Search results for: covert police operations
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1979

Search results for: covert police operations

1109 Hydrogeological Appraisal of Karacahisar Coal Field (Western Turkey): Impacts of Mining on Groundwater Resources Utilized for Water Supply

Authors: Sukran Acikel, Mehmet Ekmekci, Otgonbayar Namkhai

Abstract:

Lignite coal fields in western Turkey generally occurs in tensional Neogene basins bordered by major faults. Karacahisar coal field in Mugla province of western Turkey is a large Neogene basin filled with alternation of silisic and calcerous layers. The basement of the basin is composed of mainly karstified carbonate rocks of Mesozoic and schists of Paleozoic age. The basement rocks are exposed at highlands surrounding the basin. The basin fill deposits forms shallow, low yield and local aquifers whereas karstic carbonate rock masses forms the major aquifer in the region. The karstic aquifer discharges through a spring zone issuing at intersection of two major faults. Municipal water demand in Bodrum city, a touristic attraction area is almost totally supplied by boreholes tapping the karstic aquifer. A well field has been constructed on the eastern edge of the coal basin, which forms a ridge separating two Neogene basins. A major concern was raised about the plausible impact of mining activities on groundwater system in general and on water supply well field in particular. The hydrogeological studies carried out in the area revealed that the coal seam is located below the groundwater level. Mining operations will be affected by groundwater inflow to the pits, which will require dewatering measures. Dewatering activities in mine sites have two-sided effects: a) lowers the groundwater level at and around the pit for a safe and effective mining operation, b) continuous dewatering causes expansion of cone of depression to reach a spring, stream and/or well being utilized by local people, capturing their water. Plausible effect of mining operations on the flow of the spring zone was another issue of concern. Therefore, a detailed representative hydrogeological conceptual model of the site was developed on the basis of available data and field work. According to the hydrogeological conceptual model, dewatering of Neogene layers will not hydraulically affect the water supply wells, however, the ultimate perimeter of the open pit will expand to intersect the well field. According to the conceptual model, the coal seam is separated from the bottom by a thick impervious clay layer sitting on the carbonate basement. Therefore, the hydrostratigraphy does not allow a hydraulic interaction between the mine pit and the karstic carbonate rock aquifer. However, the structural setting in the basin suggests that deep faults intersecting the basement and the Neogene sequence will most probably carry the deep groundwater up to a level above the bottom of the pit. This will require taking necessary measure to lower the piezometric level of the carbonate rock aquifer along the faults. Dewatering the carbonate rock aquifer will reduce the flow to the spring zone. All findings were put together to recommend a strategy for safe and effective mining operation.

Keywords: conceptual model, dewatering, groundwater, mining operation

Procedia PDF Downloads 388
1108 The Impact of the Constitution of Myanmar on the Political Power of Aung San Suu Kyi and the Rohingya Conflict

Authors: Nur R. Daut

Abstract:

The objective of this paper is to offer an insight on how political power inequality has contributed and exacerbated the political violence towards the Rohingya ethnic group in Myanmar. In particular, this paper attempts to illustrate how power inequality in the country has prevented Myanmar’s leader Aung San Suu Kyi from taking effective measures on the issue. The research centers on the question of why Aung San Suu Kyi has been seen as not doing enough to stop the persecution of the Rohingya ethnic group ever since she was appointed the State Counsellor to the Myanmar government. As a Nobel Peace Prize laureate, Suu Kyi’s lack of action on the matter has come under severe criticism by the international community. Many have seen this as Suu Kyi’s failure to establish democracy and allowing mass killing to spread in the country. The real question that many perhaps should be asking, however, is how much power Suu Kyi actually holds within the government which is still heavily controlled by the military or Tatmadaw. This paper argues that Suu Kyi’s role within the government is limited which hinders constructive and effective measures to be taken on the Rohingya issue. Political power in this research is being measured by 3 factors: control over events such as burning of Rohingya villages, control over resources such as land ownership and media and control over actors such the Tatmadaw, police force and civil society who are greatly needed to ease and resolve the conflict. In order to illustrate which individuals or institution have control over all the 3 above factors, this paper will first study the constitution of Myanmar. The constitution will also be able to show the asymmetrical power relations as it will provide evidence as to how much political power Suu Kyi holds within the government in comparison to other political actors and institutions. Suu Kyi’s role as a state counsellor akin to a prime minister is a newly created position as the current constitution of Myanmar bars anyone with a foreign spouse from holding the post of a president in the country. This is already an indication of the inequality of political power between Suu Kyi and the military. Apart from studying the constitution of Myanmar, Suu Kyi’s speeches and various interviews are also studied in order to answer the research question. Unfortunately, Suu Kyi’s limited political power also involves the Buddhist monks in Myanmar who have held significant influence throughout the history of the country. This factor further prevents Suu Kyi from preserving the sanctity of human rights in Myanmar.

Keywords: Aung San Suu Kyi, constitution of Myanmar, inequality, political power, political violence, Rohingya, Tatmadaw

Procedia PDF Downloads 104
1107 12 Real Forensic Caseworks Solved by the DNA STR-Typing of Skeletal Remains Exposed to Extremely Environment Conditions without the Conventional Bone Pulverization Step

Authors: Chiara Della Rocca, Gavino Piras, Andrea Berti, Alessandro Mameli

Abstract:

DNA identification of human skeletal remains plays a valuable role in the forensic field, especially in missing persons and mass disaster investigations. Hard tissues, such as bones and teeth, represent a very common kind of samples analyzed in forensic laboratories because they are often the only biological materials remaining. However, the major limitation of using these compact samples relies on the extremely time–consuming and labor–intensive treatment of grinding them into powder before proceeding with the conventional DNA purification and extraction step. In this context, a DNA extraction assay called the TBone Ex kit (DNA Chip Research Inc.) was developed to digest bone chips without powdering. Here, we simultaneously analyzed bone and tooth samples that arrived at our police laboratory and belonged to 15 different forensic casework that occurred in Sardinia (Italy). A total of 27 samples were recovered from different scenarios and were exposed to extreme environmental factors, including sunlight, seawater, soil, fauna, vegetation, and high temperature and humidity. The TBone Ex kit was used prior to the EZ2 DNA extraction kit on the EZ2 Connect Fx instrument (Qiagen), and high-quality autosomal and Y-chromosome STRs profiles were obtained for the 80% of the caseworks in an extremely short time frame. This study provides additional support for the use of the TBone Ex kit for digesting bone fragments/whole teeth as an effective alternative to pulverization protocols. We empirically demonstrated the effectiveness of the kit in processing multiple bone samples simultaneously, largely simplifying the DNA extraction procedure and the good yield of recovered DNA for downstream genetic typing in highly compromised forensic real specimens. In conclusion, this study turns out to be extremely useful for forensic laboratories, to which the various actors of the criminal justice system – such as potential jury members, judges, defense attorneys, and prosecutors – required immediate feedback.

Keywords: DNA, skeletal remains, bones, tbone ex kit, extreme conditions

Procedia PDF Downloads 18
1106 A Comparative and Mixed Methods Study of Possible Selves of Adolescent Boys in an Observation Home and a Children's Home in India

Authors: Apurva Sapra

Abstract:

The aim of this research was to study and compare the nature of expected, feared and hoped-for selves in institutionalized adolescent boys in two residential settings – an observation home with children in conflict with the law, and a children’s home with children in need of care and protection. The study uses a concurrent mixed methods design, in which eight adolescent boys from each group, aged 13-17, were asked to respond to a questionnaire, followed by an in-depth interview. The questionnaire looked into the total scores on current, probable and hoped-for/feared positive and negative self-descriptors. Possible selves of both groups were found to be influenced by their unique histories, such as with their experience of violence, interaction with the police and emphasis given on education. Expected selves and hoped-for selves were similar within the two groups. However, they were more concrete and attainable in the observation home and more ambitious in the children’s home. Quantitative results showed that on the positive self-descriptors, the participants in the observation home had a slightly lower total score on the current parameter as on the probable and hoped-for parameters. The participants in the children’s home showed similar results on current and probable positive self-descriptors, with higher scores on the hoped-for parameter. For most of the negative self-descriptors, the current score for the observation home group was lower than the expected score, and for the children’s home group, they were feared slightly more than they were expected. Along with the nature of possible selves, the study also looked into threats and support to desired and feared possible selves, as well as strategies to attain the desired possible selves and avoid feared possible selves. While threats to possible selves were identified as external and internal in both groups, the participants in the children’s home tended to identify threats as external. The categories of support were similar across the two groups, although the nature of support provided differed. Strategies adopted by participants in the observation home could be clearly divided as past, present and future strategies, while those adopted by participants in the children’s home had an overlap with past and future strategies. The institution was perceived as having a negative influence for the future in the observation home group, but positive in the children’s home group. Limitations of the study and recommendations for future research, policy setting and the counselling profession are discussed.

Keywords: adolescents, expected self, feared self, hoped-for self, institutions, possible selves

Procedia PDF Downloads 219
1105 Recovery of an Area Degraded by Gullies in the Municipality of Monte Alto (SP), Brazil

Authors: Layane Sara Vieira, Paulo Egidio Bernardo, Roberto Saverio Souza Costa

Abstract:

Anthropogenic occupations and agricultural explorations without concern for the preservation and sustainability of the activity result in soil degradation that can make rural activity unfeasible. The objective of this work was to characterize and evaluate the recovery costs of an area degraded by major erosion (gully) in the municipality of Monte Alto (SP). Topographic characterization was carried out by means of a planialtimetric survey with a total station. The contours of the gully, internal area, slope height, contribution area, volume, and costs of operations for the recovery of the gully were delimited. The results obtained showed that the gully has a length of 145.56 m, a maximum width of 36.61 m, and a gap of 19.48 m. The external area of the gully is 1,039.8741 m², and the internal area is 119.3470 m². The calculated volume was 3,282.63 m³. The intervention area for breaking slopes was measured at 8,471.29 m², requiring the construction of 19 terraces in this area, vertically spaced at 2.8 m. The estimated costs for mechanical recovery of the gully were R$ 19,167.84 (US$ 3.657,98).

Keywords: erosion, volumetric assessment, soil degradation, terraces

Procedia PDF Downloads 84
1104 On-Line Data-Driven Multivariate Statistical Prediction Approach to Production Monitoring

Authors: Hyun-Woo Cho

Abstract:

Detection of incipient abnormal events in production processes is important to improve safety and reliability of manufacturing operations and reduce losses caused by failures. The construction of calibration models for predicting faulty conditions is quite essential in making decisions on when to perform preventive maintenance. This paper presents a multivariate calibration monitoring approach based on the statistical analysis of process measurement data. The calibration model is used to predict faulty conditions from historical reference data. This approach utilizes variable selection techniques, and the predictive performance of several prediction methods are evaluated using real data. The results shows that the calibration model based on supervised probabilistic model yielded best performance in this work. By adopting a proper variable selection scheme in calibration models, the prediction performance can be improved by excluding non-informative variables from their model building steps.

Keywords: calibration model, monitoring, quality improvement, feature selection

Procedia PDF Downloads 341
1103 Modelling and Simulation of Bioethanol Production from Food Waste Using CHEMCAD Software

Authors: Kgomotso Matobole, Noluzuko Monakali, Hilary Rutto, Tumisang Seodigeng

Abstract:

On a global scale, there is an alarming generation of food waste. Food waste is generated across the food supply chain. Worldwide urbanization, as well as global economic growth, have contributed to this amount of food waste the environment is receiving. Food waste normally ends on illegal dumping sites when not properly disposed, or disposed to landfills. This results in environmental pollution due to inadequate waste management practices. Food waste is rich in organic matter and highly biodegradable; hence, it can be utilized for the production of bioethanol, a type of biofuel. In so doing, alternative energy will be created, and the volumes of food waste will be reduced in the process. This results in food waste being seen as a precious commodity in energy generation instead of a pollutant. The main aim of the project was to simulate a biorefinery, using a software called CHEMCAD 7.12. The resulting purity of the ethanol from the simulation was 98.9%, with the feed ratio of 1: 2 for food waste and water. This was achieved by integrating necessary unit operations and optimisation of their operating conditions.

Keywords: fermentation, bioethanol, food waste, hydrolysis, simulation, modelling

Procedia PDF Downloads 328
1102 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks

Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid

Abstract:

Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.

Keywords: WSN, routing, cluster based, meme, memetic algorithm

Procedia PDF Downloads 463
1101 Optimization of E-motor Control Parameters for Electrically Propelled Vehicles by Integral Squared Method

Authors: Ibrahim Cicek, Melike Nikbay

Abstract:

Electrically propelled vehicles, either road or aerial vehicles are studied on contemporarily for their robust maneuvers and cost-efficient transport operations. The main power generating systems of such vehicles electrified by selecting proper components and assembled as e-powertrain. Generally, e-powertrain components selected considering the target performance requirements. Since the main component of propulsion is the drive unit, e-motor control system is subjected to achieve the performance targets. In this paper, the optimization of e-motor control parameters studied by Integral Squared Method (ISE). The overall aim is to minimize power consumption of such vehicles depending on mission profile and maintaining smooth maneuvers for passenger comfort. The sought-after values of control parameters are computed using the Optimal Control Theory. The system is modeled as a closed-loop linear control system with calibratable parameters.

Keywords: optimization, e-powertrain, optimal control, electric vehicles

Procedia PDF Downloads 108
1100 Generation of Automated Alarms for Plantwide Process Monitoring

Authors: Hyun-Woo Cho

Abstract:

Earlier detection of incipient abnormal operations in terms of plant-wide process management is quite necessary in order to improve product quality and process safety. And generating warning signals or alarms for operating personnel plays an important role in process automation and intelligent plant health monitoring. Various methodologies have been developed and utilized in this area such as expert systems, mathematical model-based approaches, multivariate statistical approaches, and so on. This work presents a nonlinear empirical monitoring methodology based on the real-time analysis of massive process data. Unfortunately, the big data includes measurement noises and unwanted variations unrelated to true process behavior. Thus the elimination of such unnecessary patterns of the data is executed in data processing step to enhance detection speed and accuracy. The performance of the methodology was demonstrated using simulated process data. The case study showed that the detection speed and performance was improved significantly irrespective of the size and the location of abnormal events.

Keywords: detection, monitoring, process data, noise

Procedia PDF Downloads 233
1099 Coverage Probability Analysis of WiMAX Network under Additive White Gaussian Noise and Predicted Empirical Path Loss Model

Authors: Chaudhuri Manoj Kumar Swain, Susmita Das

Abstract:

This paper explores a detailed procedure of predicting a path loss (PL) model and its application in estimating the coverage probability in a WiMAX network. For this a hybrid approach is followed in predicting an empirical PL model of a 2.65 GHz WiMAX network deployed in a suburban environment. Data collection, statistical analysis, and regression analysis are the phases of operations incorporated in this approach and the importance of each of these phases has been discussed properly. The procedure of collecting data such as received signal strength indicator (RSSI) through experimental set up is demonstrated. From the collected data set, empirical PL and RSSI models are predicted with regression technique. Furthermore, with the aid of the predicted PL model, essential parameters such as PL exponent as well as the coverage probability of the network are evaluated. This research work may assist in the process of deployment and optimisation of any cellular network significantly.

Keywords: WiMAX, RSSI, path loss, coverage probability, regression analysis

Procedia PDF Downloads 154
1098 Concept Drifts Detection and Localisation in Process Mining

Authors: M. V. Manoj Kumar, Likewin Thomas, Annappa

Abstract:

Process mining provides methods and techniques for analyzing event logs recorded in modern information systems that support real-world operations. While analyzing an event-log, state-of-the-art techniques available in process mining believe that the operational process as a static entity (stationary). This is not often the case due to the possibility of occurrence of a phenomenon called concept drift. During the period of execution, the process can experience concept drift and can evolve with respect to any of its associated perspectives exhibiting various patterns-of-change with a different pace. Work presented in this paper discusses the main aspects to consider while addressing concept drift phenomenon and proposes a method for detecting and localizing the sudden concept drifts in control-flow perspective of the process by using features extracted by processing the traces in the process log. Our experimental results are promising in the direction of efficiently detecting and localizing concept drift in the context of process mining research discipline.

Keywords: abrupt drift, concept drift, sudden drift, control-flow perspective, detection and localization, process mining

Procedia PDF Downloads 330
1097 Automated Marker Filling System

Authors: Pinisetti Swami Sairam, Meera C. S.

Abstract:

Marker pens are widely used all over the world, mainly in educational institutions due to their neat, accurate and easily erasable nature. But refilling the ink in these pens is a tedious and time consuming job. Besides, it requires careful handling of the pens and ink bottle. A fully automated marker filling system is a solution developed to overcome this problem. The system comprises of pneumatics and electronics modules as well as PLC control. The system design is done in such a way that the empty markers are dumped in a marker container which then sent through different modules of the system in order to refill it automatically. The filled markers are then collected in a marker container. Refilling of ink takes place in different stages inside the system. An ink detecting system detects the colour of the marker which is to be filled and then refilling is done. The processes like capping and uncapping of the cap as well as screwing and unscrewing of the tip are done with the help of robotic arm and gripper. We make use of pneumatics in this system in order to get the precision while performing the capping, screwing, and refilling operations. Thus with the help of this system we can achieve cleanliness, accuracy, effective and time saving in the process of filling a marker.

Keywords: automated system, market filling, information technology, control and automation

Procedia PDF Downloads 478
1096 Numerical Implementation and Testing of Fractioning Estimator Method for the Box-Counting Dimension of Fractal Objects

Authors: Abraham Terán Salcedo, Didier Samayoa Ochoa

Abstract:

This work presents a numerical implementation of a method for estimating the box-counting dimension of self-avoiding curves on a planar space, fractal objects captured on digital images; this method is named fractioning estimator. Classical methods of digital image processing, such as noise filtering, contrast manipulation, and thresholding, among others, are used in order to obtain binary images that are suitable for performing the necessary computations of the fractioning estimator. A user interface is developed for performing the image processing operations and testing the fractioning estimator on different captured images of real-life fractal objects. To analyze the results, the estimations obtained through the fractioning estimator are compared to the results obtained through other methods that are already implemented on different available software for computing and estimating the box-counting dimension.

Keywords: box-counting, digital image processing, fractal dimension, numerical method

Procedia PDF Downloads 68
1095 The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN

Authors: Nur Iman Subono, Meidi Kosandi

Abstract:

This paper examines the role of regional cooperation in the Association of Southeast Asian Nations (ASEAN) in the fight against human trafficking for Indonesia. Many among scholars suggest that regional cooperation is necessary for combating human trafficking for its transnational and organized character as a crime against humanity. ASEAN members have been collectively active in responding transnational security issues with series of talks and collaboration agreement since early 2000s. Lately in 2015, ASEAN agreed on ASEAN Convention against Trafficking in Persons, particularly Women and Children (ACTIP) that requires each member to collaborate in information sharing and providing effective safeguard and protection of victims. Yet, the frequency of human trafficking crime occurrence remains high and tend to increase in Indonesian in 2017-2018. The objective of this paper is to examine the effectiveness and success of ACTIP implementation in the fight against human trafficking in Indonesia. Based on two years of research (2017-2018) in three provinces with the largest number of victims in Indonesia, this paper shows the tendency of persisting crime despite the implementation of regional and national anti-trafficking policies. The research was conducted by archive study, literature study, discourse analysis, and depth interviews with local government officials, police, prosecutors, victims, and traffickers. This paper argues that the relative success of ASEAN in establishing convention at the high-level meetings has not been followed with the success in its implementation in the society. Three main factors have contributed to the ineffectiveness of the agreements, i.e. (1) ASEAN institutional arrangement as a collection of sovereign states instead of supranational organization with binding authority; (2) the lack of commitment of ASEAN sovereign member-states to the agreements; and (3) the complexity and variety of the nature of the crime in each member-state. In effect, these factors have contributed to generating the regionalism paradox in ASEAN where states tend to revert to national policies instead of seeking regional collective solution.

Keywords: human trafficking, transnational security, regionalism, anti trafficking policy

Procedia PDF Downloads 136
1094 Improving the Ability of Constructed Wetlands to Treat Acid Mine Drainage

Authors: Chigbo Emmanuel Ikechukwu

Abstract:

Constructed wetlands are seen as a potential means of ameliorating the poor quality water that derives from coal and gold mining operations. However, the processes whereby a wetland environment is able to improve water quality are not well understood and techniques for optimising their performance poorly developed. A parameter that may be manipulated in order to improve the treatment capacity of a wetland is the substrate in which the aquatic plants are rooted. This substrate can provide an environment wherein sulphate reducing bacteria, which contribute to the removal of contaminants from the water, are able to flourish. The bacteria require an energy source which is largely provided by carbon in the substrate. This paper discusses the form in which carbon is most suitable for the bacteria and describes the results of a series of experiments in which different materials were used as substrate. Synthetic acid mine drainage was passed through an anaerobic bioreactor that contained either compost or cow manure. The effluent water quality was monitored with respect to time and the effect of the substrate composition discussed.

Keywords: constructed wetland, bacteria, carbon, acid mine drainage, sulphate

Procedia PDF Downloads 421
1093 The Ambivalent Dealing with Diversity: An Ethnographic Study of Diversity and Its Different Faces of Managing in a Mixed Neighborhood in Germany

Authors: Nina Berding

Abstract:

Migration and the ensuing diversity are integral parts of urban societies. However, engaging with the urban society and its diversification is rarely perceived as something trivial but rather as a difficult task and a major challenge. A central aspect of the discourse is the current migration of refugees from countries of the southern hemisphere to Europe and the resulting challenges for cities, their municipalities and the civil society as a whole. Based on exploratory field research in a German inner-city neighborhood, it is aimed to show that the discourses about migration and diversity are completely contrary to the everyday life actions of the urban society. Processes of migration that include leaving one’s hometown and moving to other places, searching for ‘safe’ environments or better opportunities are, historically speaking, not a new phenomenon. The urban dwellers have a large repertoire of strategies in managing processes of difference in everyday life situations, guided them well for centuries and also in these contemporary processes with an increased mobility and diversity. So there is obviously a considerable discrepancy between what is practically lived in everyday life, and how it is talked about. The results of the study demonstrate that the current discourse about the challenges of migration seems to legitimize interventions beyond humanist approaches where migrants serve as collective scapegoats for social problems and affected by different discrimination and criminalization processes. On the one hand, everyone takes advantage of the super-mobility and super-diversity in their daily lives and on the other hand, powerful stakeholders and designated authorities operate a sort of retro- nationalism and identity collectivism. Political players, the municipalities and other stakeholders then follow an urban public policy that takes actions (increasing police presence, concepts and activities for special groups, exclusion from active social life, preventing participation etc.) towards different ‘groups’ of residents, produced along ‘ethnic’ lines. The results also show that, despite the obstacles and adversities placed in their way, the excluded residents perpetually relocate and re-position themselves and attempt to empower themselves by redefining their identities in their neighborhood.

Keywords: coexistence, everyday life, migration and diversity regimes, urban policy

Procedia PDF Downloads 230
1092 An Efficient Process Analysis and Control Method for Tire Mixing Operation

Authors: Hwang Ho Kim, Do Gyun Kim, Jin Young Choi, Sang Chul Park

Abstract:

Since tire production process is very complicated, company-wide management of it is very difficult, necessitating considerable amounts of capital and labors. Thus, productivity should be enhanced and maintained competitive by developing and applying effective production plans. Among major processes for tire manufacturing, consisting of mixing component preparation, building and curing, the mixing process is an essential and important step because the main component of tire, called compound, is formed at this step. Compound as a rubber synthesis with various characteristics plays its own role required for a tire as a finished product. Meanwhile, scheduling tire mixing process is similar to flexible job shop scheduling problem (FJSSP) because various kinds of compounds have their unique orders of operations, and a set of alternative machines can be used to process each operation. In addition, setup time required for different operations may differ due to alteration of additives. In other words, each operation of mixing processes requires different setup time depending on the previous one, and this kind of feature, called sequence dependent setup time (SDST), is a very important issue in traditional scheduling problems such as flexible job shop scheduling problems. However, despite of its importance, there exist few research works dealing with the tire mixing process. Thus, in this paper, we consider the scheduling problem for tire mixing process and suggest an efficient particle swarm optimization (PSO) algorithm to minimize the makespan for completing all the required jobs belonging to the process. Specifically, we design a particle encoding scheme for the considered scheduling problem, including a processing sequence for compounds and machine allocation information for each job operation, and a method for generating a tire mixing schedule from a given particle. At each iteration, the coordination and velocity of particles are updated, and the current solution is compared with new solution. This procedure is repeated until a stopping condition is satisfied. The performance of the proposed algorithm is validated through a numerical experiment by using some small-sized problem instances expressing the tire mixing process. Furthermore, we compare the solution of the proposed algorithm with it obtained by solving a mixed integer linear programming (MILP) model developed in previous research work. As for performance measure, we define an error rate which can evaluate the difference between two solutions. As a result, we show that PSO algorithm proposed in this paper outperforms MILP model with respect to the effectiveness and efficiency. As the direction for future work, we plan to consider scheduling problems in other processes such as building, curing. We can also extend our current work by considering other performance measures such as weighted makespan or processing times affected by aging or learning effects.

Keywords: compound, error rate, flexible job shop scheduling problem, makespan, particle encoding scheme, particle swarm optimization, sequence dependent setup time, tire mixing process

Procedia PDF Downloads 247
1091 Framework for Socio-Technical Issues in Requirements Engineering for Developing Resilient Machine Vision Systems Using Levels of Automation through the Lifecycle

Authors: Ryan Messina, Mehedi Hasan

Abstract:

This research is to examine the impacts of using data to generate performance requirements for automation in visual inspections using machine vision. These situations are intended for design and how projects can smooth the transfer of tacit knowledge to using an algorithm. We have proposed a framework when specifying machine vision systems. This framework utilizes varying levels of automation as contingency planning to reduce data processing complexity. Using data assists in extracting tacit knowledge from those who can perform the manual tasks to assist design the system; this means that real data from the system is always referenced and minimizes errors between participating parties. We propose using three indicators to know if the project has a high risk of failing to meet requirements related to accuracy and reliability. All systems tested achieved a better integration into operations after applying the framework.

Keywords: automation, contingency planning, continuous engineering, control theory, machine vision, system requirements, system thinking

Procedia PDF Downloads 182
1090 Low-Cost IoT System for Monitoring Ground Propagation Waves due to Construction and Traffic Activities to Nearby Construction

Authors: Lan Nguyen, Kien Le Tan, Bao Nguyen Pham Gia

Abstract:

Due to the high cost, specialized dynamic measurement devices for industrial lands are difficult for many colleges to equip for hands-on teaching. This study connects a dynamic measurement sensor and receiver utilizing an inexpensive Raspberry Pi 4 board, some 24-bit ADC circuits, a geophone vibration sensor, and embedded Python open-source programming. Gather and analyze signals for dynamic measuring, ground vibration monitoring, and structure vibration monitoring. The system may wirelessly communicate data to the computer and is set up as a communication node network, enabling real-time monitoring of background vibrations at various locations. The device can be utilized for a variety of dynamic measurement and monitoring tasks, including monitoring earthquake vibrations, ground vibrations from construction operations, traffic, and vibrations of building structures.

Keywords: sensors, FFT, signal processing, real-time data monitoring, ground propagation wave, python, raspberry Pi 4

Procedia PDF Downloads 86
1089 An Approach to Tackle Start up Problems Using Applied Games

Authors: Aiswarya Gopal, Kamal Bijlani, Vinoth Rengaraj, R. Jayakrishnan

Abstract:

In the business world, the term “startup” is frequently ringing the bell with the high frequency of young ventures. The main dilemma of startups is the unsuccessful management of the unique risks that have to be confronted in the present world of competition and technology. This research work tried to bring out a game based methodology to improve enough real-world experience among entrepreneurs as well as management students to handle risks and challenges in the field. The game will provide experience to the player to overcome challenges like market problems, running out of cash, poor management, and product problems which can be resolved by a proper strategic approach in the entrepreneurship world. The proposed serious game works on the life cycle of a new software enterprise where the entrepreneur moves from the planning stage to secured financial stage, laying down the basic business structure, and initiates the operations ensuring the increment in confidence level of the player.

Keywords: business model, game based learning, poor management, start up

Procedia PDF Downloads 460
1088 Design and Fabrication of Micro-Bubble Oxygenator

Authors: Chiang-Ho Cheng, An-Shik Yang, Hong-Yih Cheng

Abstract:

This paper applies the MEMS technology to design and fabricate a micro-bubble generator by a piezoelectric actuator. Coupled with a nickel nozzle plate, an annular piezoelectric ceramic was utilized as the primary structure of the generator. In operations, the piezoelectric element deforms transversely under an electric field applied across the thickness of the generator. The surface of the nozzle plate can expand or contract because of the induction of radial strain, resulting in the whole structure to bend, and successively transport oxygen micro-bubbles into the blood flow for enhancing the oxygen content in blood. In the tests, a high magnification microscope and a high speed CCD camera were employed to photograph the time evolution of meniscus shape of gaseous bubbles dispensed from the micro-bubble generator for flow visualization. This investigation thus explored the bubble formation process including the influences of inlet gas pressure along with driving voltage and resonance frequency on the formed bubble extent.

Keywords: micro-bubble, oxygenator, nozzle, piezoelectric

Procedia PDF Downloads 300
1087 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 411
1086 Responding to and Preventing Sexual and Gender Based Violence Related to Ragging, in University of Kelaniya: A Case Study

Authors: Anuruddhi Edirisinghe, Anusha Edirisinghe, Maithree Wicramasinghe, Sagarika Kannangara, Annista Wijayanayake

Abstract:

SGBV which refer to acts of inflicting physical, mental or sexual harm or sufferings that deprive a person’s liberty based on one’s gender or sexuality is known to occur in various forms. Ragging in educational institutions can often be one such form of SGBV. Ragging related SGBV is a growing problem despite various legal, policy and programme initiatives introduced over the years. While the punishment of perpetrators through the criminal justice system is expected to bring a deterrent effect, other strategies such as awareness-raising, attitudinal changes, and the empowerment of students to say no to ragging and SGBV will lead to enlightened attitudes about the practice in universities. Thus, effective regular prevention programmes are the need of the hour. The objectives of the paper are to engage with the case of a female fresher subjected to verbal abuse, physical assault and sexual harassment due to events which started as a result of wearing a trouser to the university during the ragging season. The case came to the limelight since a complaint was made to the police and 10 students were arrested under the anti-ragging act. This led to dividend opinions among the student population and a backlash from the student union. Simultaneously, this resulted in the society demanding the stricter implementation of laws and the punishment of perpetrators. The university authority appointed a task force comprising of academics, non-academics, parents, community leaders, stakeholders and students to draw up an action plan to respond to the immediate situation as well as future prevention. The paper will also discuss the implementation of task force plan. The paper is based on interviews with those involved with the issue and the experiences of the task force members and is expected to provide an in-depth understanding of the intricacies and complications associated with dealing with a contentious problem such as ragging. Given the political and ethical issues involved with insider research as well as the sensationalism of the topic, maximum care will be taken to safeguard the interests of those concerned.

Keywords: fresher, sexual and gender based violence (SGBV), sexual harassment, ragging

Procedia PDF Downloads 222
1085 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 230
1084 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review

Authors: Zeeshan Hamid, Asher Ramish

Abstract:

The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.

Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care

Procedia PDF Downloads 300
1083 Development of the Logistic Service Providers under the Pandemic Affects during COVID-19 in Turkey

Authors: Süleyman Günes

Abstract:

The crucial effects of the COVID-19 pandemic have on social and economic systems in Turkey as well as all over the world. It has impacted logistic providers and worldwide supply chains. Unexpected risks played a central role in creating vulnerabilities for logistics service operations during the pandemic terms. This study aims to research and design qualitative and quantitive contributions to logistic services. The COVID-19 pandemic brought unavoidable risks to the logistics industry in Turkey. The Logistic Service Providers (LSPs) have learned how to ensure uncertainties and risks triggered by main and adverse effects. The risks that LSPs encounter during the COVID-19 pandemic have been investigated and unveiled, and identified uncertainties and risks. The cause-effect structures were displayed by the qualitative and quantitive studies. The results suggest that supply chains and demand changes triggered by the COVID-19 pandemic while it influenced financial failure and forecast horizon with operational performances.

Keywords: logistic service providers, COVID-19, development, financial failure

Procedia PDF Downloads 61
1082 Development of a Conceptual Framework for Supply Chain Management Strategies Maximizing Resilience in Volatile Business Environments: A Case of Ventilator Challenge UK

Authors: Elena Selezneva

Abstract:

Over the last two decades, an unprecedented growth in uncertainty and volatility in all aspects of the business environment has caused major global supply chain disruptions and malfunctions. The effects of one failed company in a supply chain can ripple up and down the chain, causing a number of entities or an entire supply chain to collapse. The complicating factor is that an increasingly unstable and unpredictable business environment fuels the growing complexity of global supply chain networks. That makes supply chain operations extremely unpredictable and hard to manage with the established methods and strategies. It has caused the premature demise of many companies around the globe as they could not withstand or adapt to the storm of change. Solutions to this problem are not easy to come by. There is a lack of new empirically tested theories and practically viable supply chain resilience strategies. The mainstream organizational approach to managing supply chain resilience is rooted in well-established theories developed in the 1960-1980s. However, their effectiveness is questionable in currently extremely volatile business environments. The systems thinking approach offers an alternative view of supply chain resilience. Still, it is very much in the development stage. The aim of this explorative research is to investigate supply chain management strategies that are successful in taming complexity in volatile business environments and creating resilience in supply chains. The design of this research methodology was guided by an interpretivist paradigm. A literature review informed the selection of the systems thinking approach to supply chain resilience. Therefore, an explorative single case study of Ventilator Challenge UK was selected as a case study for its extremely resilient performance of its supply chain during a period of national crisis. Ventilator Challenge UK is intensive care ventilators supply project for the NHS. It ran for 3.5 months and finished in 2020. The participants moved on with their lives, and most of them are not employed by the same organizations anymore. Therefore, the study data includes documents, historical interviews, live interviews with participants, and social media postings. The data analysis was accomplished in two stages. First, data were thematically analyzed. In the second stage, pattern matching and pattern identification were used to identify themes that formed the findings of the research. The findings from the Ventilator Challenge UK case study supply management practices demonstrated all the features of an adaptive dynamic system. They cover all the elements of supply chain and employ an entire arsenal of adaptive dynamic system strategies enabling supply chain resilience. Also, it is not a simple sum of parts and strategies. Bonding elements and connections between the components of a supply chain and its environment enabled the amplification of resilience in the form of systemic emergence. Enablers are categorized into three subsystems: supply chain central strategy, supply chain operations, and supply chain communications. Together, these subsystems and their interconnections form the resilient supply chain system framework conceptualized by the author.

Keywords: enablers of supply chain resilience, supply chain resilience strategies, systemic approach in supply chain management, resilient supply chain system framework, ventilator challenge UK

Procedia PDF Downloads 65
1081 Mechanical Simulation with Electrical and Dimensional Tests for AISHa Containment Chamber

Authors: F. Noto, G. Costa, L. Celona, F. Chines, G. Ciavola, G. Cuttone, S. Gammino, O. Leonardi, S. Marletta, G. Torrisi

Abstract:

At Istituto Nazionale di Fisica Nucleare – Laboratorio Nazionale del Sud (INFN-LNS), a broad experience in the design, construction and commissioning of ECR and microwave ion sources is available. The AISHa ion source has been designed by taking into account the typical requirements of hospital-based facilities, where the minimization of the mean time between failures (MTBF) is a key point together with the maintenance operations, which should be fast and easy. It is intended to be a multipurpose device, operating at 18 GHz, in order to achieve higher plasma densities. It should provide enough versatility for future needs of the hadron therapy, including the ability to run at larger microwave power to produce different species and highly charged ion beams. The source is potentially interesting for any hadron therapy facility using heavy ions. In this paper, we analyzed the dimensional test and electrical test about an innovative solution for the containment chamber that allows us to solve our isolation and structural problems.

Keywords: FEM analysis, electron cyclotron resonance ion source, dielectrical measurement, hadron therapy

Procedia PDF Downloads 275
1080 Business-Intelligence Mining of Large Decentralized Multimedia Datasets with a Distributed Multi-Agent System

Authors: Karima Qayumi, Alex Norta

Abstract:

The rapid generation of high volume and a broad variety of data from the application of new technologies pose challenges for the generation of business-intelligence. Most organizations and business owners need to extract data from multiple sources and apply analytical methods for the purposes of developing their business. Therefore, the recently decentralized data management environment is relying on a distributed computing paradigm. While data are stored in highly distributed systems, the implementation of distributed data-mining techniques is a challenge. The aim of this technique is to gather knowledge from every domain and all the datasets stemming from distributed resources. As agent technologies offer significant contributions for managing the complexity of distributed systems, we consider this for next-generation data-mining processes. To demonstrate agent-based business intelligence operations, we use agent-oriented modeling techniques to develop a new artifact for mining massive datasets.

Keywords: agent-oriented modeling (AOM), business intelligence model (BIM), distributed data mining (DDM), multi-agent system (MAS)

Procedia PDF Downloads 411