Search results for: general data protection regulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30952

Search results for: general data protection regulation

30322 Analysis and Performance of European Geostationary Navigation Overlay Service System in North of Algeria for GPS Single Point Positioning

Authors: Tabti Lahouaria, Kahlouche Salem, Benadda Belkacem, Beldjilali Bilal

Abstract:

The European Geostationary Navigation Overlay Service (EGNOS) provides an augmentation signal to GPS (Global Positioning System) single point positioning. Presently EGNOS provides data correction and integrity information using the GPS L1 (1575.42 MHz) frequency band. The main objective of this system is to provide a better real-time positioning precision than using GPS only. They are expected to be used with single-frequency code observations. EGNOS offers navigation performance for an open service (OS), in terms of precision and availability this performance gradually degrades as moving away from the service area. For accurate system performance, the service will become less and less available as the user moves away from the EGNOS service. The improvement in position solution is investigated using the two collocated dual frequency GPS, where no EGNOS Ranging and Integrity Monitoring Station (RIMS) exists. One of the pseudo-range was kept as GPS stand-alone and the other was corrected by EGNOS to estimate the planimetric and altimetric precision for different dates. It is found that precision in position improved significantly in the second due to EGNOS correction. The performance of EGNOS system in the north of Algeria is also investigated in terms of integrity. The results show that the horizontal protection level (HPL) value is below 18.25 meters (95%) and the vertical protection level (VPL) is below 42.22 meters (95 %). These results represent good integrity information transmitted by EGNOS for APV I service. This service is thus compliant with the aviation requirements for Approaches with Vertical Guidance (APV-I), which is characterised by 40 m HAL (horizontal alarm limit) and 50 m VAL (vertical alarm limit).

Keywords: EGNOS, GPS, positioning, integrity, protection level

Procedia PDF Downloads 225
30321 Social Media and Student-Teacher Relationship: A Case Study Form Kashmir University

Authors: Wahid Ahmad Dar, Irshad Ahmad Najar

Abstract:

The influence of social media is percolating to every corner of our social life. It is also changing the social sphere of the classroom in particular and education in general. This paper tries to explore the ways in which social media is influencing student-teacher relationship. Differences have been found in student’s ability to draw benefits from using ICT. Besides digital divides in access and usage, there are attitudinal differences among students towards ICT aligned with traditional forms of social differences. The paper particularly focusses on how students from diverse backgrounds are using social media to interact with their teachers and how such interactions differ on the basis of social class, gender and residential background of students. A qualitative research methodology has been used for answering these questions. Open-ended questionnaire has been designed and administered to a sample of postgraduate students from University of Kashmir drawn purposively ensuring optimum number of subjects from all backgrounds. The data were analyzed by content analysis, deciphering general patterns in the data.

Keywords: social media, student-teacher relationship, social class, gender

Procedia PDF Downloads 251
30320 The Efficiency Analysis in the Health Sector: Marmara Region

Authors: Hale Kirer Silva Lecuna, Beyza Aydin

Abstract:

Health is one of the main components of human capital and sustainable development, and it is very important for economic growth. Health economics, which is an indisputable part of the science of economics, has five stages in general. These are health and development, financing of health services, economic regulation in the health, allocation of resources and efficiency of health services. A well-developed and efficient health sector plays a major role by increasing the level of development of countries. The most crucial pillars of the health sector are the hospitals that are divided into public and private. The main purpose of the hospitals is to provide more efficient services. Therefore the aim is to meet patients’ satisfaction by increasing the service quality. Health-related studies in Turkey date back to the Ottoman and Seljuk Empires. In the near past, Turkey applied 'Health Sector Transformation Programs' under different titles between 2003 and 2010. Our aim in this paper is to measure how effective these transformation programs are for the health sector, to see how much they can increase the efficiency of hospitals over the years, to see the return of investments, to make comments and suggestions on the results, and to provide a new reference for the literature. Within this framework, the public and private hospitals in Balıkesir, Bilecik, Bursa, Çanakkale, Edirne, Istanbul, Kirklareli, Kocaeli, Sakarya, Tekirdağ, Yalova will be examined by using Data Envelopment Analysis (DEA) for the years between 2000 and 2019. DEA is a linear programming-based technique, which gives relatively good results in multivariate studies. DEA basically estimates an efficiency frontier and make a comparison. Constant returns to scale and variable returns to scale are two most commonly used DEA methods. Both models are divided into two as input and output-oriented. To analyze the data, the number of personnel, number of specialist physicians, number of practitioners, number of beds, number of examinations will be used as input variables; and the number of surgeries, in-patient ratio, and crude mortality rate as output variables. 11 hospitals belonging to the Marmara region were included in the study. It is seen that these hospitals worked effectively only in 7 provinces (Balıkesir, Bilecik, Bursa, Edirne, İstanbul, Kırklareli, Yalova) for the year 2001 when no transformation program was implemented. After the transformation program was implemented, for example, in 2014 and 2016, 10 hospitals (Balıkesir, Bilecik, Bursa, Çanakkale, Edirne, İstanbul, Kocaeli, Kırklareli, Tekirdağ, Yalova) were found to be effective. In 2015, ineffective results were observed for Sakarya, Tekirdağ and Yalova. However, since these values are closer to 1 after the transformation program, we can say that the transformation program has positive effects. For Sakarya alone, no effective results have been achieved in any year. When we look at the results in general, it shows that the transformation program has a positive effect on the effectiveness of hospitals.

Keywords: data envelopment analysis, efficiency, health sector, Marmara region

Procedia PDF Downloads 130
30319 Mitigating Self-Regulation Issues in the Online Instruction of Math

Authors: Robert Vanderburg, Michael Cowling, Nicholas Gibson

Abstract:

Mathematics is one of the core subjects taught in the Australian K-12 education system and is considered an important component for future studies in areas such as engineering and technology. In addition to this, Australia has been a world leader in distance education due to the vastness of its geographic landscape. Despite this, research is still needed on distance math instruction. Even though delivery of curriculum has given way to online studies, and there is a resultant push for computer-based (PC, tablet, smartphone) math instruction, much instruction still involves practice problems similar to those original curriculum packs, without the ability for students to self-regulate their learning using the full interactive capabilities of these devices. Given this need, this paper addresses issues students have during online instruction. This study consists of 32 students struggling with mathematics enrolled in a math tutorial conducted in an online setting. The study used a case study design to understand some of the blockades hindering the students’ success. Data was collected by tracking students practice and quizzes, tracking engagement of the site, recording one-on-one tutorials, and collecting data from interviews with the students. Results revealed that when students have cognitively straining tasks in an online instructional setting, the first thing to dissipate was their ability to self-regulate. The results also revealed that instructors could ameliorate the situation and provided useful data on strategies that could be used for designing future online tasks. Specifically, instructors could utilize cognitive dissonance strategies to reduce the cognitive drain of the tasks online. They could segment the instruction process to reduce the cognitive demands of the tasks and provide in-depth self-regulatory training, freeing mental capacity for the mathematics content. Finally, instructors could provide specific scheduling and assignment structure changes to reduce the amount of student centered self-regulatory tasks in the class. These findings will be discussed in more detail and summarized in a framework that can be used for future work.

Keywords: digital education, distance education, mathematics education, self-regulation

Procedia PDF Downloads 136
30318 By-Line Analysis of Determinants Insurance Premiums : Evidence from Tunisian Market

Authors: Nadia Sghaier

Abstract:

In this paper, we aim to identify the determinants of the life and non-life insurance premiums of different lines for the case of the Tunisian insurance market over a recent period from 1997 to 2019. The empirical analysis is conducted using the linear cointegration techniques in the panel data framework, which allow both long and short-run relationships. The obtained results show evidence of long-run relationship between premiums, losses, and financial variables (stock market indices and interest rate). Furthermore, we find that the short-run effect of explanatory variables differs across lines. This finding has important implications for insurance tarification and regulation.

Keywords: insurance premiums, lines, Tunisian insurance market, cointegration approach in panel data

Procedia PDF Downloads 198
30317 Spectral Anomaly Detection and Clustering in Radiological Search

Authors: Thomas L. McCullough, John D. Hague, Marylesa M. Howard, Matthew K. Kiser, Michael A. Mazur, Lance K. McLean, Johanna L. Turk

Abstract:

Radiological search and mapping depends on the successful recognition of anomalies in large data sets which contain varied and dynamic backgrounds. We present a new algorithmic approach for real-time anomaly detection which is resistant to common detector imperfections, avoids the limitations of a source template library and provides immediate, and easily interpretable, user feedback. This algorithm is based on a continuous wavelet transform for variance reduction and evaluates the deviation between a foreground measurement and a local background expectation using methods from linear algebra. We also present a technique for recognizing and visualizing spectrally similar clusters of data. This technique uses Laplacian Eigenmap Manifold Learning to perform dimensional reduction which preserves the geometric "closeness" of the data while maintaining sensitivity to outlying data. We illustrate the utility of both techniques on real-world data sets.

Keywords: radiological search, radiological mapping, radioactivity, radiation protection

Procedia PDF Downloads 696
30316 Drug Therapy Problems and Associated Factors among Patients with Heart Failure in the Medical Ward of Arba Minch General Hospital, Ethiopia

Authors: Debalke Dale, Bezabh Geneta, Yohannes Amene, Yordanos Bergene, Mohammed Yimam

Abstract:

Background: A drug therapy problem (DTP) is an event or circumstance that involves drug therapies that actually or potentially interfere with the desired outcome and requires professional judgment to resolve. Heart failure is an emerging worldwide threat whose prevalence and health loss burden constantly increase, especially in the young and in low-to-middle-income countries. There is a lack of population-based incidence and prevalence of heart failure (HF) studies in sub-Saharan African countries, including Ethiopia. Objective: The aim of this study was designed to assess drug therapy problems and associated factors among patients with HF in the medical ward of Arba Minch General Hospital(AGH), Ethiopia, from June 5 to August 20, 2022. Methods: A retrospective cross-sectional study was conducted among 180 patients with HF who were admitted to the medical ward of AGH. Data were collected from patients' cards by using questionnaires. The data were categorized and analyzed by using SPSS version 25.0 software, and data were presented in tables and words based on the nature of the data. Result: Out of the total, 85 (57.6%) were females, and 113 (75.3%) patients were aged over fifty years. Of the 150 study participants, 86 (57.3%) patients had at least one DTP identified, and a total of 116 DTPs were identified, which is 0.77 DTPs per patient. The most common types of DTP were unnecessary drug therapy (32%), followed by the need for additional drug therapy (36%), and dose too low (15%). Patients who used polypharmacy were 5.86 (AOR) times more likely to develop DTPs than those who did not (95% CI = 1.625–16.536, P = 0.005), and patients with more co-morbid conditions developed 3.68 (AOR) times more DTPs than those who had fewer co-morbidities (95% CI = 1.28–10.5, P = 0.015). Conclusion: The results of this study indicated that drug therapy problems were common among medical ward patients with heart failure. These problems are adversely affecting the treatment outcomes of patients, so it requires the special attention of healthcare professionals to optimize them.

Keywords: heart failure, drug therapy problems, Arba Minch general hospital, Ethiopia

Procedia PDF Downloads 107
30315 Electrical Decomposition of Time Series of Power Consumption

Authors: Noura Al Akkari, Aurélie Foucquier, Sylvain Lespinats

Abstract:

Load monitoring is a management process for energy consumption towards energy savings and energy efficiency. Non Intrusive Load Monitoring (NILM) is one method of load monitoring used for disaggregation purposes. NILM is a technique for identifying individual appliances based on the analysis of the whole residence data retrieved from the main power meter of the house. Our NILM framework starts with data acquisition, followed by data preprocessing, then event detection, feature extraction, then general appliance modeling and identification at the final stage. The event detection stage is a core component of NILM process since event detection techniques lead to the extraction of appliance features. Appliance features are required for the accurate identification of the household devices. In this research work, we aim at developing a new event detection methodology with accurate load disaggregation to extract appliance features. Time-domain features extracted are used for tuning general appliance models for appliance identification and classification steps. We use unsupervised algorithms such as Dynamic Time Warping (DTW). The proposed method relies on detecting areas of operation of each residential appliance based on the power demand. Then, detecting the time at which each selected appliance changes its states. In order to fit with practical existing smart meters capabilities, we work on low sampling data with a frequency of (1/60) Hz. The data is simulated on Load Profile Generator software (LPG), which was not previously taken into consideration for NILM purposes in the literature. LPG is a numerical software that uses behaviour simulation of people inside the house to generate residential energy consumption data. The proposed event detection method targets low consumption loads that are difficult to detect. Also, it facilitates the extraction of specific features used for general appliance modeling. In addition to this, the identification process includes unsupervised techniques such as DTW. To our best knowledge, there exist few unsupervised techniques employed with low sampling data in comparison to the many supervised techniques used for such cases. We extract a power interval at which falls the operation of the selected appliance along with a time vector for the values delimiting the state transitions of the appliance. After this, appliance signatures are formed from extracted power, geometrical and statistical features. Afterwards, those formed signatures are used to tune general model types for appliances identification using unsupervised algorithms. This method is evaluated using both simulated data on LPG and real-time Reference Energy Disaggregation Dataset (REDD). For that, we compute performance metrics using confusion matrix based metrics, considering accuracy, precision, recall and error-rate. The performance analysis of our methodology is then compared with other detection techniques previously used in the literature review, such as detection techniques based on statistical variations and abrupt changes (Variance Sliding Window and Cumulative Sum).

Keywords: electrical disaggregation, DTW, general appliance modeling, event detection

Procedia PDF Downloads 78
30314 Elements of Critical Event Management: A Qualitative Study of Trauma Teams

Authors: Tan Xin Zhong Timothy, Chang Chen Jie Victor, Yew Kwan Tong, Lim Geok Peng Sandy

Abstract:

Background: Leaders in crisis response teams such as Trauma Teams in hospitals are essential to the effective coordination and direction of the team. The response to emergency trauma situations must be accurate, rapid, and well executed. To this end, the team leader’s social, technical and leadership skills are essential factors that implicate the success of an emergency trauma intervention. While each emergency trauma case varies in severity and complexity, and the experience and expertise of team leaders may vary, it would be productive to identify certain coordinative and directive functions that improve the capacity for leading a team. Methods: This qualitative study of Trauma Team physicians in Singapore General Hospital (SGH) involved 50 in-depth interviews with doctors and nurses involved in Trauma Team activations, observations of Trauma Teams managing emergency patients, and reviews of audio/video recordings of 65 trauma activations. The interviews were conducted with doctors of various ranks across the relevant departments, 12 from the Emergency Department (ED), 11 from General Surgery (GS) and 8 from Orthopaedics, while the 6 nurses were from ED. In accordance with the grounded theory approach, the content of the interviews was coded and analysed in order to derive broad leadership themes that corresponded with certain behavioural traits exhibited by trauma team leaders, supplemented with the observational and audio/video data. Results: The leadership behaviours of the team leaders could be typified into three broad categories: team orientation, engagement and activeness. Team orientation corresponds with the source and form of cognitive responsibility, decision-making and informational contributions, divisible into individualistic and consultative sub-categories. Engagement refers to the type of activity that leaders prefer to engage in, and which implicates their attentional focus, divisible into participatory and supervisory sub-categories. Activeness is a function of the leader’s attitudes towards the behavioural regulation of the team, which manifests in inactivity or activity to augment or merely align with protocol. These factors are not exhaustive and are contextually sensitive, but collectively implicate a significant portion of the leadership activity observed in trauma teams.

Keywords: trauma team activations, critical event management, leadership, teamwork

Procedia PDF Downloads 326
30313 Commercial Automobile Insurance: A Practical Approach of the Generalized Additive Model

Authors: Nicolas Plamondon, Stuart Atkinson, Shuzi Zhou

Abstract:

The insurance industry is usually not the first topic one has in mind when thinking about applications of data science. However, the use of data science in the finance and insurance industry is growing quickly for several reasons, including an abundance of reliable customer data, ferocious competition requiring more accurate pricing, etc. Among the top use cases of data science, we find pricing optimization, customer segmentation, customer risk assessment, fraud detection, marketing, and triage analytics. The objective of this paper is to present an application of the generalized additive model (GAM) on a commercial automobile insurance product: an individually rated commercial automobile. These are vehicles used for commercial purposes, but for which there is not enough volume to apply pricing to several vehicles at the same time. The GAM model was selected as an improvement over GLM for its ease of use and its wide range of applications. The model was trained using the largest split of the data to determine model parameters. The remaining part of the data was used as testing data to verify the quality of the modeling activity. We used the Gini coefficient to evaluate the performance of the model. For long-term monitoring, commonly used metrics such as RMSE and MAE will be used. Another topic of interest in the insurance industry is to process of producing the model. We will discuss at a high level the interactions between the different teams with an insurance company that needs to work together to produce a model and then monitor the performance of the model over time. Moreover, we will discuss the regulations in place in the insurance industry. Finally, we will discuss the maintenance of the model and the fact that new data does not come constantly and that some metrics can take a long time to become meaningful.

Keywords: insurance, data science, modeling, monitoring, regulation, processes

Procedia PDF Downloads 76
30312 Haemoglobin Variants and Their Frequency Distribution in Human Population of Niger State, Nigeria

Authors: Akeem Akinboro, Bala Alhaj Kegun

Abstract:

Haemoglobinopathy is a genetic disorder that has the potentiality to cause death of individuals in whom both the alpha (α) and beta (β) globin chains of the haemoglobin molecule are defective due to mutations in their genes. The haemoglobin genotype variants among some residents of Niger state, Nigeria, were determined using the secondary data available at Bida, Minna and Kotangora general hospitals of the state. A total of 1,639 data, representing 434, 655 and 550, collected from the outside patients who visited the medical laboratory units of the three general hospitals, respectively, over five years period (2015-2020) were analyzed into gene frequency, sex and age to determine their haemoglobin genotypes status. More males (51.6 – 58.7%) than females (41.3 – 48.4%) visited the three hospitals during the period covered and most of the patients were between 11 - 20 years old. The frequency of HbA allele in the human population was 0.72, 0.65, 0.68 for Bida, Minna and Kotangora, respectively, while it was 0.25, 0.29 and 0.28 for HbS allele. The HbC allele was prevalent at 0.03, 0.06 and 0.05 among the human population in Bida, Minna and Kotangora cities of Niger state. In overall, the prevalence of HbA, HbS and HbC alleles in Niger state of Nigeria was 0.68, 0.28 and 0.05. Minna being the capital city of Niger state and the most populous among the three cities in the state seems to have influx of more people who are carriers of abnormal haemoglobin genotypes which has resulted to higher frequency of HbS and HbC than those of the other two cities in this study. These results show that the pattern of haemoglobin genotypes frequency of Kontagora could be a prediction for the whole of Niger state. It is therefore necessary and important to take screening of blood for haemoglobin genotype serious among intending couples to prevent and reduce the possibility of having increase in the number of people with abnormal haemoglobin genotypes in the state.

Keywords: haemoglobin, genotype, niger state, gene frequency, general hospitals

Procedia PDF Downloads 104
30311 From Self-Regulation to Self-Efficacy: Student Empowerment in Translator Training

Authors: Paulina Pietrzak

Abstract:

The understanding of the role of the contemporary translator is fraught with contradictions and idealistic visions of individuals who, by definition, should be fully competent and versatile. In spite of the fact that lots of translation researchers have probed into the identification and exploration of the concept of translator competence, little study has been devoted to its metacognitive aspects. Due to the dynamic nature of the translator’s occupation, it is difficult to predict what specific skills will prove useful for novice translators in their professional career. Thus, it is crucial that the translator is self-regulated enough to adapt to changing job demands and effectively function in the contemporary, highly dynamic, translation market. The objective of the presentation is to investigate the role and nature of the translator’s self-regulation. It will also demonstrate the results of a pilot study into translation trainees’ self-regulatory skills and explore implications of these findings for translator training in relation to theories of student empowerment.

Keywords: cognitive translation research, translator competence, self-regulatory skills, translator training

Procedia PDF Downloads 207
30310 Modeling and Statistical Analysis of a Soap Production Mix in Bejoy Manufacturing Industry, Anambra State, Nigeria

Authors: Okolie Chukwulozie Paul, Iwenofu Chinwe Onyedika, Sinebe Jude Ebieladoh, M. C. Nwosu

Abstract:

The research work is based on the statistical analysis of the processing data. The essence is to analyze the data statistically and to generate a design model for the production mix of soap manufacturing products in Bejoy manufacturing company Nkpologwu, Aguata Local Government Area, Anambra state, Nigeria. The statistical analysis shows the statistical analysis and the correlation of the data. T test, Partial correlation and bi-variate correlation were used to understand what the data portrays. The design model developed was used to model the data production yield and the correlation of the variables show that the R2 is 98.7%. However, the results confirm that the data is fit for further analysis and modeling. This was proved by the correlation and the R-squared.

Keywords: General Linear Model, correlation, variables, pearson, significance, T-test, soap, production mix and statistic

Procedia PDF Downloads 445
30309 Effect of Noise at Different Frequencies on Heart Rate Variability - Experimental Study Protocol

Authors: A. Bortkiewcz, A. Dudarewicz, P. Małecki, M. Kłaczyński, T. Wszołek, Małgorzata Pawlaczyk-Łuszczyńska

Abstract:

Low-frequency noise (LFN) has been recognized as a special environmental pollutant. It is usually considered a broadband noise with the dominant content of low frequencies from 10 Hz to 250 Hz. A growing body of data shows that LFN differs in nature from other environmental noises, which are at comparable levels but not dominated by low-frequency components. The primary and most frequent adverse effect of LFN exposure is annoyance. Moreover, some recent investigations showed that LFN at relatively low A-weighted sound pressure levels (40−45 dB) occurring in office-like areas could adversely affect the mental performance, especially of high-sensitive subjects. It is well documented that high-frequency noise disturbs various types of human functions; however, there is very little data on the impact of LFN on well-being and health, including the cardiovascular system. Heart rate variability (HRV) is a sensitive marker of autonomic regulation of the circulatory system. Walker and co-workers found that LFN has a significantly more negative impact on cardiovascular response than exposure to high-frequency noise and that changes in HRV parameters resulting from LFN exposure tend to persist over time. The negative reactions of the cardiovascular system in response to LFN generated by wind turbines (20-200 Hz) were confirmed by Chiu. The scientific aim of the study is to assess the relationship between the spectral-temporal characteristics of LFN and the activity of the autonomic nervous system, considering the subjective assessment of annoyance, sensitivity to this type of noise, and cognitive and general health status. The study will be conducted in 20 male students in a special, acoustically prepared, constantly supervised room. Each person will be tested 4 times (4 sessions), under conditions of non-exposure (sham) and exposure to noise of wind turbines recorded at a distance of 250 meters from the turbine with different frequencies and frequency ranges: acoustic band 20 Hz-20 kHz, infrasound band 5-20 Hz, acoustic band + infrasound band. The order of sessions of the experiment will be randomly selected. Each session will last 1 h. There will be a 2-3 days break between sessions to exclude the possibility of the earlier session influencing the results of the next one. Before the first exposure, a questionnaire will be conducted on noise sensitivity, general health status using the GHQ questionnaire, hearing organ status and sociodemographic data. Before each of the 4 exposures, subjects will complete a brief questionnaire on their mood and sleep quality the night before the test. After the test, the subjects will be asked about any discomfort and subjective symptoms during the exposure. Before the test begins, Holter ECG monitoring equipment will be installed. HRV will be analyzed from the ECG recordings, including time and frequency domain parameters. The tests will always be performed in the morning (9-12) to avoid the influence of diurnal rhythm on HRV results. Students will perform psychological tests 15 minutes before the end of the test (Vienna Test System).

Keywords: neurovegetative control, heart rate variability (HRV), cognitive processes, low frequency noise

Procedia PDF Downloads 80
30308 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 89
30307 Energy Management System Based on Voltage Fluctuations Minimization for Droop-Controlled Islanded Microgrid

Authors: Zahra Majd, Mohsen Kalantar

Abstract:

Power management and voltage regulation is one of the most important issues in microgrid (MG) control and scheduling. This paper proposes a multiobjective scheduling formulation that consists of active power costs, voltage fluctuations summation, and technical constraints of MG. Furthermore, load flow and reserve constraints are considered to achieve proper voltage regulation. A modified Jacobian matrix is presented for calculating voltage variations and Mont Carlo simulation is used for generating and reducing scenarios. To convert the problem to a mixed integer linear program, a linearization procedure for nonlinear equations is presented. The proposed model is applied to a typical low-voltage MG and two different cases are investigated. The results show the effectiveness of the proposed model.

Keywords: microgrid, energy management system, voltage fluctuations, modified Jacobian matrix

Procedia PDF Downloads 91
30306 Empirical Decomposition of Time Series of Power Consumption

Authors: Noura Al Akkari, Aurélie Foucquier, Sylvain Lespinats

Abstract:

Load monitoring is a management process for energy consumption towards energy savings and energy efficiency. Non Intrusive Load Monitoring (NILM) is one method of load monitoring used for disaggregation purposes. NILM is a technique for identifying individual appliances based on the analysis of the whole residence data retrieved from the main power meter of the house. Our NILM framework starts with data acquisition, followed by data preprocessing, then event detection, feature extraction, then general appliance modeling and identification at the final stage. The event detection stage is a core component of NILM process since event detection techniques lead to the extraction of appliance features. Appliance features are required for the accurate identification of the household devices. In this research work, we aim at developing a new event detection methodology with accurate load disaggregation to extract appliance features. Time-domain features extracted are used for tuning general appliance models for appliance identification and classification steps. We use unsupervised algorithms such as Dynamic Time Warping (DTW). The proposed method relies on detecting areas of operation of each residential appliance based on the power demand. Then, detecting the time at which each selected appliance changes its states. In order to fit with practical existing smart meters capabilities, we work on low sampling data with a frequency of (1/60) Hz. The data is simulated on Load Profile Generator software (LPG), which was not previously taken into consideration for NILM purposes in the literature. LPG is a numerical software that uses behaviour simulation of people inside the house to generate residential energy consumption data. The proposed event detection method targets low consumption loads that are difficult to detect. Also, it facilitates the extraction of specific features used for general appliance modeling. In addition to this, the identification process includes unsupervised techniques such as DTW. To our best knowledge, there exist few unsupervised techniques employed with low sampling data in comparison to the many supervised techniques used for such cases. We extract a power interval at which falls the operation of the selected appliance along with a time vector for the values delimiting the state transitions of the appliance. After this, appliance signatures are formed from extracted power, geometrical and statistical features. Afterwards, those formed signatures are used to tune general model types for appliances identification using unsupervised algorithms. This method is evaluated using both simulated data on LPG and real-time Reference Energy Disaggregation Dataset (REDD). For that, we compute performance metrics using confusion matrix based metrics, considering accuracy, precision, recall and error-rate. The performance analysis of our methodology is then compared with other detection techniques previously used in the literature review, such as detection techniques based on statistical variations and abrupt changes (Variance Sliding Window and Cumulative Sum).

Keywords: general appliance model, non intrusive load monitoring, events detection, unsupervised techniques;

Procedia PDF Downloads 82
30305 Research on Energy-Related Occupant Behavior of Residential Air Conditioning Based on Zigbee Intelligent Electronic Equipment

Authors: Dawei Xia, Benyan Jiang, Yong Li

Abstract:

Split-type air conditioners is widely used for indoor temperature regulation in urban residential buildings in summer in China. The energy-related occupant behavior has a great impact on building energy consumption. Obtaining the energy-related occupant behavior data of air conditioners is the research basis for the energy consumption prediction and simulation. Relying on the development of sensing and control technology, this paper selects Zigbee intelligent electronic equipment to monitor the energy-related occupant behavior of 20 households for 3 months in summer. Through analysis of data, it is found that people of different ages in the region have significant difference in the time, duration, frequency, and energy consumption of air conditioners, and form a data model of three basic energy-related occupant behavior patterns to provide an accurate simulation of energy.

Keywords: occupant behavior, Zigbee, split air conditioner, energy simulation

Procedia PDF Downloads 196
30304 A Goal-Oriented Approach for Supporting Input/Output Factor Determination in the Regulation of Brazilian Electricity Transmission

Authors: Bruno de Almeida Vilela, Heinz Ahn, Ana Lúcia Miranda Lopes, Marcelo Azevedo Costa

Abstract:

Benchmarking public utilities such as transmission system operators (TSOs) is one of the main strategies employed by regulators in order to fix monopolistic companies’ revenues. Since 2007 the Brazilian regulator has been utilizing Data Envelopment Analysis (DEA) to benchmark TSOs. Despite the application of DEA to improve the transmission sector’s efficiency, some problems can be pointed out, such as the high price of electricity in Brazil; the limitation of the benchmarking only to operational expenses (OPEX); the absence of variables that represent the outcomes of the transmission service; and the presence of extremely low and high efficiencies. As an alternative to the current concept of benchmarking the Brazilian regulator uses, we propose a goal-oriented approach. Our proposal supports input/output selection by taking traditional organizational goals and measures as a basis for the selection of factors for benchmarking purposes. As the main advantage, it resolves the classical DEA problems of input/output selection, undesirable and dual-role factors. We also provide a demonstration of our goal-oriented concept regarding service quality. As a result, most TSOs’ efficiencies in Brazil might improve when considering quality as important in their efficiency estimation.

Keywords: decision making, goal-oriented benchmarking, input/output factor determination, TSO regulation

Procedia PDF Downloads 196
30303 Study on Developmental and Pathogenesis Related Genes Expression Deregulation in Brassica compestris Infected with 16Sr-IX Associated Phytoplasma

Authors: Samina Jam Nazeer Ahmad, Samia Yasin, Ijaz Ahmad, Muhammad Tahir, Jam Nazeer Ahmad

Abstract:

Phytoplasmas are phloem-inhibited plant pathogenic bacteria that are transferred by insect vectors. Among biotic factors, Phytoplasma infection induces abnormality influencing the physiology as well as morphology of plants. In 16Sr-IX group phytoplasma-infected brassica compestris, flower abnormalities have been associated with changes in the expression of floral development genes. To determine whether methylation was involved in down-regulation of flower development, the process of DNA methylation and Demethylation was investigated as a possible mechanism for regulation of floral gene expression in phytoplasma infected Brassica transmitted by Orosious orientalis vector by using RT-PCR, MSRE-PCR, Southern blotting, Bisulfite Sequencing, etc. Transcriptional expression of methylated genes was found to be globally down-regulated in plants infected with phytoplasma, but not severely in those infested by insect vectors and variation in expression was found in genes involved in methylation. These results also showed that genes particularly orthologous to Arabidopsis APETALA3 involved in petal formation and flower development was down-regulated severely in phytoplasma-infected brassica and with the fact that phytoplasma and insect induce variation in developmental gene expression. The DNA methylation status of flower developmental gene in phytoplasma infected plants with 5-azacytidine restored gene expression strongly suggesting that DNA methylation was involved in down-regulation of floral development genes in phytoplasma infected brassica.

Keywords: genes expression, phytoplasma, DNA methylation, flower development

Procedia PDF Downloads 374
30302 The Antecedent Factor Affecting the Entrepreneurs’ Decision Making for Using Accounting Office Service in Chiang Mai Province

Authors: Nawaporn Thongnut

Abstract:

The objective was to study the process and how to prepare the accounting of the Thai temples and to study the performance and quality in the accounting preparation of the temples in accordance with the regulation. The population was the accountants and individuals involved in the accounting preparation of 17 temples in the suburban Bangkok. The measurement used in this study was questionnaire. The statistics used in the analysis are the descriptive statistic. The data was presented in the form of percentage tables to describe the data on the demographic characteristics. The study found that temple wardens were responsible for the accounting and reporting of the temples. Abbots were to check the accuracy of the accounts in the monasteries. Mostly, there was no account auditing of the monasteries from the outside. The practice when receiving income for most of the monasteries had been keeping financial document in an orderly manner.

Keywords: corporate social responsibility, creating shared value, management accountant’s roles, stock exchange of Thailand

Procedia PDF Downloads 231
30301 Application of Fuzzy Logic in Voltage Regulation of Radial Feeder with Distributed Generators

Authors: Anubhav Shrivastava, Lakshya Bhat, Shivarudraswamy

Abstract:

Distributed Generation is the need of the hour. With current advancements in the DG technology, there are some major issues that need to be tackled in order to make this method of generation of energy more efficient and feasible. Among other problems, the control in voltage is the major issue that needs to be addressed. This paper focuses on control of voltage using reactive power control of DGs with the help of fuzzy logic. The membership functions have been defined accordingly and the control of the system is achieved. Finally, with the help of simulation results in Matlab, the control of voltage within the tolerance limit set (+/- 5%) is achieved. The voltage waveform graphs for the IEEE 14 bus system are obtained by using simple algorithm with MATLAB and then with fuzzy logic for 14 bus system. The goal of this project was to control the voltage within limits by controlling the reactive power of the DG using fuzzy logic.

Keywords: distributed generation, fuzzy logic, matlab, newton raphson, IEEE 14 bus, voltage regulation, radial network

Procedia PDF Downloads 637
30300 Mass Media Representation and the Status of Women in the 2015 General Elections in Nigeria

Authors: Grace Anweh, Patience Achakpa-ikyo

Abstract:

The issue of women unfavourable representation in the mass media is long standing. While it is a worldwide problem, developing countries in Africa especially Nigeria are considered peculiar. This paper, ‘mass media representation and the status of women in the 2015, general elections in Nigeria’ therefore aimed to assess the current trend of role playing in the mass media and how this has affected general status of women in Nigeria politics with particular reference to the 2015 general elections. The study employed a review of secondary literature and data regarding previous performances of Nigeria women in politics from 1999 to 2015 and the picture that has been paid by Nigerian mass media about women. Anchoring the paper on the agenda setting theory of the mass media, the paper analysed secondary literature and discovered that from 1999 to date, women have been participating in politics but rather than improve their status in elective offices, the percentage of women for such offices is rather declining. This trend the paper concluded is attributed to the way and manner women are represented in the mass media - as not good for policy making offices except as kitchen and home managers. The paper therefore recommends that, the country should adopt the quota allocation for all the political parties in order to give women a chance to compete with their male counterparts. While women should strive towards the managerial and ownership of media houses in order to represent the interest of women in politics thus offering the opportunity for the favourable representation of women and role models for those who may want to tour a similar part.

Keywords: mass media, media representation, Nigeria elections, women

Procedia PDF Downloads 332
30299 The Effect of Health Program on the Fitness Ability of Abnormal BMI University Students

Authors: Hui-Fang Lee, Meng-Chu Liu, Wen-Chi Lu, Hsuan-Jung Hsieh

Abstract:

The purpose of the study was to examine the effect of health program on the fitness ability of abnormal BMI students of Ching-Yun University of Science and Technology. In order to achieve this purpose, self-regulation theory and dietary education were applied, and the effect of 10-week sports activities and three-day diet records on pre-test and post-test of fitness activities was analyzed. There were 40 original participants. Then, nine people who were with normal BMI, low attendance or unfinished fitness test were eliminated from this research. The valid samples were 31 (77.5%) participants. The fitness activities included sit-bending, one minute sit-up, standing long jump, and three-minute stage boarding. The averages of three-day diet records were compared, and differences of pre-test and post-test of the four fitness activities were analyzed with paired-samples t test. The results showed that there was a significant difference between pre-test and post of male students’ BMI and one minute sit-up. Females’ sit-bending and one minute sit-up had the same effect. Females had high fat intake in three-day diet records. The research showed that the use of self-regulation theory and dietary education, the implementation of sports activities and three-day diet records could significantly enhance the physical fitness indicators or effects. While in the course of sports, we should guide students to think about the gap between self-behavior and ideal behavior, then realize the main reasons and improving methods, and finally go towards the goal and improve the effect of physical fitness.

Keywords: self-regulation theory, dietary education, three-day diet records, physical fitness

Procedia PDF Downloads 323
30298 A Contribution to Blockchain Privacy

Authors: Malika Yaici, Feriel Lalaoui, Lydia Belhoul

Abstract:

As a new distributed point-to-point (P2P) technology, blockchain has become a very broad field of research, addressing various challenges, including privacy preserving, as is the case in all other technologies. In this work, a study of the existing solutions to the problems related to private life in general and in blockchains in particular is performed. User anonymity and transaction confidentiality are the two main challenges to the protection of privacy in blockchains. Mixing mechanisms and cryptographic solutions respond to this problem but remain subject to attacks and suffer from shortcomings. Taking into account these imperfections and the synthesis of our study, we present a mixing model without trusted third parties, based on group signatures, allowing reinforcing the anonymity of the users, the confidentiality of the transactions, with minimal turnaround time and without mixing costs.

Keywords: anonymity, blockchain, mixing coins, privacy

Procedia PDF Downloads 12
30297 Overtopping Protection Systems for Overflow Earth Dams

Authors: Omid Pourabdollah, Mohsen Misaghian

Abstract:

Overtopping is known as one the most important reasons for the failure of earth dams. In some cases, it has resulted in heavy damages and losses. Therefore, enhancing the safety of earth dams against overtopping has received much attention in the past four decades. In this paper, at first, the overtopping phenomena and its destructive consequences will be introduced. Then, overtopping failure mechanism of embankments will be described. Finally, different types of protection systems for stabilization of earth dams against overtopping will be presented. These include timber cribs, riprap and gabions, reinforced earth, roller compacted concrete, and the precast concrete blocks.

Keywords: embankment dam, overtopping, roller compacted concrete, wedge concrete block

Procedia PDF Downloads 161
30296 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq

Authors: Rozh Abdulrahman Kareem

Abstract:

The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.

Keywords: law, refugee, protection, Kurdistan

Procedia PDF Downloads 64
30295 Study of the Impact of Quality Management System on Chinese Baby Dairy Product Industries

Authors: Qingxin Chen, Liben Jiang, Andrew Smith, Karim Hadjri

Abstract:

Since 2007, the Chinese food industry has undergone serious food contamination in the baby dairy industry, especially milk powder contamination. One of the milk powder products was found to contain melamine and a significant number (294,000) of babies were affected by kidney stones. Due to growing concerns among consumers about food safety and protection, and high pressure from central government, companies must take radical action to ensure food quality protection through the use of an appropriate quality management system. Previously, though researchers have investigated the health and safety aspects of food industries and products, quality issues concerning food products in China have been largely over-looked. Issues associated with baby dairy products and their quality issues have not been discussed in depth. This paper investigates the impact of quality management systems on the Chinese baby dairy product industry. A literature review was carried out to analyse the use of quality management systems within the Chinese milk power market. Moreover, quality concepts, relevant standards, laws, regulations and special issues (such as Melamine, Flavacin M1 contamination) have been analysed in detail. A qualitative research approach is employed, whereby preliminary analysis was conducted by interview, and data analysis based on interview responses from four selected Chinese baby dairy product companies was carried out. Through the analysis of literature review and data findings, it has been revealed that for quality management system that has been designed by many practitioners, many theories, models, conceptualisation, and systems are present. These standards and procedures should be followed in order to provide quality products to consumers, but the implementation is lacking in the Chinese baby dairy industry. Quality management systems have been applied by the selected companies but the implementation still needs improvement. For instance, the companies have to take measures to improve their processes and procedures with relevant standards. The government need to make more interventions and take a greater supervisory role in the production process. In general, this research presents implications for the regulatory bodies, Chinese Government and dairy food companies. There are food safety laws prevalent in China but they have not been widely practiced by companies. Regulatory bodies must take a greater role in ensuring compliance with laws and regulations. The Chinese government must also play a special role in urging companies to implement relevant quality control processes. The baby dairy companies not only have to accept the interventions from the regulatory bodies and government, they also need to ensure that production, storage, distribution and other processes will follow the relevant rules and standards.

Keywords: baby dairy product, food quality, milk powder contamination, quality management system

Procedia PDF Downloads 473
30294 Delimitation of the Perimeters of PR Otection of the Wellfield in the City of Adrar, Sahara of Algeria through the Used Wyssling’s Method

Authors: Ferhati Ahmed, Fillali Ahmed, Oulhadj Younsi

Abstract:

delimitation of the perimeters of protection in the catchment area of the city of Adrar, which are established around the sites for the collection of water intended for human consumption of drinking water, with the objective of ensuring the preservation and reducing the risks of point and accidental pollution of the resource (Continental Intercalar groundwater of the Northern Sahara of Algeria). This wellfield is located in the northeast of the city of Adrar, it covers an area of 132.56 km2 with 21 Drinking Water Supply wells (DWS), pumping a total flow of approximately 13 Hm3/year. The choice of this wellfield is based on the favorable hydrodynamic characteristics and their location in relation to the agglomeration. The vulnerability to pollution of this slick is very high because the slick is free and suffers from the absence of a protective layer. In recent years, several factors have been introduced around the field that can affect the quality of this precious resource, including the presence of a strong centre for domestic waste and agricultural and industrial activities. Thus, its sustainability requires the implementation of protection perimeters. The objective of this study is to set up three protection perimeters: immediate, close and remote. The application of the Wyssling method makes it possible to calculate the transfer time (t) of a drop of groundwater located at any point in the aquifer up to the abstraction and thus to define isochrones which in turn delimit each type of perimeter, 40 days for the nearer and 100 days for the farther away. Special restrictions are imposed for all activities depending on the distance of the catchment. The application of this method to the Adrar city catchment field showed that the close and remote protection perimeters successively occupy areas of 51.14 km2 and 92.9 km2. Perimeters are delimited by geolocated markers, 40 and 46 markers successively. These results show that the areas defined as "near protection perimeter" are free from activities likely to present a risk to the quality of the water used. On the other hand, on the areas defined as "remote protection perimeter," there is some agricultural and industrial activities that may present an imminent risk. A rigorous control of these activities and the restriction of the type of products applied in industrial and agricultural is imperative.

Keywords: continental intercalaire, drinking water supply, groundwater, perimeter of protection, wyssling method

Procedia PDF Downloads 96
30293 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227