Search results for: critical alarms checklist
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5637

Search results for: critical alarms checklist

4767 Correlating Musical Subject and Dialectical Subject to Develop a Critical Approach to Ideology in Musical Analysis and Composition

Authors: James Waide

Abstract:

In music, subject typically denotes the initial idea to which the entire composition refers—a concept congruous with Aristotle's notion of subject as primary substance, in the sense of an irreducible this particular. Gioseffo Zarlino, who established subject (soggetto) as a musical term, insisted the composer as “rediscovering” the subject within their music in order to “[bring] it to perfection” and, furthermore, that if the composer had not rediscovered the subject already, then one would simply take the first part of the composition to be the subject. Meanwhile, Žižek reads the Hegelian subject (as negativity set against positive object) through Lacanian Psychoanalysis (in which the subject is a kind of fictive entity of the clinic: a mere appearance which sits atop the objects of analysis) in the concept of Absolute Recoil. For Žižek, subject exists retroactively in Absolute Recoil from object, meaning subject is a void which only has meaning because of the object it is seen through. Following the work of theorists such as Adorno and Althusser, one can understand the ideological construction of such a subject. It may be argued that in Zarlino, musical subject can be similarly read as retroactively constructed, either by the composer or the listener. Furthermore, in recent work, Samuel Wilson identifies different kinds of subjects in music which can be psychoanalytically examined, including the fictive subject: a purely musical entity raised to the level of psychoanalytic subject. On which basis if, as Adorno insisted, 'authentic' music constitutes 'cognition without concepts', where and what is this subject without concept?.

Keywords: absolute recoil, critical theory, ideology, music analysis, psychoanalysis, retroactivity, subject

Procedia PDF Downloads 71
4766 Neuro-Fuzzy Approach to Improve Reliability in Auxiliary Power Supply System for Nuclear Power Plant

Authors: John K. Avor, Choong-Koo Chang

Abstract:

The transfer of electrical loads at power generation stations from Standby Auxiliary Transformer (SAT) to Unit Auxiliary Transformer (UAT) and vice versa is through a fast bus transfer scheme. Fast bus transfer is a time-critical application where the transfer process depends on various parameters, thus transfer schemes apply advance algorithms to ensure power supply reliability and continuity. In a nuclear power generation station, supply continuity is essential, especially for critical class 1E electrical loads. Bus transfers must, therefore, be executed accurately within 4 to 10 cycles in order to achieve safety system requirements. However, the main problem is that there are instances where transfer schemes scrambled due to inaccurate interpretation of key parameters; and consequently, have failed to transfer several critical loads from UAT to the SAT during main generator trip event. Although several techniques have been adopted to develop robust transfer schemes, a combination of Artificial Neural Network and Fuzzy Systems (Neuro-Fuzzy) has not been extensively used. In this paper, we apply the concept of Neuro-Fuzzy to determine plant operating mode and dynamic prediction of the appropriate bus transfer algorithm to be selected based on the first cycle of voltage information. The performance of Sequential Fast Transfer and Residual Bus Transfer schemes was evaluated through simulation and integration of the Neuro-Fuzzy system. The objective for adopting Neuro-Fuzzy approach in the bus transfer scheme is to utilize the signal validation capabilities of artificial neural network, specifically the back-propagation algorithm which is very accurate in learning completely new systems. This research presents a combined effect of artificial neural network and fuzzy systems to accurately interpret key bus transfer parameters such as magnitude of the residual voltage, decay time, and the associated phase angle of the residual voltage in order to determine the possibility of high speed bus transfer for a particular bus and the corresponding transfer algorithm. This demonstrates potential for general applicability to improve reliability of the auxiliary power distribution system. The performance of the scheme is implemented on APR1400 nuclear power plant auxiliary system.

Keywords: auxiliary power system, bus transfer scheme, fuzzy logic, neural networks, reliability

Procedia PDF Downloads 171
4765 Improving Fingerprinting-Based Localization System Using Generative AI

Authors: Getaneh Berie Tarekegn, Li-Chia Tai

Abstract:

With the rapid advancement of artificial intelligence, low-power built-in sensors on Internet of Things devices, and communication technologies, location-aware services have become increasingly popular and have permeated every aspect of people’s lives. Global navigation satellite systems (GNSSs) are the default method of providing continuous positioning services for ground and aerial vehicles, as well as consumer devices (smartphones, watches, notepads, etc.). However, the environment affects satellite positioning systems, particularly indoors, in dense urban and suburban cities enclosed by skyscrapers, or when deep shadows obscure satellite signals. This is because (1) indoor environments are more complicated due to the presence of many objects surrounding them; (2) reflection within the building is highly dependent on the surrounding environment, including the positions of objects and human activity; and (3) satellite signals cannot be reached in an indoor environment, and GNSS doesn't have enough power to penetrate building walls. GPS is also highly power-hungry, which poses a severe challenge for battery-powered IoT devices. Due to these challenges, IoT applications are limited. Consequently, precise, seamless, and ubiquitous Positioning, Navigation and Timing (PNT) systems are crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarms, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 42
4764 Enhanced Boiling Heat Transfer Using Wettability Patterned Surfaces

Authors: Dong Il Shim, Geehong Choi, Donghwi Lee, Namkyu Lee, Hyung Hee Cho

Abstract:

Effective cooling technology is required to secure thermal stability in extreme heat generated systems such as integrated electronic devices and power generated systems. Pool boiling heat transfer is one of the powerful cooling mechanisms using phase change phenomena. Critical heat flux (CHF) and heat transfer coefficient (HTC) are main factors to evaluate the performance of boiling heat transfer. CHF is the limitation of boiling heat transfer before film boiling which occurs thermal failure. Surface wettability is an important surface characteristic of boiling heat transfer. A hydrophilic surface has higher CHF through effective working fluid supply to local hot spots. A hydrophobic surface promotes the onset of nucleate boiling (ONB) to enhance HTC. In this study, superbiphilic surfaces, which is combined with superhydrophillic and superhydrophobic, are applied on boiling experiments to maximize boiling performance. We conducted pool boiling heat transfer using DI water at a saturated temperature and recorded bubble dynamics using a high-speed camera with 2000 fps. As a result, superbiphilic patterned surfaces promote ONB and enhance both CHF and HTC. This study demonstrates the enhanced boiling performance using superbiphilic surfaces by effective nucleation and separation of liquid/vapor pathway. We expect that further enhancement of heat transfer could be achieved in future work using optimized patterned surfaces.

Keywords: boiling heat transfer, wettability, critical heat flux, heat transfer coefficient

Procedia PDF Downloads 335
4763 Taking Learning beyond Kirkpatrick’s Levels: Applying Return on Investment Measurement in Training

Authors: Charles L. Sigmund, M. A. Aed, Lissa Graciela Rivera Picado

Abstract:

One critical component of the training development process is the evaluation of the impact and value of the program. Oftentimes, however, learning organizations bypass this phase either because they are unfamiliar with effective methods for measuring the success or effect of the training or because they believe the effort to be too time-consuming or cumbersome. As a result, most organizations that do conduct evaluation limit their scope to Kirkpatrick L1 (reaction) and L2 (learning), or at most carry through to L4 (results). In 2021 Microsoft made a strategic decision to assess the measurable and monetized impact for all training launches and designed a scalable and program-agnostic tool for providing full-scale L5 return on investment (ROI) estimates for each. In producing this measurement tool, the learning and development organization built a framework for making business prioritizations and resource allocations that is based on the projected ROI of a course. The analysis and measurement posed by this process use a combination of training data and operational metrics to calculate the effective net benefit derived from a given training effort. Business experts in the learning field generally consider a 10% ROI to be an outstanding demonstration of the value of a project. Initial findings from this work applied to a critical customer-facing program yielded an estimated ROI of more than 49%. This information directed the organization to make a more concerted and concentrated effort in this specific line of business and resulted in additional investment in the training methods and technologies being used.

Keywords: evaluation, measurement, return on investment, value

Procedia PDF Downloads 185
4762 The Perceptions of High School English Home Language Learners on Fostering 21st Century Skills Through the Use of Technology in the Classroom

Authors: Lisa Naudine Parrock, Geoffrey Lautenbach

Abstract:

The changes brought to society by the technological development in the Fourth Industrial Revolution are also reaching the sphere of education and the education system needs to respond. Students need skills such as communication, collaboration, creativity and critical thinking in order to be successful in the 21st Century, which could be developed through the meaningful use of technology. This study is theorized by the 21st Century Framework for Learning and examines the student perceptions of grade 10 and 11 English Home language learners on how the technology used in their English classroom contributes to the development of 21st Century skills. The researcher adopted a constructivist paradigm and presented findings based on a general qualitative method. The study found that students perceived the use of technology in the classroom positively contributed to their development of communication, collaboration, creativity and critical thinking. Students also perceived technology as contributing to their access to information, a positive classroom atmosphere, heightened engagement in learning and developing skills necessary for their future. In addition, this study highlighted certain pedagogical strategies and digital tools that support the development of 21st Century skills. The findings suggest that the meaningful integration of technology fosters the development of 21st Century skills in grade 10 and 11 learners.

Keywords: educational technology, 21st century skills, fourth industrial revolution, affordances of technology

Procedia PDF Downloads 134
4761 Pediatric Health Nursing Research in Jordan: Evaluating the State of Knowledge and Determining Future Research Direction

Authors: Inaam Khalaf, Nadin M. Abdel Razeq, Hamza Alduraidi, Suhaila Halasa, Omayyah S. Nassar, Eman Al-Horani, Jumana Shehadeh, Anna Talal

Abstract:

Background: Nursing researchers are responsible for generating knowledge that corresponds to national and global research priorities in order to promote, restore, and maintain the health of individuals and societies. The objectives of this scoping review of Jordanian literature are to assess the existing research on pediatric nursing in terms of evolution, authorship and collaborations, funding sources, methodologies, topics of research, and pediatric subjects' age groups so as to identify gaps in research. Methodology: A search was conducted using related keywords obtained from national and international databases. The reviewed literature included pediatric health articles published through December 2019 in English and Arabic, authored by nursing researchers. The investigators assessed the retrieved studies and extracted data using a data-mining checklist. Results: The review included 265 articles authored by Jordanian nursing researchers concerning children's health, published between 1987 and 2019; 95% were published between 2009 and 2019. The most commonly applied research methodology was the descriptive non-experimental method (76%). The main generic topics were health promotion and disease prevention (23%), chronic physical conditions (19%), mental health, behavioral disorders, and forensic issues (16%). Conclusion: The review findings identified a grave shortage of evidence concerning nursing care issues for children below five years of age, especially those between ages two and five years. The research priorities identified in this review resonate with those identified in international reports. Implications: Nursing researchers are encouraged to conduct more research targeting topics of national-level importance in collaboration with clinically involved nurses and international scholars.

Keywords: Jordan, scoping review, children health nursing, pediatric, adolescents

Procedia PDF Downloads 86
4760 Role of a Physical Therapist in Rehabilitation

Authors: Andrew Anis Fakhrey Mosaad

Abstract:

Objectives: Physiotherapy in the intensive care unit (ICU) improves patient outcomes. We aimed to determine the characteristics of physiotherapy practice and critical barriers to applying physiotherapy in ICUs. Materials and Methods: A 54-item survey for determining the characteristics physiotherapists and physiotherapy applications in the ICU was developed. The survey was electronically sent to potential participants through the Turkish Physiotherapy Association network. Sixty-five physiotherapists (47F and 18M; 23–52 years; ICU experience: 6.0±6.2 years) completed the survey. The data were analyzed using quantitative and qualitative methods. Results: The duration of ICU practice was 3.51±2.10 h/day. Positioning (90.8%), active exercises (90.8%), breathing exercises (89.2%), passive exercises (87.7%), and percussion (87.7%) were the most commonly used applications. The barriers were related to physiotherapists (low level of employment and practice, lack of shift); patients (unwillingness, instability, participation restriction); teamwork (lack of awareness and communication); equipment (inadequacy, non-priority to purchase); and legal (reimbursement, lack of direct physiotherapy access, non-recognition of autonomy) procedures. Conclusion: The most common interventions were positioning, active, passive, breathing exercises, and percussion. Critical barriers toward physiotherapy are multifactorial and related to physiotherapists, patients, teams, equipment, and legal procedures. Physiotherapist employment, service maintenance, and multidisciplinary teamwork should be considered for physiotherapy effectiveness in ICUs.

Keywords: intensive care units, physical therapy, physiotherapy, exercises

Procedia PDF Downloads 102
4759 Effectiveness of Balloon Angioplasty and Stent Angioplasty: Wound Healing in Critically Limb Ischemic

Authors: M. Wisnu Pamungkas, Patrianef Darwis

Abstract:

Introduction: Critical limb ischemia (CLI) is a vascular disease that has a significant amputation and mortality risk with diabetes mellitus, the most significant risk factor in CLI, is very common among Indonesian. Endovascular intervention (EVI) is preferred in treating CLI because it is noninvasive and effective. Balloon angioplasty and stent angioplasty are the most common method of EVI in Indonesia. This study aims to compare the effectiveness of balloon angioplasty and stent angioplasty on wound healing in CLI. Method: A cross-sectional study enrolled 90 subjects of CLI who underwent endovascular intervention using balloon angioplasty and stent angioplasty from January 2013 to July 2017 in dr. Cipto Mangunkusumo General Hospital, Jakarta. The wound healing period between balloon angioplasty dan stent angioplasty was analyzed using unpaired T-test with p<0,05 considered as statistically significant. Data of intervention method wound healing period, and subjects characteristic data (age, amputation, BMI, smoking habit, DM, occlusion site, and blood profile) were obtained. Result: The wound healing period in balloon angioplasty and stent angioplasty distributed normally. Mean value of wound healing period in balloon angioplasty and stent angioplasty are 84,8+/-2,423 and 59,93 +/- 2,423 days with a mean difference of 25 days. The difference in wound healing period in both groups is statically significant (p<0,05). The amputation event in balloon angioplasty and stent angioplasty is 22 and 16 event with no difference statistically. Conclusion: Stent angioplasty is a better method than balloon angioplasty for wound healing in patients with CLI.

Keywords: critical limb ischemia, endovascular intervention, wound healing, angioplasty

Procedia PDF Downloads 126
4758 Challenging the Stereotypes: A Critical Study of Chotti Munda, His Arrow, and Sula

Authors: Khushboo Gokani, Renu Josan

Abstract:

Mahasweta Devi and Toni Morrison are the two stalwarts of the Indian-English and the Afro-American literature respectively. The writings of these two novelists are authentic and powerful records of the lives of the people because much of their personal experiences have gone into the making of their works. Devi, a representative force of the Indian English literature, is also a social activist working with the tribals of Bihar, Jharkhand, Orissa and West Bengal. Most of her works echo the lives and struggles of the subalterns as is evident in her 'best-beloved book' Chotti Munda and His Arrow. The novelist focuses on the struggle of the tribals against the colonial and the feudal powers to create their identity, thereby, embarking on the ideological project called Setting the Record Straight. The Nobel laureate Toni Morrison, on the other hand, brings to the fore the crucial issues of gender, race, and class in many of her significant works. In one of her representative works, Sula, the protagonist emerges as a non-conformist and directly confronts the notion of a ‘good woman’ nurtured by the community of the Blacks. In addition to this, the struggle of the Blacks against the White domination, also become an important theme of the text. The thrust of the paper lies in making a critical analysis of the portrayal of the heroic attempts of the subaltern protagonist and the artistic endeavor of the novelists in challenging the stereotypes.

Keywords: the struggle of the muted groups, subaltern, center and periphery, challenging the stereotypes

Procedia PDF Downloads 237
4757 Historical Memory and Social Representation of Violence in Latin American Cinema: A Cultural Criminology Approach

Authors: Maylen Villamanan Alba

Abstract:

Latin America is marked by its history: conquest, colonialism, and slavery left deep footprints in most Latin American countries. Also, the past century has been affected by wars, military dictatorships, and political violence, which profoundly influenced Latin American popular culture. Consequently, reminiscences of historical crimes are frequently present in daily life, media, public opinion, and arts. This legacy is remembered in novels, paintings, songs, and films. In fact, Latin American cinema has a trend which refers to the verisimilitude with reality in fiction films. These films about historical violence are narrated as fictional characters, but their stories are based on real historical contexts. Therefore, cultural criminology has considered films as a significant field to understand social representations of violence related to historical crimes. The aim of the present contribution is to analyze the legacy of past and historical memory in social representations of violence in Latin American cinema as a critical approach to historical crimes. This qualitative research is based on content analysis. The sample is seven multi-award winning films of the International Festival of New Latin American Cinema of Havana. The films selected are Kamchatka, Argentina (2002); Carandiru, Brazil (2003); Enlightened by fire, Argentina (2005); Post-mortem, Chile (2010); No, Chile (2012) Wakolda; Argentina (2013) and The Clan, Argentina (2015). Cultural criminology highlights that cinema shapes meanings of social practices such as historical crimes. Critical criminology offers a critical theory framework to interpret Latin American cinema. This analysis reveals historical conditions deeply associated with power relationships, policy, and inequality issues. As indicated by this theory, violence is characterized as a structural process based on social asymmetries. These social asymmetries are crossed by social scopes, including institutional and personal dimensions. Thus, institutions of the states are depicted through personal stories of characters involved with human conflicts. Intimacy and social background are linked in the personages who simultaneously perform roles such as soldiers, policemen, professionals or inmates and they are at the same time depict as human beings with family, gender, racial, ideological or generational issues. Social representations of violence related to past legacy are a portrait of historical crimes perpetrated against Latin American citizens. Thereby, they have contributed to political positions, social behaviors, and public opinion. The legacy of these historical crimes suggests a path that should never be taken again. It means past legacy is a reminder, a warning, and a historic lesson for Latin American people. Social representations of violence are permeated by historical memory as denunciation under a critical approach.

Keywords: Latin American cinema, historical memory, social representation, violence

Procedia PDF Downloads 147
4756 The Evaluation and Assessment of Modernism

Authors: Mohammad Mirzaei

Abstract:

The term "modernism" is at the heart of debates about 20th-century literature and critical theory. Astradur Eysteinsson argues here that the notion of modernity does not emerge directly from the literature it encompasses but is actually a product of critical practices related to non-traditional literature. By intervening in and relating them to modernist works and contemporary literary theories, Esteinsson takes a comprehensive look at the idea of modernity. Eysteinsson critically examines various expressions of modernism in the rich spectrum of American, British, and European literature, criticism, and theory. He first explored a number of modernist paradigms and found a conflict between modernism's potential for cultural subversion and its relatively conservative status as a formalist project. In turn, he sees these paradigms as interpretations and inventions of literary history. Seen in this way, modernism presents both a historical change in the literary scene and the context of this change. Imbued with the connotations of tradition and modernity, modernity fulfills its primary function. Highlights and defines the complex relationship between history and post-realist literature. Eysteinsson focuses on how concepts of modernism guide our understanding of literature and literary history and how they influence the evaluation of experimental and 3post realist works in literature and art. He discusses in detail the relationship between modernism and the key terms postmodernism, avant-garde, and realism. In staging a crisis of subject and reference, modernity is not a form of discourse but its subversion, the "other" that may reveal important aspects of our social and linguistic experience in Western culture.

Keywords: literature, modernism, western cultures, postmodernism

Procedia PDF Downloads 67
4755 An Analysis of Present Supplier Selection Criteria of State Pharmaceutical Corporation (SPC) Sri Lanka: A Case Study

Authors: Gamalath M. B. P. Abeysekara

Abstract:

Primary objective of any organization is to enhance the bottom line profit. Strategic procurement is one of the prominent aspects in view of receiving this ultimate objective. Strategic procurement is an activity used in each and every organization in their operations. Pharmaceutical procurement is an especially significant task for any organizations, particularly state sector concerned. The whole pharmaceutical procurement requirement of the country is procured through the State Pharmaceutical Corporation (SPC) of Sri Lanka. They follow Pharmaceutical Procurement Guideline of 2006 as the procurement principle. The main objective of this project is to identify the importance of State Pharmaceutical Corporation supplier selection criteria and critical analysis of pharmaceutical procurement procedure. State Pharmaceutical Corporations applied net price, product quality, past performance, and delivery of suppliers’ as main criteria for the selection suppliers. Data collection for this study was taken place through a questionnaire, given to fifty doctors within the Colombo district attached to five main state hospitals. Data analysis is carried out with mean and standard deviation functions. The ultimate outcomes indicated product quality, net price, and delivery of suppliers’ are the most important criteria behind the selection of suppliers. Critical analysis proved State Pharmaceutical Corporation should focus on net price reduction, improving laboratory testing facilities and effective communication between up and down stream of supply chain.

Keywords: government procurement procedure, pharmaceutical procurement supplier selection criteria, importance of SPC supplier selection criteria

Procedia PDF Downloads 451
4754 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 57
4753 A Brief Trauma Treatment Program for Survivors of Trauma: A Single-Case Design

Authors: Duane Booysen, Ashraf Kagee

Abstract:

There is a high prevalence of violent crime and trauma exposure in South African society. Considering the prevalence of continuous violent crimes and traumatization in South Africa, the public mental health sector is required to combat the burgeoning effect of traumatic stress in South Africa. Trauma counselors, especially, provide important mental health services at primary health care to persons affected by traumatic events. Therefore, the evaluation and implementation of evidence-based trauma therapies is essential at a primary health care level in treating traumatic stress. A single-case design was used to evaluate the treatment effect of a Brief Trauma Treatment Programme treating persons who present with symptoms of posttraumatic stress disorder at a primary care trauma centre in Cape Town, South Africa. The sample consisted of six adult participants who presented with symptoms of posttraumatic stress and were assessed at baseline, during treatment, post-intervention and at 3-month follow. All participants received six sessions of trauma therapy. Assessment measures included the posttraumatic stress disorder symptom scale interviews for Diagnostic and Statistical Manual fifth edition (DSM5), the posttraumatic disorder checklist for DSM5, Beck Depression Inventory and Beck Anxiety Inventory. Results demonstrate that participants had noticeable reduced symptoms for traumatic stress, anxiety and depression despite living in contexts of violent crime and trauma. In conclusion, the article critically reflects on the need to evaluate and implement evidence-based treatments for the South African context, and how evidence-based treatments are used in developing socio-economic and cultural diverse contexts with continuous levels of violence and traumatization.

Keywords: psychological interventions, public mental health, traumatic stress, single-case design

Procedia PDF Downloads 155
4752 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 110
4751 The Morality of the Sensitive in Adorno: Suffering and Recognition in the Mimesis Model

Authors: Talita Cavaignac

Abstract:

Adorno's critique of totality, especially in a split society marked by reification, also rests on the impossibility of generalizing normative principles. Given the unfeasibility of normative universalizations, which conditions can justify the possibility of criticism and normativity in Adorno's thought? If reason itself is still entangled in alienation from the model of the domination of nature, how could be possible a critical theory? In political terms, if the notion of totality is challenged by the critique of identity, how can Adorno maintain the ideal of liberation and reconciliation between private interests and the possibility of some sort of ethics without giving up a materialist theory of society and without betting in a necessary link between redemption and history? Faced with this complex of questions, it is intended to reflect on the sense in which the notion of ‘suffering’ could throw help to the epistemological problem of the foundations of criticism in Adorno's work. The idea is that, in contrast to a universalizable model of justice, Adorno mobilizes in the notion of ‘suffering’ a gateway to the critical reflection of society. He would thus develop an approach to moral problems through the sensual-bodily perspective, fear, pain, and somatic factors. Nevertheless, due to the attention to the damaged experience and to the constitution of subjectivity -a sense in which the concept of mimesis continues to stand out- we understand suffering as an expression of an objective reification. Following the statement of other authors, the intention is to think how the resources linked to the idea of ‘suffering’ in Adorno's writings are engaged in the reflection of the problem of morality and of the contradictions between universal and particular (articulated in Hegel's tradition).

Keywords: ethics, morality, sensitive, Theodor Adorno

Procedia PDF Downloads 136
4750 The Right to Engage in Collective Bargaining in South Africa: An Exploratory Analysis

Authors: Koboro J. Selala

Abstract:

Whilst the system of collective bargaining is well-researched in South Africa, recent studies reveal that this is an area of law and practice that is poorly understood. Despite the growing attention being paid by most scholars to the role of collective bargaining in the labour relations system, only a handful of the studies have considered collective bargaining as a mechanism of dispute resolution. The purpose of this paper is to provide a critical analysis of the current understanding of the right to engage in collective bargaining in South Africa to assess the extent to which collective bargaining is used to resolve labour disputes. The overall objective is to offer a deeper understanding of the role of collective bargaining in dispute resolution process within the South African constitutional labour law context. To this end, the paper examines the applicable legal framework of collective bargaining to address two fundamental questions that are critical to the proper understanding of the functioning of the South African collective labour dispute resolution system. The first concerns the extent to which the current South African legislative framework supports the fundamental labour rights entrenched in the Constitution of the Republic of South Africa. The second addresses the role of trade unions in collective dispute resolution processes and the extent to which they can best utilize collective bargaining to resolve labour disputes. Finally, the paper discusses the general implications of the findings to stimulate further research and to enhance the constitutional development of collective labour rights in South Africa.

Keywords: collective bargaining, constitution, freedom of association, labour relations act

Procedia PDF Downloads 324
4749 Utilization of Brachystegia Spiciformis Leaf Powder in the Removal of Nitrates from Wastewaters: An Equilibrium Study

Authors: Isheanesu Hungwe, Munyaradzi Shumba, Tichaona Nharingo

Abstract:

High levels of nitrates in drinking water present a potential risk to human health for it is responsible for methemoglobinemia in infants. It also gives rise to eutrophication of dams and rivers. It is, therefore, important to find ways of compating the increasing amount of nitrates in the environment. This study explored the bioremediation of nitrates from aqueous solution using Brachystegia spiciformis leaf powder (BSLP). The acid treated leaf powder was characterized using FTIR and SEM before and after nitrate biosorption and desorption experiments. Critical biosorption factors, pH, contact time and biomass dosage were optimized as 4, 30 minutes and 10 g/L respectively. The equilibrium data generated from the investigation of the effect of initial nitrate ion concentration fitted the isotherm models in the order Dudinin-Radushkevich < Halsey=Freundlich < Langmuir < Temkin model based on the correlation of determination (R2). The Freundlich’s adsorption intensity and Langmuir’s separation factors revealed the favorability of nitrate ion sorption onto BSLP biomass with maximum sorption capacity of 87.297 mg/g. About 95% of the adsorbed nitrate was removed from the biomass under alkaline conditions (pH 11) proving that the regeration of the biomass, critical in sorption-desorption cycles, was possible. It was concluded that the BSLP was a multifunctional group material characterised by both micropores and macropores that could be effectively utilised in nitrate ion removal from aqueous solutions.

Keywords: adsorption, brachystegia spiciformis, methemoglobinemia, nitrates

Procedia PDF Downloads 259
4748 The Effectiveness of Spatial Planning And Land Use Management Act, 2013 in Fetakgomo Tubatse Local Municipality: Case Study of Apel Nodal Point

Authors: Hlabishi Peter Ntloana

Abstract:

This paper aims to present the effectiveness of the Spatial Planning and Land Use Management Act, 2013, in addressing key spatial challenges in Fetakgomo Tubatse Local Municipality, mainly focusing on Apel nodal point. Spatial Planning and Land Use Management Act, 2013, popularly known as SPLUMA, aimed at addressing emerging and existing spatial planning and land use management challenges in South Africa. There are critical key spatial challenges that are continuously encountered in Apel Nodal Point, which include dispersed rural settlement mainly in a communal settlement. The spatial patterns and rural settlements development patterns are a challenge, and such results in uncoordinated human settlements. The objective of this research paper is to analyze the spatial planning of Apel nodal points and determine the effectiveness of the SPLUMA policy. Key Informant interviews were conducted with 20 participants, and also the municipal Spatial Development Framework was considered to explore more challenges and proposed recommendations. The results divulged that there is a huge gap in addressing spatial planning, mainly in rural areas, and correlation with the findings of the Municipal Spatial Development framework. In conclusion, spatial planning remains a critical dilemma in most rural settlements, and there must be programmes and strategies to balance the effectiveness of spatial planning in urban and rural settlements.

Keywords: land use management, rural settlement, spatial development framework, spatial planning

Procedia PDF Downloads 177
4747 Analysis of Citation Rate and Data Reuse for Openly Accessible Biodiversity Datasets on Global Biodiversity Information Facility

Authors: Nushrat Khan, Mike Thelwall, Kayvan Kousha

Abstract:

Making research data openly accessible has been mandated by most funders over the last 5 years as it promotes reproducibility in science and reduces duplication of effort to collect the same data. There are evidence that articles that publicly share research data have higher citation rates in biological and social sciences. However, how and whether shared data is being reused is not always intuitive as such information is not easily accessible from the majority of research data repositories. This study aims to understand the practice of data citation and how data is being reused over the years focusing on biodiversity since research data is frequently reused in this field. Metadata of 38,878 datasets including citation counts were collected through the Global Biodiversity Information Facility (GBIF) API for this purpose. GBIF was used as a data source since it provides citation count for datasets, not a commonly available feature for most repositories. Analysis of dataset types, citation counts, creation and update time of datasets suggests that citation rate varies for different types of datasets, where occurrence datasets that have more granular information have higher citation rates than checklist and metadata-only datasets. Another finding is that biodiversity datasets on GBIF are frequently updated, which is unique to this field. Majority of the datasets from the earliest year of 2007 were updated after 11 years, with no dataset that was not updated since creation. For each year between 2007 and 2017, we compared the correlations between update time and citation rate of four different types of datasets. While recent datasets do not show any correlations, 3 to 4 years old datasets show weak correlation where datasets that were updated more recently received high citations. The results are suggestive that it takes several years to cumulate citations for research datasets. However, this investigation found that when searched on Google Scholar or Scopus databases for the same datasets, the number of citations is often not the same as GBIF. Hence future aim is to further explore the citation count system adopted by GBIF to evaluate its reliability and whether it can be applicable to other fields of studies as well.

Keywords: data citation, data reuse, research data sharing, webometrics

Procedia PDF Downloads 178
4746 Examining French Teachers’ Teaching and Learning Approaches in Some Selected Junior High Schools in Ghana

Authors: Paul Koffitse Agobia

Abstract:

In 2020 the Ministry of Education in Ghana and the National Council for Curriculum and Assessment (NaCCA) rolled out a new curriculum, Common Core Programme (CCP) for Basic 7 to 10, that lays emphasis on character building and values which are important to the Ghanaian society by providing education that will produce character–minded learners, with problem solving skills, who can play active roles in dealing with the increasing challenges facing Ghana and the global society. Therefore, learning and teaching approaches that prioritise the use of digital learning resources and active learning are recommended. The new challenge facing Ghanaian teachers is the ability to use new technologies together with the appropriate content pedagogical knowledge to help learners develop, aside the communication skills in French, the essential 21st century skills as recommended in the new curriculum. This article focusses on the pedagogical approaches that are recommended by NaCCA. The study seeks to examine French language teachers’ understanding of the recommended pedagogical approaches and how they use digital learning resources in class to foster the development of these essential skills and values. 54 respondents, comprised 30 teachers and 24 head teachers, were selected in 6 Junior High schools in rural districts (both private and public) and 6 from Junior High schools in an urban setting. The schools were selected in three regions: Volta, Central and Western regions. A class observation checklist and an interview guide were used to collect data for the study. The study reveals that some teachers adopt teaching techniques that do not promote active learning. They demonstrate little understanding of the core competences and values, therefore, fail to integrate them in their lessons. However, some other teachers, despite their lack of understanding of learning and teaching philosophies, adopted techniques that can help learners develop some of the core competences and values. In most schools, digital learning resources are not utilized, though teachers have smartphones or laptops.

Keywords: active learning, core competences, digital learning resources, pedagogical approach, values.

Procedia PDF Downloads 76
4745 The Future Control Rooms for Sustainable Power Systems: Current Landscape and Operational Challenges

Authors: Signe Svensson, Remy Rey, Anna-Lisa Osvalder, Henrik Artman, Lars Nordström

Abstract:

The electric power system is undergoing significant changes. Thereby, the operation and control are becoming partly modified, more multifaceted and automated, and thereby supplementary operator skills might be required. This paper discusses developing operational challenges in future power system control rooms, posed by the evolving landscape of sustainable power systems, driven in turn by the shift towards electrification and renewable energy sources. A literature review followed by interviews and a comparison to other related domains with similar characteristics, a descriptive analysis was performed from a human factors perspective. Analysis is meant to identify trends, relationships, and challenges. A power control domain taxonomy includes a temporal domain (planning and real-time operation) and three operational domains within the power system (generation, switching and balancing). Within each operational domain, there are different control actions, either in the planning stage or in the real-time operation, that affect the overall operation of the power system. In addition to the temporal dimension, the control domains are divided in space between a multitude of different actors distributed across many different locations. A control room is a central location where different types of information are monitored and controlled, alarms are responded to, and deviations are handled by the control room operators. The operators’ competencies, teamwork skills, team shift patterns as well as control system designs are all important factors in ensuring efficient and safe electricity grid management. As the power system evolves with sustainable energy technologies, challenges are found. Questions are raised regarding whether the operators’ tacit knowledge, experience and operation skills of today are sufficient to make constructive decisions to solve modified and new control tasks, especially during disturbed operations or abnormalities. Which new skills need to be developed in planning and real-time operation to provide efficient generation and delivery of energy through the system? How should the user interfaces be developed to assist operators in processing the increasing amount of information? Are some skills at risk of being lost when the systems change? How should the physical environment and collaborations between different stakeholders within and outside the control room develop to support operator control? To conclude, the system change will provide many benefits related to electrification and renewable energy sources, but it is important to address the operators’ challenges with increasing complexity. The control tasks will be modified, and additional operator skills are needed to perform efficient and safe operations. Also, the whole human-technology-organization system needs to be considered, including the physical environment, the technical aids and the information systems, the operators’ physical and mental well-being, as well as the social and organizational systems.

Keywords: operator, process control, energy system, sustainability, future control room, skill

Procedia PDF Downloads 95
4744 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis

Authors: Azeem Alphonce

Abstract:

In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.

Keywords: language, skin whitening products, beauty standards, social mental models

Procedia PDF Downloads 71
4743 Laser Shock Peening of Additively Manufactured Nickel-Based Superalloys

Authors: Michael Munther, Keivan Davami

Abstract:

One significant roadblock for additively manufactured (AM) parts is the buildup of residual tensile stresses during the fabrication process. These residual stresses are formed due to the intense localized thermal gradients and high cooling rates that cause non-uniform material expansion/contraction and mismatched strain profiles during powder-bed fusion techniques, such as direct metal laser sintering (DMLS). The residual stresses adversely affect the fatigue life of the AM parts. Moreover, if the residual stresses become higher than the material’s yield strength, they will lead to acute geometric distortion. These are limiting the applications and acceptance of AM components for safety-critical applications. Herein, we discuss laser shock peening method as an advanced technique for the manipulation of the residual stresses in AM parts. An X-ray diffraction technique is used for the measurements of the residual stresses before and after the laser shock peening process. Also, the hardness of the structures is measured using a nanoindentation technique. Maps of nanohardness and modulus are obtained from the nanoindentation, and a correlation is made between the residual stresses and the mechanical properties. The results indicate that laser shock peening is able to induce compressive residual stresses in the structure that mitigate the tensile residual stresses and increase the hardness of AM IN718, a superalloy, almost 20%. No significant changes were observed in the modulus after laser shock peening. The results strongly suggest that laser shock peening can be used as an advanced post-processing technique to optimize the service lives of critical components for various applications.

Keywords: additive manufacturing, Inconel 718, laser shock peening, residual stresses

Procedia PDF Downloads 127
4742 Bridge Health Monitoring: A Review

Authors: Mohammad Bakhshandeh

Abstract:

Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.

Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis

Procedia PDF Downloads 90
4741 Automated Manual Handling Risk Assessments: Practitioner Experienced Determinants of Automated Risk Analysis and Reporting Being a Benefit or Distraction

Authors: S. Cowley, M. Lawrance, D. Bick, R. McCord

Abstract:

Technology that automates manual handling (musculoskeletal disorder or MSD) risk assessments is increasingly available to ergonomists, engineers, generalist health and safety practitioners alike. The risk assessment process is generally based on the use of wearable motion sensors that capture information about worker movements for real-time or for posthoc analysis. Traditionally, MSD risk assessment is undertaken with the assistance of a checklist such as that from the SafeWork Australia code of practice, the expert assessor observing the task and ideally engaging with the worker in a discussion about the detail. Automation enables the non-expert to complete assessments and does not always require the assessor to be there. This clearly has cost and time benefits for the practitioner but is it an improvement on the assessment by the human. Human risk assessments draw on the knowledge and expertise of the assessor but, like all risk assessments, are highly subjective. The complexity of the checklists and models used in the process can be off-putting and sometimes will lead to the assessment becoming the focus and the end rather than a means to an end; the focus on risk control is lost. Automated risk assessment handles the complexity of the assessment for the assessor and delivers a simple risk score that enables decision-making regarding risk control. Being machine-based, they are objective and will deliver the same each time they assess an identical task. However, the WHS professional needs to know that this emergent technology asks the right questions and delivers the right answers. Whether it improves the risk assessment process and results or simply distances the professional from the task and the worker. They need clarity as to whether automation of manual task risk analysis and reporting leads to risk control or to a focus on the worker. Critically, they need evidence as to whether automation in this area of hazard management leads to better risk control or just a bigger collection of assessments. Practitioner experienced determinants of this automated manual task risk analysis and reporting being a benefit or distraction will address an understanding of emergent risk assessment technology, its use and things to consider when making decisions about adopting and applying these technologies.

Keywords: automated, manual-handling, risk-assessment, machine-based

Procedia PDF Downloads 119
4740 A Cohesive Zone Model with Parameters Determined by Uniaxial Stress-Strain Curve

Authors: Y.J. Wang, C. Q. Ru

Abstract:

A key issue of cohesive zone models is how to determine the cohesive zone model parameters based on real material test data. In this paper, uniaxial nominal stress-strain curve (SS curve) is used to determine two key parameters of a cohesive zone model (CZM): The maximum traction and the area under the curve of traction-separation law (TSL). To this end, the true SS curve is obtained based on the nominal SS curve, and the relationship between the nominal SS curve and TSL is derived based on an assumption that the stress for cracking should be the same in both CZM and the real material. In particular, the true SS curve after necking is derived from the nominal SS curve by taking the average of the power law extrapolation and the linear extrapolation, and a damage factor is introduced to offset the true stress reduction caused by the voids generated at the necking zone. The maximum traction of the TSL is equal to the maximum true stress calculated based on the damage factor at the end of hardening. In addition, a simple specimen is modeled by Abaqus/Standard to calculate the critical J-integral, and the fracture energy calculated by the critical J-integral represents the stored strain energy in the necking zone calculated by the true SS curve. Finally, the CZM parameters obtained by the present method are compared to those used in a previous related work for a simulation of the drop-weight tear test.

Keywords: dynamic fracture, cohesive zone model, traction-separation law, stress-strain curve, J-integral

Procedia PDF Downloads 474
4739 Great Food, No Atmosphere: A Review of Performance Nutrition for Application to Extravehicular Activities in Spaceflight

Authors: Lauren E. Church

Abstract:

Background: Extravehicular activities (EVAs) are a critical aspect of missions aboard the International Space Station (ISS). It has long been noted that the spaceflight environment and the physical demands of EVA cause physiological and metabolic changes in humans; this review aims to combine these findings with nutritional studies in analogues of the spaceflight and EVA environments to make nutritional recommendations for astronauts scheduled for and immediately returning from EVAs. Results: Energy demands increase during orbital spaceflight and see further increases during EVA. Another critical element of EVA nutrition is adequate hydration. Orbital EVA appears to provide adequate hydration under current protocol, but during lunar surface EVA (LEVA) and in a 10km lunar walk-back test astronauts have stated that up to 20% more water was needed. Previous attempts for in-suit edible sustenance have not been adequately taken up by astronauts to be economically viable. In elite endurance athletes, a mixture of glucose and fructose is used in gels, improving performance. Discussion: A combination of non-caffeinated energy drink and simple water should be available for astronauts during EVA, allowing more autonomy. There should also be provision of gels or a similar product containing appropriate sodium levels to maintain hydration, but not so much as to hyperhydrate through renal water reabsorption. It is also suggested that short breaks be built into the schedule of EVAs for these gels to be consumed, as it is speculated that reason for low uptake of in-suit sustenance is the lack of time available in which to consume it.

Keywords: astronaut, nutrition, space, sport

Procedia PDF Downloads 128
4738 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 51