Search results for: media access control (MAC)
15302 Accurate and Repeatable Pressure Control for Critical Testing of Advanced Ceramics Using Proportional and Derivative Controller
Authors: Benchalak Muangmeesri
Abstract:
The purpose of this paper is to discuss how to test the best control performance of a ceramics. Hydraulic press machine (HPM) is the most common shaping of advanced ceramic with products, dimensions, and ceramic products mainly from synthetic powders. A microcontroller can be achieved to control process and has set high standards in the shaping of raw materials in powder form. HPM was proposed to develop a position control system that linked to the embedded controller PIC16F877 via Proportional and Derivative (PD) controller. The model is performed using MATLAB/SIMULINK and the best control performance of an HPM. Finally, PD controller results, showing the best performance as it had the smallest overshoot and highest quality using a microcontroller control.Keywords: ceramics, hydraulic press, microcontroller, PD controller
Procedia PDF Downloads 35615301 Market Access for Foreign Investment in Host States: Municipal Law and International Law
Authors: Qiang Ren
Abstract:
A growing number of states are improving domestic law to better protect and promote foreign investment by changing/upgrading the existing law. However, inconsistency occurs because the new law is different from the ‘old’ law. For example, China has issued an unprecedented Foreign Investment Law and several regulations allowing comprehensive market access for foreign investment in most energy sectors since 2020. However, some laws, rules, regulations, etc. enacted previously remain valid, and the provisions regulating foreign investment do not grant full market access to foreign investment as such. The inconsistency above makes it necessary to investigatehow the international investment treaty law and dispute settlement practice respond to the ‘inconsistency and conflict’ in municipal law andwhat remedy foreign investors can seek under international law if the investment is denied due to inconsistency. Ultimately, it aims to examine how international tribunals should balance the gradually developing legal system of host states and the protection of foreign investors and investments if the host states cannot provide consistency during such a transition period of law development. The research seeks to answer these questions by making a comparative analysis of domestic law on market access to foreign investment, international investment treaties, and dispute arbitral practice. The objective is to examine how international investment treaty law and international investment dispute settlement practice evaluate the conflicts in the municipal law of host states in the admission of foreign investment. It also explores the possibility of harmonisation among them.Keywords: municipal law, protect and promote foreign investment, international law, host states
Procedia PDF Downloads 9415300 Enhancing Access to Microfinance for Housing Provision in the Informal Sector of North East Nigeria
Authors: Wilfred Emmannuel Dzasu, Sani Usman Kunya, Inuwa Yusuf Mohammed, Moses Jonathan Gambo
Abstract:
The research aimed at investigating and identifying the strategies for enhancing access to microfinance for housing provision in the informal sector of North East Nigeria, with a focus on addressing the critical issue of housing poverty and lack of access to affordable housing finance among low-income households in the informal sector. The study employed an exploratory sequential mixed method design, combining both qualitative and quantitative data collection and analysis techniques. In the qualitative phase, 12 participants from microfinance institutions (MFIs) in four selected states (Adamawa, Bauchi, Gombe, and Taraba) were interviewed. The interviews were conducted using an interview guide with open-ended questions and were recorded with the consent of the respondents. In the quantitative phase, a survey strategy was adopted to collect data from 500 questionnaires distributed to informal sector workers (ISWs) in the study area. A total of 350 questionnaires were returned, representing a 70.0% response rate. The most preferred strategy for improving access to housing microfinance among ISWs is aggressive awareness of housing financing options by MFIs, with a mean score of 4.213; the most important strategy for improving access to housing microfinance among MFIs is close monitoring and adequate supervision of housing loan beneficiaries by MFIs, with a mean score of 4.675. The study identified several government-related strategies that are necessary for enhancing access to housing microfinance, including the provision of grants and subsidized intervention funds for housing, improvement in infrastructures to aid housing developments, and adequate measures for checking inflation/price fluctuation of building materials. The study also identified several MFI-related strategies that are necessary for enhancing access to housing microfinance, including deliberate expansion in the capital bases of MFIs, adequate training and capacity development of MFIs staff on relevant skills in housing micro-financing, and introduction of loan products that suit the incremental building needs of informal sector workers. Overall, the study highlights the need for a combination of government-related and MFI-related strategies to enhance access to microfinance for housing provision in the informal sector of North East Nigeria.Keywords: finanace, microfinance, housing, North East Nigeria
Procedia PDF Downloads 2515299 Sampling Effects on Secondary Voltage Control of Microgrids Based on Network of Multiagent
Authors: M. J. Park, S. H. Lee, C. H. Lee, O. M. Kwon
Abstract:
This paper studies a secondary voltage control framework of the microgrids based on the consensus for a communication network of multiagent. The proposed control is designed by the communication network with one-way links. The communication network is modeled by a directed graph. At this time, the concept of sampling is considered as the communication constraint among each distributed generator in the microgrids. To analyze the sampling effects on the secondary voltage control of the microgrids, by using Lyapunov theory and some mathematical techniques, the sufficient condition for such problem will be established regarding linear matrix inequality (LMI). Finally, some simulation results are given to illustrate the necessity of the consideration of the sampling effects on the secondary voltage control of the microgrids.Keywords: microgrids, secondary control, multiagent, sampling, LMI
Procedia PDF Downloads 33315298 Nurse Practitioner Led Pediatric Primary Care Clinic in a Tertiary Care Setting: Improving Access and Health Outcomes
Authors: Minna K. Miller, Chantel. E. Canessa, Suzanna V. McRae, Susan Shumay, Alissa Collingridge
Abstract:
Primary care provides the first point of contact and access to health care services. For the pediatric population, the goal is to help healthy children stay healthy and to help those that are sick get better. Primary care facilitates regular well baby/child visits; health promotion and disease prevention; investigation, diagnosis and management of acute and chronic illnesses; health education; both consultation and collaboration with, and referral to other health care professionals. There is a protective association between regular well-child visit care and preventable hospitalization. Further, low adherence to well-child care and poor continuity of care are independently associated with increased risk of hospitalization. With a declining number of family physicians caring for children, and only a portion of pediatricians providing primary care services, it is becoming increasingly difficult for children and their families to access primary care. Nurse practitioners are in a unique position to improve access to primary care and improve health outcomes for children. Limited literature is available on the nurse practitioner role in primary care pediatrics. The purpose of this paper is to describe the development, implementation and evaluation of a Nurse Practitioner-led pediatric primary care clinic in a tertiary care setting. Utilizing the participatory, evidence-based, patient-focused process for advanced practice nursing (PEPPA framework), this paper highlights the results of the initial needs assessment/gap analysis, the new service delivery model, populations served, and outcome measures.Keywords: access, health outcomes, nurse practitioner, pediatric primary care, PEPPA framework
Procedia PDF Downloads 49415297 Government Intervention in Land Market
Authors: Waqar Ahmad Bajwa
Abstract:
In the land market, there are two kinds of government intervention. First one is the control of development and second is the supply of land. In the both intervention Government has a lot of benefits. In development control the government designation of conservation areas and the effects of growth controls which may increase the price of land. On other hand Government also apply charge fee on land. The second type of intervention is to increase the supply of land, either by direct action or indirect action, as in the Pakistan, by obligatory purchase or important domain.Keywords: supply of control, control of development, charge fee, land control
Procedia PDF Downloads 26415296 The Effect of Culture on User Interface Design of Social Media- A Case Study on Preferences of Saudi Arabian on the Arabic User Interface of Facebook
Authors: Hana Almakky, Reza Sahandi, Jacqui Taylor
Abstract:
Social media continue to grow, and user interfaces may become more appealing if cultural characteristics are incorporated into their design. Facebook was designed in the west, and the original language was English. Subsequently, the words in the user interface were translated to other languages, including Arabic. Arabic words are written from right to left, and English is written from left to right. The translated version may misrepresent the original design and users preferences may influence their culture, which should be considered in the user interface design. Previous research indicates that users are more comfortable when interacting with a user interface, which relates to their own culture. Therefore, this paper, using a survey investigates the preferences of Saudi Arabian on the Arabic version of user interface of Facebook.Keywords: culture, social media, user interface design, Facebook, Saudi Arabia
Procedia PDF Downloads 39815295 Menstrual Hygiene Practices Among the Women Age 15-24 in India
Authors: Priyanka Kumari
Abstract:
Menstrual hygiene is an important aspect in the life of young girls. Menstrual Hygiene Management (MHM) is defined as ‘Women and adolescent girls using a clean material to absorb or collect menstrual blood that can be changed in privacy as often as necessary for the duration of the menstruation period, using soap and water for washing the body as required and having access to facilities to dispose of used menstrual management materials. This paper aims to investigate the prevalence of hygienic menstrual practices and socio-demographic correlates of hygienic menstrual practices among women aged 15-24 in India. Data from the 2015–2016 National Family Health Survey–4 for 244,500 menstruating women aged 15–24 were used. The methods have been categorized into two, women who use sanitary napkins, locally prepared napkins and tampons considered as a hygienic method and those who use cloth, any other method and nothing used at all during menstruation considered as an unhygienic method. Women’s age, year of schooling, religion, place of residence, caste/tribe, marital status, wealth index, type of toilet facility used, region, the structure of the house and exposure to mass media are taken as an independent variables. Bivariate analysis was carried out with selected background characteristics to analyze the socio-economic and demographic factors associated with the use of hygienic methods during menstruation. The odds for the use of the hygienic method were computed by employing binary logistic regression. Almost 60% of the women use cloth as an absorbent during menstruation to prevent blood stains from becoming evident. The hygienic method, which includes the use of locally prepared napkins, sanitary napkins and tampons, is 16.27%, 41.8% and 2.4%. The proportion of women who used hygienic methods to prevent blood stains from becoming evident was 57.58%. Multivariate analyses reveal that education of women, wealth and marital status are found to be the most important positive factors of hygienic menstrual practices. The structure of the house and exposure to mass media also have a positive impact on the use of menstrual hygiene practices. In contrast, women residing in rural areas belonging to scheduled tribes are less likely to use hygienic methods during their menstruation. Geographical regions are also statistically significant with the use of hygienic methods during menstruation. This study reveals that menstrual hygiene is not satisfactory among a large proportion of adolescent girls. They need more education about menstrual hygiene. A variety of factors affect menstrual behaviors; amongst these, the most influential is economic status, educational status and residential status, whether urban or rural. It is essential to design a mechanism to address and access healthy menstrual knowledge. It is important to encourage policies and quality standards that promote safe and affordable options and dynamic markets for menstrual products. Materials that are culturally acceptable, contextually available and affordable. Promotion of sustainable, environmentally friendly menstrual products and their disposal as it is a very important aspect of sustainable development goals. We also need to educate the girls about the services which are provided by the government, like a free supply of sanitary napkins to overcome reproductive tract infections. Awareness regarding the need for information on healthy menstrual practices is very important. It is essential to design a mechanism to address and access healthy menstrual practices. Emphasis should be given to the education of young girls about the importance of maintaining hygiene during menstruation to prevent the risk of reproductive tract infections.Keywords: adolescent, menstruation, menstrual hygiene management, menstrual hygiene
Procedia PDF Downloads 13915294 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device
Authors: K. N. Dinesh Babu, M. V. Gopalan, G. R. Manjunatha, R. Ramaprabha, V. Rajini
Abstract:
In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an intelligent electronic device (IED) is discussed. Its been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.Keywords: transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED)
Procedia PDF Downloads 59415293 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm
Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy
Abstract:
IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.Keywords: IoT, fog networks, data stewardship, dynamic access policy
Procedia PDF Downloads 5915292 Investigating the Effect of Executive Functions on Young Children’s Drawing of Familiar and Unfamiliar
Authors: Reshaa Alruwaili
Abstract:
This study was inspired by previous studies with young children that found (a) that they need both inhibitory control and working memory when drawing an unfamiliar subject (e.g., animals) by adapting their schema of the human figure and (b) that when drawing something familiar (e.g., a person) they use inhibitory control mediated through fine motor control to execute their drawing. This study, therefore, systematically investigated whether direct effects for both working memory and inhibitory control and/or effects mediated through fine motor control existed when drawing both familiar and unfamiliar subjects. Participants were 95 children (41-66 months old) required to draw both a man and a dog, scored respectively for how representational they were and for differences from a human figure. Regression and mediation analyses showed that inhibitory control alone predicted drawing a recognizable man while working memory alone predicted drawing a dog that was not human-like when fine motor control, age, and gender were controlled. Contrasting with some previous studies, these results suggest that the roles of working memory and inhibitory control are sensitive to the familiarity of the drawing task and are not necessarily mediated through fine motor control. Implications for research on drawing development are discussed.Keywords: child drawing, inhibitory control, working memory, fine motor control, mediation, familiar and unfamiliar subjects
Procedia PDF Downloads 7615291 Bit Error Rate (BER) Performance of Coherent Homodyne BPSK-OCDMA Network for Multimedia Applications
Authors: Morsy Ahmed Morsy Ismail
Abstract:
In this paper, the structure of a coherent homodyne receiver for the Binary Phase Shift Keying (BPSK) Optical Code Division Multiple Access (OCDMA) network is introduced based on the Multi-Length Weighted Modified Prime Code (ML-WMPC) for multimedia applications. The Bit Error Rate (BER) of this homodyne detection is evaluated as a function of the number of active users and the signal to noise ratio for different code lengths according to the multimedia application such as audio, voice, and video. Besides, the Mach-Zehnder interferometer is used as an external phase modulator in homodyne detection. Furthermore, the Multiple Access Interference (MAI) and the receiver noise in a shot-noise limited regime are taken into consideration in the BER calculations.Keywords: OCDMA networks, bit error rate, multiple access interference, binary phase-shift keying, multimedia
Procedia PDF Downloads 17515290 DEA-Based Variable Structure Position Control of DC Servo Motor
Authors: Ladan Maijama’a, Jibril D. Jiya, Ejike C. Anene
Abstract:
This paper presents Differential Evolution Algorithm (DEA) based Variable Structure Position Control (VSPC) of Laboratory DC servomotor (LDCSM). DEA is employed for the optimal tuning of Variable Structure Control (VSC) parameters for position control of a DC servomotor. The VSC combines the techniques of Sliding Mode Control (SMC) that gives the advantages of small overshoot, improved step response characteristics, faster dynamic response and adaptability to plant parameter variations, suppressed influences of disturbances and uncertainties in system behavior. The results of the simulation responses of the VSC parameters adjustment by DEA were performed in Matlab Version 2010a platform and yield better dynamic performance compared with the untuned VSC designed.Keywords: differential evolution algorithm, laboratory DC servomotor, sliding mode control, variable structure control
Procedia PDF Downloads 41515289 Intrusiveness, Appraisal and Thought Control Strategies in Patients with Obsessive Compulsive Disorder
Authors: T. Arshad
Abstract:
A correlation study was done to explore the relationship of intrusiveness, appraisal and thought control strategies in patients with Obsessive Compulsive Disorder. Theoretical frame work for the present study was Salkovskis (1985) cognitive model of obsessive compulsive disorder. Sample of 100 patients (men=48, women=52) of age 14-62 years (M=32.13, SD=10.37) was recruited from hospitals of Lahore, Pakistan. Revised Obsessional Intrusion Inventory, Stress Appraisal Measure, Thought Control Questionnaire and Symptoms Checklist-R were self-administered. Findings revealed that intrusiveness is correlated with appraisals (controllable by self, controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment). Furthermore, appraisals (uncontrollable, stressfulness, controllable by others) were emerged as strong predictors for different through control strategies (distraction, punishment and social control). Moreover, men have higher frequency of intrusion, whereas women were frequently using social control as thought control strategy. Results implied that intrusiveness, appraisals (controllable by others, uncontrollable, stressfulness) and thought control strategy (punishment) are related which maintains the disorder.Keywords: appraisal, intrusiveness, obsessive compulsive disorder, thought control strategies
Procedia PDF Downloads 38915288 Ancient Iran Water Technologies
Authors: Akbar Khodavirdizadeh, Ali Nemati Babaylou, Hassan Moomivand
Abstract:
The history of human access to water technique has been one of the factors in the formation of human civilizations in the ancient world. The technique that makes surface water and groundwater accessible to humans on the ground has been a clever technique in human life to reach the water. In this study, while examining the water technique of ancient Iran using the Qanats technique, the water supply system of different regions of the ancient world were also studied and compared. Six groups of the ancient region of ancient Greece (Archaic 480-750 BC and Classical 223-480 BC), Urartu in Tuspa (600-850 BC), Petra (106-168 BC), Ancient Rome (265 BC), and the ancient United States (1450 BC) and ancient Iranian water technologies were studied under water supply systems. Past water technologies in these areas: water transmission systems in primary urban centers, use of water structures in water control, use of bridges in water transfer, construction of waterways for water transfer, storage of rainfall, construction of various types of pottery- ceramic, lead, wood and stone pipes have been used in water transfer, flood control, water reservoirs, dams, channel, wells, and Qanat. The central plateau of Iran is one of the arid and desert regions. Archaeological, geomorphological, and paleontological studies of the central region of the Iranian plateau showed that without the use of Qanats, the possibility of urban civilization in this region was difficult and even impossible. Zarch aqueduct is the most important aqueduct in Yazd region. Qanat of Zarch is a plain Qanat with a gallery length of 80 km; its mother well is 85 m deep and has 2115 well shafts. The main purpose of building the Qanat of Zārch was to access the groundwater source and transfer it to the surface of the ground. Regarding the structure of the aqueduct and the technique of transferring water from the groundwater source to the surface, it has a great impact on being different from other water techniques in the ancient world. The results show that the use of water technologies in ancient is very important to understand the history of humanity in the use of hydraulic techniques.Keywords: ancient water technologies, groundwaters, qanat, human history, Ancient Iran
Procedia PDF Downloads 11215287 Stability of Stochastic Model Predictive Control for Schrödinger Equation with Finite Approximation
Authors: Tomoaki Hashimoto
Abstract:
Recent technological advance has prompted significant interest in developing the control theory of quantum systems. Following the increasing interest in the control of quantum dynamics, this paper examines the control problem of Schrödinger equation because quantum dynamics is basically governed by Schrödinger equation. From the practical point of view, stochastic disturbances cannot be avoided in the implementation of control method for quantum systems. Thus, we consider here the robust stabilization problem of Schrödinger equation against stochastic disturbances. In this paper, we adopt model predictive control method in which control performance over a finite future is optimized with a performance index that has a moving initial and terminal time. The objective of this study is to derive the stability criterion for model predictive control of Schrödinger equation under stochastic disturbances.Keywords: optimal control, stochastic systems, quantum systems, stabilization
Procedia PDF Downloads 45815286 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order
Authors: Farida Ibrahim
Abstract:
Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.Keywords: civil society, Egypt, right to information, socio-economic rights
Procedia PDF Downloads 28115285 The Effects of Social Media on the Dreams of Preadolescent Girls
Authors: Saveria Capecchi
Abstract:
The aim of the quali-quantitative research conducted in the spring of 2021 (still in the midst of the Covid-19 emergency) was to analyze the relationship between the imaginary of 142 girls aged 10-12 from two Italian cities in the Emilia-Romagna region (the capital, Bologna, and Parma) and the influence that various socialization agents can have on it, with particular attention to social media. In order to investigate the relationship between imagination and media, two tools were used: first, the girls wrote an essay in class about their future lives, imagining waking up one morning as a thirty-year-old adults. Six types of "dreams" reflecting the values and lifestyles characteristic of contemporary Italian society emerged. Additionally, the girls completed a questionnaire on their leisure time and, in particular, media consumption aimed at identifying their favorite characters. The results provided insights into understanding the reference values and lifestyles that define their subculture (they belong to the so-called Generation Z). Another interesting aspect of this research is the possibility of comparing the results with those of a similar study on preadolescent imaginary conducted in 1995, involving 292 girls from Milan and Bologna, belonging to the Millennial generation. The narratives about the imagined adult life reflect some crucial changes undergone by Italian society in a quarter of a century: there are advancements towards gender equality, and the imagined family is increasingly detached from tradition. There is a more persistent dream of a life marked by beauty, wealth, and fame, while at the same time, there is a greater social commitment, from solidarity with marginalized people to environmentalism. Furthermore, the mentioned new digital and robotic professions will project us into the near future.Keywords: gender equality, gender stereotypes, imaginary, preadolescents, social media
Procedia PDF Downloads 5415284 Research and Development of Net-Centric Information Sharing Platform
Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong
Abstract:
Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control
Procedia PDF Downloads 57015283 Green Public Procurement in Open Access and Traditional Journals: A Comparative Bibliometric Analysis
Authors: Alonso-Cañadas J., Galán-Valdivieso F., Saraite-Sariene L., García-Tabuyo M., Alonso-Morales N.
Abstract:
Green Public Procurement (GPP) has recently gained attention in the academic and policy arenas since climate change has shown the need to be addressed by both private companies and public entities. Such growing interest motivates this article, aiming to explore the most influential journals, publishers, categories, and topics, as well as the recent trends and future research lines in GPP. Based on the Web of Science database, 578 articles from 2004 to February 2022 devoted to GPP are analyzed using Bibliometrix, an R-tool to perform bibliometric analysis, and Google’s Big Query and Data Studio. This article introduces a variety of findings. First, the most influential journals by far are “Journal of Cleaner Production” and “Sustainability,” differing in that the latter is open access while the former publishes via traditional subscription. This result also occurs regarding the main publishers (Elsevier and MDPI). These features lead us to split the sample into open-access journals and traditional journals to deepen into the similarities and differences between them, confirming that traditional journals exhibit a higher degree of influence in the literature than their open-access counterparts in terms of the number of documents, number of citations and impact (according to the H index). Second, this research also highlights the recent emergence of green-related terms (sustainable, environment) and, parallelly, the increase in categorizing GPP papers in “green” WoS categories, particularly since 2019. Finally, a number of related topics are emerging and will lead the research, such as food security, infrastructures, and implementation barriers of GPP.Keywords: bibliometric analysis, green public procurement, open access, traditional journals
Procedia PDF Downloads 10415282 The Instrumentalization of Digital Media in the Context of Sexualized Violence
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media
Procedia PDF Downloads 18315281 Active Flutter Suppression of Sports Aircraft Tailplane by Supplementary Control Surface
Authors: Aleš Kratochvíl, Svatomír Slavík
Abstract:
The paper presents an aircraft flutter suppression by active damping of supplementary control surface at trailing edge. The mathematical model of thin oscillation airfoil with control surface driven by pilot is developed. The supplementary control surface driven by control law is added. Active damping of flutter by several control law is present. The structural model of tailplane with an aerodynamic strip theory based on the airfoil model is developed by a finite element method. The optimization process of stiffens parameters is carried out to match the structural model with results from a ground vibration test of a small sport airplane. The implementation of supplementary control surface driven by control law is present. The active damping of tailplane model is shown.Keywords: active damping, finite element method, flutter, tailplane model
Procedia PDF Downloads 29215280 Impact of Gender Difference on Crop Productivity: The Case of Decha Woreda, Ethiopia
Authors: Getinet Gezahegn Gebre
Abstract:
The study examined the impact of gender differences on Crop productivity in Decha woreda of southwest Kafa zone, located 140 Km from Jimma Town and 460 km southwest of Addis Ababa, between Bonga town and Omo River. The specific objectives were to assess the extent to which the agricultural production system is gender oriented, to examine access and control over productive resources, and to estimate men’s and women’s productivity in agriculture. Cross-sectional data collected from a total of 140 respondents were used in this study, whereby 65 were female-headed and 75 were male-headed households. The data were analyzed by using Statistical Package for Social Science (SPSS). Descriptive statistics such as frequency, mean, percentage, t-test and chi-square were used to summarize and compare the information between the two groups. Moreover, Cobb-Douglas(CD) production function was used to estimate the productivity difference in agriculture between male and female-headed households. Results of the study showed that male-headed households (MHH) own more productive resources such as land, livestock, labor and other agricultural inputs as compared to female-headed households (FHH). Moreover, the estimate of CD production function shows that livestock, herbicide use, land size and male labor were statistically significant for MHH, while livestock, land size, herbicides use and female labor were significant variables for FHH. The crop productivity difference between MHH and FHH was about 68.83% in the study area. However, if FHH had equal access to the inputs as MHH, the gross value of the output would be higher by 23.58% for FHH. This might suggest that FHH would be more productive than MHH if they had equal access to inputs as MHH. Based on the results obtained, the following policy implication can be drawn: accessing FHH to inputs that increase the productivity of agriculture, such as herbicides, livestock and male labor; increasing the productivity of land; and introducing technologies that reduce the time and energy of women, especially for enset processing.Keywords: gender difference, crop productivity, GDP, efficiency
Procedia PDF Downloads 7315279 Detecting Cyberbullying, Spam and Bot Behavior and Fake News in Social Media Accounts Using Machine Learning
Authors: M. D. D. Chathurangi, M. G. K. Nayanathara, K. M. H. M. M. Gunapala, G. M. R. G. Dayananda, Kavinga Yapa Abeywardena, Deemantha Siriwardana
Abstract:
Due to the growing popularity of social media platforms at present, there are various concerns, mostly cyberbullying, spam, bot accounts, and the spread of incorrect information. To develop a risk score calculation system as a thorough method for deciphering and exposing unethical social media profiles, this research explores the most suitable algorithms to our best knowledge in detecting the mentioned concerns. Various multiple models, such as Naïve Bayes, CNN, KNN, Stochastic Gradient Descent, Gradient Boosting Classifier, etc., were examined, and the best results were taken into the development of the risk score system. For cyberbullying, the Logistic Regression algorithm achieved an accuracy of 84.9%, while the spam-detecting MLP model gained 98.02% accuracy. The bot accounts identifying the Random Forest algorithm obtained 91.06% accuracy, and 84% accuracy was acquired for fake news detection using SVM.Keywords: cyberbullying, spam behavior, bot accounts, fake news, machine learning
Procedia PDF Downloads 3615278 Realization of a Temperature Based Automatic Controlled Domestic Electric Boiling System
Authors: Shengqi Yu, Jinwei Zhao
Abstract:
This paper presents a kind of analog circuit based temperature control system, which is mainly composed by threshold control signal circuit, synchronization signal circuit and trigger pulse circuit. Firstly, the temperature feedback signal function is realized by temperature sensor TS503F3950E. Secondly, the main control circuit forms the cycle controlled pulse signal to control the thyristor switching model. Finally two reverse paralleled thyristors regulate the output power by their switching state. In the consequence, this is a modernized and energy-saving domestic electric heating system.Keywords: time base circuit, automatic control, zero-crossing trigger, temperature control
Procedia PDF Downloads 48115277 Nitrogen Fixation, Cytokinin and Exopolysachharide Production by indigenous Azotobacter spp. from East Nusa Tenggara
Authors: Reginawanti Hindersah, Widiya Septiani Perdanawati, Dewi Azizah Sulaksana, Hidiyah Ayu Ma’rufah
Abstract:
Maize in some region in East Nusa Tenggara Indonesia bordering Republic Democratic of Timor Leste is important local food crop and commonly cultivated using conventional method without appropriate plant nutrition system so that productivity is still low. A way to enhance local corn yield is adding biofertilizer containing nitrogen (N2) fixing bacteria such as Azotobacter. The purpose of this research was to determine N2 fixation, cytokinin as well as exopolysachharide production capacity of six indigenous Azotobacter strains in pure culture. The N2 fixation capacities of native 3 day old Azotobacter strains added to Ashby Media varied from 0.01 to 0.39 µM/g/hour. Cytokinin production of these strain in liquid culture of N-free Media was 0.11 to 40.04 ppm while exopolysachharide content in liquid culture of Vermani Media varied from 0.4 to 27.3 g/L. This results demonstrate that some local Azotobacter strains might be used as biofertilizer.Keywords: azotobacter, local isolate, N fixation, phythohormone, exopolysaccaride
Procedia PDF Downloads 43215276 A Study of Evolutional Control Systems
Authors: Ti-Jun Xiao, Zhe Xu
Abstract:
Controllability is one of the fundamental issues in control systems. In this paper, we study the controllability of second order evolutional control systems in Hilbert spaces with memory and boundary controls, which model dynamic behaviors of some viscoelastic materials. Transferring the control problem into a moment problem and showing the Riesz property of a family of functions related to Cauchy problems for some integrodifferential equations, we obtain a general boundary controllability theorem for these second order evolutional control systems. This controllability theorem is applicable to various concrete 1D viscoelastic systems and recovers some previous related results. It is worth noting that Riesz sequences can be used for numerical computations of the control functions and the identification of new Riesz sequence is of independent interest for the basis-function theory. Moreover, using the Riesz sequences, we obtain the existence and uniqueness of (weak) solutions to these second order evolutional control systems in Hilbert spaces. Finally, we derive the exact boundary controllability of a viscoelastic beam equation, as an application of our abstract theorem.Keywords: evolutional control system, controllability, boundary control, existence and uniqueness
Procedia PDF Downloads 22215275 Cryptography Based Authentication Methods
Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf
Abstract:
This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.Keywords: information security, cryptography, system access control, authentication, network security
Procedia PDF Downloads 47115274 A Comparative Analysis of Self-help Housing and Government Mass Housing Scheme in Addressing the Challenge of Housing Access in Mararaba Area of Karu Local Government Area, Nasarawa State, Nigeria
Authors: John Abubakar
Abstract:
Access to decent housing is a global challenge. An estimated one billion people currently live in slum settlements globally. About 80 percent of these slum dwellers are in Asia and Africa. Nigeria accounts for a significant percentage of African slum dwellers because of its size. Addressing the challenge of slum settlement in Nigeria can have far reaching positive implications in Africa. A major slum settlement in Nigeria is Mararaba slum in Karu local government of Nasarawa state. The importance of this slum settlement hinges on its proximity to Abuja, Nigeria’s capital city. This study is an attempt at identifying the impact of self-help housing and government mass housing scheme in addressing the problem of housing access in Mararaba area of Karu local government, Nasarawa state. The research method used is the content analysis of existing literature. After the review of existing literature, the paper argues that self-help house is more impactful in addressing housing access in Mararaba area of Karu local government. Therefore, self-help housing should be recognized and incorporated into the housing policy of Nasarawa state. Both self-help housing and government mass housing programs are reviewed comparatively, and their strengths and weaknesses analyses.Keywords: slum settlement, informal settlement, progressive improvement, holistic planning
Procedia PDF Downloads 7815273 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263