Search results for: process issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19074

Search results for: process issues

11124 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 73
11123 Dislocation and Writing: A Process of Remaking Identity

Authors: Hasti Abbasi

Abstract:

Creative writers have long followed the tradition of romantic exile, looking inward in an attempt to construct new viewpoints through the power of imagination. The writer, who attempts to resist uncertainty and locate her place in the new country through writing, resists creativity itself. For a writer, certain satisfaction can be achieved through producing a creative art away from the anxiety of the sense of dislocation. Dislocation, whether enforced or self-inflicted, could in many ways be a disaster but it could also cultivate a greater creative capacity and be a source of creative expression. This paper will investigate the idea of the creative writer as exiled self through reflections on the relationship between dislocation and writing.

Keywords: dislocation, creative writing, remaking identity, exile literature

Procedia PDF Downloads 285
11122 Eco-Friendly Softener Extracted from Ricinus communis (Castor) Seeds for Organic Cotton Fabric

Authors: Fisaha Asmelash

Abstract:

The processing of textiles to achieve a desired handle is a crucial aspect of finishing technology. Softeners can enhance the properties of textiles, such as softness, smoothness, elasticity, hydrophilicity, antistatic properties, and soil release properties, depending on the chemical nature used. However, human skin is sensitive to rough textiles, making softeners increasingly important. Although synthetic softeners are available, they are often expensive and can cause allergic reactions on human skin. This paper aims to extract a natural softener from Ricinus communis and produce an eco-friendly and user-friendly alternative due to its 100% herbal and organic nature. Crushed Ricinus communis seeds were soaked in a mechanical oil extractor for one hour with a 100g cotton fabric sample. The defatted cake or residue obtained after the extraction of oil from the seeds, also known as Ricinus communis meal, was obtained by filtering the raffinate and then dried at 1030c for four hours before being stored under laboratory conditions for the softening process. The softener was applied directly to 100% cotton fabric using the padding process, and the fabric was tested for stiffness, crease recovery, and drape ability. The effect of different concentrations of finishing agents on fabric stiffness, crease recovery, and drape ability was also analyzed. The results showed that the change in fabric softness depends on the concentration of the finish used. As the concentration of the finish was increased, there was a decrease in bending length and drape coefficient. Fabrics with a high concentration of softener showed a maximum decrease in drape coefficient and stiffness, comparable to commercial softeners such as silicon. The highest decrease in drape coefficient was found to be comparable with commercial softeners, silicon. Maximum increases in crease recovery were seen in fabrics treated with Ricinus communis softener at a concentration of 30gpl. From the results, the extracted softener proved to be effective in the treatment of 100% cotton fabric

Keywords: ricinus communis, crease recovery, drapability, softeners, stiffness

Procedia PDF Downloads 89
11121 Spray Drying and Physico-Chemical Microbiological Evaluation of Ethanolic Extracts of Propolis

Authors: David Guillermo Piedrahita Marquez, Hector Suarez Mahecha, Jairo Humberto Lopez

Abstract:

The propolis are substances obtained from the beehive have an action against pathogens, prooxidant substances and free radicals because of its polyphenols content, this has motivated the use of these compounds in the food and pharmaceutical industries. However, due to their organoleptic properties and their ability to react with other compounds, their application has been limited; therefore, the objective of this research was to propose a mechanism to protect propolis and mitigate side effects granted by its components. To achieve the stated purpose ethanolic extracts of propolis (EEP) from three samples from Santander were obtained and their antioxidant and antimicrobial activity were evaluated in order to choose the extract with the biggest potential. Subsequently mixtures of the extract with maltodextrin were prepared by spray drying varying concentration and temperature, finally the yield, the physicochemical, and antioxidant properties of the products were measured. It was concluded that Socorro propolis was the best for the production of microencapsulated due to their activity against pathogenic strains, for its large percentage of DPPH radical inactivation and for its high phenolic content. In spray drying, the concentration of bioactive had a greater impact than temperature and the conditions set allowed a good performance and the production of particles with high antioxidant potential and little chance of proliferation of microorganisms. Also, it was concluded that the best conditions that allowed us to obtain the best particles were obtained after drying a mixture 1:2 ( EEP: Maltodextrin), besides the concentration is the most important variable in the spray drying process, at the end we obtained particles of different sizes and shape and the uniformity of the surface depend on the temperature. After watching the previously mentioned microparticles by scanning electron microscopy (SEM) it was concluded that most of the particles produced during the spray dry process had a spherical shape and presented agglomerations due to the moisture content of the ethanolic extracts of propolis (EEP), the morphology of the microparticles contributed to the stability of the final product and reduce the loss of total phenolic content.

Keywords: spray drying, propolis, maltodextrin, encapsulation, scanning electron microscopy

Procedia PDF Downloads 285
11120 Use of Information Technology in the Government of a State

Authors: Pavel E. Golosov, Vladimir I. Gorelov, Oksana L. Karelova

Abstract:

There are visible changes in the world organization, environment and health of national conscience that create a background for discussion on possible redefinition of global, state and regional management goals. Authors apply the sustainable development criteria to a hierarchical management scheme that is to lead the world community to non-contradictory growth. Concrete definitions are discussed in respect of decision-making process representing the state mostly. With the help of system analysis it is highlighted how to understand who would carry the distinctive sign of world leadership in the nearest future.

Keywords: decision-making, information technology, public administration

Procedia PDF Downloads 507
11119 Energy Efficient Buildings in Tehran by Reviewing High-Tech Methods and Vernacular Architecture Principles

Authors: Shima Naderi, Abbas Abbaszadeh Shahri

Abstract:

Energy resources are reachable and affordable in Iran, thus surplus access to fossil fuels besides high level of economic growth leads to serious environmental critical such as pollutants and greenhouse gases in the atmosphere, increase in average degrease and lack of water sources specially in Tehran as a capital city of Iran. As building sector consumes a huge portion of energy, taking actions towards alternative sources of energy as well as conserving non-renewable energy resources and architectural energy saving methods are the fundamental basis for achieving sustainability`s goals. This study tries to explore implantation of both high technologies and traditional issues for reduction of energy demands in buildings of Tehran and introduce some factors and instructions for achieving this purpose. Green and energy efficient buildings such as ZEBs make it possible to preserve natural resources for the next generations by reducing pollution and increasing ecosystem self-recovery. However ZEB is not widely spread in Iran because of its low economic efficiency, it is not viable for a private entrepreneur without the governmental supports. Therefore executing of Architectural Energy Efficiency can be a better option. It is necessary to experience a substructure expansion with respect to traditional residential building style. Renewable energies and passive design which are the substantial part of the history of architecture in Iran can be regenerated and employed as an essential part of designing energy efficient buildings.

Keywords: architectural energy efficiency, passive design, renewable energies, zero energy buildings

Procedia PDF Downloads 354
11118 Sustainable Cities: Harnessing the Power of Urban Renewable Energy

Authors: Mehrzad Soltani, Pegah Rezaei

Abstract:

In the endeavor to construct cities that are not only thriving but also environmentally responsible, effective urban planning and architectural design assume paramount significance. The focal point of this pursuit is the harnessing of urban renewable energy. By embracing sustainable practices such as the integration of solar panels into the urban landscape and the establishment of smart grids, cities are poised to confront head-on the dual challenge of surging energy demands and pressing environmental concerns. Urban renewable energy solutions offer a multifaceted approach to these issues. Firstly, they usher in a clean and sustainable source of energy, reducing the cities' ecological footprint while ensuring a continuous power supply. This transition to eco-friendly energy is also intrinsically linked to enhanced spatial utilization, thereby streamlining the efficiency of urban areas. Moreover, it spurs the adoption of sustainable transportation alternatives, diminishing the reliance on fossil fuels and mitigating air pollution. However, the significance of integrating renewable energy solutions transcends the realm of urban sustainability. It embodies a holistic approach towards creating cities that harmoniously coexist with the natural environment while catering to the needs and aspirations of their inhabitants. In essence, prioritizing sustainability in urban planning and architectural design has evolved from a choice to a necessity, one that not only safeguards the cities' well-being but also fosters a better quality of life for their residents. Thus, it is imperative that we acknowledge the transformative potential of these innovations as we pave the way towards the cities of the future.

Keywords: sustainability, smart grids, solar panel, urban planning, environmental concerns

Procedia PDF Downloads 85
11117 Citizen Becoming: ‘In-between’ State and Tibetan Self-Fashioning (1946- 1986)

Authors: Noel Mariam George

Abstract:

This paper explores the history of Tibetan citizenship, one of the primary non-partition refugee communities, and their negotiation of 'in-betweenness' as a mode of political and legal belonging in India. While South Asian citizenship histories have primarily centered around the 1947 and 1971 Partitions, this paper uncovers an often-overlooked period, spanning the 1950s, 60s, and 70s, when Tibetans began to assert their claims within the Indian state. This paper challenges the conventional teleological narrative of partition by highlighting a distinct period when the Indian state negotiated boundaries of belonging for non-partition refugees differently. It explores how Tibetans occupied an 'in-between' status, existing as both foreigners and potential citizens, thereby complicating the traditional citizen-refugee binary. Moreover, it underscores that citizenship during this era was not solely determined by legal frameworks. Instead, it was a dynamic process shaped by historical contexts, practices, and relationships. Tibetans pursued citizen-like claims through legal battles, lobbying, protests, volunteering, and collective solidarity, revealing citizenship as an 'act' embedded in their daily lives. Tibetan liminality is characterized by their simultaneous maintenance of exile identity and pursuit of citizen-like claims in India. The cautious Indian state, reluctant to label Tibetans as either 'refugees' or 'citizens,' has contributed to this liminal status. This duality has intensified Tibetans' precarity but has also led to creative and transformative practices that have expanded the boundaries of democracy and citizenship in India. Beyond traditional narratives of Indian benevolence, this paper scrutinizes the geopolitical factors driving Indian support for Tibetans. Additionally, it challenges 'common-sensical' narratives by demonstrating how Tibetans strategically navigated Indian citizenship. Using archival sources from the British Library and the National Archives in London and Delhi along with digitized materials, the paper reveals citizenship as a multi-faceted historical process. It examines how Tibetans exercised agency within the Indian state despite their liminal status.

Keywords: citizenship, borderlands, forced displacement, refugees in India

Procedia PDF Downloads 72
11116 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence

Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis

Abstract:

Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.

Keywords: energy security, public opinion, risk, energy threat, energy security policy

Procedia PDF Downloads 505
11115 Geo-Collaboration Model between a City and Its Inhabitants to Develop Complementary Solutions for Better Household Waste Collection

Authors: Abdessalam Hijab, Hafida Boulekbache, Eric Henry

Abstract:

According to several research studies, the city as a whole is a complex, spatially organized system; its modeling must take into account several factors, socio-economic, and political, or geographical, acting at multiple scales of observation according to varied temporalities. Sustainable management and protection of the environment in this complex system require significant human and technical investment, particularly for monitoring and maintenance. The objective of this paper is to propose an intelligent approach based on the coupling of Geographic Information System (GIS) and Information and Communications Technology (ICT) tools in order to integrate the inhabitants in the processes of sustainable management and protection of the urban environment, specifically in the processes of household waste collection in urban areas. We are discussing a collaborative 'city/inhabitant' space. Indeed, it is a geo-collaborative approach, based on the spatialization and real-time geo-localization of topological and multimedia data taken by the 'active' inhabitant, in the form of geo-localized alerts related to household waste issues in their city. Our proposal provides a good understanding of the extent to which civil society (inhabitants) can help and contribute to the development of complementary solutions for the collection of household waste and the protection of the urban environment. Moreover, it allows the inhabitant to contribute to the enrichment of a data bank for future uses. Our geo-collaborative model will be tested in the Lamkansa sampling district of the city of Casablanca in Morocco.

Keywords: geographic information system, GIS, information and communications technology, ICT, geo-collaboration, inhabitants, city

Procedia PDF Downloads 111
11114 Designing and Implementing a Tourist-Guide Web Service Based on Volunteer Geographic Information Using Open-Source Technologies

Authors: Javad Sadidi, Ehsan Babaei, Hani Rezayan

Abstract:

The advent of web 2.0 gives a possibility to scale down the costs of data collection and mapping, specifically if the process is done by volunteers. Every volunteer can be thought of as a free and ubiquitous sensor to collect spatial, descriptive as well as multimedia data for tourist services. The lack of large-scale information, such as real-time climate and weather conditions, population density, and other related data, can be considered one of the important challenges in developing countries for tourists to make the best decision in terms of time and place of travel. The current research aims to design and implement a spatiotemporal web map service using volunteer-submitted data. The service acts as a tourist-guide service in which tourists can search interested places based on their requested time for travel. To design the service, three tiers of architecture, including data, logical processing, and presentation tiers, have been utilized. For implementing the service, open-source software programs, client and server-side programming languages (such as OpenLayers2, AJAX, and PHP), Geoserver as a map server, and Web Feature Service (WFS) standards have been used. The result is two distinct browser-based services, one for sending spatial, descriptive, and multimedia volunteer data and another one for tourists and local officials. Local official confirms the veracity of the volunteer-submitted information. In the tourist interface, a spatiotemporal search engine has been designed to enable tourists to find a tourist place based on province, city, and location at a specific time of interest. Implementing the tourist-guide service by this methodology causes the following: the current tourists participate in a free data collection and sharing process for future tourists, a real-time data sharing and accessing for all, avoiding a blind selection of travel destination and significantly, decreases the cost of providing such services.

Keywords: VGI, tourism, spatiotemporal, browser-based, web mapping

Procedia PDF Downloads 90
11113 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 402
11112 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation

Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez

Abstract:

With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).

Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling

Procedia PDF Downloads 196
11111 Hermitical Landscapes: The Congregation of Saint Paul of Serra De Ossa

Authors: Rolando Volzone

Abstract:

The Congregation of Saint Paul of Serra de Ossa (Ossa Mountain) was founded in 1482, originated by the eremitic movement of the homens da pobre vida (poor life men), which is documented since 1366. The community of hermits expanded up to the first half of the 15th century, mostly in southern Portugal in the Alentejo region. In 1578, following a process of institutionalization led by the Church, an autonomous congregation was set up, affiliated in the Hungarian Order of Saint Paul the First Hermit, until 1834, when the decree of dissolution of the religious orders disbanded all the convents and monasteries in Portugal. The architectural evidences that reached our days as a legacy of the hermitical movement in Serra de Ossa, although studied and analysed from an historical point of view, are still little known with respect to the architectural characteristics of its physical implantation and its relationship with the natural systems. This research intends to expose the appropriation process of the locus eremus as a starting point for the interpretation of this landscape, evidencing the close relationship between the religious experience and the physical space chosen to reach the perfection of the soul. The locus eremus is thus determined not only by practical aspects such as the absolute and relative location, orography, existence of water resources, or the King’s favoring to the religious and settlement action of the hermits, but also by spiritual aspects related to the symbolism of the physical elements present and the solitary walk of these men. These aspects, combined with the built architectural elements and other exerted human action, may be fertile ground for the definition of a hypothetical hermitical landscape based on the sufficiently distinctive characteristics that sustain it. The landscape built by these hermits is established as a cultural and material heritage, and its preservation is of utmost importance. They deeply understood this place and took advantage of its natural resources, manipulating them in an ecological and economically sustainable way, respecting the place, without overcoming its own genius loci but becoming part of it.

Keywords: architecture, congregation of Saint Paul of Serra de Ossa, heremitical landscape, locus eremus

Procedia PDF Downloads 228
11110 Effect of the Workpiece Position on the Manufacturing Tolerances

Authors: Rahou Mohamed , Sebaa Fethi, Cheikh Abdelmadjid

Abstract:

Manufacturing tolerancing is intended to determine the intermediate geometrical and dimensional states of the part during its manufacturing process. These manufacturing dimensions also serve to satisfy not only the functional requirements given in the definition drawing but also the manufacturing constraints, for example geometrical defects of the machine, vibration, and the wear of the cutting tool. The choice of positioning has an important influence on the cost and quality of manufacture. To avoid this problem, a two-step approach have been developed. The first step is dedicated to the determination of the optimum position. As for the second step, a study was carried out for the tightening effect on the tolerance interval.

Keywords: dispersion, tolerance, manufacturing, position

Procedia PDF Downloads 333
11109 Mobile Payment over NFC: The M-Check System Case

Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich

Abstract:

The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.

Keywords: M-payment, NFC, M-check, M-commerce, security

Procedia PDF Downloads 590
11108 Intersectional Bullying, LGBT Youth and the Construction of Power

Authors: Elle Hilke Dominski

Abstract:

This paper explores the impact of intersectional bullying of lesbian, gay, bisexual, transgender (LGBT) youth from a multi-layered experience perspective within bullying incidents at school. Present inclusionary measures at school may not be designed as a continuous process of finding better methods for responding to diversity, rather remain ‘fixed’ as singular solutions applied universally. This paper argues recognizing education through a lens of inclusion begins to realize most educational systems are poorly equipped to handle diversity.

Keywords: bullying, education, intersectional bullying, LGBT

Procedia PDF Downloads 213
11107 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 470
11106 Financial Capacity, Governance, and Corporate Engagement in Environmental Protection

Authors: Lubica Hikkerova, Jean-Michel Sahut

Abstract:

Environmental protection remains a global challenge but, since 2012, there has been a progressive decline in corporate engagement in environmental protection issues. This study seeks to investigate the role of financial capacity and governance in improving the level of environmental engagement of companies. The regression technique is applied to data on 351 large European companies from the ASSET4-ESG database for the 2007-2015 period. Firstly, the results show that the companies in the sample are fairly engaged in environmental protection, with a strong dispersion representing nearly four times the average. This means that the companies in the sample do not share the same level of engagement in matters of environmental protection, some being more committed than others. Secondly, the results reveal that the financial capacity of the company, as assessed through its indicators, has a significant effect on its level of environmental protection engagement in the present sample. This effect is more positive the higher the profits the company makes, and more negative the more heavily indebted or, the higher the rates of dividends it pays per share. Lastly, the results also show that a better quality of governance plays an important role in the decision to undertake actions leading to environmental protection. More specifically, the degree of management implication in the running of the business, the respect of the rights of the shareholders, the effectiveness of the control exerted by the board of directors, and, to a lesser extent, the independence of the audit committee, are variables which have a positive and significant influence on the level of environmental engagement of companies.

Keywords: financial capacity, corporate governance, environmental engagement, stakeholder theory, theory of organizational legitimacy, theory of resources and capabilities

Procedia PDF Downloads 185
11105 Physico-Mechanical Behavior of Indian Oil Shales

Authors: K. S. Rao, Ankesh Kumar

Abstract:

The search for alternative energy sources to petroleum has increased these days because of increase in need and depletion of petroleum reserves. Therefore the importance of oil shales as an economically viable substitute has increased many folds in last 20 years. The technologies like hydro-fracturing have opened the field of oil extraction from these unconventional rocks. Oil shale is a compact laminated rock of sedimentary origin containing organic matter known as kerogen which yields oil when distilled. Oil shales are formed from the contemporaneous deposition of fine grained mineral debris and organic degradation products derived from the breakdown of biota. Conditions required for the formation of oil shales include abundant organic productivity, early development of anaerobic conditions, and a lack of destructive organisms. These rocks are not gown through the high temperature and high pressure conditions in Mother Nature. The most common approach for oil extraction is drastically breaking the bond of the organics which involves retorting process. The two approaches for retorting are surface retorting and in-situ processing. The most environmental friendly approach for extraction is In-situ processing. The three steps involved in this process are fracturing, injection to achieve communication, and fluid migration at the underground location. Upon heating (retorting) oil shale at temperatures in the range of 300 to 400°C, the kerogen decomposes into oil, gas and residual carbon in a process referred to as pyrolysis. Therefore it is very important to understand the physico-mechenical behavior of such rocks, to improve the technology for in-situ extraction. It is clear from the past research and the physical observations that these rocks will behave as an anisotropic rock so it is very important to understand the mechanical behavior under high pressure at different orientation angles for the economical use of these resources. By knowing the engineering behavior under above conditions will allow us to simulate the deep ground retorting conditions numerically and experimentally. Many researchers have investigate the effect of organic content on the engineering behavior of oil shale but the coupled effect of organic and inorganic matrix is yet to be analyzed. The favourable characteristics of Assam coal for conversion to liquid fuels have been known for a long time. Studies have indicated that these coals and carbonaceous shale constitute the principal source rocks that have generated the hydrocarbons produced from the region. Rock cores of the representative samples are collected by performing on site drilling, as coring in laboratory is very difficult due to its highly anisotropic nature. Different tests are performed to understand the petrology of these samples, further the chemical analyses are also done to exactly quantify the organic content in these rocks. The mechanical properties of these rocks are investigated by considering different anisotropic angles. Now the results obtained from petrology and chemical analysis are correlated with the mechanical properties. These properties and correlations will further help in increasing the producibility of these rocks. It is well established that the organic content is negatively correlated to tensile strength, compressive strength and modulus of elasticity.

Keywords: oil shale, producibility, hydro-fracturing, kerogen, petrology, mechanical behavior

Procedia PDF Downloads 343
11104 Nyaya, Buddhist School Controversy regarding the Laksana of Pratyaksa: Causal versus Conceptual Analysis

Authors: Maitreyee Datta

Abstract:

Buddhist lakṣaņa of pratyakṣa pramā is not the result of the causal analysis of the genesis of it. Naiyāyikas, on the other hand, has provided the lakṣaņa of pratyakṣa in terms of the causal analysis of it. Thus, though in these two philosophical systems philosophers have discussed in detail the nature of pratyakṣa pramā (perception), yet their treatments and understanding of it vary according to their respective understanding of pramā and prmāņa and their relationship. In Nyāya school, the definition (lakṣņa) of perception (pratyakṣa) has been given in terms of the process by virtue of which it has been generated. Thus, Naiyāyikas were found to provide a causal account of perception (pratyakṣa) by virtue of their lakṣaņa of it. But in Buddhist epistemology perception has been defined by virtue of the nature of perceptual knowledge (pratyakṣa pramā) which is devoid of any vikalpa or cognition. These two schools differed due to their different metaphysical presuppositions which determine their epistemological pursuits. The Naiyāyikas admitted pramā and pramāņa as separate events and they have taken pramāņa to be the cause of pramā. These presuppositions enabled them to provide a lakṣaņa of pratyakṣa pramā in terms of the causes by which it is generated. Why did the Buddhist epistemologists define perception by the unique nature of perceptual knowledge instead of the process by which it is generated? This question will be addressed and dealt with in the present paper. In doing so, the unique purpose of Buddhist philosophy will be identified which will enable us to find out an answer to the above question. This enterprise will also reveal the close relationship among some basic Buddhist presuppositions like pratityasamutpādavāda and kṣaņikavāda with Buddhist epistemological positions. In other words, their distinctive notion of pramā (knowledge) indicates their unique epistemological position which is found to comply with their basic philosophical presuppositions. The first section of the paper will present the Buddhist epistemologists’ lakṣaņa of pratyakṣa. The analysis of the lakṣaņa will be given in clear terms to reveal the nature of pratyakṣa as an instance of pramā. In the second section, an effort will be made to identify the uniqueness of such a definition. Here an articulation will be made in which the relationship among basic Buddhist presuppositions and their unique epistemological positions are determined. In the third section of the paper, an effort will be made to compare Nyāya epistemologist’s position regarding pratyakṣa with that of the Buddhist epistemologist.

Keywords: laksana, prama, pramana, pratyksa

Procedia PDF Downloads 145
11103 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 104
11102 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 293
11101 Considerations upon Structural Health Monitoring of Small to Medium Wind Turbines

Authors: Nicolae Constantin, Ştefan Sorohan

Abstract:

The small and medium wind turbines are running in quite different conditions as compared to the big ones. Consequently, they need also a different approach concerning the structural health monitoring (SHM) issues. There are four main differences between the above mentioned categories: (i) significantly smaller dimensions, (ii) considerably higher rotation speed, (iii) generally small distance between the turbine and the energy consumer and (iv) monitoring assumed in many situations by the owner. In such conditions, nondestructive inspections (NDI) have to be made as much as possible with affordable, yet effective techniques, requiring portable and accessible equipment. Additionally, the turbines and accessories should be easy to mount, dispose and repair. As the materials used for such unit can be metals, composites and combined, the technologies should be adapted accordingly. An example in which the two materials co-exist is the situation in which the damaged metallic skin of a blade is repaired with a composite patch. The paper presents the inspection of the bonding state of the patch, using portable ultrasonic equipment, able to put in place the Lamb wave method, which proves efficient in global and local inspections as well. The equipment is relatively easy to handle and can be borrowed from specialized laboratories or used by a community of small wind turbine users, upon the case. This evaluation is the first in a row, aimed to evaluate efficiency of NDI performed with rather accessible, less sophisticated equipment and related inspection techniques, having field inspection capabilities. The main goal is to extend such inspection procedures to other components of the wind power unit, such as the support tower, water storage tanks, etc.

Keywords: structural health monitoring, small wind turbines, non-destructive inspection, field inspection capabilities

Procedia PDF Downloads 335
11100 Quality Assurance Practices in the Universities of Pakistan: Physical Facilities as Encouragement

Authors: Ijaz Ahamad Tatlah

Abstract:

The justification of this study was to identify about physical facilities as encouragement to Quality Assurance Practices (QAP) in the Universities of Pakistan concerning the views of students, teachers and Directors of Quality Enhancement Cells’ (QEC’s) and to differentiate the views of students, teachers and Directors of QECs in relation to physical facilities about quality assurance practices in the universities of Pakistan. It was a quantitative and qualitative research study. This study was conducted on a sample of 28 universities (public and private sector) of Pakistan by using random and purposive sampling technique. Questionnaires and semi-structured interviews were planned to gather information from students, teachers and Directors of QECs in relation to physical facilities about quality assurance practices in the universities of Pakistan. The data was analyzed by using Descriptive, inferential statistics, and thematic coding. The study revealed that students, teachers and Directors of QEC’s faced a lot of problems and issues without physical facilities. Quality assurance Agency (QAA), Quality Assurance Department (QAD) and Higher Education commission (HEC) all are relevant Pakistani Agencies, which are working consistently of both sectors i.e. public and private to supervise, guide and facilitate the universities of Pakistan for developing quality assurance practices. Majority of the students teachers and Directors’ of QECs opined that books, research journals, manuals for use of science laboratories, equipment for experiments and update computers were available for teachers and students’ in the universities. It was suggested by the students teachers and Directors of QECs of universities that Quality Assurance Practices (QAP) can be accelerated by thinking the following steps: provision of sufficient resources, add the latest software for computers laboratories and new edition of books.

Keywords: physical facilities, quality assurance practices, library, laboratory

Procedia PDF Downloads 378
11099 Cryptocurrency Realities: Insights from Social and Economic Psychology

Authors: Sarah Marie

Abstract:

In today's dynamic financial landscape, cryptocurrencies represent a paradigm shift characterized by innovation and intense debate. This study probes into their transformative potential and the challenges they present, offering a balanced perspective that recognizes both their promise and pitfalls. Emulating the engaging style of a TED Talk, this research goes beyond academic analysis, serving as a critical bridge to reconcile the perspectives of cryptocurrency skeptics and enthusiasts, fostering a well-informed dialogue. The study employs a mixed-method approach, analyzing current trends, regulatory landscapes, and public perceptions in the cryptocurrency domain. It distinguishes genuine innovators in this field from ostentatious opportunists, echoing the sentiment that real innovation should be separated from mere showmanship. If one is unfamiliar with who is being referenced, they can likely spot them leaning against their Lamborghinis outside "Crypto" conventions, looking greasy. Major findings reveal a complex scenario dominated by regulatory uncertainties, market volatility, and security issues, emphasizing the need for a coherent regulatory framework that balances innovation with risk management and sustainable practices. The study underscores the importance of transparency and consumer protection in fostering responsible growth within the cryptocurrency ecosystem. In conclusion, the research advocates for education, innovation, and ethical governance in the realm of cryptocurrencies. It calls for collaborative efforts to navigate the intricacies of this evolving landscape and to realize its full potential in a responsible, inclusive, and forward-thinking manner.

Keywords: financial landscape, innovation, public perception, transparency

Procedia PDF Downloads 45
11098 Mg AZ31B Alloy Processed through ECASD

Authors: P. Fernández-Morales, D. Peláez, C. Isaza, J. M. Meza, E. Mendoza

Abstract:

Mg AZ31B alloy sheets were processed through equal-channel angular sheet drawing (ECASD) process, following the route A and C at room temperature and varying the processing speed. SEM was used to analyze the microstructure. The grain size was refined and presence of twins was observed. Vickers microhardness and tensile testing were carried out to evaluate the mechanical properties, showing in general; a remarkable increase in the first pass and slight increases during subsequent passes and, that the route C produces better uniform properties distribution through the thickness of the samples.

Keywords: ECASD, Mg Alloy, mechanical properties, microstructure

Procedia PDF Downloads 359
11097 Experimental Study on the Heating Characteristics of Transcritical CO₂ Heat Pumps

Authors: Lingxiao Yang, Xin Wang, Bo Xu, Zhenqian Chen

Abstract:

Due to its outstanding environmental performance, higher heating temperature and excellent low-temperature performance, transcritical carbon dioxide (CO₂) heat pumps are receiving more and more attention. However, improperly set operating parameters have a serious negative impact on the performance of the transcritical CO₂ heat pump due to the properties of CO₂. In this study, the heat transfer characteristics of the gas cooler are studied based on the modified “three-stage” gas cooler, then the effect of three operating parameters, compressor speed, gas cooler water-inlet flowrate and gas cooler water-inlet temperature, on the heating process of the system are investigated from the perspective of thermal quality and heat capacity. The results shows that: In the heat transfer process of gas cooler, the temperature distribution of CO₂ and water shows a typical “two region” and “three zone” pattern; The rise in the cooling pressure of CO₂ serves to increase the thermal quality on the CO₂ side of the gas cooler, which in turn improves the heating temperature of the system; Nevertheless, the elevated thermal quality on the CO₂ side can exacerbate the mismatch of heat capacity on both sides of the gas cooler, thereby adversely affecting the system coefficient of performance (COP); Furthermore, increasing compressor speed mitigates the mismatch in heat capacity caused by elevated thermal quality, which is exacerbated by decreasing gas cooler water-inlet flowrate and rising gas cooler water-inlet temperature; As a delegate, the varying compressor speed results in a 7.1°C increase in heating temperature within the experimental range, accompanied by a 10.01% decrease in COP and an 11.36% increase in heating capacity. This study can not only provide an important reference for the theoretical analysis and control strategy of the transcritical CO₂ heat pump, but also guide the related simulation and the design of the gas cooler. However, the range of experimental parameters in the current study is small and the conclusions drawn are not further analysed quantitatively. Therefore, expanding the range of parameters studied and proposing corresponding quantitative conclusions and indicators with universal applicability could greatly increase the practical applicability of this study. This is also the goal of our next research.

Keywords: transcritical CO₂ heat pump, gas cooler, heat capacity, thermal quality

Procedia PDF Downloads 12
11096 Developing a Culturally Acceptable End of Life Survey (the VOICES-ESRD/Thai Questionnaire) for Evaluation Health Services Provision of Older Persons with End-Stage Renal Disease (ESRD) in Thailand

Authors: W. Pungchompoo, A. Richardson, L. Brindle

Abstract:

Background: The developing of a culturally acceptable end of life survey (the VOICES-ESRD/Thai questionnaire) is an essential instrument for evaluation health services provision of older persons with ESRD in Thailand. The focus of the questionnaire was on symptoms, symptom control and the health care needs of older people with ESRD who are managed without dialysis. Objective: The objective of this study was to develop and adapt VOICES to make it suitable for use in a population survey in Thailand. Methods: The mixed methods exploratory sequential design was focussed on modifying an instrument. Data collection: A cognitive interviewing technique was implemented, using two cycles of data collection with a sample of 10 bereaved carers and a prototype of the Thai VOICES questionnaire. Qualitative study was used to modify the developing a culturally acceptable end of life survey (the VOICES-ESRD/Thai questionnaire). Data analysis: The data were analysed by using content analysis. Results: The revisions to the prototype questionnaire were made. The results were used to adapt the VOICES questionnaire for use in a population-based survey with older ESRD patients in Thailand. Conclusions: A culturally specific questionnaire was generated during this second phase and issues with questionnaire design were rectified.

Keywords: VOICES-ESRD/Thai questionnaire, cognitive interviewing, end of life survey, health services provision, older persons with ESRD

Procedia PDF Downloads 279
11095 Performing the Landscape: Temporary and Performative Practices in Landscape Production

Authors: Miguel Costa

Abstract:

Despite the "time" element being an intrinsic characteristic of the work with the landscape, its execution and completion are also often dependent on external factors, i.e., the slow bureaucratic procedures required for the implementation of a project. In the urban areas of the city, these conditions are even more present — some landscape projects are articulated with the architectural/urban design, transporting itself long, expensive and inflexible processes related with the constant transformations of contemporary urban culture, where the needs and expectations could change before the project is finished. However, despite the renewed interest and growing concern for issues related to the landscapes (particularly since the European Landscape Convention, its scope and fields of action, extended to all the landscapes and not just the selected ones), still lacks the need for a greater inclusion of citizens in its protection and construction processes as well as a greater transparency and clarity of the consequences and results of their active participation. This article aims to reflect on the production processes of urban landscapes, on its completion runtime and its relationship with the citizens by introducing temporary projects as a fieldwork methodology, as well as using the contribution of different professional practices and knowledge for its monitoring, execution, and implementation. These strategies address a more interdisciplinary, transdisciplinary and performative approach, not only from the ephemeral experience of objects and actions but also from the processes and the dynamic events that are organized from these objects and actions over the landscape. The goal is to discuss the results of these approaches on its different dimensions: critical dimension; experimental and strategic dimension; pedagogical dimension; political dimension; cultural.

Keywords: landscape fieldwork, interdisciplinarity, public inclusion, public participation, temporary projects, transdisciplinarity

Procedia PDF Downloads 321