Search results for: perception control system security strategy
30797 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community
Authors: Christantus Begealawuh Nchongayi
Abstract:
As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security
Procedia PDF Downloads 21630796 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 11530795 Design and Implementation of a Cross-Network Security Management System
Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).Keywords: network security management, device organization, emergency response, cross-network
Procedia PDF Downloads 16830794 Housing Security System and Household Entrepreneurship: Evidence from China
Authors: Wangshi Yong, Wei Shi, Jing Zou, Qiang Li, Yilin Tian
Abstract:
With the advancement of the reform of China’s housing security system, the impact is becoming increasingly profound. This paper explores the relationship between the housing security system and household entrepreneurship on the 2017 China Household Finance Survey (CHFS) and conducts a large number of robustness checks, including PSM and IV estimation. The results show that the assistance of the housing security system will significantly promote family entrepreneurship, increasing the probability of entrepreneurship by 2%. Its internal mechanism is mainly achieved by relaxing liquidity constraints and increasing household social capital. However, the risk preference effect has not existed. Heterogeneity analysis shows that the positive impact of the housing security system on family entrepreneurship is mainly reflected in areas with high housing prices and incomes, as well as households with long-term security and social or commercial insurance. Meanwhile, it also verifies that the positive externalities of the housing security system will also positively affect active entrepreneurial motivation, entrepreneurial intensity, and entrepreneurial innovation.Keywords: the housing security system, household entrepreneurship, social capital, liquidity constraints, risk preference
Procedia PDF Downloads 8430793 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 11430792 Hip Strategy in Dynamic Postural Control in Recurrent Ankle Sprain
Authors: Radwa Elshorbagy, Alaa Elden Balbaa, Khaled Ayad, Waleed Reda
Abstract:
Introduction: Ankle sprain is a common lower limb injury that is complicated by high recurrence rate. The cause of recurrence is not clear; however, changes in motor control have been postulated. Objective: to determine the contribution of proximal hip strategy to dynamic postural control in patients with recurrent ankle sprain. Methods: Fifteen subjects with recurrent ankle sprain (group A) and fifteen healthy control subjects (group B) participated in this study. Abductor-adductors as well as flexor-extensor hip musculatures control was abolished by fatigue using the Biodex Isokinetic System. Dynamic postural control was measured before and after fatigue by the Biodex Balance System. Results: Repeated measures MANOVA was used to compare between and within group differences, in group A fatiguing of hip muscles (flexors-extensors and abductors-adductors) increased overall stability index (OASI), anteroposterior stability index (APSI) and mediolateral stability index (MLSI) significantly (p=0.00) whereas; in group B fatiguing of hip flexors-extensors increased significantly OASI and APSI only (p= 0.017, 0.010; respectively) while fatiguing of hip abductors-adductors has no significant effect on these variables. Moreover, patients with ankle sprain had significantly lower dynamic balance after hip muscles fatigue compared to the control group. Specifically, after hip flexor-extensor fatigue, the OASI, APSI and MLSI were increased significantly than those of the control values (p= 0.002, 0.011, and 0.003, respectively) whereas fatiguing of hip abductors-adductors increased significantly in OASI and APSI only (p=0.012, 0.026, respectively). Conclusion: To maintain dynamic balance, patients with recurrent ankle sprain seem to rely more on the hip strategy. This means that those patients depend on a top to down instead of down to top strategy clinical relevance: patients with recurrent ankle sprain less efficient in maintaining the dynamic postural control due to the change in motor strategies. Indicating that health care providers and rehabilitation specialists should treat CAI as a global/central and not just as a simple local or peripheral injury.Keywords: hip strategy, ankle strategy, postural control, dynamic balance
Procedia PDF Downloads 33830791 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture
Procedia PDF Downloads 37530790 The Connection Between the International Law and the Legal Consultation on the Social Media
Authors: Amir Farouk Ahmed Ali Hussin
Abstract:
Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy
Procedia PDF Downloads 6330789 Simulation and Analysis of Inverted Pendulum Controllers
Authors: Sheren H. Salah
Abstract:
The inverted pendulum is a highly nonlinear and open-loop unstable system. An inverted pendulum (IP) is a pendulum which has its mass above its pivot point. It is often implemented with the pivot point mounted on a cart that can move horizontally and may be called a cart and pole. The characteristics of the inverted pendulum make identification and control more challenging. This paper presents the simulation study of several control strategies for an inverted pendulum system. The goal is to determine which control strategy delivers better performance with respect to pendulum’s angle. The inverted pendulum represents a challenging control problem, which continually moves toward an uncontrolled state. For controlling the inverted pendulum. The simulation study that sliding mode control (SMC) control produced better response compared to Genetic Algorithm Control (GAs) and proportional-integral-derivative(PID) control.Keywords: Inverted Pendulum (IP) Proportional-Integral-Derivative (PID), Genetic Algorithm Control (GAs), Sliding Mode Control (SMC)
Procedia PDF Downloads 55530788 Control Strategy of Solar Thermal Cooling System under the Indonesia Climate
Authors: Budihardjo Sarwo Sastrosudiro, Arnas Lubis, Muhammad Idrus Alhamid, Nasruddin Jusuf
Abstract:
Solar thermal cooling system was installed on Mechanical Research Center (MRC) Building that is located in Universitas Indonesia, Depok, Indonesia. It is the first cooling system in Indonesia that utilizes solar energy as energy input combined with natural gas; therefore, the control system must be appropriated with the climates. In order to stabilize the cooling capacity and also to maximize the use of solar energy, the system applies some controllers. Constant flow rate and on/off controller are applied for the hot water, chilled water and cooling water pumps. The hot water circulated by pump when the solar radiation is over than 400W/m2, and the chilled water is continually circulated by pump and its temperature is kept constant 7 °C by absorption chiller. The cooling water is also continually circulated until the outlet temperature of cooling tower below than 27 oC. Furthermore, the three-way valve is used to control the hot water for generate vapor on absorption chiller. The system performance using that control system is shown in this study results.Keywords: absorption chiller, control system, solar cooling, solar energy
Procedia PDF Downloads 27430787 Islamic Social Security: A Discourse
Authors: Safiyya A. Abba, Shehu U. R. Aliyu
Abstract:
This paper deals with Islamic social security: a discourse explores the meaning and nature of Islamic social security system. The paper reviews the social security framework and operations during the early period. The paper further identifies the instruments of Islamic social security discusses its principles and objectives. The paper discovers that Islamic social security is a personification of a comprehensive welfare approach in view of its varied instruments that are deeply rooted in the Islamic law, unique principles and realistic and achievable objectives. Furthermore, the Islamic social security system has far reaching socioeconomic implications; social justice, cohesion, equity, a catalyst for poverty eradication, income redistribution, economic growth and development.Keywords: Islamic social security, basic needs, zakat, socioeconomic justice, equity
Procedia PDF Downloads 44030786 Georgian Social Security System Compatibility with EU Requirements
Authors: Nino Grigolaia
Abstract:
Introduction: The article discusses the experience of the EU in the social field, analyzes the peculiarities of the functioning of the social system in Georgia, and reveals the priority and importance of social policy. Methodology: Different research methods are applied in the presented paper. There are used induction, deduction, analysis, synthesis, analogy, correlation, and statistical observation methodologies in the work. Main Findings: Based on the analysis of social security reforms in Georgia, the main systematic problems are detected, the recommendations on social security system components, integration of the social security field in the unified insurance system, the formation of the national social system, perfection of the legislative, regulatory framework of social protection, adoption of foreign experience are developed in the article. Conclusion: The article concludes that the social protection system in Georgia is at an early stage of development, with the significant impact of factors such as high level of unemployment, low pensions, a large number of families living under the poverty line, and other ones. Accordingly, it is well-established that the study of the social security problem in Georgia is still actual. Based on the analysis, appropriate suggestions in the field of social security are made, and relevant recommendations are proposed.Keywords: social security, social system, social policy, social security models
Procedia PDF Downloads 14730785 The Effect of Postural Sway and Technical Parameters of 8 Weeks Technical Training Performed with Restrict of Visual Input on the 10-12 Ages Soccer Players
Authors: Nurtekin Erkmen, Turgut Kaplan, Halil Taskin, Ahmet Sanioglu, Gokhan Ipekoglu
Abstract:
The aim of this study was to determine the effects of an 8 week soccerspecific technical training with limited vision perception on postural control and technical parameters in 10-12 aged soccer players. Subjects in this study were 24 male young soccer players (age: 11.00 ± 0.56 years, height: 150.5 ± 4.23 cm, body weight: 41.49 ± 7.56 kg). Subjects were randomly divided as two groups: Training and control. Balance performance was measured by Biodex Balance System (BBS). Short pass, speed dribbling, 20 m speed with ball, ball control, juggling tests were used to measure soccer players’ technical performances with a ball. Subjects performed soccer training 3 times per week for 8 weeks. In each session, training group with limited vision perception and control group with normal vision perception committed soccer-specific technical drills for 20 min. Data analyzed with t-test for independent samples and Mann-Whitney U between groups and paired t-test and Wilcoxon test between pre-posttests. No significant difference was found balance scores and with eyes open and eyes closed and LOS test between training and control groups after training (p>0.05). After eight week of training there are no significant difference in balance score with eyes open for both training and control groups (p>0.05). Balance scores decreased in training and control groups after the training (p<0.05). The completion time of LOS test shortened in both training and control groups after training (p<0.05). The training developed speed dribbling performance of training group (p<0.05). On the other hand, soccer players’ performance in training and control groups increased in 20 m speed with a ball after eight week training (p<0.05). In conclusion; the results of this study indicate that soccer-specific training with limited vision perception may not improves balance performance in 10-12 aged soccer players, but it develops speed dribbling performance.Keywords: Young soccer players, vision perception, postural control, technical
Procedia PDF Downloads 46930784 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 46730783 Sliding Mode Control of Variable Speed Wind Energy Conversion Systems
Authors: Zine Souhila Rached, Mazari Benyounes Bouzid, Mohamed Amine, Allaoui Tayeb
Abstract:
Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, its high cost is a major constraint, especially on the less windy sites. The purpose of wind energy systems is to maximize energy efficiency, and extract maximum power from the wind speed. In other words, having a power coefficient is maximum and therefore the maximum power point tracking. In this case, the MPPT control becomes important.To realize this control, strategy conventional proportional and integral (PI) controller is usually used. However, this strategy cannot achieve better performance. This paper proposes a robust control of a turbine which optimizes its production, that is improve the quality and energy efficiency, namely, a strategy of sliding mode control. The proposed sliding mode control strategy presents attractive features such as robustness to parametric uncertainties of the turbine; the proposed sliding mode control approach has been simulated on three-blade wind turbine. The simulation result under Matlab\Simulink has validated the performance of the proposed MPPT strategy.Keywords: wind turbine, maximum power point tracking, sliding mode, energy conversion systems
Procedia PDF Downloads 61130782 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy
Authors: Riddhi Shah
Abstract:
Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations
Procedia PDF Downloads 60030781 Microwave Security System in Museums: Design and Implementation
Authors: Dalia Elsheakh, Hala Elsadek
Abstract:
The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations.Keywords: microwave security system, object locating system, real time locating system (RTLS), antenna array, array electronic scanning
Procedia PDF Downloads 34930780 Students’ Perception of E-Learning Systems at Hashemite University
Authors: Muneer Abbad
Abstract:
In search of better, traditional learning universities have expanded their ways to deliver knowledge and integrate cost effective e-learning systems. Universities’ use of information and communication technologies has grown tremendously over the last decade. To ensure efficient use of the e-learning system, this project aimed to evaluate the good and bad practices, detect errors and determine areas for further improvements in usage. This project critically evaluated the students’ perception of the e-learning system and recommended changes to improve students’ e-learning usage, through conducting questionnaire given to the students that have experience with e-learning systems. Results of the study indicated that, in general, students have favourable perceptions toward using the e-learning system. They seemed to value the resources tool and its contribution to building their knowledge more than other e-learning tools. However, they seemed to perceive a limited value from the audio or video podcasts. This study has shown that technology acceptance is the most variable, factor that contributes to students’ perception and satisfaction of the e-learning system.Keywords: e-learning, perception, Jordan, universities
Procedia PDF Downloads 48930779 Experimental Analysis of Control in Electric Vehicle Charging Station Based Grid Tied Photovoltaic-Battery System
Authors: A. Hassoune, M. Khafallah, A. Mesbahi, T. Bouragba
Abstract:
This work presents an improved strategy of control for charging a lithium-ion battery in an electric vehicle charging station using two charger topologies i.e. single ended primary inductor converter (SEPIC) and forward converter. In terms of rapidity and accuracy, the power system consists of a topology/control diagram that would overcome the performance constraints, for instance the power instability, the battery overloading and how the energy conversion blocks would react efficiently to any kind of perturbations. Simulation results show the effectiveness of the proposed topologies operated with a power management algorithm based on voltage/peak current mode controls. In order to provide credible findings, a low power prototype is developed to test the control strategy via experimental evaluations of the converter topology and its controls.Keywords: battery storage buffer, charging station, electric vehicle, experimental analysis, management algorithm, switches control
Procedia PDF Downloads 16530778 Distributed Control Strategy for Dispersed Energy Storage Units in the DC Microgrid Based on Discrete Consensus
Authors: Hanqing Yang, Xiang Meng, Qi Li, Weirong Chen
Abstract:
The SOC (state of charge) based droop control has limitations on the load power sharing among different energy storage units, due to the line impedance. In this paper, a distributed control strategy for dispersed energy storage units in the DC microgrid based on discrete consensus is proposed. Firstly, a sparse information communication network is built. Thus, local controllers can communicate with its neighbors using voltage, current and SOC information. An average voltage of grid can be evaluated to compensate voltage offset by droop control, and an objective virtual resistance fulfilling above requirement can be dynamically calculated to distribute load power according to the SOC of the energy storage units. Then, the stability of the whole system and influence of communication delay are analyzed. It can be concluded that this control strategy can improve the robustness and flexibility, because of having no center controller. Finally, a model of DC microgrid with dispersed energy storage units and loads is built, the discrete distributed algorithm is established and communication protocol is developed. The co-simulation between Matlab/Simulink and JADE (Java agent development framework) has verified the effectiveness of proposed control strategy.Keywords: dispersed energy storage units, discrete consensus algorithm, state of charge, communication delay
Procedia PDF Downloads 28030777 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge
Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada
Abstract:
According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.Keywords: ancestral knowledge, climate change, medicinal plants, solar energy
Procedia PDF Downloads 23530776 Exact and Approximate Controllability of Nuclear Dynamics Using Bilinear Controls
Authors: Ramdas Sonawane, Mahaveer Gadiya
Abstract:
The control problem associated with nuclear dynamics is represented by nonlinear integro-differential equation with additive controls. To control chain reaction, certain amount of neutrons is added into (or withdrawn out of) chamber as and when required. It is not realistic. So, we can think of controlling the reactor dynamics by bilinear control, which enters the system as coefficient of state. In this paper, we study the approximate and exact controllability of parabolic integro-differential equation controlled by bilinear control with non-homogeneous boundary conditions in bounded domain. We prove the existence of control and propose an explicit control strategy.Keywords: approximate control, exact control, bilinear control, nuclear dynamics, integro-differential equations
Procedia PDF Downloads 44430775 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit
Authors: Yllka Hysaj, Ylberina Hysaj Arifi
Abstract:
Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.Keywords: migration, self-initiated expatriates, Brexit, job security
Procedia PDF Downloads 17030774 Research of Control System for Space Intelligent Robot Based on Vision Servo
Authors: Changchun Liang, Xiaodong Zhang, Xin Liu, Pengfei Sun
Abstract:
Space intelligent robotic systems are expected to play an increasingly important role in the future. The robotic on-orbital service, whose key is the tracking and capturing technology, becomes research hot in recent years. In this paper, the authors propose a vision servo control system for target capturing. Robotic manipulator will be an intelligent robotic system with large-scale movement, functional agility, and autonomous ability, and it can be operated by astronauts in the space station or be controlled by the ground operator in the remote operation mode. To realize the autonomous movement and capture mission of SRM, a kind of autonomous programming strategy based on multi-camera vision fusion is designed and the selection principle of object visual position and orientation measurement information is defined for the better precision. Distributed control system hierarchy is designed and reliability is considering to guarantee the abilities of control system. At last, a ground experiment system is set up based on the concept of robotic control system. With that, the autonomous target capturing experiments are conducted. The experiment results validate the proposed algorithm, and demonstrates that the control system can fulfill the needs of function, real-time and reliability.Keywords: control system, on-orbital service, space robot, vision servo
Procedia PDF Downloads 41930773 The Role of Arousal in Time Perception: Implications for Emotional Driving
Authors: Ewa Siedlecka
Abstract:
Emotional stress is an important risk factor in the rate and severity of traffic accidents. Moreover, incorrect time perception is implicated in the increase of traffic violations, such as running red lights or collisions. While the role of emotional arousal on perceived time is well-established, the role of physiological arousal in time perception remains unexamined. Specific emotions can be, however, associated with distinct physiological responses. In the current research, two studies examined the role of physiological arousal in time perception. In the first experiment, 41 participants engaged in a cold pressor task and had their time perception measured throughout the experiment. In the second study, 138 participants engaged in either isometric or deep breathing exercises. These activities were designed to simulate the sympathetic and parasympathetic nervous systems, respectively. Participants completed a bisection task to measure time perception in both studies, as well as a physiological response via an Electrocardiography (ECG). Results found that activation of the parasympathetic nervous system is associated with greater time perception. These findings are discussed with reference to models of time perception, as well as implications for emotional driving and misperceptions of speed. It is important to consider the role of physiology in the misperception of time, as these factors can lead to increases in driving accidents.Keywords: emotions, nervous system, physiology, time perception
Procedia PDF Downloads 32430772 Application of the DTC Control in the Photovoltaic Pumping System
Authors: M. N. Amrani, H. Abanou, A. Dib
Abstract:
In this paper, we proposed a strategy for optimizing the performance for a pumping structure constituted by an induction motor coupled to a centrifugal pump and improving existing results in this context. The considered system is supplied by a photovoltaic generator (GPV) through two static converters piloted in an independent manner. We opted for a maximum power point tracking (MPPT) control method based on the Neuro - Fuzzy, which is well known for its stability and robustness. To improve the induction motor performance, we use the concept of Direct Torque Control (DTC) and PID controller for motor speed to pilot the working of the induction motor. Simulations of the proposed approach give interesting results compared to the existing control strategies in this field. The model of the proposed system is simulated by MATLAB/Simulink.Keywords: solar energy, pumping photovoltaic system, maximum power point tracking, direct torque Control (DTC), PID regulator
Procedia PDF Downloads 54830771 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 30730770 Fall Avoidance Control of Wheeled Inverted Pendulum Type Robotic Wheelchair While Climbing Stairs
Authors: Nan Ding, Motoki Shino, Nobuyasu Tomokuni, Genki Murata
Abstract:
The wheelchair is the major means of transport for physically disabled people. However, it cannot overcome architectural barriers such as curbs and stairs. In this paper, the authors proposed a method to avoid falling down of a wheeled inverted pendulum type robotic wheelchair for climbing stairs. The problem of this system is that the feedback gain of the wheels cannot be set high due to modeling errors and gear backlash, which results in the movement of wheels. Therefore, the wheels slide down the stairs or collide with the side of the stairs, and finally the wheelchair falls down. To avoid falling down, the authors proposed a slider control strategy based on skyhook model in order to decrease the movement of wheels, and a rotary link control strategy based on the staircase dimensions in order to avoid collision or slide down. The effectiveness of the proposed fall avoidance control strategy was validated by ODE simulations and the prototype wheelchair.Keywords: EPW, fall avoidance control, skyhook, wheeled inverted pendulum
Procedia PDF Downloads 33330769 China’s Grand Strategy and Greece
Authors: Alexandra Doga, Andreas Lioumpas, Sotiris Petropoulos
Abstract:
This paper assesses China-Greece relations since 2006, examining them as part of China’s Grand Strategy and Greece’s perception of them. Τhe first aim of the paper is to provide an overview of China-Greece relations in connection with its long- and short-term goals. In essence, it focuses on understanding whether a Chinese grand strategy towards Greece exists. Secondly, it aims to examine the perception of Greeks over China’s foreign policy towards Greece. The intended contribution of the paper is to illustrate the response of national discourses over China’s increased presence in both the global sphere and specific countries in particular. This paper is based on qualitative analysis of secondary data as well as a thorough primary research scheme based on semi-structured interviews. The study made use of official Chinese government documents as well as academic journal articles and books. Local news outlets like newspapers provide data, and news surrounding Greece’s perception of China-Greece relations were also included. Moreover, a number of interviews of Greek officials, academics, journalists, and businessmen were conducted. This paper concluded that the period that began with the 2006 Joint Communiqué between China and Greece on the Establishment of Comprehensive Strategic Partnership has been one of the rapid strengthening of bilateral economic and political relations and frequent high-level visits. There are diverging/opposing views on whether China’s strategic choices towards Greece form part of a broader strategic approach and on whether this strategy is closely connected to the BRI initiative and its priorities.Keywords: China, Greece, Grand Strategy, BRI, COSCO, Piraeus Port, Mediterranean
Procedia PDF Downloads 10830768 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria
Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma
Abstract:
Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures
Procedia PDF Downloads 111