Search results for: knowledge integrity
8103 Pool Fire Tests of Dual Purpose Casks for Spent Nuclear Fuel
Authors: K. S. Bang, S. H. Yu, J. C. Lee, K. S. Seo, S. H. Lee
Abstract:
Dual purpose casks are used for storage and transport of spent nuclear fuel assemblies. Therefore, they satisfy the requirements prescribed in the Korea NSSC Act 2013-27, the IAEA Safety Standard Series No. SSR-6, and US 10 CFR Part 71. These regulatory guidelines classify the dual purpose cask as a Type B package, and state that a Type B package must be able to withstand a temperature of 800°C for a period of 30 min. Therefore, a fire test was conducted using a one-sixth slice of a real cask to estimate the thermal integrity of the dual purpose cask at a temperature of 800°C. The neutron shield reached a maximum temperature of 183°C, which indicates that dual purpose cask was properly insulated from the heat of the flames. The temperature rise of the basket during the fire test was 29°C. Therefore, the integrity of a spent nuclear fuel is estimated to be maintained. The temperature was lower when a cooling pin was installed. The neutron shielding was therefore protected adequately by cooling pin. As a result, the thermal integrity of the dual purpose cask was maintained and the cask is judged to be sufficiently safe for temperatures under 800°C.Keywords: dual purpose cask, spent nuclear fuel, pool fire test, integrity
Procedia PDF Downloads 4618102 Influence of Machining Process on Surface Integrity of Plasma Coating
Authors: T. Zlámal, J. Petrů, M. Pagáč, P. Krajkovič
Abstract:
For the required function of components with the thermal spray coating, it is necessary to perform additional machining of the coated surface. The paper deals with assessing the surface integrity of Metco 2042, a plasma sprayed coating, after its machining. The selected plasma sprayed coating serves as an abradable sealing coating in a jet engine. Therefore, the spray and its surface must meet high quality and functional requirements. Plasma sprayed coatings are characterized by lamellar structure, which requires a special approach to their machining. Therefore, the experimental part involves the set-up of special cutting tools and cutting parameters under which the applied coating was machined. For the assessment of suitably set machining parameters, selected parameters of surface integrity were measured and evaluated during the experiment. To determine the size of surface irregularities and the effect of the selected machining technology on the sprayed coating surface, the surface roughness parameters Ra and Rz were measured. Furthermore, the measurement of sprayed coating surface hardness by the HR 15 Y method before and after machining process was used to determine the surface strengthening. The changes of strengthening were detected after the machining. The impact of chosen cutting parameters on the surface roughness after the machining was not proven.Keywords: machining, plasma sprayed coating, surface integrity, strengthening
Procedia PDF Downloads 2668101 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 188100 Knowledge Sharing and Organizational Performance: A System Dynamics Approach
Authors: Shachi Pathak
Abstract:
We are living in knowledge based economy where firms can gain competitive advantage with the help of managing knowledge within the organization. The purpose the study is to develop a conceptual model to explain the relationship between factors affecting knowledge sharing, called as knowledge enablers, in an organization, knowledge sharing activities and organizational performance, using system dynamics approach. This research is important since it will provide better understandings on what are the key knowledge enablers to support knowledge sharing activities, and how knowledge sharing activities will affect the capability of an organization to enhance the performance of the organization.Keywords: knowledge management, knowledge sharing, organizational performance, system dynamics
Procedia PDF Downloads 3748099 Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya
Authors: Osama Sassi, Manal Eltorki, Iftikhar Ahmad
Abstract:
Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection.Keywords: corrosion mitigation on gas transmission pipelines, pipeline integrity management, corrosion management of gas pipelines, prevention and inspection of corrosion
Procedia PDF Downloads 768098 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 3928097 Preserving Digital Arabic Text Integrity Using Blockchain Technology
Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib
Abstract:
With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.Keywords: arabic text, authentication, blockchain, integrity, quran, verification
Procedia PDF Downloads 1648096 Non-Chronological Approach in Crane Girder and Composite Steel Beam Installation: Case Study
Authors: Govindaraj Ramanathan
Abstract:
The time delay and the structural stability are major issues in big size projects due to several factors. Improper planning and poor coordination lead to delay in construction, which sometimes result in reworking or rebuilding. This definitely increases the cost and time of project. This situation stresses the structural engineers to plan out of the limits of contemporary technology utilizing non-chronological approach with creative ideas. One of the strategies to solve this issue is through structural integrity solutions in a cost-effective way. We have faced several problems in a project worth 470 million USD, and one such issue is crane girder installation with composite steel beams. We have applied structural integrity approach with the proper and revised planning schedule to solve the problem efficiently with minimal expenses.Keywords: construction management, delay, non-chronological approach, composite beam, structural integrity
Procedia PDF Downloads 2378095 Data Mining As A Tool For Knowledge Management: A Review
Authors: Maram Saleh
Abstract:
Knowledge has become an essential resource in today’s economy and become the most important asset of maintaining competition advantage in organizations. The importance of knowledge has made organizations to manage their knowledge assets and resources through all multiple knowledge management stages such as: Knowledge Creation, knowledge storage, knowledge sharing and knowledge use. Researches on data mining are continues growing over recent years on both business and educational fields. Data mining is one of the most important steps of the knowledge discovery in databases process aiming to extract implicit, unknown but useful knowledge and it is considered as significant subfield in knowledge management. Data miming have the great potential to help organizations to focus on extracting the most important information on their data warehouses. Data mining tools and techniques can predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This review paper explores the applications of data mining techniques in supporting knowledge management process as an effective knowledge discovery technique. In this paper, we identify the relationship between data mining and knowledge management, and then focus on introducing some application of date mining techniques in knowledge management for some real life domains.Keywords: Data Mining, Knowledge management, Knowledge discovery, Knowledge creation.
Procedia PDF Downloads 2088094 Investigating the Impact of Knowledge Management Components on Employee Productivity
Authors: Javad Moghtader Kargaran
Abstract:
Today, attention to knowledge and management Knowledge as a strategy is very important has taken with economy becoming knowledge-oriented, how and knowing the effective management and integration of different types Knowledge (obvious-implicit) to preserve and create advantage. Competition has become very important. Knowledge is a valuable resource for empowering organizations in the direction of innovation and competition. Due to the importance of human resources in the survival of organizations, extensive efforts are made to empower them. This knowledge can lead to awareness among employees. Employees and the knowledge that is in their minds are very valuable resources for the organization, which must be managed and developed. In fact, the ultimate goal of knowledge management is to increase the intelligence and productivity of employees and the organization.Keywords: knowledge, management, productivity, human
Procedia PDF Downloads 958093 The Effectiveness of Exchange of Tacit and Explicit Knowledge Using Digital and Face to Face Sharing
Authors: Delio I. Castaneda, Paul Toulson
Abstract:
The purpose of this study was to investigate the knowledge sharing effectiveness of two types of knowledge, tacit and explicit, depending on two channels: face to face or digital. Participants were 217 knowledge workers in New Zealand and researchers who attended a knowledge management conference in the United Kingdom. In the study, it was found that digital tools are effective to share explicit knowledge. In addition, digital tools that facilitated dialogue were effective to share tacit knowledge. It was also found that face to face communication was an effective way to share tacit and explicit knowledge. Results of this study contribute to clarify in what cases digital tools are effective to share tacit knowledge. Additionally, even though explicit knowledge can be easily shared using digital tools, this type of knowledge is also possible to be shared through dialogue. Result of this study may support practitioners to redesign programs and activities based on knowledge sharing to make strategies more effective.Keywords: digital knowledge, explicit knowledge, knowledge sharing, tacit knowledge
Procedia PDF Downloads 2558092 A Framework for Customer Knowledge Management (CKM) as a Key Role in Relationship
Authors: Mehrnoosh Askarizadeh
Abstract:
The customer’s value has become obvious for the leading companies in today’s competitive environment. Therefore they are constantly trying to improve their relationship with customers. Customer Knowledge has been recognized as a strategic resource and a key to the success of any company. Talking about the Customer Knowledge Management is closely associated with Knowledge Management and Customer Relationship Management (CRM). Recent studies conducted in the fields of Knowledge Management (KM) and Customer Relationship Management (CRM) has explained that the two approaches can have great synergies. In this paper, our aim is to provide an understanding of Customer Knowledge Management (CKM) as an integrated management approach and competence it requires. We describe CKM as an ongoing process of generating, disseminating and using customer knowledge within an organization and between an organization and its customers. In addition, we propose a comprehensive framework of CKM, the ability to integrate customer knowledge into customer relationship management processes.Keywords: e-commerce, knowledge management (KM), customer relationship management (CRM), customer knowledge management (CKM)
Procedia PDF Downloads 5578091 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 3078090 Understanding Tacit Knowledge and Its Role in Military Organizations: Methods of Managing Tacit Knowledge
Authors: M. Erhan Orhan, Onur Ozdemir
Abstract:
Expansion of area of operation and increasing diversity of threats forced the military organizations to change in many ways. However, tacit knowledge still is the most fundamental component of organizational knowledge. Since it is human oriented and in warfare human stands at the core of the organization. Therefore, military organizations should find effective ways of systematically utilizing tacit knowledge. In this context, this article suggest some methods for turning tacit knowledge into explicit in military organizations.Keywords: tacit knowledge, military, knowledge management, warfare, technology
Procedia PDF Downloads 4888089 Sustainable Resource Use as a Means of Preserving the Integrity of the Eco-System and Environment
Authors: N. Hedayat, E. Karamifar
Abstract:
Sustainable food and fiber production is emerging as an irresistible option in agrarian planning. Although one should not underestimate the successes of the Green Revolution in enhancing crop production, its adverse environmental and ecosystem consequences have also been remarkable. The aim of this paper is to identify ways of improving crop production to ensure agricultural sustainability and environmental integrity. Systematic observations are used for data collection on intensive farming, deforestation and the environmental implications of industrial pollutants on agricultural sustainability at national and international levels. These were achieved within a comparative analytical model of data interpretation. Results show that while multiple factors enhance yield, they have a simultaneous effect in undermining the ecosystem and environmental integrity. Results show that application of excessive agrichemical have been one of the major cause of polluting the surface and underground water bodies as well as soil layers in affected croplands. Results consider rapid deforestation in the tropical regions has been the underlying cause of impairing the integrity of biodiversity and oxygen-generation regime. These, coupled with production of greenhouse gasses, have contributed to global warming and hydrological irregularities. Continuous production of pollutants and effluents has affected marine and land biodiversity arising from acid rains generated by modern farming and deforestation. Continuous production of greenhouse gases has also been instrumental in affecting climatic behavior manifested in recurring draughts and contraction of lakes and ponds as well as emergence of potential flooding of waterways and floodplains in the future.Keywords: agricultural sustainability, environmental integrity, pollution, eco-system
Procedia PDF Downloads 4018088 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks
Authors: Antonio Pizzarello, Oris Friesen
Abstract:
Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition
Procedia PDF Downloads 2238087 Effect of Incentives on Knowledge Sharing and Learning: Evidence from the Indian IT Sector
Authors: Asish O. Mathew, Lewlyn L. R. Rodrigues
Abstract:
The organizations in the knowledge economy era have recognized the importance of building knowledge assets for sustainable growth and development. In comparison to other industries, Information Technology (IT) enterprises, holds an edge in developing an effective Knowledge Management (KM) program, thanks to their in-house technological abilities. This paper tries to study the various knowledge-based incentive programs and its effect on Knowledge Sharing and Learning in the context of the Indian IT sector. A conceptual model is developed linking KM incentives, knowledge sharing, and learning. A questionnaire study is conducted to collect primary data from the knowledge workers of the IT organizations located in India. The data was analysed using Structural Equation Modeling using Partial Least Square method. The results show a strong influence of knowledge management incentives on knowledge sharing and an indirect influence on learning.Keywords: knowledge management, knowledge management incentives, knowledge sharing, learning
Procedia PDF Downloads 4768086 Analysis and Performance of European Geostationary Navigation Overlay Service System in North of Algeria for GPS Single Point Positioning
Authors: Tabti Lahouaria, Kahlouche Salem, Benadda Belkacem, Beldjilali Bilal
Abstract:
The European Geostationary Navigation Overlay Service (EGNOS) provides an augmentation signal to GPS (Global Positioning System) single point positioning. Presently EGNOS provides data correction and integrity information using the GPS L1 (1575.42 MHz) frequency band. The main objective of this system is to provide a better real-time positioning precision than using GPS only. They are expected to be used with single-frequency code observations. EGNOS offers navigation performance for an open service (OS), in terms of precision and availability this performance gradually degrades as moving away from the service area. For accurate system performance, the service will become less and less available as the user moves away from the EGNOS service. The improvement in position solution is investigated using the two collocated dual frequency GPS, where no EGNOS Ranging and Integrity Monitoring Station (RIMS) exists. One of the pseudo-range was kept as GPS stand-alone and the other was corrected by EGNOS to estimate the planimetric and altimetric precision for different dates. It is found that precision in position improved significantly in the second due to EGNOS correction. The performance of EGNOS system in the north of Algeria is also investigated in terms of integrity. The results show that the horizontal protection level (HPL) value is below 18.25 meters (95%) and the vertical protection level (VPL) is below 42.22 meters (95 %). These results represent good integrity information transmitted by EGNOS for APV I service. This service is thus compliant with the aviation requirements for Approaches with Vertical Guidance (APV-I), which is characterised by 40 m HAL (horizontal alarm limit) and 50 m VAL (vertical alarm limit).Keywords: EGNOS, GPS, positioning, integrity, protection level
Procedia PDF Downloads 2258085 The Work System Method for Designing Knowledge Mobilization Projects
Authors: Chihab Benmoussa
Abstract:
Could the Work System Approach (WSA) function as a framework for designing high-impact knowledge mobilization systems? This paper put forward arguments in favor of the applicability of WSA for knowledge mobilization design based on evidences from a practical research. Normative approaches for practitioners are highly needed especially in the field of knowledge management (KM), given the abysmal rate of disappointment and failure of KM projects. The paper contrasts knowledge management and knowledge mobilization, presents the WSA and showed how the WSA’s concepts and ideas fit with the approach adopted by a multinational company in designing a successful knowledge mobilization initiative.Keywords: knowledge management, knowledge mobilizations, work system method
Procedia PDF Downloads 5238084 Management of Indigenous Knowledge: Expectations of Library and Information Professionals in Developing Countries
Authors: Desmond Chinedu Oparaku, Pearl C. Akanwa, Oyemike Victor Benson
Abstract:
This paper examines the challenges facing library and information centers (LICs) in managing indigenous knowledge in academic libraries in developing countries. The need for managing an indigenous knowledge in library and information centers in developing nations is becoming more critical. There is an ever increasing output of indigenous knowledge; effective management of indigenous knowledge becomes necessary to enable the next generation benefit from them. This paper thus explores the concept of indigenous knowledge (IK), nature of indigenous knowledge (IK), the various forms of indigenous knowledge (IK), sources of indigenous knowledge (IK), and relevance of indigenous knowledge (IK). The expectations of library and information professionals towards effective management of indigenous knowledge and the challenges to effective management of indigenous knowledge were highlighted. Recommendations were made based on the identified challenges.Keywords: library, indigenous knowledge, information centres, information professionals
Procedia PDF Downloads 4228083 Machine Learning Methods for Network Intrusion Detection
Authors: Mouhammad Alkasassbeh, Mohammad Almseidin
Abstract:
Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE. Procedia PDF Downloads 2348082 Effect of Integrity of the Earthing System on the Rise of Earth Potential
Authors: N. Ullah, A. Haddad, F. Van Der Linde
Abstract:
This paper investigates the effects of breaks in bonds, breaks in the earthing system and breaks in earth wire on the rise of the earth potential (EPR) in a substation and at the transmission tower bases using various models of an L6 tower. Different approaches were adopted to examine the integrity of the earthing system and the terminal towers. These effects were investigated to see the associated difference in the EPR magnitudes with respect to a healthy system at various locations. Comparisons of the computed EPR magnitudes were then made between the healthy and unhealthy system to detect any difference. The studies were conducted at power frequency for a uniform soil with different soil resistivities. It was found that full breaks in the double bond of the terminal towers increase the EPR significantly at the fault location, while they reduce EPR at the terminal tower bases. A fault on the isolated section of the grid can result in EPR values up to 8 times of those on a healthy system at higher soil resistivities, provided that the extended earthing system stays connected to the grid.Keywords: bonding, earthing, EPR, integrity, system
Procedia PDF Downloads 3288081 The Challenges of Well Integrity on Plug and Abandoned Wells for Offshore Co₂ Storage Site Containment
Authors: Siti Noor Syahirah Mohd Sabri
Abstract:
The oil and gas industry is committed to net zero carbon emissions because the consequences of climate change could be catastrophic unless responded to very soon. One way of reducing CO₂ emissions is to inject it into a depleted reservoir buried underground. This greenhouse gas reduction technique significantly reduces CO₂ released into the atmosphere. In general, depleted oil and gas reservoirs provide readily available sites for the storage of CO₂ in offshore areas. This is mainly due to the hydrocarbons have been optimally produced and the existence of voids for effective CO₂ storage. Hence, make it a good candidate for a CO₂ well injector location. Geological storage sites are often evaluated in terms of capacity, injectivity and containment. Leakage through the cap rock or existing well is the main concern in the depleted fields. In order to develop these fields as CO₂ storage sites, the long-term integrity of wells drilled in these oil & gas fields must be ascertained to ensure good CO₂ containment. Well, integrity is often defined as the ability to contain fluids without significant leakage through the project lifecycle. Most plugged and abandoned (P & A) wells in Peninsular Malaysia have drilled 20 – 30 years ago and were not designed to withstand downhole conditions having >50%vol CO₂ and CO₂/H₂O mixture. In addition, Corrosive-Resistant Alloy (CRA) tubular and CO₂-resistant cement was not used during good construction. The reservoir pressure and temperature conditions may have further degraded the material strength and elevated the corrosion rate. Understanding all the uncertainties that may have affected cement-casing bonds, such as the quality of cement behind the casing, subsidence effect, corrosion rate, etc., is the first step toward well integrity evaluation. Secondly, proper quantification of all the uncertainties involved needs to be done to ensure long-term underground storage objectives of CO₂ are achieved. This paper will discuss challenges associated with estimating the performance of well barrier elements in existing P&A wells. Risk ranking of the existing P&A wells is to be carried out in order to ensure the integrity of the storage site is maintained for long-term CO₂ storage. High-risk existing P&A wells are to be re-entered to restore good integrity and to reduce future leakage that may happen. In addition, the requirement to design a fit-for-purpose monitoring and mitigation technology package for potential CO₂ leakage/seepage in the marine environment will be discussed accordingly. The holistic approach will ensure that the integrity is maintained, and CO₂ is contained underground for years to come.Keywords: CCUS, well integrity, co₂ storage, offshore
Procedia PDF Downloads 908080 Building a Hierarchical, Granular Knowledge Cube
Authors: Alexander Denzler, Marcel Wehrle, Andreas Meier
Abstract:
A knowledge base stores facts and rules about the world that applications can use for the purpose of reasoning. By applying the concept of granular computing to a knowledge base, several advantages emerge. These can be harnessed by applications to improve their capabilities and performance. In this paper, the concept behind such a construct, called a granular knowledge cube, is defined, and its intended use as an instrument that manages to cope with different data types and detect knowledge domains is elaborated. Furthermore, the underlying architecture, consisting of the three layers of the storing, representing, and structuring of knowledge, is described. Finally, benefits as well as challenges of deploying it are listed alongside application types that could profit from having such an enhanced knowledge base.Keywords: granular computing, granular knowledge, hierarchical structuring, knowledge bases
Procedia PDF Downloads 4988079 Presenting a Knowledge Mapping Model According to a Comparative Study on Applied Models and Approaches to Map Organizational Knowledge
Authors: Ahmad Aslizadeh, Farid Ghaderi
Abstract:
Mapping organizational knowledge is an innovative concept and useful instrument of representation, capturing and visualization of implicit and explicit knowledge. There are a diversity of methods, instruments and techniques presented by different researchers following mapping organizational knowledge to reach determined goals. Implicating of these methods, it is necessary to know their exigencies and conditions in which those can be used. Integrating identified methods of knowledge mapping and comparing them would help knowledge managers to select the appropriate methods. This research conducted to presenting a model and framework to map organizational knowledge. At first, knowledge maps, their applications and necessity are introduced because of extracting comparative framework and detection of their structure. At the next step techniques of researchers such as Eppler, Kim, Egbu, Tandukar and Ebner as knowledge mapping models are presented and surveyed. Finally, they compare and a superior model would be introduced.Keywords: knowledge mapping, knowledge management, comparative study, business and management
Procedia PDF Downloads 4038078 Seismic Integrity Determination of Dams in Urban Areas
Authors: J. M. Mayoral, M. Anaya
Abstract:
The urban and economic development of cities demands the construction of water use and flood control infrastructure. Likewise, it is necessary to determine the safety level of the structures built with the current standards and if it is necessary to define the reinforcement actions. The foregoing is even more important in structures of great importance, such as dams, since they imply a greater risk for the population in case of failure or undesirable operating conditions (e.g., seepage, cracks, subsidence). This article presents a methodology for determining the seismic integrity of dams in urban areas. From direct measurements of the dynamic properties using geophysical exploration and ambient seismic noise measurements, the seismic integrity of the concrete-faced rockfill dam selected as a case of study is evaluated. To validate the results, two accelerometer stations were installed (e.g., free field and crest of the dam). Once the dynamic properties were determined, three-dimensional finite difference models were developed to evaluate the dam seismic performance for different intensities of movement, considering the site response and soil-structure interaction effects. The seismic environment was determined from the uniform hazard spectra for several return periods. Based on the results obtained, the safety level of the dam against different seismic actions was determined, and the effectiveness of ambient seismic noise measurements in dynamic characterization and subsequent evaluation of the seismic integrity of urban dams was evaluated.Keywords: risk, seismic, soil-structure interaction, urban dams
Procedia PDF Downloads 1188077 Contestation of Local and Non-Local Knowledge in Developing Bali Cattle at Barru Regency, Province of South Sulawesi, Indonesia
Authors: A. Amidah Amrawaty, M. Saleh S. Ali, Darmawan Salman
Abstract:
The aim of this study was to identify local and non local knowledge in Bali cattle development, to analyze the contestation between local and non-local knowledge. The paradigm used was constructivism paradigm with a qualitative approach. descriptive type of research using case study method. The study was conducted in four villages subjected to Agropolitan Program, i.e. Palakka, Tompo, Galung and Anabanua in Barru District, province of South Sulawesi. The results indicated that the local knowledge of the farmers were: a) knowledge of animal housing, b) knowledge of the prevention and control disease, c) knowledge of the feed, d) knowledge of breed selection, e) knowledge of sharing arrangement, f) knowledge of marketing, Generally, there are three patterns of knowledge contestation namely coexistence, ‘zero sum game’ and hybridization but in this research only coexistence and zero sum game patterns took place, while the pattern of hybridization did not occur.Keywords: contestation, local knowledge, non-local knowledge, developing of Bali cattle
Procedia PDF Downloads 4038076 The Design Method of Artificial Intelligence Learning Picture: A Case Study of DCAI's New Teaching
Authors: Weichen Chang
Abstract:
To create a guided teaching method for AI generative drawing design, this paper develops a set of teaching models for AI generative drawing (DCAI), which combines learning modes such as problem-solving, thematic inquiry, phenomenon-based, task-oriented, and DFC . Through the information security AI picture book learning guided programs and content, the application of participatory action research (PAR) and interview methods to explore the dual knowledge of Context and ChatGPT (DCAI) for AI to guide the development of students' AI learning skills. In the interviews, the students highlighted five main learning outcomes (self-study, critical thinking, knowledge generation, cognitive development, and presentation of work) as well as the challenges of implementing the model. Through the use of DCAI, students will enhance their consensus awareness of generative mapping analysis and group cooperation, and they will have knowledge that can enhance AI capabilities in DCAI inquiry and future life. From this paper, it is found that the conclusions are (1) The good use of DCAI can assist students in exploring the value of their knowledge through the power of stories and finding the meaning of knowledge communication; (2) Analyze the transformation power of the integrity and coherence of the story through the context so as to achieve the tension of ‘starting and ending’; (3) Use ChatGPT to extract inspiration, arrange story compositions, and make prompts that can communicate with people and convey emotions. Therefore, new knowledge construction methods will be one of the effective methods for AI learning in the face of artificial intelligence, providing new thinking and new expressions for interdisciplinary design and design education practice.Keywords: artificial intelligence, task-oriented, contextualization, design education
Procedia PDF Downloads 298075 Creation and Management of Knowledge for Organization Sustainability and Learning
Authors: Deepa Kapoor, Rajshree Singh
Abstract:
This paper appreciates the emergence and growing importance as a new production factor makes the development of technologies, methodologies and strategies for measurement, creation, and diffusion into one of the main priorities of the organizations in the knowledge society. There are many models for creation and management of knowledge and diverse and varied perspectives for study, analysis, and understanding. In this article, we will conduct a theoretical approach to the type of models for the creation and management of knowledge; we will discuss some of them and see some of the difficulties and the key factors that determine the success of the processes for the creation and management of knowledge.Keywords: knowledge creation, knowledge management, organizational development, organization learning
Procedia PDF Downloads 3458074 A Review of Encryption Algorithms Used in Cloud Computing
Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele
Abstract:
Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.Keywords: cloud computing, data integrity, confidentiality, privacy, availability
Procedia PDF Downloads 132