Search results for: resilient principles
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2231

Search results for: resilient principles

1631 New Approach in Sports Management of Great Sports Events

Authors: Taieb Kherafa Noureddine

Abstract:

The paper presents a new approach regarding the management in sports that is based on the principles of reengineering. Applying that modern and pure management system, called reengineering, in sports activity, we hope to get better and better results, in order to increase both the health state and the performances of trained athletes. The paper also presents the similarities between BPR (Business Process Reengineering) and sports managements, as well as the proposed solution for a proper implementation of such model of management. The five components of the basic BPR model are presented, together with their features for sports management.

Keywords: business process reengineering, great sports events, sports management, training activities

Procedia PDF Downloads 477
1630 Resilience of Infrastructure Networks: Maintenance of Bridges in Mountainous Environments

Authors: Lorenza Abbracciavento, Valerio De Biagi

Abstract:

Infrastructures are key elements to ensure the operational functionality of the transport system. The collapse of a single bridge or, equivalently, a tunnel can leads an entire motorway to be considered completely inaccessible. As a consequence, the paralysis of the communications network determines several important drawbacks for the community. Recent chronicle events have demonstrated that ensuring the functional continuity of the strategic infrastructures during and after a catastrophic event makes a significant difference in terms of life and economical losses. Moreover, it has been observed that RC structures located in mountain environments show a worst state of conservation compared to the same typology and aging structures located in temperate climates. Because of its morphology, in fact, the mountain environment is particularly exposed to severe collapse and deterioration phenomena, generally: natural hazards, e.g. rock falls, and meteorological hazards, e.g. freeze-thaw cycles or heavy snows. For these reasons, deep investigation on the characteristics of these processes becomes of fundamental importance to provide smart and sustainable solutions and make the infrastructure system more resilient. In this paper, the design of a monitoring system in mountainous environments is presented and analyzed in its parts. The method not only takes into account the peculiar climatic conditions, but it is integrated and interacts with the environment surrounding.

Keywords: structural health monitoring, resilience of bridges, mountain infrastructures, infrastructural network, maintenance

Procedia PDF Downloads 51
1629 Design Architecture Anti-Corruption Commission (KPK) According to KPK Law: Strong or Weak?

Authors: Moh Rizaldi, Ali Abdurachman, Indra Perwira

Abstract:

The biggest demonstration after the 1998 reforms that took place in Indonesia for several days at the end of 2019 did not eliminate the intention of the People’s Representative Council (Dewan Perwakilan Rakyat or DPR) and the President to enact the law 19 of 2019 (KPK law). There is a central issue to be highlighted, namely whether the change is intended to strengthen or even weaken the KPK. To achieve this goal, the Analysis focuses on two agency principles namely the independent principle and the control principle as seen from three things namely the legal substance, legal structure, and legal culture. The research method is normative with conceptual, historical and statute approaches. The argument from this writing is that KPK Law has cut most of the KPK's authority as a result the KPK has become symbolic or toothless in combating corruption.

Keywords: control, independent, KPK, law no. 19 of 2019

Procedia PDF Downloads 109
1628 Emergence of New Development Bank: Analyzing the Impact on BRICS Nations and the World Order

Authors: Urvi Shah, Anmol Jain

Abstract:

The talks of a New Global Order have been doing rounds since the advent of 21st century. Similar change in global scenario was witnessed when the Bretton Woods System came up post the World War II. The changing world order has been analyzed by using the Purchasing Power Parity (PPP) and Nominal Gross Domestic Product (GDP) estimates. The PPP and Nominal GDP methods show the purchasing power and financial background of the countries respectively, which helps in knowing both real and nominal financial strength of the country. Today, the rising powers of BRICS are posing new challenges to the world order shaped by the West. BRICS, i.e. Brazil, Russia, India, China and South Africa, countries have at various instances represented the interests of developing countries at world forums. The pooled population of these nations accounts for 41.6% of the total world population which gives a very resilient idea of the workforce or human resources which is mobilized by them. They have a combined GDP (PPP) of around 30.57% of the total world GDP (PPP). The paper tries to analyze the prospects and impact of the New Development Bank (NDB) formerly known as the BRICS Bank, on world economy, which has the potential to act as a rival to West dominated IMF and World Bank. The paper studies the paradigm shift in the global order, impact of the NDB on third world nations and the developed nations. The study concluded that the relative positions of BRICS countries in the world economy are changing, irrespective of the measurement methodology being US$ or the PPP model.

Keywords: BRICS, New Development Bank, Nominal GDP, purchasing power parity

Procedia PDF Downloads 307
1627 Chaotic Dynamics of Cost Overruns in Oil and Gas Megaprojects: A Review

Authors: O. J. Olaniran, P. E. D. Love, D. J. Edwards, O. Olatunji, J. Matthews

Abstract:

Cost overruns are a persistent problem in oil and gas megaprojects. Whilst the extant literature is filled with studies on incidents and causes of cost overruns, underlying theories to explain their emergence in oil and gas megaprojects are few. Yet, a way to contain the syndrome of cost overruns is to understand the bases of ‘how and why’ they occur. Such knowledge will also help to develop pragmatic techniques for better overall management of oil and gas megaprojects. The aim of this paper is to explain the development of cost overruns in hydrocarbon megaprojects through the perspective of chaos theory. The underlying principles of chaos theory and its implications for cost overruns are examined and practical recommendations proposed. In addition, directions for future research in this fertile area provided.

Keywords: chaos theory, oil and gas, cost overruns, megaprojects

Procedia PDF Downloads 543
1626 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 451
1625 Effect of Steel Fibers on M30 Fly Ash Concrete

Authors: Saksham

Abstract:

Concrete's versatility and affordability make it a highly competitive building material capable of meeting diverse requirements. However, the increasing demands placed on structures and the need for enhanced durability and performance have driven the development of distinct cementitious materials and concrete composites. One significant aspect of this advancement is the utilization of waste materials from industries, such as fly ash, to improve concrete's properties. Fly ash, a byproduct of coal combustion can enhance concrete's strength and durability while reducing environmental impact. Additionally, steel fibers can enhance concrete's toughness and crack resistance, contributing to improved structural performance. The experimental study aims to optimize the proportion of ingredients in M30-grade concrete, incorporating fly ash and steel fibers. By varying fly ash content (10% to 30%) and steel fiber dosage (0% to 1.5%), the research seeks to determine the optimal combination for achieving the desired compressive strength. Two sets of experiments are conducted: one focusing on varying fly ash content while keeping steel fiber dosage constant, and the other focusing on varying steel fiber dosage while keeping other parameters fixed. Through systematic testing, molding, curing, and evaluation according to specified standards, the research aims to analyze the impact of fly ash and steel fibers on concrete's compressive strength. The findings have the potential to inform engineers about optimized concrete mix designs that balance performance, cost-effectiveness, and sustainability, advancing toward more resilient and environmentally friendly building practices.

Keywords: concrete, sustainability, durability, compressive strength

Procedia PDF Downloads 29
1624 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony

Authors: Lev Bertovsky

Abstract:

The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.

Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning

Procedia PDF Downloads 173
1623 An Analysis and Design of Mobile Payment System Based on NFC Technology

Authors: Shafiq ur Rehman, Zubair Ahmed Shaikh

Abstract:

This research provides the comparative study of different mobile payment system and proposes an efficient solution of mobile payment system. The research involves discovering how the mobile payment methods can be used and implemented keeping user and system interaction under consideration. The implementation of Nielsen’s heuristic and universal design principles enhanced the user’s interaction design and made the system more appropriate, understandable and visible to the end user. The design of application is greatly affected by the user driven factors. These factors help in the efficiency of the application usage.

Keywords: mobile payment system, m-commerce, usability, near field communication

Procedia PDF Downloads 435
1622 Research Methods and Design Strategies to Improve Resilience in Coastal and Estuary Cities

Authors: Irene Perez Lopez

Abstract:

Delta and estuary cities are spaces constantly evolving, incessantly altered by the ever-changing actions of water transformation. Strategies that incorporate comprehensive and integrated approaches to planning and design with water will play a powerful role in defining new types of flood defense. These strategies will encourage more resilient and active urban environments, allowing for new spatial and functional programs. This abstract presents the undergoing research in Newcastle, the first urbanized delta in New South Wales (Australia), and the region's second-biggest catchment and estuary. The research methodology is organized in three phases: 1) a projective cartography that analyses maps and data across the region's recorded history, identifying past and present constraints, and predicting future conditions. The cartography aids to identify worst-case scenarios, revealing the implications of land reclamation that have not considered the confronting evolution of climate change and its conflicts with inhabitation; 2) the cartographic studies identify the areas under threat and form the basis for further interdisciplinary research, complimented by community consultation, to reduce flood risk and increase urban resilience and livability; 3) a speculative or prospective phase of design with water to generate evidence-based guidelines that strengthen urban resilience of shorelines and flood prone areas.

Keywords: coastal defense, design, urban resilience, mapping

Procedia PDF Downloads 115
1621 Control Mechanisms for Sprayer Used in Turkey

Authors: Huseyin Duran, Yesim Benal Oztekin, Kazim Kubilay Vursavus, Ilker Huseyin Celen

Abstract:

There are two main approaches to manufacturing, market and usage of plant protection machinery in Turkey. The first approach is called as ‘Product Safety Approach’ and could be summarized as minimum health and safety requirements of consumer needs on plant protection equipment and machinery products. The second approach is the practices related to the Plant Protection Equipment and Machinery Directive. Product safety approach covers the plant protection machinery product groups within the framework of a new approach directive, Machinery Safety Directive (2006/42 / AT). The new directive is in practice in our country by 03.03.2009, parallel to the revision of the EU Regulation on the Directive (03.03.2009 dated and numbered 27158 published in the Official Gazette). ‘Pesticide Application for Machines’ paragraph is added to the 2006/42 / EC Machinery Safety Directive, which is, in particular, reveals the importance of primary health care and product safety issue, explaining the safety requirements for machines used in the application of plant protection products. The Ministry of Science, Industry and Technology is the authorized organizations in our country for the publication and implementation of this regulation. There is a special regulation, carried out by Ministry of Food, Agriculture and Livestock General Directorate of Food and Control, on the manufacture and sale of plant protection machinery. This regulation, prepared based on 5996 Veterinary Services, Plant Health, Food and Feed Law, is ‘Regulation on Plant Protection Equipment and Machinery’ (published on 02.04.2011 whit number 27893 in the Official Gazette). The purposes of this regulation are practicing healthy and reliable crop production, the preparation, implementation and dissemination of the integrated pest management programs and projects for the development of human health and environmentally friendly pest control methods. This second regulation covers: approval, manufacturing, licensing of Plant Protection Equipment and Machinery; duties and responsibilities of the dealers; principles and procedures related to supply and control of the market. There are no inspection procedures for the application of currently used plant protection machinery in Turkey. In this study, content and application principles of all regulation approaches currently used in Turkey are summarized.

Keywords: plant protection equipment and machinery, product safety, market surveillance, inspection procedures

Procedia PDF Downloads 243
1620 Structural and Electronic Properties of the Rock-salt BaxSr1−xS Alloys

Authors: B. Bahloul, K. Babesse, A. Dkhira, Y. Bahloul, L. Amirouche

Abstract:

Structural and electronic properties of the rock-salt BaxSr1−xS are calculated using the first-principles calculations based on the density functional theory (DFT) within the generalized gradient approximation (GGA), the local density approximation (LDA) and the virtual-crystal approximation (VCA). The calculated lattice parameters at equilibrium volume for x=0 and x=1 are in good agreement with the literature data. The BaxSr1−xS alloys are found to be an indirect band gap semiconductor. Moreoever, for the composition (x) ranging between [0-1], we think that our results are well discussed and well predicted.

Keywords: semiconductor, Ab initio calculations, rocksalt, band structure, BaxSr1−xS

Procedia PDF Downloads 380
1619 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J

Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa

Abstract:

A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.

Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index

Procedia PDF Downloads 117
1618 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: authentication, enterprise IoT cybersecurity, PKI/TTP, IoT space

Procedia PDF Downloads 149
1617 CMMI Key Process Areas and FDD Practices

Authors: Rituraj Deka, Nomi Baruah

Abstract:

The development of information technology during the past few years resulted in designing of more and more complex software. The outsourcing of software development makes a higher requirement for the management of software development project. Various software enterprises follow various paths in their pursuit of excellence, applying various principles, methods and techniques along the way. The new research is proving that CMMI and Agile methodologies can benefit from using both methods within organizations with the potential to dramatically improve business performance. The paper describes a mapping between CMMI key process areas (KPAs) and Feature-Driven Development (FDD) communication perspective, so as to increase the understanding of how improvements can be made in the software development process.

Keywords: Agile, CMMI, FDD, KPAs

Procedia PDF Downloads 441
1616 Polygamy versus Equality Rights: Polyandry as a Solution

Authors: Nqobizwe Mvelo Ngema

Abstract:

The right to equality has been accepted as one of the principles of jus cogens since the Second World War and it is protected in numerous international and regional human rights instruments. The convention on the elimination of all forms of discrimination against women (CEDAW) is a comprehensive document that serves as the international Bill of Rights for women and it prohibits polygamy. This paper examines whether the most unusual customary practice of polyandry would serve as a solution in elevating the status of women to be on par with that of man that are polygamists or not. This paper concludes by arguing that polyandry cannot solve the problem of inequalities that are confronted by women because even in polyandrous societies there is male domination that is detrimental to the equality rights of women.

Keywords: human rights, polygamy, polyandry, polygyny

Procedia PDF Downloads 483
1615 Creating Emotional Brand Attachment through Immersive Worlds in Brick-and-Mortar Stores

Authors: Sanne Dollerup

Abstract:

This paper is an analysis of the store Tarina Tarantino through an exploration of different perspectives of play. It is based on Yelp reviews where customers disclose a very positive emotional reaction toward the store. The paper proposes some general principles for designing immersive stores based on ‘possible world’ theory. The aim is to disclose essential condition for customer engagement is an overall cohesiveness in all elements in a store. The most significant contribution in this paper is that products become props for role-playing in a store, hence making them central for maintaining that role outside the store.

Keywords: experience design, emotional brand attachment, retail design, case study

Procedia PDF Downloads 140
1614 Deep Reinforcement Learning for Advanced Pressure Management in Water Distribution Networks

Authors: Ahmed Negm, George Aggidis, Xiandong Ma

Abstract:

With the diverse nature of urban cities, customer demand patterns, landscape topologies or even seasonal weather trends; managing our water distribution networks (WDNs) has proved a complex task. These unpredictable circumstances manifest as pipe failures, intermittent supply and burst events thus adding to water loss, energy waste and increased carbon emissions. Whilst these events are unavoidable, advanced pressure management has proved an effective tool to control and mitigate them. Henceforth, water utilities have struggled with developing a real-time control method that is resilient when confronting the challenges of water distribution. In this paper we use deep reinforcement learning (DRL) algorithms as a novel pressure control strategy to minimise pressure violations and leakage under both burst and background leakage conditions. Agents based on asynchronous actor critic (A2C) and recurrent proximal policy optimisation (Recurrent PPO) were trained and compared to benchmarked optimisation algorithms (differential evolution, particle swarm optimisation. A2C manages to minimise leakage by 32.48% under burst conditions and 67.17% under background conditions which was the highest performance in the DRL algorithms. A2C and Recurrent PPO performed well in comparison to the benchmarks with higher processing speed and lower computational effort.

Keywords: deep reinforcement learning, pressure management, water distribution networks, leakage management

Procedia PDF Downloads 60
1613 Moving beyond the Gender Pay Gap: An Investigation of Pension Gender Inequalities across European Counties

Authors: Enva Doda

Abstract:

Recent statistical analyses within the European Union (EU) underscore the enduring significance of the Gender Pay Gap in amplifying the Gender Pension Gap, a phenomenon resisting proportional reduction over time. This study meticulously calculates the Pension Gap, scrutinizing contributing variables within diverse pension systems. Furthermore, it investigates whether the "unexplained" segment of the Gender Gap correlates with political institutions, economic systems, historical events, or discrimination, utilizing quantitative methods and the Blinder-Oaxaca Decomposition Method to pinpoint potential discriminatory factors. The descriptive analysis reveals a conspicuous Gender Pension Gap across European nations, displaying notable variation. While an overall reduction in the Gender Gap is observed, the degree of improvement varies among countries. Subsequent analyses will delve into the specific reasons or variables influencing distinct Gender Gap percentages, forming the basis for nuanced policy recommendations. This comprehensive research enriches the ongoing discourse on gender equality and economic equity. By focusing on the root causes of the Pension Gap, the study has the potential to instigate policy adjustments, urging policymakers to reassess systemic structures and contribute to informed decision-making. Emphasizing gender equality as essential for a flourishing and resilient economy, the research aspires to drive positive change on academic and policy fronts.

Keywords: blinder Oaxaca decomposition method, discrimination, gender pension gap, quantitative methods, unexplained gender gap

Procedia PDF Downloads 26
1612 Universality and Synchronization in Complex Quadratic Networks

Authors: Anca Radulescu, Danae Evans

Abstract:

The relationship between a network’s hardwiring and its emergent dynamics are central to neuroscience. We study the principles of this correspondence in a canonical setup (in which network nodes exhibit well-studied complex quadratic dynamics), then test their universality in biological networks. By extending methods from discrete dynamics, we study the effects of network connectivity on temporal patterns, encapsulating long-term behavior into the rich topology of network Mandelbrot sets. Then elements of fractal geometry can be used to predict and classify network behavior.

Keywords: canonical model, complex dynamics, dynamic networks, fractals, Mandelbrot set, network connectivity

Procedia PDF Downloads 289
1611 Atomistic Study of Structural and Phases Transition of TmAs Semiconductor, Using the FPLMTO Method

Authors: Rekab Djabri Hamza, Daoud Salah

Abstract:

We report first-principles calculations of structural and magnetic properties of TmAs compound in zinc blende(B3) and CsCl(B2), structures employing the density functional theory (DFT) within the local density approximation (LDA). We use the full potential linear muffin-tin orbitals (FP-LMTO) as implemented in the LMTART-MINDLAB code (Calculation). Results are given for lattice parameters (a), bulk modulus (B), and its first derivatives(B’) in the different structures NaCl (B1) and CsCl (B2). The most important result in this work is the prediction of the possibility of transition; from cubic rocksalt (NaCl)→ CsCl (B2) (32.96GPa) for TmAs. These results use the LDA approximation.

Keywords: LDA, phase transition, properties, DFT

Procedia PDF Downloads 94
1610 Experimental Setup of Corona Discharge on Dye Degradation for Science Education

Authors: Shivam Dubey, Vinit Srivastava, Abhay Singh Thakur, Rahul Vaish

Abstract:

The presence of organic dyes in water is a critical issue that poses a significant threat to the environment and human health. We have investigated the use of corona discharge as a potential method for degrading organic dyes in water. Methylene Blue dye was exposed to corona discharge, and its photo-absorbance was measured over time to determine the extent of degradation. The results depicted a decreased absorbance for the dye and the loss of the characteristic colour of methylene blue. The effects of various parameters, including current, voltage, gas phase, salinity, and electrode spacing, on the reaction rates, were investigated. The highest reaction rates were observed at the highest current and voltage (up to 10kV), lowest salinity, smallest electrode spacing, and an environment containing enhanced levels of oxygen. These findings have possible applications for science education curriculum. By investigating the use of corona discharge for destroying organic dyes, we can provide students with a practical application of scientific principles that they can apply to real-world problems. This research can demonstrate the importance of understanding the chemical and physical properties of organic dyes and the effects of corona discharge on their degradation and provide a holistic understanding of the applications of scientific research. Moreover, our study also emphasizes the importance of considering the various parameters that can affect reaction rates. By investigating the effects of current, voltage, matter phase, salinity, and electrode spacing, we can provide students with an opportunity to learn about the importance of experimental design and how to evade constraints that can limit meaningful results. In conclusion, this study has the potential to provide valuable insights into the use of corona discharge for destroying organic dyes in water and has significant implications for science education. By highlighting the practical applications of scientific principles, experimental design, and the importance of considering various parameters, this research can help students develop critical thinking skills and prepare them for future careers in science and engineering.

Keywords: dye degradation, corona discharge, science education, hands-on learning, chemical education

Procedia PDF Downloads 56
1609 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 641
1608 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 16
1607 The Right to Water in the Lancang-Mekong River Basin Disputes

Authors: Heping Dang, Raymond Yu Wang

Abstract:

The Langcang-Mekong River is the most important international watercourse in mainland Southeast Asia. In recent years, the six riparian states, China, Myanmar, Laos, Thailand, Cambodia and Vietnam, have confronted increasing disputes over the use of the trans-boundary water. To settle these disputes and protect the fundamental right to water, quite a few inter-state mechanisms have been established, such as the Mekong River Commission, the economic cooperation program of the Greater Mekong Subregion, the ‘Belt and Road Initiative’ and the ‘Lancang-Mekong Cooperation Mechanism’ and the ‘Lower Mekong Initiative’. Non-Governmental Organizations (NGOs) have also been an important and constructive institutional entrepreneur in trans-boundary water governance. Although the status and extent of the right to water are yet to be clearly defined, this paper aims to 1) unpack how the right to water is interpreted and exercised in the Lancang-Mekong River Basin Dispute; and 2) to evaluate the roles of the right to water in settling international water disputes. To achieve these objectives, Secondary data such as archival documents of international law and relevant stakeholders will be compiled for analysis. First-hand information about the organizational structure, accountability, values and strategies of the international mechanisms and NGOs in question will also be collected through fieldwork in the Mekong river basin. Semi-structural interviews, group discussions and participatory observation will be conducted to collect data. The authors have access to the fieldwork because they have abundant experience of collaborating with Mekong-based international NGOs in previous research projects. This research will display how the concepts and principles of international law and the UN guidelines are interpreted in practice. These principles include the definition and extent of the right to water, the practical use of ‘vital human need’, the indicators of ‘adequacy of water’ including ‘availability, quality and accessibility’, and how the right to water is related to the progressive realization of the right to life. This down-to earth research will enrich the theoretical discussion of international law, particularly international human rights law, within the UN framework. Moreover, the outcomes of this research will provide new insights into the roles that the right to water might play in consensus-building and dispute settlement in a rapidly changing context, where water is pivotal for poverty alleviation, biodiversity conservation and the promotion of sustainable livelihoods.

Keywords: international water dispute, Lancang-Mekong River, right to water, state and non-state actors

Procedia PDF Downloads 263
1606 Senior Entrepreneurship and the Takeover of Family Businesses: The Case of Moroccan Family-Owned Small Medium-Sized Enterprises

Authors: Brahim Ouzaka, Said Ouhadi

Abstract:

Family businesses (FB) represent the oldest and most resilient form of organization. However, they are weakened by problems of entrepreneurial discontinuity. The objective of this paper is to analyze the problem of the succession of FBs created by senior entrepreneurs. This study analyzes and explores the constructs of senior entrepreneurship and the strategy and takeover policies of the Moroccan Family owned Small and Medium-Sized Businesses. Our main research question is formulated as follows: how does senior entrepreneurship promote the takeover of Moroccan family SMEs? So we aim through this study to analyze the challenge of the takeover of the FB created by senior entrepreneurs in order to explore and understand the specificities, choices and strategies as well as the reality of the takeover process among this category of senior entrepreneurs. After a review of the literature on the relationship between the constructs of senior entrepreneurship and the takeover of FBs, the empirical study will consist of an exploratory qualitative approach of 3 family SMEs created by senior entrepreneurs and subsequently transmitted to their descendants. This qualitative research serves to explore the choices, the strategies as well as the specificities of the entrepreneurial acts and processes of this category of entrepreneurs. The interviews were conducted with senior entrepreneurs and successors of three Moroccan family SMEs, focusing on the specificity of entrepreneurial actions and strategies in the case of SMEs launched by senior entrepreneurs and on the reality of the conduct and preparation of the takeover process, the methods of socialization and training of buyers in the context of these companies.

Keywords: senior entrepreneurship, family SME, family business, takeover

Procedia PDF Downloads 68
1605 Exploring Public Trust in Democracy

Authors: Yaron Katz

Abstract:

The investigation of immigrants' electoral choices has remained relatively uncharted territory despite the fact that numerous nations extend political rights to their expatriates. This paper centers its attention on the matter of public trust in democracy, with a focus on the intricacies of Israeli politics as a divided system. It delves into the potential implications of political and social transformations stemming from the involvement of expatriate voters in elections taking place in their country of origin. In doing so, the article endeavors to explore a pathway for resolving a persistent challenge facing the stability of the Israeli political landscape over the past decade: the difficulty in forming a resilient government that genuinely represents the majority of voters. An examination is conducted into the role played by a demographic with the capacity to exert significant influence on election outcomes, namely, individuals residing outside of Israel. The objective of this research is to delve into this subject, dissecting social developments and political prospects that may shape the country's trajectory in the coming decades. This inquiry is especially pertinent given the extensive engagement of migrants in Israeli politics and the link between Israelis living abroad and their home country. Nevertheless, the study's findings reveal that while former citizens exhibit extensive involvement in Israeli politics and are cognizant of the potential consequences of permitting them to participate in elections, they maintain steadfastly unfavorable views regarding the inclusion of Israelis living overseas in their home country's electoral processes.

Keywords: trust, globalization, policy, democracy

Procedia PDF Downloads 30
1604 Mathematical Reconstruction of an Object Image Using X-Ray Interferometric Fourier Holography Method

Authors: M. K. Balyan

Abstract:

The main principles of X-ray Fourier interferometric holography method are discussed. The object image is reconstructed by the mathematical method of Fourier transformation. The three methods are presented – method of approximation, iteration method and step by step method. As an example the complex amplitude transmission coefficient reconstruction of a beryllium wire is considered. The results reconstructed by three presented methods are compared. The best results are obtained by means of step by step method.

Keywords: dynamical diffraction, hologram, object image, X-ray holography

Procedia PDF Downloads 378
1603 Embodied Empowerment: A Design Framework for Augmenting Human Agency in Assistive Technologies

Authors: Melina Kopke, Jelle Van Dijk

Abstract:

Persons with cognitive disabilities, such as Autism Spectrum Disorder (ASD) are often dependent on some form of professional support. Recent transformations in Dutch healthcare have spurred institutions to apply new, empowering methods and tools to enable their clients to cope (more) independently in daily life. Assistive Technologies (ATs) seem promising as empowering tools. While ATs can, functionally speaking, help people to perform certain activities without human assistance, we hold that, from a design-theoretical perspective, such technologies often fail to empower in a deeper sense. Most technologies serve either to prescribe or to monitor users’ actions, which in some sense objectifies them, rather than strengthening their agency. This paper proposes that theories of embodied interaction could help formulating a design vision in which interactive assistive devices augment, rather than replace, human agency and thereby add to a persons’ empowerment in daily life settings. It aims to close the gap between empowerment theory and the opportunities provided by assistive technologies, by showing how embodiment and empowerment theory can be applied in practice in the design of new, interactive assistive devices. Taking a Research-through-Design approach, we conducted a case study of designing to support independently living people with ASD with structuring daily activities. In three iterations we interlaced design action, active involvement and prototype evaluations with future end-users and healthcare professionals, and theoretical reflection. Our co-design sessions revealed the issue of handling daily activities being multidimensional. Not having the ability to self-manage one’s daily life has immense consequences on one’s self-image, and also has major effects on the relationship with professional caregivers. Over the course of the project relevant theoretical principles of both embodiment and empowerment theory together with user-insights, informed our design decisions. This resulted in a system of wireless light units that users can program as a reminder for tasks, but also to record and reflect on their actions. The iterative process helped to gradually refine and reframe our growing understanding of what it concretely means for a technology to empower a person in daily life. Drawing on the case study insights we propose a set of concrete design principles that together form what we call the embodied empowerment design framework. The framework includes four main principles: Enabling ‘reflection-in-action’; making information ‘publicly available’ in order to enable co-reflection and social coupling; enabling the implementation of shared reflections into an ‘endurable-external feedback loop’ embedded in the persons familiar ’lifeworld’; and nudging situated actions with self-created action-affordances. In essence, the framework aims for the self-development of a suitable routine, or ‘situated practice’, by building on a growing shared insight of what works for the person. The framework, we propose, may serve as a starting point for AT designers to create truly empowering interactive products. In a set of follow-up projects involving the participation of persons with ASD, Intellectual Disabilities, Dementia and Acquired Brain Injury, the framework will be applied, evaluated and further refined.

Keywords: assistive technology, design, embodiment, empowerment

Procedia PDF Downloads 259
1602 European Countries Challenge’s in Value Added Tax

Authors: Fatbardha Kadiu, Nulifer Caliskan

Abstract:

The value added tax came as a necessity of substituting the old tax on sales. Based on the advantages of this new tax in our days it is used successfully in more than 140 countries around the world. The aim of the paper is to describe the nature of this tax with its advantages and disadvantages. Also it will describe the way how it functions in most of the European countries and the actual challenges of these countries on value added tax. It will be present the types of goods which are exempt from this tax, the reasons and the consequences of those exemptions. The paper will be based on secondary data taken from respective literature. An econometric model will be present in order to identify the dependence of value tax from other parameters. The analyzing most refers to the two main principles of harmonization and billing on the fiscal system and the ways how to restructures the system in order to minimize the fiscal evasion.

Keywords: value added tax, revenues, complexity, legal uncertainty

Procedia PDF Downloads 382