Search results for: cloud accounting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1311

Search results for: cloud accounting

531 The Role of the Internal Audit Unit in Detecting and Preventing Fraud at Public Universities in West Java, Indonesia

Authors: Fury Khristianty Fitriyah

Abstract:

This study aims to identify the extent of the role of the Satuan Pengawas Intern (Internal Audit Unit) in detecting and preventing fraud in public universities in West Java under the Ministry of Research, Technology and Higher Education. The research method applied was a qualitative case study approach, while the unit of analysis for this study is the Internal Audit Unit at each public university. Results of this study indicate that the Internal Audit Unit is able to detect and prevent fraud within a public university environment by means of red flags to mark accounting anomalies. These stem from inaccurate budget planning that prompts inappropriate use of funds, exacerbated by late disbursements of funds, which potentially lead to fictitious transactions, and discrepancies in recording state-owned assets into a state property management system (SIMAK BMN), which, if not conducted properly, potentially causes loss to the state.

Keywords: governance, internal control, fraud, public university

Procedia PDF Downloads 278
530 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 182
529 Blockchain-Resilient Framework for Cloud-Based Network Devices within the Architecture of Self-Driving Cars

Authors: Mirza Mujtaba Baig

Abstract:

Artificial Intelligence (AI) is evolving rapidly, and one of the areas in which this field has influenced is automation. The automobile, healthcare, education, and robotic industries deploy AI technologies constantly, and the automation of tasks is beneficial to allow time for knowledge-based tasks and also introduce convenience to everyday human endeavors. The paper reviews the challenges faced with the current implementations of autonomous self-driving cars by exploring the machine learning, robotics, and artificial intelligence techniques employed for the development of this innovation. The controversy surrounding the development and deployment of autonomous machines, e.g., vehicles, begs the need for the exploration of the configuration of the programming modules. This paper seeks to add to the body of knowledge of research assisting researchers in decreasing the inconsistencies in current programming modules. Blockchain is a technology of which applications are mostly found within the domains of financial, pharmaceutical, manufacturing, and artificial intelligence. The registering of events in a secured manner as well as applying external algorithms required for the data analytics are especially helpful for integrating, adapting, maintaining, and extending to new domains, especially predictive analytics applications.

Keywords: artificial intelligence, automation, big data, self-driving cars, machine learning, neural networking algorithm, blockchain, business intelligence

Procedia PDF Downloads 113
528 Liquidity and Cash Management Practices of Owner-Managed Firms-A Case of South East, Nigeria

Authors: Ugbor Raphael Oluchukwu

Abstract:

The survey research design was adopted to examine whether liquidity and cash management practices of owner-managed firms in South East Nigeria influence their profitability, growth and survival. Four independent variables (accounting systems, working capital management, budgetary control, and managerial planning) were used in the evaluation which was restricted to eight small firms. Results indicate that one variable, working capital management alone dominate the liquidity perception of owner managers. As a result, owner managers find it difficult to meet maturing business obligations as growth sets in. The study also reveals that the four independent variables have significant impact on the profitability, growth and survival of owner managed firms. Owner managers are therefore advised to undertake regular entrepreneurship training in order to upgrade their liquidity and cash management knowledge and practices to enhance their overall performance.

Keywords: liquidity management, owner-managed firm, profitability, survival

Procedia PDF Downloads 424
527 Using T-Splines to Model Point Clouds from Terrestrial Laser Scanner

Authors: G. Kermarrec, J. Hartmann

Abstract:

Spline surfaces are a major representation of freeform surfaces in the computer-aided graphic industry and were recently introduced in the field of geodesy for processing point clouds from terrestrial laser scanner (TLS). The surface fitting consists of approximating a trustworthy mathematical surface to a large numbered 3D point cloud. The standard B-spline surfaces lack of local refinement due to the tensor-product construction. The consequences are oscillating geometry, particularly in the transition from low-to-high curvature parts for scattered point clouds with missing data. More economic alternatives in terms of parameters on how to handle point clouds with a huge amount of observations are the recently introduced T-splines. As long as the partition of unity is guaranteed, their computational complexity is low, and they are flexible. T-splines are implemented in a commercial package called Rhino, a 3D modeler which is widely used in computer aided design to create and animate NURBS objects. We have applied T-splines surface fitting to terrestrial laser scanner point clouds from a bridge under load and a sheet pile wall with noisy observations. We will highlight their potential for modelling details with high trustworthiness, paving the way for further applications in terms of deformation analysis.

Keywords: deformation analysis, surface modelling, terrestrial laser scanner, T-splines

Procedia PDF Downloads 136
526 A Value-Oriented Metamodel for Small and Medium Enterprises’ Decision Making

Authors: Romain Ben Taleb, Aurélie Montarnal, Matthieu Lauras, Mathieu Dahan, Romain Miclo

Abstract:

To be competitive and sustainable, any company has to maximize its value. However, unlike listed companies that can assess their values based on market shares, most Small and Medium Enterprises (SMEs) which are non-listed cannot have direct and live access to this critical information. Traditional accounting reports only give limited insights to SME decision-makers about the real impact of their day-to-day decisions on the company’s performance and value. Most of the time, an SME’s financial valuation is made one time a year as the associated process is time and resource-consuming, requiring several months and external expertise to be completed. To solve this issue, we propose in this paper a value-oriented metamodel that enables real-time and dynamic assessment of the SME’s value based on the large definition of their assets. These assets cover a wider scope of resources of the company and better account for immaterial assets. The proposal, which is illustrated in a case study, discusses the benefits of incorporating assets in the SME valuation.

Keywords: SME, metamodel, decision support system, financial valuation, assets

Procedia PDF Downloads 86
525 Fair Value Implementation of Financial Asset: Evidence in Indonesia’s Banking Sector

Authors: Alhamdi Alfi Fajri

Abstract:

The purpose of this study is to analyze and to give empirical proof about the effect of fair value implementation on financial asset against information asymmetry in Indonesia’s banking sector. This research tested the effect of fair value implementation on financial asset based on Statement of Financial Accounting Standard (PSAK) No. 55 and the fair value reliability measurement based on PSAK No. 60 against level of information asymmetry. The scope of research is Indonesia’s banking sector. The test’s result shows that the use of fair value based on PSAK No. 55 is significantly associated with information asymmetry. This positive relation is higher than the amortized cost implementation on financial asset. In addition, the fair value hierarchy based on PSAK No. 60 is significantly associated with information asymmetry. This research proves that the more reliable measurement of fair value on financial asset, the more observable fair value measurement and reduces level of information asymmetry.

Keywords: fair value, PSAK No. 55, PSAK No. 60, information asymmetry, bank

Procedia PDF Downloads 340
524 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks

Authors: Yao-Hong Tsai

Abstract:

Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.

Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance

Procedia PDF Downloads 152
523 Minority Students' Attitudes on Preferential Policies for Ethnic Minorities in China: Case Study of an Institute of Education for Ethnic Minorities

Authors: Xiaoxu Liu, Yuwen Chen

Abstract:

In this study, we investigated ethnic minority students’ perception of the implementation of preferential policies in China. Using a mixed methods design, we surveyed 320 students from an institute of education for ethnic minorities and conducted further in-depth interviews with seven respondents. Although interviewees were from 30 ethnic groups, most of them were from mainstream high schools. We found that minority students from preparatory classes have an overall positive attitude towards preferential policies and preparatory class but lack sense of belonging to the university for various reasons. Findings indicate that although preparatory class is regarded as being helpful for minority students’ academic development, there are differences of attitude mainly depending on the high schools they graduated from and their ethnic identities. Our analyses suggest that ethnicity, high school graduated from, hometown and family income are more important than gender, religion, and political affiliation when accounting for their perceptions of the implementation of preferential policies in China.

Keywords: Chinese minority education, higher education, preferential policies, survey analysis

Procedia PDF Downloads 181
522 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access

Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman

Abstract:

Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.

Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)

Procedia PDF Downloads 416
521 Relative Composition of Executive Compensation Packages, Corporate Governance and Financial Reporting Quality

Authors: Philemon Rakoto

Abstract:

Most executive compensation packages consist of four major components: base fixed salary, annual and long-term non-equity incentive plans, share-based and option-based awards and pension value. According to agency theory, the relative composition of executive compensation packages is one of the mechanisms that firms use to align the interests of executives and shareholders in order to mitigate agency costs. This paper tests the effect of the relative composition of executive compensation packages on financial reporting quality. Financial reporting quality is measured by the value relevance of accounting earnings. Corporate governance is a moderating variable in the model. Using data from Canadian firms composing S&P/TSX index of the year 2013 and governance scores based on Board Games, the analysis shows that, only for firms with good governance, there is an optimal level of the proportion of executive equity-based compensation in relation to total compensation that enhances the quality of financial reporting.

Keywords: Canada, corporate governance, executive compensation packages, financial reporting quality

Procedia PDF Downloads 342
520 The Determinants of Voluntary Disclosure in Croatia

Authors: Zeljana Aljinovic Barac, Marina Granic, Tina Vuko

Abstract:

Study investigates the level and extent of voluntary disclosure practice in Croatia. The research was conducted on the sample of 130 medium and large companies. Findings indicate that two thirds of the companies analysed disclose below-average number of additional information. The explanatory analyses has shown that firm size, listing status and industrial sector significantly and positively affect the level and extent of voluntary disclosure in the annual report of Croatian companies. On the other hand, profitability and ownership structure were found statistically insignificant. Unlike previous studies, this paper deals with level of voluntary disclosure of medium and large companies, as well as companies whose shares are not listed on the organized capital market, which can be found as our contribution. Also, the research makes contribution by providing the insights into voluntary disclosure practices in Croatia, as a case of macro-oriented accounting system economy, i.e. bank oriented economy with an emerging capital market.

Keywords: annual report, Croatian companies, disclosure index, voluntary disclosure

Procedia PDF Downloads 323
519 RV-YOLOX: Object Detection on Inland Waterways Based on Optimized YOLOX Through Fusion of Vision and 3+1D Millimeter Wave Radar

Authors: Zixian Zhang, Shanliang Yao, Zile Huang, Zhaodong Wu, Xiaohui Zhu, Yong Yue, Jieming Ma

Abstract:

Unmanned Surface Vehicles (USVs) are valuable due to their ability to perform dangerous and time-consuming tasks on the water. Object detection tasks are significant in these applications. However, inherent challenges, such as the complex distribution of obstacles, reflections from shore structures, water surface fog, etc., hinder the performance of object detection of USVs. To address these problems, this paper provides a fusion method for USVs to effectively detect objects in the inland surface environment, utilizing vision sensors and 3+1D Millimeter-wave radar. MMW radar is complementary to vision sensors, providing robust environmental information. The radar 3D point cloud is transferred to 2D radar pseudo image to unify radar and vision information format by utilizing the point transformer. We propose a multi-source object detection network (RV-YOLOX )based on radar-vision fusion for inland waterways environment. The performance is evaluated on our self-recording waterways dataset. Compared with the YOLOX network, our fusion network significantly improves detection accuracy, especially for objects with bad light conditions.

Keywords: inland waterways, YOLO, sensor fusion, self-attention

Procedia PDF Downloads 105
518 Empowering Certificate Management with Blockchain Technology

Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware

Abstract:

The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.

Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker

Procedia PDF Downloads 41
517 The Valuation of Equity Book Value and Net Income of Financial Firms in Times of Financial Crisis

Authors: Sami Adwan, Alaa Alhaj Ismail, Claudia Girardone

Abstract:

This paper examines the changes in the value relevance of book value of equity and net income of financial firms over the crisis period. It also examines how these changes vary with three variables, namely, fair value exposure, ownership concentration, and regulatory capital ratios. Using a sample of financial firms operating in the European Economic Area over 2005-2011, our findings suggest that the value relevance of book value of equity increases while that of net income decreases during the financial crisis. We find that more exposure to fair value accounting mitigates the impact of the crisis on the value relevance of book value of equity and net income. We also find that more concentrated ownership appears to have a mitigating impact on the changes in the value relevance of both book value of equity and net income in times of financial crisis. Finally, we find evidence that the level of regulatory capital ratios tends to have an attenuating effect on the changes in the value relevance of net income (but not book value of equity) in times of financial crisis.

Keywords: value relevance, financial crisis, financial firms, fair value, ownership concentration, regulatory capital

Procedia PDF Downloads 174
516 A Study on the Relation between Auditor Rotation and Audit Quality in Iranian Firms

Authors: Bita Mashayekhi, Marjan Fayyazi, Parisa Sefati

Abstract:

Audit quality is a popular topic in accounting and auditing research because recent decades’ financial crises reduce the reliability of financial reports to public investors and cause significant doubt about the audit profession. Therefore, doing research to identify effective factors in improving audit quality is necessary for bringing back public investors’ trust to financial statements as well as audit reports. In this study, we explore the relationship between audit rotation and audit quality. For this purpose, we employ the Duff (2009) model of audit quality to measure audit quality and use a questionnaire survey of 27 audit service quality attributes. Our results show that there is a negative relationship between auditor’s rotation and audit quality as we consider the auditor’s reputation, capability, assurance, experience, and responsiveness as surrogates for audit quality. There is no evidence for verifying a same relationship when we use the auditor’s independence and expertise for measuring audit quality.

Keywords: audit quality, auditor’s rotation, reputation, capability, assurance, experience, responsiveness, independence, expertise

Procedia PDF Downloads 224
515 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 42
514 Application of Remote Sensing Technique on the Monitoring of Mine Eco-Environment

Authors: Haidong Li, Weishou Shen, Guoping Lv, Tao Wang

Abstract:

Aiming to overcome the limitation of the application of traditional remote sensing (RS) technique in the mine eco-environmental monitoring, in this paper, we first classified the eco-environmental damages caused by mining activities and then introduced the principle, classification and characteristics of the Light Detection and Ranging (LiDAR) technique. The potentiality of LiDAR technique in the mine eco-environmental monitoring was analyzed, particularly in extracting vertical structure parameters of vegetation, through comparing the feasibility and applicability of traditional RS method and LiDAR technique in monitoring different types of indicators. The application situation of LiDAR technique in extracting typical mine indicators, such as land destruction in mining areas, damage of ecological integrity and natural soil erosion. The result showed that the LiDAR technique has the ability to monitor most of the mine eco-environmental indicators, and exhibited higher accuracy comparing with traditional RS technique, specifically speaking, the applicability of LiDAR technique on each indicator depends on the accuracy requirement of mine eco-environmental monitoring. In the item of large mine, LiDAR three-dimensional point cloud data not only could be used as the complementary data source of optical RS, Airborne/Satellite LiDAR could also fulfill the demand of extracting vertical structure parameters of vegetation in large areas.

Keywords: LiDAR, mine, ecological damage, monitoring, traditional remote sensing technique

Procedia PDF Downloads 391
513 Microplastics in Two Bivalves of The Bay of Bengal Coast, Bangladesh

Authors: Showmitra Chowdhury, M. Shahadat Hossain, S. M. Sharifuzzaman, Sayedur Rahman Chowdhury, Subrata Sarker, M. Shah Nawaz Chowdhury

Abstract:

Microplastics were identified in mussel (Pernaviridis) and Oyster (Crassostrea madrasensis) from the south east coast of Bangladesh. Samples were collected from four sites of the coast based on their availability, and gastrointestinal tracts were assessed following isolation, floatation, filtration, microscopic observation, and polymer identification by micro-Fourier Transformed Infrared Spectroscope (μ-FTIR) for microplastics determination. A total of 1527 microplastics were identified from 130 samples. The amount of microplastics varied from 0.66 to 3.10 microplastics/g and from 3.20 to 27.60 items/individual. Crassostrea madrasensiscontained on average 1.64 items/g and exhibited the highest level of microplastics by weight. Fiber was the most dominant type, accounting for 72% of total microplastics. Polyethylene, polypropylene, polystyrene, polyester, and nylon were the major polymer types. In both species, transparent/ black color and filamentous shape was dominant. The most common size ranges from 0.005 to 0.25mm and accounted for 39% to 67%. The study revealed microplastics pollution is widespread and relatively high in the bivalves of Bangladesh.

Keywords: microplastics, bivalves, mussel, oyster, bay of bengal, Bangladesh

Procedia PDF Downloads 103
512 Evaluation of Rehabilitation in Ischemic Stroke

Authors: Amirmohammad Dahouri

Abstract:

Each year, more than 795,000 individuals in the United States grieve a stroke, and by 2030, it is predictable that 4% of the U.S. people will have had a stroke. Ischemic stroke, accounting for about 80% of all strokes, is one of the main causes of disability. The goal of stroke rehabilitation is to help patients return to physical and mental functions and relearn the required aids to living everyday life. This flagging has an adverse effect on patients’ quality of life and affects their daily living activities. In recent years, the rehabilitation of ischemic stroke attractions more attention in the world. A review of the rudimentary perceptions of stroke rehabilitation that are price stressing to all specialists who delicacy patients with stroke. Ideas are made for patients on how to functionally manage daily activities after they have qualified for a stroke. It is vital for home healthcare clinicians to understand the process from acute events to medical equilibrium and rehabilitation to adaptation. Different sources such as Pub Med Google Scholar and science direct have been used and various contemporary articles in this era have been analyzed. The care plan must also foundation actual actions to protect against recurrent stroke, as stroke patients are generally at significant risk for further ischemic or hemorrhagic attacks. Here, we review evidence of rehabilitation in treating post-stroke impairment.

Keywords: rehabilitation, stroke, ischemic, hemorrhagic, brain

Procedia PDF Downloads 155
511 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 253
510 The Potential and Economic Viability Analysis of Grid-Connected Solar PV Power in Kenya

Authors: Remember Samu, Kathy Kiema, Murat Fahrioglu

Abstract:

This present study is aimed at minimizing the dependence on fossil fuels thus reducing greenhouse gas (GHG) emissions and also to curb for the rising energy demands in Kenya. In this analysis, 35 locations were each considered for their techno-economic potential of installation of a 10MW grid-connected PV plant. The sites are scattered across the country but are mostly concentrated in the eastern region and were selected based on their accessibility to the national grid and availability of their meteorological parameters from NASA Solar Energy Dataset. RETScreen software 4.0 version will be employed for the analysis in this present paper. The capacity factor, simple payback, equity payback, the net present value (NPV), annual life cycle savings, energy production cost, net annual greenhouse gas emission reduction and the equivalent barrels of crude oil not consumed are outlined. Energy accounting is performed and compared to the existing grid tariff for an effective feasibility argument of this 10MW grid-connected PV power system.

Keywords: photovoltaics, project viability analysis, PV module, renewable energy

Procedia PDF Downloads 308
509 Banking and Accounting Analysis Researches Effect on Environment and Income

Authors: Gerges Samaan Henin Abdalla

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 47
508 Scenario-Based Analysis of Electric Vehicle Penetration in Road Transportation in Laos

Authors: Bouneua Khamphilavanh, Toshihiko Masui

Abstract:

The penetration of EV (electric vehicle) technology in Lao road transportation, in this study, was analyzed by using the AIM/CGE [Laos] model. The computable general equilibrium (CGE) model was developed by the Asia-Pacific Integrated Model (AIM) team. In line with the increase of the number of road vehicles, the energy demand in the transport sector has been gradually increased which resulted in a large amount of budget spent for importing fossil fuels during the last decade, and a high carbon dioxide emission from the transport sector, hence the aim of this research is to analyze the impact of EVs penetration on economic and CO₂ emission in short-term, middle-term, and long-term. By the year 2050, the expected gross domestic product (GDP) value, due to Laos will spend more budget for importing the EV, will be gradually lost up to one percent. The cumulative CO₂ emission from 2020 to 2050 in BAU case will be 12,000 GgCO₂eq, and those in the EV mitigation case will be 9,300 GgCO₂eq, which accounting for likely 77% cumulative CO₂ emission reduction in the road transport sector by introducing the EV technology.

Keywords: GDP, CO₂ mitigation, CGE model, EV technology, transport

Procedia PDF Downloads 269
507 Efficient GIS Based Public Health System for Disease Prevention

Authors: K. M. G. T. R. Waidyarathna, S. M. Vidanagamachchi

Abstract:

Public Health System exists in Sri Lanka has a satisfactory complete information flow when compared to other systems in developing countries. The availability of a good health information system contributed immensely to achieve health indices that are in line with the developed countries like US and UK. The health information flow at the moment is completely paper based. In Sri Lanka, the fields like banking, accounting and engineering have incorporated information and communication technology to the same extent that can be observed in any other country. The field of medicine has behind those fields throughout the world mainly due to its complexity, issues like privacy, confidentially and lack of people with knowledge in both fields of Information Technology (IT) and Medicine. Sri Lanka’s situation is much worse and the gap is rapidly increasing with huge IT initiatives by private-public partnerships in all other countries. The major goal of the framework is to support minimizing the spreading diseases. To achieve that a web based framework should be implemented for this application domain with web mapping. The aim of this GIS based public health system is a secure, flexible, easy to maintain environment for creating and maintaining public health records and easy to interact with relevant parties.

Keywords: DHIS2, GIS, public health, Sri Lanka

Procedia PDF Downloads 558
506 Performance Evaluation of Pilot Rotating Biological Contactor for Decentralised Management of Domestic Sewage in Delhi

Authors: T. R. Sreekrishnan, Mukesh Khare, Dinesh Upadhyay

Abstract:

In a Rotating Biological Contactor (RBC), the biological film responsible for removal of pollutants is formed on the surface of discs. Evaluation studies of a pilot RBC designed to treat sewage of 150 persons with BOD Loading Rate: 8.2–26.7 g/m2/d, Discharge: 57.6 – 115.2 m3/day, HRT 1.25 – 2.5 hrs, at STP Yamuna Vihar Delhi. Removal of organic materials through use of fixed film reactors such as RBC is accomplished by means of a biological film on the fixed media. May and June in Delhi are dry summer months where the ambient temperature is in the range of 35oC to 45oC. July is a wet monsoon month that receives occasional precipitation, cloud cover, high humidity, with ambient temperature in the range of 30oC to 35oC. The organic and inorganic loads to the RBC employed in this study are actual city sewage conditions. Average in fluent BOD concentrations have been 330 mg/l, 245 mg/l and 160 mg/l and the average COD concentrations have been 670 mg/l, 500 mg/l, and 275 mg/l. The city sewage also has high concentration of ammonia, phosphorous, total suspended solids (TSS). pH of the city sewage is near neutral. Overall, the substrate conditions of city sewage are conducive for biological treatment though aerobic process. The presentation is a part of the ongoing collaborative research initiative between IIT Delhi and Karlsruhe Institute of Technology, Germany which is going on for last 15 years or so in the treatment of sewage waste of Delhi using semi-decentralized treatment system based on Rotating Biological Contactor.

Keywords: Rotating Biological Contactor (RBC), COD, BOD, HRT, STP

Procedia PDF Downloads 383
505 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures

Authors: Silvina Caíno-Lores, Jesús Carretero

Abstract:

Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.

Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing

Procedia PDF Downloads 254
504 2D Surface Flow Model in The Biebrza Floodplain

Authors: Dorota Miroslaw-Swiatek, Mateusz Grygoruk, Sylwia Szporak

Abstract:

We applied a two-dimensional surface water flow model with irregular wet boundaries. In this model, flow equations are in the form of a 2-D, non-linear diffusion equations which allows to account spatial variations in flow resistance and topography. Calculation domain to simulate the flow pattern in the floodplain is congruent with a Digital Elevation Model (DEM) grid. The rate and direction of sheet flow in wetlands is affected by vegetation type and density, therefore the developed model take into account spatial distribution vegetation resistance to the water flow. The model was tested in a part of the Biebrza Valley, of an outstanding heterogeneity in the elevation and flow resistance distributions due to various ecohydrological conditions and management measures. In our approach we used the highest-possible quality of the DEM in order to obtain hydraulic slopes and vegetation distribution parameters for the modelling. The DEM was created from the cloud of points measured in the LiDAR technology. The LiDAR reflects both the land surface as well as all objects on top of it such as vegetation. Depending on the density of vegetation cover the ability of laser penetration is variable. Therefore to obtain accurate land surface model the “vegetation effect” was corrected using data collected in the field (mostly the vegetation height) and satellite imagery such as Ikonos (to distinguish different vegetation types of the floodplain and represent them spatially). Model simulation was performed for the spring thaw flood in 2009.

Keywords: floodplain flow, Biebrza valley, model simulation, 2D surface flow model

Procedia PDF Downloads 494
503 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things

Authors: Wei Hu, Wenguang Chen, Chong Dong

Abstract:

In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.

Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management

Procedia PDF Downloads 118
502 Rhetorical Features of Research Article Abstracts of Non-Native English-Speaking Novice Student Researchers

Authors: Rita Darmayanti

Abstract:

This study aims at investigating the discourse pattern and structure of research article abstracts. The characteristics of the language used in abstracts written by non-native English-speaking (NNES) novice researchers are mainly examined in terms of rhetorical moves and the degree of variability of the rhetorical features as indicated by the structure of clauses and the linguistic features of the text. To this end, 20 abstracts written by undergraduate students of the accounting department at the State Polytechnic of Malang in 2018-2019 were employed as the data of this study. Findings showed that the most frequently used pattern of the rhetorical move is I(Introduction)-P(Purpose)-M(Method)-Pr(Product or Result)-C(Conclusion) with the significant use of active sentence and present and past tense. The findings of the study are projected to be utilized for evaluating the quality of students’ abstracts and generating a pedagogical proposal of ESP writing course or at least providing a critical review of current practices in ESP program intended for non-native English students at tertiary level.

Keywords: rhetorical features, rhetorical moves, non-native English-speaking novice researchers, research abstract

Procedia PDF Downloads 124