Search results for: implement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1547

Search results for: implement

767 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 472
766 Thermo-Economic Analysis of a Natural Draft Direct Cooling System for a Molten Salt Power Tower

Authors: Huiqiang Yang, Domingo Santana

Abstract:

Reducing parasitic power consumption of concentrating solar power plants is the main challenge to increase the overall efficiency, particularly for molten salt tower technology. One of the most effective approaches to reduce the parasitic power consumption is to implement a natural draft dry cooling system instead of the standard utilized mechanical draft dry cooling system. In this paper, a thermo-economic analysis of a natural draft direct cooling system was performed based on a 100MWe commercial scale molten salt power plant. In this configuration with a natural draft direct cooling system, the exhaust steam from steam turbine flows directly to the heat exchanger bundles inside the natural draft dry cooling tower, which eliminates the power consumption of circulation pumps or fans, although the cooling tower shadows a portion of the heliostat field. The simulation results also show that compared to a mechanical draft cooling system the annual solar field efficiency is decreased by about 0.2% due to the shadow, which is equal to a reduction of approximately 13% of the solar field area. As a contrast, reducing the solar field size by 13% in purpose in a molten salt power plant with a natural draft drying cooling system actually will lead to a reduction of levelized cost of electricity (LCOE) by about 4.06% without interfering the power generated.

Keywords: molten salt power tower, natural draft dry cooling, parasitic power consumption, commercial scale

Procedia PDF Downloads 154
765 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 84
764 The Economic Impact of the Elimination of Preferential Trade Arrangements in the Organization of the Eastern Caribbean States

Authors: Natasha Lalla

Abstract:

The impact of free trade on growth has been highly debated and studies have generated varying results. Since the 1970s the Caribbean has engaged in asymmetrical trade with some European states characterized by the Lomé Conventions (1975-1999). These agreements allowed for Caribbean products such as sugar and banana to enter some European countries duty-free and above market prices. With the onset of the World Trade Organization by the mid-1990s, the EU’s banana trade regime was considered illegitimate. Lomé was replaced by the Cotonou agreement (2000-2007), in order to phase out preferences and ensure that the Caribbean trade arrangements were consistent with the international economic environment of trade liberalization. This agreement facilitated signing of the Economic Partnership Agreement in 2008 by both trade blocs whereby Caribbean states must implement freer trade by 2033. The current study is an exploration of how the Organization of the Eastern Caribbean States, the smallest, economically and ecologically vulnerable states of the Caribbean have restructured their trade policies towards the end of preferences and what has been the economic developmental impact of this. This is done by analyzing key reports to understand how these states restructured policies towards freer trade. Secondly, to determine the impact of this, data collected for specific economic indicators were analyzed in a fixed effects panel data framework for the period 1979-2016 on six states of the Organization of the Eastern Caribbean States. The study, therefore, found that freer trade has resulted in negative growth in these states.

Keywords: free trade, growth, OECS, small island developing states

Procedia PDF Downloads 174
763 The Effects of Prolonged Social Media Use on Student Health: A Focus on Computer Vision Syndrome, Hand Pain, and Headaches and Mental Status

Authors: Augustine Ndudi Egere, Shehu Adamu, Esther Ishaya Solomon

Abstract:

As internet accessibility and smartphones continue to increase in Nigeria, Africa’s most populous country, social media platforms have become ubiquitous, causing students of 18-25 age brackets to spend more time on social media. The research investigated the impact of prolonged social media use on the physical health of students, with a specific focus on computer vision syndrome, hand pain, headaches and mental status. The study adopted a mixed-methods approach combining quantitative surveys to gather statistical data on usage patterns and symptoms, along with qualitative interviews into the experiences and perceptions of medical practitioners concerning cases under study within the geopolitical region. The result was analyzed using Regression analysis. It was observed that there is a significant correlation between social media usage by the students in the study age bracket concerning computer vision syndrome, hand pain, headache and general mental status. The research concluded by providing valuable insights into potential interventions and strategies to mitigate the adverse effects of excessive social media use on student well-being and recommends, among others, that educational institutions, parents, and students themselves collaborate to implement strategies aimed at promoting responsible and balanced use of social media.

Keywords: social media, student health, computer vision syndrome, hand pain, headaches, mental staus

Procedia PDF Downloads 34
762 Using Risk Management Indicators in Decision Tree Analysis

Authors: Adel Ali Elshaibani

Abstract:

Risk management indicators augment the reporting infrastructure, particularly for the board and senior management, to identify, monitor, and manage risks. This enhancement facilitates improved decision-making throughout the banking organization. Decision tree analysis is a tool that visually outlines potential outcomes, costs, and consequences of complex decisions. It is particularly beneficial for analyzing quantitative data and making decisions based on numerical values. By calculating the expected value of each outcome, decision tree analysis can help assess the best course of action. In the context of banking, decision tree analysis can assist lenders in evaluating a customer’s creditworthiness, thereby preventing losses. However, applying these tools in developing countries may face several limitations, such as data availability, lack of technological infrastructure and resources, lack of skilled professionals, cultural factors, and cost. Moreover, decision trees can create overly complex models that do not generalize well to new data, known as overfitting. They can also be sensitive to small changes in the data, which can result in different tree structures and can become computationally expensive when dealing with large datasets. In conclusion, while risk management indicators and decision tree analysis are beneficial for decision-making in banks, their effectiveness is contingent upon how they are implemented and utilized by the board of directors, especially in the context of developing countries. It’s important to consider these limitations when planning to implement these tools in developing countries.

Keywords: risk management indicators, decision tree analysis, developing countries, board of directors, bank performance, risk management strategy, banking institutions

Procedia PDF Downloads 47
761 Exploring Factors Associated with Substance Use among Pregnant Women in a Cape Town Community

Authors: Mutshinye Manguvhewa, Maria Florence, Mansoo Yu, Elize Koch, Kamal Kamaloodien

Abstract:

Substance use among pregnant women is a perennial problem in the Western Cape Province of South Africa. There are many influential factors are associated with substance use among women of childbearing age. The study explored factors associated with substance use among pregnant women using a qualitative research design and the bio-ecological theoretical framework to explore and guide the researcher throughout the study. Participants were selected using purposive sampling. Only participants accessed from the Department of Social Development meeting the inclusion criteria of the study were interviewed using semi structured interviews. Immediate referral for psychological intervention during the interview was available for participants who needed it. Braun and Clarke's six phases of thematic analysis were utilised to analyse the data. The study adheres to ethical guidelines for the participants' protection. Participants were informed about the study before the initiation of the interviews and the details of their voluntary participation were explained. The key findings from this study illustrate that socio-cultural factors, personal factors, emotional response and intimate relationships are the major contributing factors to substance use among pregnant women in this sample. The results outline the preventative measures that pregnant women implement. Lastly, the study reveals the positive and negative perceptions of substance use programmes that participants share. Some of the study findings are similar to the existing literature and some of the findings differed. Recommendations emanating from the study include that the stakeholders, rehabilitation centres, Department of Health and future researchers should act proactively against substance use during pregnancy.

Keywords: substance addiction, antenatal care, pregnancy, substance use

Procedia PDF Downloads 113
760 Mechanical and Biodegradability of Porous Poly-ε-Caprolactone/Polyethylene Glycol Copolymer-Reinforced Cellulose Nanofibers for Soft Tissue Engineering Applications

Authors: Mustafa Abu Ghalia, Mohammed Seddik

Abstract:

The design and development of a new class of biomaterial has gained particular interest in producing polymer scaffold for biomedical applications. Improving mechanical properties, biological and controlling pores scaffold are important factors to provide appropriate biomaterial for implement in soft tissue repair and regeneration. In this study, poly-ε-caprolactone (PCL) /polyethylene glycol (PEG) copolymer (80/20) incorporated with CNF scaffolds were made employing solvent casting and particulate leaching methods. Four mass percentages of CNF (1, 2.5, 5, and 10 wt.%) were integrated into the copolymer through a silane coupling agent. Mechanical properties were determined using Tensile Tester data acquisition to investigate the effect of porosity, pore size, and CNF contents. Tensile strength obtained for PCL/PEG- 5 wt.% CNF was 16 MPa, which drastically decreased after creating a porous structure to 7.1 MPa. The optimum parameters of the results were found to be 5 wt.% for CNF, 240 μm for pore size, and 83% for porosity. Scanning electron microscopy (SEM) micrograph reveals that consistent pore size and regular pore shape were accomplished after the addition of CNF-5 wt. % into PCL/PEG. The results of mass loss of PCL/PEG reinforced-CNF 1% have clearly enhanced to double values compared with PCL/PEG copolymer and three times with PCL/PEG scaffold-CNF 1%. In addition, all PCL/PEG reinforced and scaffold- CNF were partially disintegrated under composting conditions confirming their biodegradable behavior. This also provides a possible solution for the end life of these biomaterials.

Keywords: PCL/PEG, cellulose nanofibers, tissue engineering, biodegradation, compost polymers

Procedia PDF Downloads 49
759 Setting the Baseline for a Sentinel System for the Identification of Occupational Risk Factors in Africa

Authors: Menouni Aziza, Chbihi Kaoutar, Duca Radu Corneliu, Gilissen Liesbeth, Bounou Salim, Godderis Lode, El Jaafari Samir

Abstract:

In Africa, environmental and occupational health risks are mostly underreported. The aim of this research is to develop and implement a sentinel surveillance system comprising training and guidance of occupational physicians (OC) who will report new work-related diseases in African countries. A group of 30 OC are recruited and trained in each of the partner countries (Morocco, Benin and Ethiopia). Each committed OC is asked to recruit 50 workers during a consultation in a time-frame of 6 months (1500 workers per country). Workers are asked to fill out an online questionnaire about their health status and work conditions, including exposure to 20 chemicals. Urine and blood samples are then collected for human biomonitoring of common exposures. Some preliminary results showed that 92% of the employees surveyed are exposed to physical constraints, 44% to chemical agents, and 24% to biological agents. The most common physical constraints are manual handling of loads, noise pollution and thermal pollution. The most frequent chemical risks are exposure to pesticides and fuels. This project will allow a better understanding of effective sentinel systems as a promising method to gather high quality data, which can support policy-making in terms of preventing emerging work-related diseases.

Keywords: sentinel system, occupational diseases, human biomonitoring, Africa

Procedia PDF Downloads 73
758 The Need for a Consistent Regulatory Framework for CRISPR Gene-Editing in the European Union

Authors: Andrew Thayer, Courtney Rondeau, Paraskevi Papadopoulou

Abstract:

The Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) gene-editing technologies have generated considerable discussion about the applications and ethics of their use. However, no consistent guidelines for using CRISPR technologies have been developed -nor common legislation passed related to gene editing, especially as it is connected to genetically modified organisms (GMOs) in the European Union. The recent announcement that the first babies with CRISPR-edited genes were born, along with new studies exploring CRISPR’s applications in treating thalassemia, sickle-cell anemia, cancer, and certain forms of blindness, have demonstrated that the technology is developing faster than the policies needed to control it. Therefore, it can be seen that a reasonable and coherent regulatory framework for the use of CRISPR in human somatic and germline cells is necessary to ensure the ethical use of the technology in future years. The European Union serves as a unique region of interconnected countries without a standard set of regulations or legislation for CRISPR gene-editing. We posit that the EU would serve as a suitable model in comparing the legislations of its affiliated countries in order to understand the practicality and effectiveness of adopting majority-approved practices. Additionally, we present a proposed set of guidelines which could serve as a basis in developing a consistent regulatory framework for the EU countries to implement but also act as a good example for other countries to adhere to. Finally, an additional, multidimensional framework of smart solutions is proposed with which all stakeholders are engaged to become better-informed citizens.

Keywords: CRISPR, ethics, regulatory framework, European legislation

Procedia PDF Downloads 126
757 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments

Authors: Katja Wiedemann, Melinda Gainschnigg

Abstract:

This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.

Keywords: employment issues, gender inequality , women's studies, workplace

Procedia PDF Downloads 232
756 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program

Authors: Chrysanthi Nega, Fotini-Sonia Apergi

Abstract:

Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.

Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling

Procedia PDF Downloads 307
755 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 275
754 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 330
753 Heat: A Healthy Eating Programme

Authors: Osagbai Joshua Eriki, Ngozi Agunwamba, Alice Hill, Lorna Almond, Maniya Duffy, Devashini Naidoo, David Ho, Raman Deo

Abstract:

Aims: To evaluate the baseline eating pattern in a psychiatric hospital through quantifying purchases of food and drink items at the hospital shop and to implement a traffic light healthy eating labeling system. Method: A electronic till with reporting capabilities was purchased. A two-week period of baseline data collection was conducted. Thereafter, a system for labeling items based on the nutritional value of the food items at the hospital shop was implemented. Green labeling represented the items with the lowest calories and red the most. Further data was collated on the number and types of items purchased by patients according to the category, and the initial effectiveness of the system was evaluated. Result: Despite the implementation of the traffic light system, the red category had the highest number of items purchased by patients, highlighting the importance of promoting healthy eating choices. However, the study also showed that the system was effective in promoting healthy options, as the number of items purchased from the green category increased during the study period. Conclusion: The implementation of a traffic light labeling system for items sold at the hospital shop offers a promising approach to promoting healthy eating habits and choices. This is likely to contribute to a toolkit of measures when considering the multifactorial challenges that obesity and weight issues pose for long-stay psychiatric inpatients

Keywords: mental health, nutrition, food, healthy

Procedia PDF Downloads 90
752 Variability of the Snowline Altitude at Different Region in the Eastern Tibetan Plateau in Recent 20 Years

Authors: Zhen Li, Chang Liu, Ping Zhang

Abstract:

These Glaciers are thought of as natural water reservoirs and are of vital importance to hydrological models and industrial production, and glacial changes act as significant indicators of climate change. The glacier snowline can be used as an indicator of the equilibrium line, which may be a key parameter to study the effect of climate change on glaciers. Using Google Earth Engine, we select optical satellite imageries and implement the Otsu thresholding method on a near-infrared band to detect snowline altitudes (SLAs) of 26 glaciers in three regions of the eastern Tibetan Plateau. Three different study regions in the eastern Tibetan Plateau have different climate regimes, which are Sepu Kangri (SK, maritime glacier), Bu’Gyai Kangri (BK, continental glacier) and west of Qiajajima (WQ, continental glacier), along a latitudinal transect from south to north. We analyzed the effects of climatic factors on the SLA changes from 1995 to 2016. SLAs are fluctuating upward, and the rising values are 100 m, 60 m, and 34 m from south to north during the 22 years. We also observed that the climatic factor that affects the variability of SLA gradually changes from precipitation to temperature from south to north. The northern continental glaciers are mainly affected by temperature, and the southern maritime glaciers affected by precipitation. Owing to the influence of primary climatic factors, continental glaciers are found to have higher SLAs on the south slope, while maritime glaciers have higher SLAs on the north slope.

Keywords: climate change, glacier, snowline altitude, tibetan plateau

Procedia PDF Downloads 145
751 Efficacy of Remote Sensing Application in Monitoring the Effectiveness of Afforestation Project in Northern Nigeria

Authors: T. Garba, Y. Y. Babanyara, K. G. Ilellah, M. A. Modibbo, T. O. Quddus, M. J. Sani

Abstract:

After the United Nation Convention on Desertification (UNCD) in 1977 which was preceded by extensive, regional, and local studies, and consultations with numerous scientists, decision-makers, and relevant institutions. Global Plan of Action to Combat Desertification (PACD) was formulated, endorsed by member Countries. The role of implementing PACD was vested with Governments of countries affected by desertification. The Federal Government of Nigeria as a signatory and World Bank funded and implement afforestation project aimed at combating desertification between 1988 and 1999. This research, therefore, applied remote sensing techniques to assess the effectiveness of the project. To achieve that a small portion of about 143,609 hectares was curved out from the project area. Normalized Difference of the Vegetative Index (NDVI) and Land Use Land Cover were derived from Landsat TM 1986, Landsat ETM 1999 and Nigeria Sat 1, 2007 of the project area. The findings show that there was an increase in cultivated area due to the project from 1986 through 1999 and 2007. This is further buttressed by the three NDVI imageries due to their high positive pixel value from 0.04 in 1986 to 0.22 in 1999 and to 0.32 in 2007 These signifies the gradual physical development of Afforestation project in the area. In addition, it was also verified by histograms of changes in vegetation which indicated an increased vegetative cover from 60,192 in 1986, to 102,476 in 1999 and then to 88,343 in 2007. The study concluded that Remote Sensing approach has actually confirmed that the project was indeed successful and effective.

Keywords: afforestation, desertification, landsat, vegetative index, remote sensing

Procedia PDF Downloads 307
750 Work in the Industry of the Future-Investigations of Human-Machine Interactions

Authors: S. Schröder, P. Ennen, T. Langer, S. Müller, M. Shehadeh, M. Haberstroh, F. Hees

Abstract:

Since a bit over a year ago, Festo AG and Co. KG, Festo Didactic SE, robomotion GmbH, the researchers of the Cybernetics-Lab IMA/ZLW and IfU, as well as the Human-Computer Interaction Center at the RWTH Aachen University, have been working together in the focal point of assembly competences to realize different scenarios in the field of human-machine interaction (HMI). In the framework of project ARIZ, questions concerning the future of production within the fourth industrial revolution are dealt with. There are many perspectives of human-robot collaboration that consist Industry 4.0 on an individual, organization and enterprise level, and these will be addressed in ARIZ. The aim of the ARIZ projects is to link AI-Approaches to assembly problems and to implement them as prototypes in demonstrators. To do so, island and flow based production scenarios will be simulated and realized as prototypes. These prototypes will serve as applications of flexible robotics as well as AI-based planning and control of production process. Using the demonstrators, human interaction strategies will be examined with an information system on one hand, and a robotic system on the other. During the tests, prototypes of workspaces that illustrate prospective production work forms will be represented. The human being will remain a central element in future productions and will increasingly be in charge of managerial tasks. Questions thus arise within the overall perspective, primarily concerning the role of humans within these technological revolutions, as well as their ability to act and design respectively to the acceptance of such systems. Roles, such as the 'Trainer' of intelligent systems may become a possibility in such assembly scenarios.

Keywords: human-machine interaction, information technology, island based production, assembly competences

Procedia PDF Downloads 191
749 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 288
748 A Prediction Model Using the Price Cyclicality Function Optimized for Algorithmic Trading in Financial Market

Authors: Cristian Păuna

Abstract:

After the widespread release of electronic trading, automated trading systems have become a significant part of the business intelligence system of any modern financial investment company. An important part of the trades is made completely automatically today by computers using mathematical algorithms. The trading decisions are taken almost instantly by logical models and the orders are sent by low-latency automatic systems. This paper will present a real-time price prediction methodology designed especially for algorithmic trading. Based on the price cyclicality function, the methodology revealed will generate price cyclicality bands to predict the optimal levels for the entries and exits. In order to automate the trading decisions, the cyclicality bands will generate automated trading signals. We have found that the model can be used with good results to predict the changes in market behavior. Using these predictions, the model can automatically adapt the trading signals in real-time to maximize the trading results. The paper will reveal the methodology to optimize and implement this model in automated trading systems. After tests, it is proved that this methodology can be applied with good efficiency in different timeframes. Real trading results will be also displayed and analyzed in order to qualify the methodology and to compare it with other models. As a conclusion, it was found that the price prediction model using the price cyclicality function is a reliable trading methodology for algorithmic trading in the financial market.

Keywords: algorithmic trading, automated trading systems, financial markets, high-frequency trading, price prediction

Procedia PDF Downloads 172
747 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia

Authors: Kakha Nadiardze, Nana Phirosmanashvili

Abstract:

The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.

Keywords: food safety, GMO, LMO, E. coli, quality

Procedia PDF Downloads 494
746 The Network Relative Model Accuracy (NeRMA) Score: A Method to Quantify the Accuracy of Prediction Models in a Concurrent External Validation

Authors: Carl van Walraven, Meltem Tuna

Abstract:

Background: Network meta-analysis (NMA) quantifies the relative efficacy of 3 or more interventions from studies containing a subgroup of interventions. This study applied the analytical approach of NMA to quantify the relative accuracy of prediction models with distinct inclusion criteria that are evaluated on a common population (‘concurrent external validation’). Methods: We simulated binary events in 5000 patients using a known risk function. We biased the risk function and modified its precision by pre-specified amounts to create 15 prediction models with varying accuracy and distinct patient applicability. Prediction model accuracy was measured using the Scaled Brier Score (SBS). Overall prediction model accuracy was measured using fixed-effects methods that accounted for model applicability patterns. Prediction model accuracy was summarized as the Network Relative Model Accuracy (NeRMA) Score which ranges from -∞ through 0 (accuracy of random guessing) to 1 (accuracy of most accurate model in concurrent external validation). Results: The unbiased prediction model had the highest SBS. The NeRMA score correctly ranked all simulated prediction models by the extent of bias from the known risk function. A SAS macro and R-function was created to implement the NeRMA Score. Conclusions: The NeRMA Score makes it possible to quantify the accuracy of binomial prediction models having distinct inclusion criteria in a concurrent external validation.

Keywords: prediction model accuracy, scaled brier score, fixed effects methods, concurrent external validation

Procedia PDF Downloads 219
745 Transforming ESL Teaching and Learning with ICT

Authors: Helena Sit

Abstract:

Developing skills in using ICT in the language classroom has been discussed at all educational levels. Digital tools and learning management systems enable teachers to transform their instructional activities while giving learners the opportunity to engage with virtual communities. In the field of English as a second language (ESL) teaching and learning, the use of technology-enhanced learning and diverse pedagogical practices continues to grow. Whilst technology and multimodal learning is a way of the future for education, second language teachers now face the predicament as to whether implementing these newer ways of learning is, in fact, beneficial or disadvantageous to learners. Research has shown that integrating multimodality and technology can improve students’ engagement and participation in their English language learning. However, students can experience anxiety or misunderstanding when engaging with E-learning or digital-mediated learning. This paper aims to explore how ESL teaching and learning are transformed via the use of educational technology and what impact it has had on student teachers. Case study is employed in this research. The study reviews the growing presence of technology and multimodality in university language classrooms, discusses their impact on teachers’ pedagogical practices, and proposes scaffolding strategies to help design effective English language courses in the Australian education context. The study sheds light on how pedagogical integration today may offer a way forward for language teachers of tomorrow and provides implications to implement an evidence-informed approach that blends knowledge from research, practice and people experiencing the practice in the digital era.

Keywords: educational technology, ICT in higher education, curriculum design and innovation, teacher education, multiliteracies pedagogy

Procedia PDF Downloads 66
744 The Impact of Equine-Assisted Therapy on Occupational Engagement for Children with Intellectual and/or Developmental Disabilities: From the Perspectives of the Children and Their Caregivers

Authors: Morgan Dempsey, Sam Lewis, Maggie Pierce, Alex Goodman

Abstract:

This research investigates the impact of equine-assisted therapy programs on occupational engagement for children with intellectual and developmental disabilities. There is a general lack of evidence for equine-based services for this population, so this research aims to decrease gaps in the current literature. To gain comprehensive insight, data will be collected from both the child and their caregiver. This study takes a qualitative approach utilizing online surveys and in-person guided interviews. The participants are individuals ages 4-17 with a diagnosed intellectual or developmental disability who are currently participating in a PATH int. certified equine-assisted therapy program. Also, caregivers of individuals who meet this criterion are included. This study decreases gaps in the literature by providing comprehensive data regarding the impacts of these services on occupational engagement. The addressed domains are physical, behavioral, emotional, and social functioning, as well as overall activity engagement and impacts in everyday life. With a better understanding of how equine-assisted therapy affects relevant outcomes for children with disabilities, an increased number of occupational therapists can implement these uniquely effective services while adhering to standards of evidence-based practice. Ultimately, this research strives to contribute to generalizable data in occupational therapy by supporting the implementation of equine-assisted services for children with intellectual and/or developmental disabilities and their caregivers/families.

Keywords: occupational therapy, pediatric, rehabilitation, hippotherapy

Procedia PDF Downloads 23
743 Reimagine and Redesign: Augmented Reality Digital Technologies and 21st Century Education

Authors: Jasmin Cowin

Abstract:

Augmented reality digital technologies, big data, and the need for a teacher workforce able to meet the demands of a knowledge-based society are poised to lead to major changes in the field of education. This paper explores applications and educational use cases of augmented reality digital technologies for educational organizations during the Fourth Industrial Revolution. The Fourth Industrial Revolution requires vision, flexibility, and innovative educational conduits by governments and educational institutions to remain competitive in a global economy. Educational organizations will need to focus on teaching in and for a digital age to continue offering academic knowledge relevant to 21st-century markets and changing labor force needs. Implementation of contemporary disciplines will need to be embodied through learners’ active knowledge-making experiences while embracing ubiquitous accessibility. The power of distributed ledger technology promises major streamlining for educational record-keeping, degree conferrals, and authenticity guarantees. Augmented reality digital technologies hold the potential to restructure educational philosophies and their underpinning pedagogies thereby transforming modes of delivery. Structural changes in education and governmental planning are already increasing through intelligent systems and big data. Reimagining and redesigning education on a broad scale is required to plan and implement governmental and institutional changes to harness innovative technologies while moving away from the big schooling machine.

Keywords: fourth industrial revolution, artificial intelligence, big data, education, augmented reality digital technologies, distributed ledger technology

Procedia PDF Downloads 267
742 Experimental Characterization of Anti-Icing System and Accretion of Re-Emitted Droplets on Turbojet Engine Blades

Authors: Guillaume Linassier, Morgan Balland, Hugo Pervier, Marie Pervier, David Hammond

Abstract:

Atmospheric icing for turbojet is caused by ingestion of super-cooled water droplets. To prevent operability risks, manufacturer can implement ice protection systems. Thermal systems are commonly used for this purpose, but their activation can cause the formation of a water liquid film, that can freeze downstream the heated surface or even on other components. In the framework of STORM, a European project dedicated to icing physics in turbojet engines, a cascade rig representative of engine inlet blades was built and tested in an icing wind tunnel. This mock-up integrates two rows of blades, the upstream one being anti-iced using an electro-thermal device the downstream one being unheated. Under icing conditions, the anti-icing system is activated and set at power level to observe a liquid film on the surface and droplet re-emission at the trailing edge. These re-emitted droplets will impinge on the downstream row and contribute to ice accretion. A complete experimental database was generated, including the characterization of ice accretion shapes, and the characterization of electro-thermal anti-icing system (power limit for apparition of the runback water or ice accretion). These data will be used for validation of numerical tools for modeling thermal anti-icing systems in the scope of engine application, as well as validation of re-emission droplets model for stator parts.

Keywords: turbomachine, anti-icing, cascade rig, runback water

Procedia PDF Downloads 175
741 Present and Future of Micromobility in the City of Medellin

Authors: Saul Emilio Rivero Mejia, Estefanya Marin Tabares, Carlos Andres Rodriguez Toro, Katherine Bolano Restrepo, Sarita Santa Cortes

Abstract:

Medellin is the Colombian city with the best public transportation system in the country, which is composed of two subway lines, five metro cables, two Bus Rapid Transit lines, and a streetcar. But despite the above, the Aburra Valley, the area in which the city is located, comparatively speaking, has a lower number of urban roads per inhabitant built, compared to the national average. In addition, since there is approximately one vehicle for every three inhabitants in Medellin, the problems of congestion and environmental pollution have become more acute over the years, and it has even been necessary to implement restrictive measures to the use of private vehicles on a permanent basis. In that sense, due to the limitations of physical space, the low public investment in road infrastructure, it is necessary to opt for mobility alternatives according to the above. Within the options for the city, there is what is known as micromobility. Micromobility is understood as those small and light means of transport used to travel short distances, which use electrical energy, such as skateboards and bicycles. These transport alternatives have a high potential for use by the city's young population, but this requires an adequate infrastructure and also state regulation. Taking into account the above, this paper will analyze the current state and future of micro mobility in the city of Medellin, making a prospective analysis, supported by a PEST (political, economic, social and technological) analysis. Based on the above, it is expected to identify the growth of demand for these alternative means and its impact on the mobility of the city in the medium and short term.

Keywords: electric, micromobility, transport, sustainable

Procedia PDF Downloads 114
740 Implementation of Lean Production in Business Enterprises: A Literature-Based Content Analysis of Implementation Procedures

Authors: P. Pötters, A. Marquet, B. Leyendecker

Abstract:

The objective of this paper is to investigate different implementation approaches for the implementation of Lean production in companies. Furthermore, a structured overview of those different approaches is to be made. Therefore, the present work is intended to answer the following research question: What differences and similarities exist between the various systematic approaches and phase models for the implementation of Lean Production? To present various approaches for the implementation of Lean Production discussed in the literature, a qualitative content analysis was conducted. Within the framework of a qualitative survey, a selection of texts dealing with lean production and its introduction was examined. The analysis presents different implementation approaches from the literature, covering the descriptive aspect of the study. The study also provides insights into similarities and differences among the implementation approaches, which are drawn from the analysis of latent text contents and author interpretations. In this study, the focus is on identifying differences and similarities among systemic approaches for implementing Lean Production. The research question takes into account the main object of consideration, objectives pursued, starting point, procedure, and endpoint of the implementation approach. The study defines the concept of Lean Production and presents various approaches described in literature that companies can use to implement Lean Production successfully. The study distinguishes between five systemic implementation approaches and seven phase models to help companies choose the most suitable approach for their implementation project. The findings of this study can contribute to enhancing transparency regarding the existing approaches for implementing Lean Production. This can enable companies to compare and contrast the available implementation approaches and choose the most suitable one for their specific project.

Keywords: implementation, lean production, phase models, systematic approaches

Procedia PDF Downloads 84
739 Islamic Credit Risk Management in Murabahah Financing: The Study of Islamic Banking in Malaysia

Authors: Siti Nor Amira Bt. Mohamad, Mohamad Yazis B. Ali Basah, Muhammad Ridhwan B. Ab. Aziz, Khairil Faizal B. Khairi, Mazlynda Bt. Md. Yusuf, Hisham B. Sabri

Abstract:

The understanding of risk and the concept of it occurs associated in Islamic financing was well-known in the financial industry by the using of Profit-and-Loss Sharing (PLS). It was presently in any Islamic financial transactions in order to comply with shariah rules. However, the existence of risk in Murabahah contract of financing is an ability that the counterparty is unable to complete its obligations within the agreed terms. Therefore, it is called as credit or default risk. Credit risk occurs when the client fails to make timely payment after the bank makes complete delivery of assets. Thus, it affects the growth of the bank as the banking business is in no position to have appropriate measures to cover the risk. Therefore, the bank may impose penalty on the outstanding balance. This paper aims to highlight the credit risk determinant and issues surrounding in Islamic bank in Malaysia in terms of Murabahah financing and how to manage it by using the proper techniques. Finally, it explores the credit risk management concept that might solve the problems arise. The study found that the credit risk can be managed properly by improving the use of comprehensive reference checklist of business partners on their character and past performance as well as their comprehensive database. Besides that, prevention of credit risk can be done by using collateral as security against the risk and we also argue on the Shariah guidelines and procedures should be implement coherently by the banking business because so that the risk would be control by having an effective instrument for Islamic modes of financing.

Keywords: Islamic banking, credit risk, Murabahah financing, risk mitigation

Procedia PDF Downloads 438
738 Study on Mitigation Measures of Gumti Hydro Power Plant Using Analytic Hierarchy Process and Concordance Analysis Techniques

Authors: K. Majumdar, S. Datta

Abstract:

Electricity is recognized as fundamental to industrialization and improving the quality of life of the people. Harnessing the immense untapped hydropower potential in Tripura region opens avenues for growth and provides an opportunity to improve the well-being of the people of the region, while making substantial contribution to the national economy. Gumti hydro power plant generates power to mitigate the crisis of power in Tripura, India. The first unit of hydro power plant (5 MW) was commissioned in June 1976 & another two units of 5 MW was commissioned simultaneously. But out of 15 MW capacity at present only 8-9 MW power is produced from Gumti hydro power plant during rainy season. But during lean season the production reduces to 0.5 MW due to shortage of water. Now, it is essential to implement some mitigation measures so that the further atrocities can be prevented and originality will be possible to restore. The decision making ability of the Analytic Hierarchy Process (AHP) and Concordance Analysis Techniques (CAT) are utilized to identify the better decision or solution to the present problem. Some related attributes are identified by the method of surveying within the experts and the available reports and literatures. Similar criteria are removed and ultimately seven relevant ones are identified. All the attributes are compared with each other and rated accordingly to their importance over the other with the help of Pair wise Comparison Matrix. In the present investigation different mitigation measures are identified and compared to find the best suitable alternative which can solve the present uncertainties involving the existence of the Gumti Hydro Power Plant.

Keywords: concordance analysis techniques, analytic hierarchy process, hydro power

Procedia PDF Downloads 340