Search results for: the legal system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18385

Search results for: the legal system

17545 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 292
17544 An Optimal Bayesian Maintenance Policy for a Partially Observable System Subject to Two Failure Modes

Authors: Akram Khaleghei Ghosheh Balagh, Viliam Makis, Leila Jafari

Abstract:

In this paper, we present a new maintenance model for a partially observable system subject to two failure modes, namely a catastrophic failure and a failure due to the system degradation. The system is subject to condition monitoring and the degradation process is described by a hidden Markov model. A cost-optimal Bayesian control policy is developed for maintaining the system. The control problem is formulated in the semi-Markov decision process framework. An effective computational algorithm is developed and illustrated by a numerical example.

Keywords: partially observable system, hidden Markov model, competing risks, multivariate Bayesian control

Procedia PDF Downloads 441
17543 Simulation of Behaviour Dynamics and Optimization of the Energy System

Authors: Iva Dvornik, Sandro Božić, Žana Božić Brkić

Abstract:

System-dynamic simulating modelling is one of the most appropriate and successful scientific methods of the complex, non-linear, natural, technical and organizational systems. In the recent practice its methodology proved to be efficient in solving the problems of control, behavior, sensitivity and flexibility of the system dynamics behavior having a high degree of complexity, all these by computing simulation i.e. “under laboratory conditions” what means without any danger for observed realities. This essay deals with the research of the gas turbine dynamic process as well as the operating pump units and transformation of gas energy into hydraulic energy has been simulated. In addition, system mathematical model has been also researched (gas turbine- centrifugal pumps – pipeline pressure system – storage vessel).

Keywords: system dynamics, modelling, centrifugal pump, turbine, gases, continuous and discrete simulation, heuristic optimisation

Procedia PDF Downloads 94
17542 The Impacts of Soft and Hard Enterprise Resource Planning to the Corporate Business Performance through the Enterprise Resource Planning Integrated System

Authors: Sautma Ronni Basana, Zeplin Jiwa Husada Tarigan, Widjojo Suprapto

Abstract:

Companies have already implemented the Enterprise Resource Planning (ERP) system to increase the data integration so that they can improve their business performance. Although some companies have managed to implement the ERP well, they still need to improve gradually so that the ERP functions can be optimized. To obtain a faster and more accurate data, the key users and IT department have to customize the process to suit the needs of the company. In reality, sustaining the ERP technology system requires soft and hard ERP so it enables to improve the business performance of the company. Soft and hard ERP are needed to build a tough system to ensure the integration among departments running smoothly. This research has three questions. First, is the soft ERP bringing impacts to the hard ERP and system integration. Then, is the hard ERP having impacts to the system integration. Finally, is the business performance of the manufacturing companies is affected by the soft ERP, hard ERP, and system integration. The questionnaires are distributed to 100 manufacturing companies in East Java, and are collected from 90 companies which have implemented the ERP, with the response rate of 90%. From the data analysis using PLS program, it is obtained that the soft ERP brings positive impacts to the hard ERP and system integration for the companies. Then, the hard ERP brings also positive impacts to the system integration. Finally, the business process performance of the manufacturing companies is affected by the system integration, soft ERP, and hard ERP simultaneously.

Keywords: soft ERP, hard ERP, system integration, business performance

Procedia PDF Downloads 390
17541 Understanding Indigenous Perspectives and Critical Knowledge in International Law

Authors: Radhika Jagtap

Abstract:

Contemporary scholarship in international legal theory is investigating new avenues of providing alternatives to dominant concepts. Indigenous peoples’ philosophies and perspectives developed through them provide a fertile ground to explore similar alternative ideas. This review paper evaluates the theorized accounts of indigenous scholarships which have contributed towards a rich body of knowledge generating alternative visions on dominant notions of ‘post coloniality’, ‘resistance’ and ‘globalization’. Further, it shall assess the relevance of such a project in shaping contemporary international legal thought. Traditional or classical international law has been opined to be highly influenced by the colonial and imperialist history which also left a mark on the way dominant discourses of resistance and globalization are read in mainstream international law. The paper shall first define what do we mean by indigenous philosophy and what kind of indigeneity is that inclusive of. Second, the paper defines the dominant discourse and then counters the same with the alternative indigenous perspective in the case of each concept that is in question. Finally, the paper shall conclude with certain theoretical findings – that the post coloniality, from indigenous perspective, lead to the further marginalization of indigeneity, especially in the third world; that human rights as the sole means of representing resistance in international law ends up making it a very state-centric discipline and last, that globalization from an indigenous, marginalised perspective is not as celebrated as it is in mainstream international law. Major scholarly works that shall be central to the discussion are those of Linda Tuiwahi Smith, Ella Shohat and David Harvey. The nature of the research shall be inductive and involve mostly theoretical review of scholarly works.

Keywords: indigenous, post colonial, globalization, perspectives

Procedia PDF Downloads 322
17540 Conflict, Confusion or Compromise: Violence against Women, A Case Study of Pakistan

Authors: Farhat Jabeen, Syed Asfaq Hussain Bukhari

Abstract:

In the wake of the contemporary period the basic objective of the research paper points out that socio-cultural scenario of Pakistan reveals that gender-based violence is deep rooted in the society irrespective of language and ethnicity. This paper would reconnaissance the possibility reforms in Pakistan for diminishing of violence. Women are not given their due role, rights, and respect. Furthermore, they are treated as chattels. This presentation will cover the socio-customary practices in the context of discrimination, stigmatization, and violence against women. This paper envisages justice in a broader sense of recognition of rights for women, and masculine structure of society, socio-customary practices and discrimination against women are a very serious concern which needs to be understood as a multidimensional problem. The paper will specially focus on understanding the existing obstacles of women in Pakistan in the constitutional scenario. Women stumble across discrimination and human rights manipulations, voluptuous violation and manipulation including domestic viciousness and are disadvantaged by laws, strategies, and programming that do not take their concerns into considerations. This presentation examines the role of honour killings among Pakistani community. This affects their self-assurance and capability to elevation integrity campaign where gender inequalities and discrimination in social, legal domain are to be put right. This paper brings to light the range of practices, laws and legal justice regarding the status of women and also covers attitude towards compensations for murders/killings, domestic violence, rape, adultery, social behavior and recourse to justice.

Keywords: discrimination, cultural, women, violence

Procedia PDF Downloads 311
17539 Providing Additional Advantages for STATCOM in Power Systems by Integration of Energy Storage Device

Authors: Reza Sedaghati

Abstract:

The use of Flexible AC Transmission System (FACTS) devices in a power system can potentially overcome limitations of the present mechanically controlled transmission system. Also, the advance of technology makes possible to include new energy storage devices in the electrical power system. The integration of Superconducting Magnetic Energy Storage (SMES) into Static Synchronous Compensator (STATCOM) can lead to increase their flexibility in improvement of power system dynamic behaviour by exchanging both active and reactive powers with power grids. This paper describes structure and behaviour of SMES, specifications and performance principles of the STATCOM/SMES compensator. Moreover, the benefits and effectiveness of integrated SMES with STATCOM in power systems is presented. Also, the performance of the STATCOM/SMES compensator is evaluated using an IEEE 3-bus system through the dynamic simulation by PSCAD/EMTDC software.

Keywords: STATCOM/SMES compensator, chopper, converter, energy storage system, power systems

Procedia PDF Downloads 549
17538 The Hague Abduction Convention and the Egyptian Position: Strategizing for a Law Reform

Authors: Abdalla Ahmed Abdrabou Emam Eldeib

Abstract:

For more than a century, the Hague Conference has tackled issues in the most challenging areas of private international law, including family law. Its actions in the realm of international child abduction have been remarkable in two ways during the last two decades. First, on October 25, 1980, the Hague Convention on the Civil Aspects of International Child Abduction (the Convention) was promulgated as an unusually inventive and powerful tool. Second, the Convention is rapidly becoming more prominent in the development of international child law. By that time, overseas travel had grown more convenient, and more couples were marrying or travelling across national lines. At the same time, parental separation and divorce have increased, leading to an increase in international child custody battles. The convention they drafted avoids legal quagmires and addresses extra-legal issues well. It literally restores the kid to its place of usual residence by establishing that the youngster was unlawfully abducted from that position or, alternatively, was wrongfully kept abroad after an allowed visit. Legal custody of a child of a contested parent is usually followed by the child's abduction or unlawful relocation to another country by the non-custodial parent or other persons. If a child's custodial parent lives outside of Egypt, the youngster may be kidnapped and brought to Egypt. It's natural to ask what laws should apply and what legal norms should be followed while hearing individual instances. This study comprehensively evaluates and estimates the relevant Hague Child Abduction Convention and the current situation in Egypt and which law is applicable for child custody. In addition, this research emphasis, detail, and focus on the position of Cross-border parental child abductions in Egypt. Moreover, examine the Islamic law compared to the Hague Convention on Child Custody in detail, as well as mentioning the treatment of Islamic countries in this matter in general and Egypt's treatment of this matter in particular, as well as the criticism directed at Egypt regarding the application and implementation of child custody issues. The present research backs up this method by using non-doctrinal techniques, including surveys, interviews, and dialogues. An important objective of this research is to examine the factors that contribute to parental child abduction. In this case, family court attorneys and other interested parties serve as the target audience from whom data is collected. A survey questionnaire was developed and sent to the target population in order to collect data for future empirical testing to validate the identified critical factors on Parental Child Abduction. The main finding in this study is breaking the reservations of many Muslim countries to join the Hague Convention with regard to child custody., Likewise, clarify the problems of implementation in practice in cases of kidnapping a child from one of the parents and traveling with him outside the borders of the country. Finally, this study is to provide suggestions for reforming the current Egyptian Family Law to make it an effective and efficient for all dispute's resolution mechanism and the possibility of joining The Hague Convention.

Keywords: egyptian family law, Hague child abduction convention, child custody, cross-border parental child abductions in egypt

Procedia PDF Downloads 60
17537 The Connection between De Minimis Rule and the Effect on Trade

Authors: Pedro Mario Gonzalez Jimenez

Abstract:

The novelties introduced by the last Notice on agreements of minor importance tighten the application of the ‘De minimis’ safe harbour in the European Union. However, the undetermined legal concept of effect on trade between the Member States becomes importance at the same time. Therefore, the current analysis that the jurist should carry out in the European Union to determine if an agreement appreciably restrict competition under Article 101 of the Treaty on the Functioning of the European Union is double. Hence, it is necessary to know how to balance the significance in competition and the significance in effect on trade between the Member States. It is a crucial issue due to the negative delimitation of restriction of competition affects the positive one. The methodology of this research is rather simple. Beginning with a historical approach to the ‘De Minimis Rule’, their main problems and uncertainties will be found. So, after the analysis of normative documents and the jurisprudence of the Court of Justice of the European Union some proposals of ‘Lege ferenda’ will be offered. These proposals try to overcome the contradictions and questions that currently exist in the European Union as a consequence of the current legal regime of agreements of minor importance. The main findings of this research are the followings: Firstly, the effect on trade is another way to analyze the importance of an agreement different from the ‘De minimis rule’. In point of fact, this concept is singularly adapted to go through agreements that have as object the prevention, restriction or distortion of competition, as it is observed in the most famous European Union case-law. Thanks to the effect on trade, as long as the proper requirements are met there is no a restriction of competition under article 101 of the Treaty on the Functioning of the European Union, even if the agreement had an anti-competitive object. These requirements are an aggregate market share lower than 5% on any of the relevant markets affected by the agreement and turnover lower than 40 million of Euros. Secondly, as the Notice itself says ‘it is also intended to give guidance to the courts and competition authorities of the Member States in their application of Article 101 of the Treaty, but it has no binding force for them’. This reality makes possible the existence of different statements among the different Member States and a confusing perception of what a restriction of competition is. Ultimately, damage on trade between the Member States could be observed for this reason. The main conclusion is that the significant effect on trade between Member States is irrelevant in agreements that restrict competition because of their effects but crucial in agreements that restrict competition because of their object. Thus, the Member States should propose the incorporation of a similar concept in their legal orders in order to apply the content of the Notice. Otherwise, the significance of the restrictive agreement on competition would not be properly assessed.

Keywords: De minimis rule, effect on trade, minor importance agreements, safe harbour

Procedia PDF Downloads 167
17536 Local Tax Map Software System Development

Authors: Smithinun Thairoongrojana

Abstract:

This research is a qualitative research with three main purposes: (1) to develop the local tax map software system to be linked to the main Local Tax Map System (LTAX3000) system; (2) to design and develop a program for tax data fieldwork on wireless devices and link it to LTAX3000 database of Surat Thani Municipality; (3) to develop the human resource responsible for the fieldwork to be able to use the program and maintain the system and also to be able to work with the dynamic of technologies. In-depth interviews with the two groups of samples, the board of Surat Thani Municipality and operation staff responsible for observing and taxing fieldworks were conducted. The result of this study demonstrates the new developed fieldworks system that can be used both stand-alone usage and networking usage. The fieldworks system to collect and store the variety of taxing information within Surat Thani Municipality will be explained. Then the fieldwork operation process development and the replacement of transferring and storing the information via the network communication.

Keywords: Local tax map, software system development, wireless devices, human resource

Procedia PDF Downloads 187
17535 Comparing Performance of Irrigation System in Nepal by Collective Action and Decision-Making Capacity of the Farmers

Authors: Manita Ale, Ganesh P. Shivakoti, Ram C. Bastakoti

Abstract:

Irrigation system, a system for enhancing agricultural productivity, requires regular maintenance in order to avoid irregular allocation of water. For maintenance of the system in long run, farmers’ participation plays a key role increasing the performance of system. The performance of any irrigation system mainly relies on various factors which affect collective action plus decision making, as well as their shared impacts. The paper consists of system level information that were collected from 12 Irrigation Systems (IS) from three-sampled districts of Nepal and the household information that were collected from 160 irrigation water users. The results reveal that, out of 12 sampled irrigation systems, only 4 systems shows high performance levels. The high performance level of those systems was characterized on the basis of adequate availability of water, good maintenance of system infrastructure, and conformance to existing rules followed. In addition, the paper compares different irrigation systems based on trust, reciprocity, cropping intensity, command area and yield as tools to indicate the importance of collective action in performance of irrigation system.

Keywords: collective action, decision-making, farmers’ participation, performance

Procedia PDF Downloads 395
17534 Performance Analysis of the First-Order Characteristics of Polling System Based on Parallel Limited (K=1) Services Mode

Authors: Liu Yi, Bao Liyong

Abstract:

Aiming at the problem of low efficiency of pipelined scheduling in periodic query-qualified service, this paper proposes a system service resource scheduling strategy with parallel optimized qualified service polling control. The paper constructs the polling queuing system and its mathematical model; firstly, the first-order and second-order characteristic parameter equations are obtained by partial derivation of the probability mother function of the system state variables, and the complete mathematical, analytical expressions of each system parameter are deduced after the joint solution. The simulation experimental results are consistent with the theoretical calculated values. The system performance analysis shows that the average captain and average period of the system have been greatly improved, which can better adapt to the service demand of delay-sensitive data in the dense data environment.

Keywords: polling, parallel scheduling, mean queue length, average cycle time

Procedia PDF Downloads 25
17533 Space Debris: An Environmental Hazard

Authors: Anwesha Pathak

Abstract:

Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.

Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts

Procedia PDF Downloads 77
17532 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject

Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat

Abstract:

Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.

Keywords: Learning Management System, social media, Operating System, information technology

Procedia PDF Downloads 343
17531 Loss Analysis by Loading Conditions of Distribution Transformers

Authors: A. Bozkurt, C. Kocatepe, R. Yumurtaci, İ. C. Tastan, G. Tulun

Abstract:

Efficient use of energy, with the increase in demand of energy and also with the reduction of natural energy sources, has improved its importance in recent years. Most of the losses in the system from electricity produced until the point of consumption is mostly composed by the energy distribution system. In this study, analysis of the resulting loss in power distribution transformer and distribution power cable is realized which are most of the losses in the distribution system. Transformer losses in the real distribution system were analyzed by CYME Power Engineering Software program. These losses are disclosed for different voltage levels and different loading conditions.

Keywords: distribution system, distribution transformer, power cable, technical losses

Procedia PDF Downloads 634
17530 Appearance-Based Discrimination in a Workplace: An Emerging Problem for Labor Law Relationships

Authors: Irmina Miernicka

Abstract:

Nowadays, dress codes and widely understood appearance are becoming more important in the workplace. They are often used in the workplace to standardize image of an employer, to communicate a corporate image and ensure that customers can easily identify it. It is also a way to build professionalism of employer. Additionally, in many cases, an employer will introduce a dress code for health and safety reasons. Employers more often oblige employees to follow certain rules concerning their clothing, grooming, make-up, body art or even weight. An important research problem is to find the limits of the employer's interference with the external appearance of employees. They are primarily determined by the two main obligations of the employer, i. e. the obligation to respect the employee's personal rights and the principle of equal treatment and non-discrimination in employment. It should also be remembered that the limits of the employer's interference will be different when certain rules concerning the employee's appearance result directly from the provisions of laws and other acts of universally binding law (workwear, official clothing, and uniform). The analysis of this issue was based on literature and jurisprudence, both domestic and foreign, including the U.S. and European case law, and led the author to put forward a thesis that there are four main principles, which will protect the employer from the allegation of discrimination. First, it is the principle of adequacy - the means requirements regarding dress code must be appropriate to the position and type of work performed by the employee. Secondly, in accordance with the purpose limitation principle, an employer may introduce certain requirements regarding the appearance of employees if there is a legitimate, objective justification for this (such as work safety or type of work performed), not dictated by the employer's subjective feelings and preferences. Thirdly, these requirements must not place an excessive burden on workers and be disproportionate in relation to the employer's objective (principle of proportionality). Fourthly, the employer should also ensure that the requirements imposed in the workplace are equally burdensome and enforceable from all groups of employees. Otherwise, it may expose itself to grounds of discrimination based on sex or age. At the same time, it is also possible to differentiate the situation of some employees if these differences are small and reflect established habits and traditions and if employees are obliged to maintain the same level of professionalism in their positions. Although this subject may seem to be insignificant, frequent application of dress codes and increasing awareness of both employees and employers indicate that its legal aspects need to be thoroughly analyzed. Many legal cases brought before U.S. and European courts show that employees look for legal protection when they consider that their rights are violated by dress code introduced in a workplace.

Keywords: labor law, the appearance of an employee, discrimination in the workplace, dress code in a workplace

Procedia PDF Downloads 115
17529 Restriction on the Freedom of Economic Activity in the Polish Energy Law

Authors: Zofia Romanowska

Abstract:

Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.

Keywords: license, energy law, energy market, public goods, regulator

Procedia PDF Downloads 234
17528 Evaluation of Photovoltaic System with Different Research Methods of Maximum Power Point Tracking

Authors: Mehdi Ameur, Ahmed Essadki, Tamou Nasser

Abstract:

The purpose of this paper is the evaluation of photovoltaic system with MPPT techniques. This system is developed by combining the models of established solar module and DC-DC converter with the algorithms of perturbing and observing (P&O), incremental conductance (INC) and fuzzy logic controller (FLC). The system is simulated under different climate conditions and MPPT algorithms to determine the influence of these conditions on characteristic power-voltage of PV system. According to the comparisons of the simulation results, the photovoltaic system can extract the maximum power with precision and rapidity using the MPPT algorithms discussed in this paper.

Keywords: fuzzy logic controller, FLC, hill climbing, HC, incremental conductance (INC), perturb and observe (P&O), maximum power point, MPP, maximum power point tracking, MPPT

Procedia PDF Downloads 502
17527 Regional Pole Placement by Saturated Power System Stabilizers

Authors: Hisham M. Soliman, Hassan Yousef

Abstract:

This manuscript presents new results on design saturated power system stabilizers (PSS) to assign system poles within a desired region for achieving good dynamic performance. The regional pole placement is accomplished against model uncertainties caused by different load conditions. The design is based on a sufficient condition in the form of linear matrix inequalities (LMI) which forces the saturated nonlinear controller to lie within the linear zone. The controller effectiveness is demonstrated on a single machine infinite bus system.

Keywords: power system stabilizer, saturated control, robust control, regional pole placement, linear matrix inequality (LMI)

Procedia PDF Downloads 553
17526 An Information System for Strategic Performance Scoring in Municipal Management

Authors: Emin Gundogar, Aysegul Yilmaz

Abstract:

Strategic performance scoring is a significant procedure in management. There are various methods to improve this procedure. This study introduces an information system that is developed to score performance for municipal management. The application of the system is clarified by exemplifying municipal processes.

Keywords: management information system, municipal management, performance scoring

Procedia PDF Downloads 754
17525 Solar Heating System to Promote the Disinfection of Water

Authors: Elmo Thiago Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale

Abstract:

It presents a heating system using low cost alternative solar collectors to promote the disinfection of water in low income communities that take water contaminated by bacteria. The system consists of two solar collectors, with total area of 4 m² and was built using PET bottles and cans of beer and soft drinks. Each collector is made up of 8 PVC tubes, connected in series and work in continuous flow. It will determine the flux the most appropriate to generate the temperature to promote the disinfection. It will be presented results of the efficiency and thermal loss of system and results of analysis of water after undergoing the process of heating.

Keywords: Disinfection of water, solar heating system, poor communities, bioinformatics, biomedicine

Procedia PDF Downloads 472
17524 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 142
17523 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 414
17522 Condition Monitoring System of Mine Air Compressors Based on Wireless Sensor Network

Authors: Sheng Fu, Yinbo Gao, Hao Lin

Abstract:

In the current mine air compressors monitoring system, there are some difficulties in the installation and maintenance because of the wired connection. To solve the problem, this paper introduces a new air compressors monitoring system based on ZigBee in which the monitoring parameters are transmitted wirelessly. The collecting devices are designed to form a cluster network to collect vibration, temperature, and pressure of air cylinders and other parameters. All these devices are battery-powered. Besides, the monitoring software in PC is developed using MFC. Experiments show that the designed wireless sensor network works well in the site environmental condition and the system is very convenient to be installed since the wireless connection. This monitoring system will have a wide application prospect in the upgrade of the old monitoring system of the air compressors.

Keywords: condition monitoring, wireless sensor network, air compressor, zigbee, data collecting

Procedia PDF Downloads 492
17521 Early-Stage Venture Investment Model: Evidence from Saudi Arabia

Authors: Tibah Alharbi, Renzo Cordina, David Power

Abstract:

Relatively few studies have explored how venture capitalist investors (VCs) make investment decisions and the information they rely on when taking an equity stake in an investee company. In addition, little is known about how much investors monitor start-ups after the decision to invest has been made. The VC scene in the US or European context is understood better than that of developing countries such as those in the Middle East. Although some differences among VC investors have been identified, the reasons behind such differences have not been fully explored – especially in a country such as Saudi Arabia. Therefore, this research seeks to understand the impact of external factors on the VC investor’ behaviour. The unique cultural and legal environments in the Kingdom of Saudi Arabia, the growing VC sector in the country, and the increasing importance attached to start-ups under the Saudi Government’s Vision 2030 program make such an investigation timely. Ascertaining the perceptions of VC investors in such a context will provide a deeper understanding of the determinants of VC investment in a novel setting. Using semi-structured interviews with over 20 participants, the research explores the structure of VC funds, the cycle of the VC investment in a start-up from the sourcing of deals, the screening and evaluation of such deals, the closing of such deals, and finally, the monitoring of such investments before the decision to exit such deals at the appropriate time. The results show some similarities to the VC model, which characterizes such investment in the US and Europe, but several differences emerge given the unique cultural and legal settings within the Kingdom. The results provide an in-depth understanding of the VC investors’ mindset relative to the existing studies in the literature.

Keywords: exit, monitoring, start-ups, venture capital

Procedia PDF Downloads 132
17520 Towards a Mandatory Frame of ADR in Divorce Cases: Key Elements from a Comparative Perspective for Belgium

Authors: Celine Jaspers

Abstract:

The Belgian legal system is slowly evolving to mandatory mediation to promote ADR. One of the reasons for this evolution is the lack of use of alternative methods in relation to their possible benefits. Especially in divorce cases, ADR can play a beneficial role in resolving disputes, since the emotional component is very much present. When children are involved, a solution provided by the parent may be more adapted to the child’s best interest than a court order. In the first part, the lack of use of voluntary ADR and the evolution toward mandatory ADR in Belgium will be indicated by sources of legislation, jurisprudence and social-scientific sources, with special attention to divorce cases. One of the reasons is lack of knowledge on ADR, despite the continuing efforts of the Belgian legislator to promote ADR. One of the last acts of ADR-promotion, was the implementation of an Act in 2018 which gives the judge the possibility to refer parties to mediation if at least one party wants to during the judicial procedure. This referral is subject to some conditions. The parties will be sent to a private mediator, recognized by the Federal Mediation Commission, to try to resolve their conflict. This means that at least one party can be mandated to try mediation (indicated as “semi-mandatory mediation”). The main goal is to establish the factors and elements that Belgium has to take into account in their further development of mandatory ADR, with consideration of the human rights perspective and the EU perspective. Furthermore it is also essential to detect some dangerous pitfalls other systems have encountered with their process design. Therefore, the second part, the comparative component, will discuss the existing framework in California, USA to establish the necessary elements, possible pitfalls and considerations the Belgian legislator can take into account when further developing the framework of mandatory ADR. The contrasting and functional method will be used to create key elements and possible pitfalls, to help Belgium improve its existing framework. The existing mandatory system in California has been in place since 1981 and is still up and running, and can thus provide valuable lessons and considerations for the Belgian system. Thirdly, the key elements from a human rights perspective and from a European Union perspective (e.g. the right to access to a judge, the right to privacy) will be discussed too, since the basic human rights and European legislation and jurisprudence play a significant part in Belgian legislation as well. The main sources for this part will be the international and European treaties, legislation, jurisprudence and soft law. In the last and concluding part, the paper will list the most important elements of a mandatory ADR-system design with special attention to the dangers of these elements (e.g. to include or exclude domestic violence cases in the mandatory ADR-framework and the consequences thereof), and with special attention for the necessary the international and European rights, prohibitions and guidelines.

Keywords: Belgium, divorce, framework, mandatory ADR

Procedia PDF Downloads 133
17519 Heritage Tree Expert Assessment and Classification: Malaysian Perspective

Authors: B.-Y.-S. Lau, Y.-C.-T. Jonathan, M.-S. Alias

Abstract:

Heritage trees are natural large, individual trees with exceptionally value due to association with age or event or distinguished people. In Malaysia, there is an abundance of tropical heritage trees throughout the country. It is essential to set up a repository of heritage trees to prevent valuable trees from being cut down. In this cross domain study, a web-based online expert system namely the Heritage Tree Expert Assessment and Classification (HTEAC) is developed and deployed for public to nominate potential heritage trees. Based on the nomination, tree care experts or arborists would evaluate and verify the nominated trees as heritage trees. The expert system automatically rates the approved heritage trees according to pre-defined grades via Delphi technique. Features and usability test of the expert system are presented. Preliminary result is promising for the system to be used as a full scale public system.

Keywords: arboriculture, Delphi, expert system, heritage tree, urban forestry

Procedia PDF Downloads 297
17518 SPICE Modeling for Evaluation of Distribution System Reliability Indices

Authors: G. N. Srinivas, K. Raju

Abstract:

This paper presents Markov processes for determining the reliability indices of distribution system. The continuous Markov modeling is applied to a complex radial distribution system and electrical equivalent circuits are developed for the modeling. In general PSPICE is being used for electrical and electronic circuits and various applications of power system like fault analysis, transient analysis etc. In this paper, the SPICE modeling equivalent circuits which are developed are applied in a novel way to Distribution System reliability analysis. These circuits are simulated using PSPICE software to obtain the state probabilities, the basic and performance indices. Thus the basic indices and the performance indices obtained by this method are compared with those obtained by FMEA technique. The application of the concepts presented in this paper are illustrated and analyzed for IEEE-Roy Billinton Test System (RBTS).

Keywords: distribution system, Markov Model, reliability indices, spice simulation

Procedia PDF Downloads 525
17517 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 777
17516 Neural Network Based Fluctuation Frequency Control in PV-Diesel Hybrid Power System

Authors: Heri Suryoatmojo, Adi Kurniawan, Feby A. Pamuji, Nursalim, Syaffaruddin, Herbert Innah

Abstract:

Photovoltaic (PV) system hybrid with diesel system is utilized widely for electrification in remote area. PV output power fluctuates due to uncertainty condition of temperature and sun irradiance. When the penetration of PV power is large, the reliability of the power utility will be disturbed and seriously impact the unstable frequency of system. Therefore, designing a robust frequency controller in PV-diesel hybrid power system is very important. This paper proposes new method of frequency control application in hybrid PV-diesel system based on artificial neural network (ANN). This method can minimize the frequency deviation without smoothing PV output power that controlled by maximum power point tracking (MPPT) method. The neural network algorithm controller considers average irradiance, change of irradiance and frequency deviation. In order the show the effectiveness of proposed algorithm, the addition of battery as energy storage system is also presented. To validate the proposed method, the results of proposed system are compared with the results of similar system using MPPT only. The simulation results show that the proposed method able to suppress frequency deviation smaller compared to the results of system using MPPT only.

Keywords: energy storage system, frequency deviation, hybrid power generation, neural network algorithm

Procedia PDF Downloads 487