Search results for: party wear
355 Shaking Force Balancing of Mechanisms: An Overview
Authors: Vigen Arakelian
Abstract:
The balancing of mechanisms is a well-known problem in the field of mechanical engineering because the variable dynamic loads cause vibrations, as well as noise, wear and fatigue of the machines. A mechanical system with unbalance shaking force and shaking moment transmits substantial vibration to the frame. Therefore, the objective of the balancing is to cancel or reduce the variable dynamic reactions transmitted to the frame. The resolution of this problem consists in the balancing of the shaking force and shaking moment. It can be fully or partially, by internal mass redistribution via adding counterweights or by modification of the mechanism's architecture via adding auxiliary structures. The balancing problems are of continue interest to researchers. Several laboratories around the world are very active in this area and new results are published regularly. However, despite its ancient history, mechanism balancing theory continues to be developed and new approaches and solutions are constantly being reported. Various surveys have been published that disclose particularities of balancing methods. The author believes that this is an appropriate moment to present a state of the art of the shaking force balancing studies completed by new research results. This paper presents an overview of methods devoted to the shaking force balancing of mechanisms, as well as the historical aspects of the origins and the evolution of the balancing theory of mechanisms.Keywords: inertial forces, shaking forces, balancing, dynamics, mechanism design
Procedia PDF Downloads 127354 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 63353 Application of Metakaolin from Northeast of Thailand Used as Binder in Casting Process of Rice Polishing Cylinder
Authors: T. Boonkang, C. Santhaweesuk, N. Pianthong, P. Neeramon, A. Phimhlo, S. Bangphan
Abstract:
The objective of this research was to apply metakaolin from northeast of Thailand as a binder in the casting process of rice polishing cylinder in replacement of the imported calcined magnesite cement and to reduce the production cost of the cylinder. Metakaolin was obtained from three different regions (Udon Thani, Nakhon Phanom, and Ubon Ratchathani). The design of experiment analysis using the MINITAB Release 14 based on the compressive strength and tensile strength testing was conducted. According to the analysis results, it was found that the optimal proportions were calcined magnesite cement: metakaolin from Udon Thani, Nakhon Phanom and Ubon Ratchathani equal to 63:37, 71:29, and 100:0, respectively. When used this formula to cast the cylinder and test the rice milling, it was found that the average broken rice percent was 32.52 and 38.29 for the cylinder contained the metakaolin from Udon Thani and Nakhon Phanom, respectively, which implied that the cylinder which contained the metakaolin from Udon Thani has higher efficiency than the cylinder which contained the metakaolin from Nakhon Phanom at 0.05 level of statistical significance. Whereas, the average wear rate of cylinder from both resources were 7.27 and 6.53 g/h, respectively.Keywords: binder, casting, metakaolin, rice polishing cylinder
Procedia PDF Downloads 305352 Experimental and Numerical Investigation on Delaminated Composite Plate
Authors: Sreekanth T. G., Kishorekumar S., Sowndhariya Kumar J., Karthick R., Shanmugasuriyan S.
Abstract:
Composites are increasingly being used in industries due to their unique properties, such as high specific stiffness and specific strength, higher fatigue and wear resistances, and higher damage tolerance capability. Composites are prone to failures or damages that are difficult to identify, locate, and characterize due to their complex design features and complicated loading conditions. The lack of understanding of the damage mechanism of the composites leads to the uncertainties in the structural integrity and durability. Delamination is one of the most critical failure mechanisms in laminated composites because it progressively affects the mechanical performance of fiber-reinforced polymer composite structures over time. The identification and severity characterization of delamination in engineering fields such as the aviation industry is critical for both safety and economic concerns. The presence of delamination alters the vibration properties of composites, such as natural frequencies, mode shapes, and so on. In this study, numerical analysis and experimental analysis were performed on delaminated and non-delaminated glass fiber reinforced polymer (GFRP) plate, and the numerical and experimental analysis results were compared, and error percentage has been found out.Keywords: composites, delamination, natural frequency, mode shapes
Procedia PDF Downloads 108351 Analysis of the 2023 Karnataka State Elections Using Online Sentiment
Authors: Pranav Gunhal
Abstract:
This paper presents an analysis of sentiment on Twitter towards the Karnataka elections held in 2023, utilizing transformer-based models specifically designed for sentiment analysis in Indic languages. Through an innovative data collection approach involving a combination of novel methods of data augmentation, online data preceding the election was analyzed. The study focuses on sentiment classification, effectively distinguishing between positive, negative, and neutral posts while specifically targeting the sentiment regarding the loss of the Bharatiya Janata Party (BJP) or the win of the Indian National Congress (INC). Leveraging high-performing transformer architectures, specifically IndicBERT, coupled with specifically fine-tuned hyperparameters, the AI models employed in this study achieved remarkable accuracy in predicting the INC’s victory in the election. The findings shed new light on the potential of cutting-edge transformer-based models in capturing and analyzing sentiment dynamics within the Indian political landscape. The implications of this research are far-reaching, providing invaluable insights to political parties for informed decision-making and strategic planning in preparation for the forthcoming 2024 Lok Sabha elections in the nation.Keywords: sentiment analysis, twitter, Karnataka elections, congress, BJP, transformers, Indic languages, AI, novel architectures, IndicBERT, lok sabha elections
Procedia PDF Downloads 85350 Penalization of Transnational Crimes in the Domestic Legal Order: The Case of Poland
Authors: Magda Olesiuk-Okomska
Abstract:
The degree of international interdependence has grown significantly. Poland is a party to nearly 1000 binding multilateral treaties, including international legal instruments devoted to criminal matters and obliging the state to penalize certain crimes. The paper presents results of a theoretical research conducted as a part of doctoral research. The main hypothesis assumed that there was a separate category of crimes to penalization of which Poland was obliged under international legal instruments; that a catalogue of such crimes and a catalogue of international legal instruments providing for Poland’s international obligations had never been compiled in the domestic doctrine, thus there was no mechanism for monitoring implementation of such obligations. In the course of the research, a definition of transnational crimes was discussed and confronted with notions of international crimes, treaty crimes, as well as cross-border crimes. A list of transnational crimes penalized in the Polish Penal Code as well as in non-code criminal law regulations was compiled; international legal instruments, obliging Poland to criminalize and penalize specific conduct, were enumerated and catalogued. It enabled the determination whether Poland’s international obligations were implemented in domestic legislation, as well as the formulation of de lege lata and de lege ferenda postulates. Implemented research methods included inter alia a dogmatic and legal method, an analytical method and desk research.Keywords: international criminal law, transnational crimes, transnational criminal law, treaty crimes
Procedia PDF Downloads 223349 Electron Microscopical Analysis of Arterial Line Filters During Cardiopulmonary Bypass
Authors: Won-Gon Kim
Abstract:
Introduction: The clinical value of arterial line filters is still a controversial issue. Proponents of arterial line filtration argue that filters remove particulate matter and undissolved gas from circulation, while opponents argue the absence of conclusive clinical data. We conducted scanning electron microscope (SEM) studies of arterial line filters used clinically in the CPB circuits during adult cardiac surgery and analyzed the types and characteristics of materials entrapped in the arterial line filters. Material and Methods: Twelve arterial line filters were obtained during routine hypothermic cardiopulmonary bypass in 12 adult cardiac patients. The arterial line filter was a screen type with a pore size of 40 ㎛ (Baxter Health care corporation Bentley division, Irvine, CA, U.S.A.). After opening the housing, the woven polyester strands were examined with SEM. Results and Conclusion: All segments examined(120 segments, each 2.5 X 2.5 cm in size) contained no embolic particles larger in their cross-sectional area than the pore size of the filter(40 ㎛). The origins of embolic particulates were mostly from environmental foreign bodies. This may suggest a possible need for more aggressive filtration of smaller particulates than is generally carried out at the present time.Keywords: arterial line filter, tubing wear, scanning electron microscopy, SEM
Procedia PDF Downloads 448348 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 102347 Social Influences on Americans' Mask-Wearing Behavior during COVID-19
Authors: Ruoya Huang, Ruoxian Huang, Edgar Huang
Abstract:
Based on a convenience sample of 2,092 participants from across all 50 states of the United States, a survey was conducted to explore Americans’ mask-wearing behaviors during COVID-19 according to their political convictions, religious beliefs, and ethnic cultures from late July to early September, 2020. The purpose of the study is to provide evidential support for government policymaking so as to drive up more effective public policies by taking into consideration the variance in these social factors. It was found that the respondents’ party affiliation or preference, religious belief, and ethnicity, in addition to their health condition, gender, level of concern of contracting COVID-19, all affected their mask-wearing habits both in March, the initial coronavirus outbreak stage, and in August, when mask-wearing had been made mandatory by state governments. The study concludes that pandemic awareness campaigns must be run among all citizens, especially among African Americans, Muslims, and Republicans, who have the lowest rates of wearing masks, in order to protect themselves and others. It is recommended that complementary cognitive bias awareness programs should be implemented in non-Black and non-Muslim communities to eliminate social concerns that deter them from wearing masks.Keywords: COVID-19 pandemic, ethnicity, mask-wearing, policymaking implications, political affiliations, religious beliefs, United States
Procedia PDF Downloads 234346 Production of Spherical Cementite within Bainitic Matrix Microstructures in High Carbon Powder Metallurgy Steels
Authors: O. Altuntaş, A. Güral
Abstract:
The hardness-microstructure relationships of spherical cementite in bainitic matrix obtained by a different heat treatment cycles carried out to high carbon powder metallurgy (P/M) steel were investigated. For this purpose, 1.5 wt.% natural graphite powder admixed in atomized iron powders and the mixed powders were compacted under 700 MPa at room temperature and then sintered at 1150 °C under a protective argon gas atmosphere. The densities of the green and sintered samples were measured via the Archimedes method. A density of 7.4 g/cm3 was obtained after sintering and a density of 94% was achieved. The sintered specimens having primary cementite plus lamellar pearlitic structures were fully quenched from 950 °C temperature and then over-tempered at 705 °C temperature for 60 minutes to produce spherical-fine cementite particles in the ferritic matrix. After by this treatment, these samples annealed at 735 °C temperature for 3 minutes were austempered at 300 °C salt bath for a period of 1 to 5 hours. As a result of this process, it could be able to produced spherical cementite particle in the bainitic matrix. This microstructure was designed to improve wear and toughness of P/M steels. The microstructures were characterized and analyzed by SEM and micro and macro hardness.Keywords: powder metallurgy steel, bainite, cementite, austempering and spheroidization heat treatment
Procedia PDF Downloads 161345 Analysis of an High Voltage Direct Current (HVDC) Connection Using a Real-Time Simulator Under Various Disturbances
Authors: Mankour Mohamed, Miloudi Mohamed
Abstract:
A thorough and accurate simulation is necessary for the study of a High Voltage Direct Current (HVDC) link system during various types of disturbances, including internal faults on both converters, either on the rectifier or on the inverter, as well as external faults, such as AC or DC faults on both converter sides inside the DC link party. In this study, we examine how an HVDC inverter responds to three different types of failures, including faults at the inverter valve, system control faults, and single-phase-to-ground AC faults at the sending end of the inverter side. As this phenomenon represents the most frequent problem that may affect inverter valves, particularly those based on thyristor valves (LCC (line-Commutated converter)), it is more precise to explore which circumstance generates and raises the commutation failure on inverter valves. Because of the techniques used to accelerate the simulation, digital real-time simulators are now the most potent tools that provide simulation results. The real-time-lab RT-LAB platform HYPERSIM OP-5600 is used to implement the Simulation in the Loop (SIL) technique, which is used to validate the results. It is demonstrated how to recover from both the internal faults and the AC problem. The simulation findings show how crucial a role the control system plays in fault recovery.Keywords: hypersim simulator, HVDC systems, mono-polar link, AC faults, misfiring faults
Procedia PDF Downloads 94344 Cutting Performance of BDD Coating on WC-Co Tools
Authors: Feng Xu, Zhaozhi Liu, Junhua Xu, Xiaolong Tang, Dunwen Zuo
Abstract:
Chemical vapor deposition (CVD) diamond coated cutting tool has excellent cutting performance, it is the most ideal tool for the processing of nonferrous metals and alloys, composites, nonmetallic materials and other difficult-to-machine materials efficiently and accurately. Depositing CVD diamond coating on the cemented carbide with high cobalt content can improve its toughness and strength, therefore, it is very important to research on the preparation technology and cutting properties of CVD diamond coated cemented carbide cutting tool with high cobalt content. The preparation technology of boron-doped diamond (BDD) coating has been studied and the coated drills were prepared. BDD coating were deposited on the drills by using the optimized parameters and the SEM results show that there are no cracks or collapses in the coating. Cutting tests with the prepared drills against the silumin and aluminum base printed circuit board (PCB) have been studied. The results show that the wear amount of the coated drill is small and the machined surface has a better precision. The coating does not come off during the test, which shows good adhesion and cutting performance of the drill.Keywords: cemented carbide with high cobalt content, CVD boron-doped diamond, cutting test, drill
Procedia PDF Downloads 440343 Network and Sentiment Analysis of U.S. Congressional Tweets
Authors: Chaitanya Kanakamedala, Hansa Pradhan, Carter Gilbert
Abstract:
Social media platforms, such as Twitter, are excellent datasets for understanding human interactions and sentiments. This report explores social dynamics among US Congressional members through a network analysis applied to a dataset of tweets spanning 2008 to 2017 from the ’US Congressional Tweets Dataset’. In this report, we preform network analysis where connections between users (edges) are established based on a similarity threshold: two tweets are connected if the tweets they post are similar. By utilizing the Natural Language Toolkit (NLTK) and NetworkX, we quantified tweet similarity and constructed a graph comprising various interconnected components. Each component represents a cluster of users with closely aligned content. We then preform sentiment analysis on each cluster to explore the prevalent emotions and opinions within these groups. Our findings reveal that despite the initial expectation of distinct ideological divisions typically aligning with party lines, the analysis exposed a high degree of topical convergence across tweets from different political affiliations. The analysis preformed in this report not only highlights the potential of social media as a tool for political communication but also suggests a complex layer of interaction that transcends traditional partisan boundaries, reflecting a complicated landscape of politics in the digital age.Keywords: natural language processing, sentiment analysis, centrality analysis, topic modeling
Procedia PDF Downloads 37342 The Promise of Nunca Más after Cambiemos: Representations of the 2x1 Decision of the Supreme Court and Santiago Maldonado's Disappearance in the Newspaper La Nación
Authors: Uluhan Berk Ondul
Abstract:
This article aims to shed light on the new stage of transitional justice in Argentina through examining the representations of the 2x1 decision of the Supreme Court and Santiago Maldonado’s Disappearance in the newspaper, La Nación. The two events hold the key to understanding Argentina’s journey since return to democracy as they are about the same crimes of the dictatorship, namely, the forced disappearance of civilians and the subsequent impunity that follows. In the case of a convicted torturer, The Supreme Court of Argentina ruled on 3rd of May 2017 that the days spent in preventive detention after two years should be counted double for the overall sentence. This court decision was met with severe resistance from the members of the parliament as well as the human rights movement. The second item on the list still continues and divides the country into two camps: (1) those who think that the police force has committed another act of forced disappearance in the case of activist Santiago Maldonado and (2) the others who blame the peronistas (the party and supporters of the ex-president Cristina Fernandez de Kirchner) of using this subject as a means to score political points. As a newspaper known for its proximity to the current administration, La Nación offers an insight to the direction of the country and also demonstrates how the neoliberal mindset works. The results of the study show that the transitional justice process in Argentina is far from being complete as the Promise of Nunca Más is still not a shared value but a political statement.Keywords: Argentina, Fallo 2x1, impunity, Santiago Maldonado, transitional justice
Procedia PDF Downloads 231341 Predicting Root Cause of a Fire Incident through Transient Simulation
Authors: Mira Ezora Zainal Abidin, Siti Fauzuna Othman, Zalina Harun, M. Hafiz M. Pikri
Abstract:
In a fire incident involving a Nitrogen storage tank that over-pressured and exploded, resulting in a fire in one of the units in a refinery, lack of data and evidence hampered the investigation to determine the root cause. Instrumentation and fittings were destroyed in the fire. To make it worst, this incident occurred during the COVID-19 pandemic, making collecting and testing evidence delayed. In addition to that, the storage tank belonged to a third-party company which requires legal agreement prior to the refinery getting approval to test the remains. Despite all that, the investigation had to be carried out with stakeholders demanding answers. The investigation team had to devise alternative means to support whatever little evidence came out as the most probable root cause. International standards, practices, and previous incidents on similar tanks were referred. To narrow down to just one root cause from 8 possible causes, transient simulations were conducted to simulate the overpressure scenarios to prove and eliminate the other causes, leaving one root cause. This paper shares the methodology used and details how transient simulations were applied to help solve this. The experience and lessons learned gained from the event investigation and from numerous case studies via transient analysis in finding the root cause of the accident leads to the formulation of future mitigations and design modifications aiming at preventing such incidents or at least minimize the consequences from the fire incident.Keywords: fire, transient, simulation, relief
Procedia PDF Downloads 95340 Form of Social Quality Moving Process of Suburb Communities in a Changing World
Authors: Supannee Chaiumporn
Abstract:
This article is to introduce the meaning and form of social quality moving process as indicated by members of two suburb communities with different social and cultural contexts. The form of social quality moving process is very significant for the community and social development, because it will make the people living together with sustainable happiness. This is a qualitative study involving 30 key-informants from two suburb communities. Data were collected though key-informant interviews, and analyzed using logical content description and descriptive statistics. This research found that on the social quality component, the people in both communities stressed the procedure for social quality-making. This includes the generousness, sharing and assisting among people in the communities. These practices helped making people to live together with sustainable happiness. Living as a family or appear to be a family is the major social characteristic of these two communities. This research also found that form of social quality’s moving process of both communities stress relation of human and nature; “nature overpower humans” paradigm and influence of religious doctrine that emphasizes relations among humans. Both criteria make the form of social’s moving process simple, adaptive to nature and caring for opinion sharing and understanding among each other before action. This form of social quality’s moving process is composed of 4 steps; (1) awareness building, (2) motivation to change, (3) participation from every party concerned (4) self-reliance.Keywords: social quality, form of social quality moving process, happiness, different social and cultural context
Procedia PDF Downloads 386339 The Impact of Initiators on Fast Drying Traffic Marking Paint
Authors: Maryam Taheri, Mehdi Jahanfar, Kenji Ogino
Abstract:
Fast drying traffic marking paint comprising a solvent-borne resin, a filler, a pigment and a solvent that is especially suitable for colder ambient (temperatures near freezing) applications, where waterborne traffic paint cannot be used. Acrylic resins based on methyl methacrylate, butyl acrylate, acrylic acid, and styrene were synthesized in different solvents using organic peroxide initiators such as peroxyester, peroxyketal, dialkylperoxide and azo. After polymerization, the molecular weight (Mw), polydispersity index= PDI (Mw/Mn), viscosity, total residual monomer and APHA color were evaluated and results of organic peroxide initiators (t- butyl and t-amyl derivatives) were also compared with the azo initiator. The Mw, PDI, viscosity, mass conversation and APHA color of resins with t-amyl derivatives of organic peroxide initiators are very proper. The results of the traffic marking paints test such as non-volatile matter, no- pick- up time, hiding power, resistance to wear and water resistance study that produced with these resins also confirm this.Keywords: fast drying traffic marking paint, acrylic resin, organic peroxide initiator, peroxyester, peroxyketal, dialkylperoxide and azo initiator
Procedia PDF Downloads 208338 Loop Heat Pipe Two-Phase Heat Transports: Guidelines for Technology Utilization
Authors: Triem T. Hoang
Abstract:
Loop heat pipes (LHPs) are two-phase capillary-pumped heat transports. An appropriate working fluid is selected for the intended application temperature range. A closed-loop is evacuated to a high vacuum, back-filled partially with the working fluid, and then hermetically sealed under the fluid own pressure. Heat from a heat source conducts through the evaporator casing to vaporize liquid on the outer surface of the wick structure inside the evaporator. The generated vapor is compelled to vent out of the evaporator and into the vapor line for transport to the condenser assembly. There, heat is removed and rejected to a heat sink to condensed vapor back to liquid. The liquid exits the condenser and travels in the liquid line to return to the evaporator to complete the cycle. The circulation of fluid, and thus the heat transport in the LHP, is accomplished entirely by capillary action. The LHP contains no mechanical moving part to wear out or break down and, therefore possesses, reliability and a long life even without maintenance. In this paper, the author not only attempts to introduce the LHP technology in simplistic terms to those who are not familiar with it but also provides necessary technical information to potential users for the proper design and analysis of the LHP system.Keywords: two-phase heat transfer, loop heat pipe, capillary pumped technology, thermal-fluid modeling
Procedia PDF Downloads 141337 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 437336 Financial Intermediation: A Transaction Two-Sided Market Model Approach
Authors: Carlo Gozzelino
Abstract:
Since the early 2000s, the phenomenon of the two-sided markets has been of growing interest in academic literature as such kind of markets differs by having cross-side network effects and same-side network effects characterizing the transactions, which make the analysis different when compared to traditional seller-buyer concept. Due to such externalities, pricing strategies can be based on subsidizing the participation of one side (i.e. considered key for the platform to attract the other side) while recovering the loss on the other side. In recent years, several players of the Italian financial intermediation industry moved from an integrated landscape (i.e. selling their own products) to an open one (i.e. intermediating third party products). According to academic literature such behavior can be interpreted as a merchant move towards a platform, operating in a two-sided market environment. While several application of two-sided market framework are available in academic literature, purpose of this paper is to use a two-sided market concept to suggest a new framework applied to financial intermediation. To this extent, a model is developed to show how competitors behave when vertically integrated and how the peculiarities of a two-sided market act as an incentive to disintegrate. Additionally, we show that when all players act as a platform, the dynamics of a two-sided markets can allow at least a Nash equilibrium to exist, in which platform of different sizes enjoy positive profit. Finally, empirical evidences from Italian market are given to sustain – and to challenge – this interpretation.Keywords: financial intermediation, network externalities, two-sided markets, vertical differentiation
Procedia PDF Downloads 160335 Legal Responsibility of the External Auditor Qualitative Case Study of Libyan Environment
Authors: Bubaker F. Shareia
Abstract:
The aim of this paper is to determine a general frame of the auditor's legal responsibilities in Libya which were implied in professional codes and rules, these codes and rules were concerned with the auditor's rights and duties in conducting his professional duties. This will provide a background for the Libyan accounting profession, and the challenges in tailoring Auditors to meet third party's needs. Being informed of the kinds of legal responsibilities which the external auditors could face during conducting their duties. The study is based on a literature review and archival research, reinforced by a qualitative case study comprised of interviews, questionnaire and a study of internal documents. To reach such an understanding, the researcher designed two questionnaires for collecting the data. One questionnaire was distributed among the certified public accountant firms in Libya and the second was distributed among a group of randomly selected lawyers and judges in the same country. Most auditors agreed upon the determination of their responsibilities toward the state and they emphasized that their responsibilities toward their clients were limited to the accepted standards of auditing. Moreover, all auditors who were surveyed emphasized that there has never been any juridical claims against them, and as a consequence they have never paid any legal fines. This study focuses on one country, which does limit its generalisability. However, it also suggests fruitful research areas in considering the impact and challenge of the historic factors in the accounting profession in emerging economies.Keywords: accounting, external auditor, legal responsibilities, libyan accounting profession
Procedia PDF Downloads 148334 Access to Justice for Persons with Intellectual Disabilities in Indonesia: Case and Problem in Indonesian Criminal Justice System
Authors: Fines Fatimah, SH. MH.
Abstract:
Indonesia is one of the countries that has ratified the UNCRPD (United Nations Convention on the Rights of Persons with Disabilities). The ratification of this convention brings consequences on the adjustment of national legislation with the UNCRPD convention, where this ratification at the same time is a measure in the eyes of the international community that a state party could be consistent with the issues and problems of disability. Persons with disabilities often have little access to justice when they are forced to deal with the criminal justice system. Pursuit of justice through litigation are often not in their favor, therefore without any awareness of law enforcement/awareness of disability will further complicate access to justice for persons with disabilities. Under Article 13 of the UNCRPD, it appeared that the convention requires ratifying states to guarantee equal opportunity and treatment in justice for persons with disabilities. The States should also ensure that any judicial rules must be adapted to the circumstances of persons with disabilities so that people with disabilities can fully participate in all stages of the trial court and, for example, as a witness. Finally, the state must provide training to understand these persons with disabilities (for those who work in the judiciary institution such as police or prison officials). Further, this paper aims to describe problem faced by persons with intellectual disabilities to access justice in Indonesian Criminal Justice System. This paper tries to find and propose the alternative solutions to promote the quality of law enforcement in Indonesia, especially for persons with intellectual disabilities.Keywords: access to justice, Indonesian criminal justice system, intellectual disability, ratifying states
Procedia PDF Downloads 516333 Internalising Islamic Principles of Theocracy as a Pedestal for Good Governance in Nigeria
Authors: Busari Moshood Olanyi
Abstract:
Good governance remains the expectation of every political party in power, especially in this democratic dispensation of the Nigerian Nation. The need to ensure that the citizenry enjoys the dividends of democracy as often promised during various electioneering campaigns is envisioned to be the motif for different agendas and political slogans by different administrations. Unfortunately, different political agendas towards the security of lives and properties, halting the pillage of the economy by corrupt public officials and creation of employment opportunities for the youths, have a record of setback in the history of political leadership and governance in Nigeria. Therefore, the paper examined the principles of Islamic theocracy in its advocacy for a paradigm shift in the Nigerian political system, with a view to engendering good governance. Islamic political terms such as Shūrā (mutual consultation), ‘Adālah (equality and justice), Khilāfah (succession and stewardship) Majlis ash-Shūrā (consultative forum) and Muḥāsabah (accountability) were espoused as sacrosanct to implementing Islamic theocracy as an alternative system of government in Nigeria. The paper concluded by being flexible on the nomenclature of the suggested political system, considering the multi-religious nature of the country as a political entity. Among other recommendations, infusion of politics into our moral/religious system and not the other way round was considered a good step in the direction of a political paradigm shift for ensuring good governance and guaranteeing its sustainability in Nigeria.Keywords: Nigerian nation, democracy, good governance, Islamic theocracy, paradigm shift
Procedia PDF Downloads 146332 Terrorism and Sustainable Tourism Development
Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu
Abstract:
Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness
Procedia PDF Downloads 624331 Close-Out Netting Clauses from a Comparative Perspective
Authors: Lidija Simunovic
Abstract:
A Close-out netting cause is a clause within master agreements which reduces credit risks. This clause contains the parties ' advance agreement that the occurrence of a certain event (such as the commencement of bankruptcy proceedings) will result in the termination of the contract and that their mutual claims will be calculated as a net lump-sum to be paid by one party to the other. The legal treatment of the enforceability of close-out netting clauses opens up many legal matters in comparative legal systems because it is not uniformly treated in comparative laws. Certain legal systems take a liberal approach and allow the enforcement of close-out netting clauses. Others are much stricter, and they limit or completely prohibit the enforcement of close-out netting clauses through the mandatory provisions of their national bankruptcy laws. The author analyzes the concept of close-out netting clauses in selected comparative legal systems and examines the differences in their legal treatment by using the historical, analytical, and comparative method. It results that special treatment of the close-out netting in national laws with a liberal approach is often forced by financial industry lobbies and introduced in national laws without the justified reasons. Contrary to that in legal systems with limited or prohibited approach on close-out netting the uncertain enforceability of the close-out netting clause causes potential credit risks. The detected discrepancy on the national legal treatment and national financial markets regarding close-out netting lead to the conclusion to author’s best knowledge that is not possible to use any national model of close-out netting as a role model which perfectly fits all.Keywords: close-out netting clauses, derivatives, insolvency, offsetting
Procedia PDF Downloads 145330 Investigation of Dry Ice Mixed Novel Hybrid Lubri-Coolant in Sustainable Machining of Ti-6AL-4V Alloy: A Comparison of Experimental and Modelling
Authors: Muhammad Jamil, Ning He, Aqib Mashood Khan, Munish Kumar Gupta
Abstract:
Ti-6Al-4V has numerous applications in the medical, automobile, and aerospace industries due to corrosion resistivity, structural stability, and chemical inertness to most fluids at room temperature. These peculiar characteristics are beneficial for their application and present formidable challenges during machining. Machining of Ti-6Al-4V produces an elevated cutting temperature above 1000oC at dry conditions. This accelerates tool wear and reduces product quality. Therefore, there is always a need to employ sustainable/effective coolant/lubricant when machining such alloy. In this study, Finite Element Modeling (FEM) and experimental analysis when cutting Ti-6Al-4V under a distinctly developed dry ice mixed hybrid lubri-coolant are presented. This study aims to model the milling process of Ti-6Al-4V under a proposed novel hybrid lubri-coolant using different cutting speeds and feed per tooth DEFORM® software package was used to conduct the FEM and the numerical model was experimentally validated. A comparison of experimental and simulation results showed a maximum error of no more than 6% for all experimental conditions. In a nutshell, it can be said that the proposed model is effective in predicting the machining temperature precisely.Keywords: friction coefficient, heat transfer, finite element modeling (FEM), milling Ti-6Al-4V
Procedia PDF Downloads 60329 Continuous Dyeing of Graphene and Polyaniline on Textiles for Electromagnetic interference Shielding: An Application of Intelligent Fabrics
Authors: Mourad Makhlouf Sabrina Bouriche, Zoubir Benmaamar, Didier Villemin
Abstract:
Background: The increasing presence of electromagnetic interference (EMI) requires the development of effective protection solutions. Intelligent textiles offer a promising approach due to their wear ability and the possibility of integration into everyday clothing. In this study, the use of graphene and polyaniline for EMI shielding on cotton fabrics was examined. Methods: In this study, the continuous dyeing of recycled graphite-derived graphene and polyaniline was examined. Bottom-reforming technology was adopted to improve adhesion and achieve uniform distribution of conductive material on the fiber surface. The effect of material weight ratio on fabric performance and X-band EMI shielding effectiveness (SE) was evaluated. Significant Findings: The dyed cotton fabrics incorporating graphene, polyaniline, and their combination exhibited improved conductivity. Notably, these fabrics achieved EMI SE values ranging from 9 to 16 dB within the X-band frequency range (8-9 GHz). These findings demonstrate the potential of this approach for developing intelligent textiles with effective EMI shielding capabilities. Additionally, the utilization of recycled materials contributes to a more sustainable shielding solution.Keywords: Intelligent textiles, graphene, polyaniline, electromagnetic shielding, conductivity, recycling
Procedia PDF Downloads 46328 Sports and Beauty: Translating the History of Aesthetics into Today’s World of Sports
Authors: Matthew McNees
Abstract:
An inductive aesthetic approach to sports yields critical and meaningful insight into sports philosophy, sports governance, and sports history. Critical reflection will always remain key to the analysis of the past, present and future of sporting institutions, but a philosophically imaginative method of induction allows certain salient connections to be articulated and potentially implemented between various sporting entities who exist as individuals, particularly between practitioner, owner/manager and observer (‘fan’ or interested party.) By honing in on the concept of beauty in sports, the primary reason for viewership, consumption or engagement with sports comes into focus as an aesthetic concept. While always a subjective or shadowy articulation, an aesthetic state often remains unnecessarily unrevealed due to claims about unconscious states, entire rhetorics (or counter-rhetorics) about beauty, and Misalliance among sporting development systems. Since aesthetics require an inductive state of subjectivity in determining various levels of beauty (which the so-called world of sports often thinks of as morality), the audience for aesthetics in sports also needs an inductive explanation of the concept in which one comes to see a process of viewership at work within themselves that is revealed by a simple need parried outward by a complex process of engagement. The potentially redemptive moment of revelation regarding the beauty of sports and the athlete within these systems creates in the viewer a new space of consciousness where the world of sports discovers some of its longed-for transparency, openness, parity and equity upon which its immediate future depends.Keywords: aesthetics, governance, history, philosophy
Procedia PDF Downloads 251327 An Internet of Things Smart Washroom Framework
Authors: Robin Ratnasingham, Maher Elshakankiri
Abstract:
This research report will look at how to make a smart washroom to increase public hygiene and cleanliness. The system would use IoT devices to pick up various activities in the washroom and notify the appropriate stakeholders or devices to regulate the condition of the washroom. As more people are required to physically go back to the office or school, ensuring a clean and sanitized washroom is even more important now than before. It would help prevent virus outbreaks and safeguard the organization from shutdowns or slowdowns in their business. A framework of the suggested smart washroom was introduced to help reduce the chances of a virus outbreak. Most organizations outsource renovation or implementation to an external party. Using the smart washroom framework, we looked at vendors that provide smart washroom solutions. There are IoT vendors that cannot match the framework, and there are vendors that can support the framework design. This segment is a niche market, and most of the devices are similar in their basic functions. However, all the vendors have unique characteristics to give them a competitive advantage over the rest of the IoT washroom companies. Ultimately, the organization would need to decide if they want to add IoT devices to enable smart capability or renovate the washroom to create a fluid IoT smart washroom design. The report would introduce an IoT smart washroom framework to help organizations design a cohesive preventive measure network for the daily maintenance routine. The framework is designed to help understand how to manage washroom cleanliness more efficiently and to provide guidance in achieving this goal. The leading result is eliminating potential viral outbreaks that could jeopardize the organization.Keywords: IoT, smart washroom, public hygiene, cleanliness, virus outbreaks, safeguard
Procedia PDF Downloads 96326 Life Prediction of Cutting Tool by the Workpiece Cutting Condition
Authors: Noemia Gomes de Mattos de Mesquita, José Eduardo Ferreira de Oliveira, Arimatea Quaresma Ferraz
Abstract:
Stops to exchange cutting tool, to set up again the tool in a turning operation with CNC or to measure the workpiece dimensions have a direct influence on production. The premature removal of the cutting tool results in high cost of machining since the parcel relating to the cost of the cutting tool increases. On the other hand, the late exchange of cutting tool also increases the cost of production because getting parts out of the preset tolerances may require rework for its use when it does not cause bigger problems such as breaking of cutting tools or the loss of the part. Therefore, the right time to exchange the tool should be well defined when wanted to minimize production costs. When the flank wear is the limiting tool life, the time predetermination that a cutting tool must be used for the machining occurs within the limits of tolerance can be done without difficulty. This paper aims to show how the life of the cutting tool can be calculated taking into account the cutting parameters (cutting speed, feed and depth of cut), workpiece material, power of the machine, the dimensional tolerance of the part, the finishing surface, the geometry of the cutting tool and operating conditions of the machine tool, once known the parameters of Taylor algebraic structure. These parameters were raised for the ABNT 1038 steel machined with cutting tools of hard metal.Keywords: machining, productions, cutting condition, design, manufacturing, measurement
Procedia PDF Downloads 635