expression and outstanding edge location of NSCT. Through real images experiments, simulation results demonstrate that the proposed method is better than other edge detection methods based on Canny operator, wavelet and contourlet. Additionally, the proposed method also works well for noisy images.

Keywords: edge detection, NSCT, shift invariant, modulus maxima

Procedia PDF Downloads 474
9353 An Evaluation of the Efficacy of School-Based Suicide Prevention Programs

Authors: S. Wietrzychowski

Abstract:

The following review has identified specific programs, as well as the elements of these programs, that have been shown to be most effective in preventing suicide in schools. Suicide is an issue that affects many students each year. Although this is a prominent issue, there are few prevention programs used within schools. The primary objective of most prevention programs is to reduce risk factors such as depression and hopelessness, and increase protective factors like support systems and help-seeking behaviors. Most programs include a gatekeeper training model, education component, peer support group, and/or counseling/treatment. Research shows that some of these programs, like the Signs of Suicide and Youth Aware of Mental Health Programme, are effective in reducing suicide behaviors and increasing protective factors. These programs have been implemented in many countries across the world and have shown promising results. Since schools can provide easy access to adolescents, implement education programs, and train staff members and students how to identify and to report suicide behaviors, school-based programs seem to be the best way to prevent suicide among adolescents. Early intervention may be an effective way to prevent suicide. Although, since early intervention is not always an option, school-based programs in high schools have also been shown to decrease suicide attempts by up to 50%. As a result of this presentation, participants will be able to 1.) list at least 2 evidence-based suicide prevention programs, 2.) identify at least 3 factors which protect against suicide, and 3.) describe at least 3 risk factors for suicide.

Keywords: school, suicide, prevention, programs

Procedia PDF Downloads 324
9352 A Focused, High-Intensity Spread-Spectrum Ultrasound Solution to Prevent Biofouling

Authors: Alan T. Sassler

Abstract:

Biofouling is a significant issue for ships, especially those based in warm water ports. Biofouling damages hull coatings, degrades platform hydrodynamics, blocks cooling water intakes, and returns, reduces platform range and speed, and increases fuel consumption. Although platforms are protected to some degree by antifouling paints, these paints are much less effective on stationary platforms, and problematic biofouling can occur on antifouling paint-protected stationary platforms in some environments in as little as a matter of weeks. Remediation hull cleaning operations are possible, but they are very expensive, sometimes result in damage to the vessel’s paint or hull and are generally not completely effective. Ultrasound with sufficient intensity focused on specific frequency ranges can be used to prevent the growth of biofouling organisms. The use of ultrasound to prevent biofouling isn't new, but systems to date have focused on protecting platforms by shaking the hull using internally mounted transducers similar to those used in ultrasonic cleaning machines. While potentially effective, this methodology doesn't scale well to large platforms, and there are significant costs associated with installing and maintaining these systems, which dwarf the initial purchase price. An alternative approach has been developed, which uses highly directional pier-mounted transducers to project high-intensity spread-spectrum ultrasonic energy into the water column focused near the surface. This focused energy has been shown to prevent biofouling at ranges of up to 50 meters from the source. Spreading the energy out over a multi-kilohertz band makes the system both more effective and more environmentally friendly. This system has been shown to be both effective and inexpensive in small-scale testing and is now being characterized on a larger scale in selected marinas. To date, test results have been collected in Florida marinas suggesting that this approach can be used to keep ensonified areas of thousands of square meters free from biofouling, although care must be taken to minimize shaded areas.

Keywords: biofouling, ultrasonic, environmentally friendly antifoulant, marine protection, antifouling

Procedia PDF Downloads 47
9351 Quantum Algebra from Generalized Q-Algebra

Authors: Muna Tabuni

Abstract:

The paper contains an investigation of the notion of Q algebras. A brief introduction to quantum mechanics is given, in that systems the state defined by a vector in a complex vector space H which have Hermitian inner product property. H may be finite or infinite-dimensional. In quantum mechanics, operators must be hermitian. These facts are saved by Lie algebra operators but not by those of quantum algebras. A Hilbert space H consists of a set of vectors and a set of scalars. Lie group is a differentiable topological space with group laws given by differentiable maps. A Lie algebra has been introduced. Q-algebra has been defined. A brief introduction to BCI-algebra is given. A BCI sub algebra is introduced. A brief introduction to BCK=BCH-algebra is given. Every BCI-algebra is a BCH-algebra. Homomorphism maps meanings are introduced. Homomorphism maps between two BCK algebras are defined. The mathematical formulations of quantum mechanics can be expressed using the theory of unitary group representations. A generalization of Q algebras has been introduced, and their properties have been considered. The Q- quantum algebra has been studied, and various examples have been given.

Keywords: Q-algebras, BCI, BCK, BCH-algebra, quantum mechanics

Procedia PDF Downloads 183
9350 Refining Sexual Assault Treatment: Recovered Survivors and Expert Therapists Concur on Effective Therapy Components

Authors: Avigail Moor, Michal Otmazgin, Hagar Tsiddon, , Avivit Mahazri

Abstract:

The goal of the present study was to refine sexual assault therapy through the examination of the level of agreement between survivor and therapist assessments of key recovery-promoting therapeutic interventions. This is the first study to explore the level of agreement between those who partake in the treatment process from either position. Semi structured interviews were conducted in this qualitative study with 10 survivors and 10 experienced therapists. The results document considerable concurrence between them regarding relational and trauma processing treatment components alike. Together, these reports outline key effective interventions, both common and specific in nature, concomitantly supported by both groups.

Keywords: sexual assault, rape treatment, therapist training, psychotherapy

Procedia PDF Downloads 40
9349 Correlates of Coping in Individuals with Tinnitus

Authors: Antonio Oliveira, Rute F. Meneses, Nuno Trigueiros-Cunha

Abstract:

Tinnitus is commonly defined as an aberrant perception of sound without external stimulus. It is a chronic condition, with consequences on the QOL. The coping strategies used were not always effective and coping was identified as a predictor of QOL in individuals with tinnitus, which reinforces the idea that in health the use of effective coping styles should be promoted. This work intend to verify relations between coping strategies assessed by BriefCope in subjects with tinnitus and variables such as gender, age and severity of tinnitus measured by THI and the Visual Analogue Scale and also hearing and hyperacusis. The results indicate that there are any statistically significant relationships between the variables assessed in relation to the results of BriefCope except in the Visual Analogue Scale. These results, indicating no relationship between almost all variables, reinforce the need for further study of coping strategies use by these patients.

Keywords: Brief Cope, coping strategies, quality of live, THI, Tinnitus

Procedia PDF Downloads 499
9348 Case Study of Gender Mainstreaming in Rand Water: A Journey of Transformation

Authors: Saki Makume

Abstract:

Misogyny is a serious problem in the world that is predominantly patriarchal. South Africa is a very unequal society, so are the companies in this country. After 1994, laws were promulgated to outlaw unfair discrimination, amongst them discrimination based on gender. The presentation aims to share the experiences and learnings of Rand Water through its transformation journey. The environment was so hostile to women in the workplace that policies and practices excluded or unfairly discriminated against women. The paper will be in the form of a case study, predominantly qualitative and to a lesser extent quantitative. The results will show that the number of women at Board, Executive and Management levels have increased; and policies amended to be gender sensitive. Policies were developed that specifically protected women’s rights e.g. sexual harassment. A program like TechnoGirl was introduced to lure girl learners to Rand Water.

Keywords: gender mainstreaming, policies, transformation, unfair discrimination

Procedia PDF Downloads 261
9347 Child Labour and Contemporary Slavery: A Nigerian Perspective

Authors: Obiageli Eze

Abstract:

Millions of Nigerian children are subjected daily to all forms of abuse, ranging from trafficking to slavery, and forced labor. These under age children are taken from different parts of the Country to be used as sex slaves and laborers in the big cities, killed for rituals, organ transplantation, or used for money laundering, begging on the streets or are put to work in the fields. These children are made to do inhuman jobs under degrading conditions and face all kinds of abuse at the hands of their owners with no hope of escape. While lots of people blame poverty or culture as a basis for human trafficking in Nigeria, the National Agency for the Prohibition and Trafficking in Persons and other Related Matters (NAPTIP) says other causes of the outrageous rate of human trafficking in the country are ignorance, desperation, and the promotion and commercialization of sex by the European Union (EU) as dozens of young Nigerian children and women are forced to work as prostitutes in European countries including the Netherlands, France, Italy, and Spain. In the cause of searching for greener pastures, they are coerced into work they have not chosen and subjected to perpetual life in bondage. The Universal Declaration of Human Rights 1948 prohibits slave trade and slavery. Despite the fact that Nigeria is a Sovereign member of the United Nations and signatory to this International instrument, Child trafficking and slavery is still on the increase. This may be caused by the fact that the punishment for this crime in Nigeria is a maximum term of 10 years imprisonment with some of the worst offenders getting off with as little as 2 years imprisonment or an option of fine. It goes without saying that this punishment is not sufficient to act as a deterrent to these modern slave traders. Another major factor oiling the wheel of trafficking in the country is voodoo. The victims are taken to shrines of voodoo priests for oath taking. There, underage girls and boys are made to swear that they would never reveal the identities of their traffickers to anyone if arrested whether in the course of the journey or in the destination countries and that they would pay off debt. Nigeria needs tougher Laws in order to be able to combat human trafficking and slave trade. Also there has to be aggressive sensitization and awareness programs designed to educate and enlighten the public as to the dangers faced by these victims and the need to report any suspicious activity to the authorities. This paper attempts to give an insight into the plight of under-age Nigerian children trafficked and sold as slaves and offer a more effective stand in the fight against it.

Keywords: child labor, slavery, slave trade, trafficking

Procedia PDF Downloads 484
9346 The Relevant Study of Leisure Motivation, Leisure Attitude and Health Promotion Lifestyle of Elderly People in Taiwan

Authors: Cheng-Yu Tsai, Chiung-En Huang, Ming-Tsang Wu

Abstract:

The purpose of this study was to investigate the relationships among leisure motivation, leisure attitude, and health promotion lifestyle. The participants were recruited from a convenience sampling that subjects were at least 55 years of age in Tainan City, Taiwan. Three hundred survey instruments were distributed, and 227 effective instruments were returned, for an effective rate of 75.7%. The collected data were analyzed statistically. The findings of this research were as follows: 1.There is significantly correlated between leisure motivation and leisure attitude. 2. There is significantly correlated between leisure attitude and health promotion lifestyle. 3. There is significantly correlated between leisure motivation and health promotion lifestyle.

Keywords: leisure motivation, leisure attitude, health promotion lifestyle, tourism

Procedia PDF Downloads 341
9345 E-Procurement Adoption and Effective Service Delivery in the Uganda Coffee Industry

Authors: Taus Muganda

Abstract:

This research explores the intricate relationship between e-procurement adoption and effective service delivery in the Uganda Coffee Industry, focusing on the processes involved, key actors, and the impact of digital transformation. The study is guided by three prominent theories, Actor-Network Theory, Resource-Based View Theory, and Institutional Theory to comprehensively explore the dynamics of e-procurement in the context of the coffee sector. The primary aim of this project is to examine the e-procurement adoption process and its role in enhancing service delivery within the Uganda Coffee Industry. The research questions guiding this inquiry are: firstly, whether e-procurement adoption and implementation contribute to achieving quality service delivery; and secondly, how e-procurement adoption can be effectively realized within the Uganda Coffee Industry. To address these questions, the study has laid out specific objectives. Firstly, it seeks to investigate the impact of e-procurement on effective service delivery, analysing how the integration of digital processes influences the overall quality of services provided in the coffee industry. Secondly, it aims to critically analyse the measures required to achieve effective delivery outcomes through the adoption and implementation of e-procurement, assessing the strategies that can maximize the benefits of digital transformation. Furthermore, the research endeavours to identify and examine the key actor’s instrumental in achieving effective service delivery within the Uganda Coffee Industry. By utilizing Actor-Network Theory, the study will elucidate the network of relationships and collaborations among actors involved in the e-procurement process. The research contributes to addressing a critical gap in the sector. Despite coffee being the leading export crop in Uganda, constituting 16% of total exports, there is a recognized need for digital transformation, specifically in the realm of e-procurement, to enhance the productivity of producers and contribute to the economic growth of the country. The study aims to provide insights into transforming the Uganda Coffee Industry by focusing on improving the e-procurement services delivered to actors in the coffee sector. The three forms of e-procurement investigated in this research—E-Sourcing, E-Payment, and E-Invoicing—serve as focal points in understanding the multifaceted dimensions of digital integration within the Uganda Coffee Industry. This research endeavours to offer practical recommendations for policymakers, industry stakeholders, and the UCDA to strategically leverage e-procurement for the benefit of the entire coffee value chain.

Keywords: e-procurement, effective service delivery, actors, actor-network theory, resource-based view theory, institutional theory, e-invocing, e-payment, e-sourcing

Procedia PDF Downloads 44
9344 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network

Authors: Amit Verma, Pardeep Kaur

Abstract:

In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.

Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval

Procedia PDF Downloads 362
9343 Personal Data Protection: A Legal Framework for Health Law in Turkey

Authors: Veli Durmus, Mert Uydaci

Abstract:

Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.

Keywords: data protection, personal data, privacy, healthcare, health law

Procedia PDF Downloads 197
9342 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 428
9341 Effective Validation Model and Use of Mobile-Health Apps for Elderly People

Authors: Leonardo Ramirez Lopez, Edward Guillen Pinto, Carlos Ramos Linares

Abstract:

The controversy brought about by the increasing use of mHealth apps and their effectiveness for disease prevention and diagnosis calls for immediate control. Although a critical topic in research areas such as medicine, engineering, economics, among others, this issue lacks reliable implementation models. However, projects such as Open Web Application Security Project (OWASP) and various studies have helped to create useful and reliable apps. This research is conducted under a quality model to optimize two mHealth apps for older adults. Results analysis on the use of two physical activity monitoring apps - AcTiv (physical activity) and SMCa (energy expenditure) - is positive and ideal. Through a theoretical and practical analysis, precision calculations and personal information control of older adults for disease prevention and diagnosis were performed. Finally, apps are validated by a physician and, as a result, they may be used as health monitoring tools in physical performance centers or any other physical activity. The results obtained provide an effective validation model for this type of mobile apps, which, in turn, may be applied by other software developers that along with medical staff would offer digital healthcare tools for elderly people.

Keywords: model, validation, effective, healthcare, elderly people, mobile app

Procedia PDF Downloads 203