Search results for: programming frameworks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1666

Search results for: programming frameworks

646 Healthcare Big Data Analytics Using Hadoop

Authors: Chellammal Surianarayanan

Abstract:

Healthcare industry is generating large amounts of data driven by various needs such as record keeping, physician’s prescription, medical imaging, sensor data, Electronic Patient Record(EPR), laboratory, pharmacy, etc. Healthcare data is so big and complex that they cannot be managed by conventional hardware and software. The complexity of healthcare big data arises from large volume of data, the velocity with which the data is accumulated and different varieties such as structured, semi-structured and unstructured nature of data. Despite the complexity of big data, if the trends and patterns that exist within the big data are uncovered and analyzed, higher quality healthcare at lower cost can be provided. Hadoop is an open source software framework for distributed processing of large data sets across clusters of commodity hardware using a simple programming model. The core components of Hadoop include Hadoop Distributed File System which offers way to store large amount of data across multiple machines and MapReduce which offers way to process large data sets with a parallel, distributed algorithm on a cluster. Hadoop ecosystem also includes various other tools such as Hive (a SQL-like query language), Pig (a higher level query language for MapReduce), Hbase(a columnar data store), etc. In this paper an analysis has been done as how healthcare big data can be processed and analyzed using Hadoop ecosystem.

Keywords: big data analytics, Hadoop, healthcare data, towards quality healthcare

Procedia PDF Downloads 411
645 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 90
644 A Hybrid Algorithm for Collaborative Transportation Planning among Carriers

Authors: Elham Jelodari Mamaghani, Christian Prins, Haoxun Chen

Abstract:

In this paper, there is concentration on collaborative transportation planning (CTP) among multiple carriers with pickup and delivery requests and time windows. This problem is a vehicle routing problem with constraints from standard vehicle routing problems and new constraints from a real-world application. In the problem, each carrier has a finite number of vehicles, and each request is a pickup and delivery request with time window. Moreover, each carrier has reserved requests, which must be served by itself, whereas its exchangeable requests can be outsourced to and served by other carriers. This collaboration among carriers can help them to reduce total transportation costs. A mixed integer programming model is proposed to the problem. To solve the model, a hybrid algorithm that combines Genetic Algorithm and Simulated Annealing (GASA) is proposed. This algorithm takes advantages of GASA at the same time. After tuning the parameters of the algorithm with the Taguchi method, the experiments are conducted and experimental results are provided for the hybrid algorithm. The results are compared with those obtained by a commercial solver. The comparison indicates that the GASA significantly outperforms the commercial solver.

Keywords: centralized collaborative transportation, collaborative transportation with pickup and delivery, collaborative transportation with time windows, hybrid algorithm of GA and SA

Procedia PDF Downloads 386
643 Supplier Selection in a Scenario Based Stochastic Model with Uncertain Defectiveness and Delivery Lateness Rates

Authors: Abeer Amayri, Akif A. Bulgak

Abstract:

Due to today’s globalization as well as outsourcing practices of the companies, the Supply Chain (SC) performances have become more dependent on the efficient movement of material among places that are geographically dispersed, where there is more chance for disruptions. One such disruption is the quality and delivery uncertainties of outsourcing. These uncertainties could lead the products to be unsafe and, as is the case in a number of recent examples, companies may have to end up in recalling their products. As a result of these problems, there is a need to develop a methodology for selecting suppliers globally in view of risks associated with low quality and late delivery. Accordingly, we developed a two-stage stochastic model that captures the risks associated with uncertainty in quality and delivery as well as a solution procedure for the model. The stochastic model developed simultaneously optimizes supplier selection and purchase quantities under price discounts over a time horizon. In particular, our target is the study of global organizations with multiple sites and multiple overseas suppliers, where the pricing is offered in suppliers’ local currencies. Our proposed methodology is applied to a case study for a US automotive company having two assembly plants and four potential global suppliers to illustrate how the proposed model works in practice.

Keywords: global supply chains, quality, stochastic programming, supplier selection

Procedia PDF Downloads 454
642 Design and Synthesis of Copper-Zeolite Composite for Antimicrobial Activity and Heavy Metal Removal From Waste Water

Authors: Feleke Terefe Fanta

Abstract:

Background: The existence of heavy metals and coliform bacteria contaminants in aquatic system of Akaki river basin, a sub city of Addis Ababa, Ethiopia has become a public concern as human population increases and land development continues. Hence, it is the right time to design treatment technologies that can handle multiple pollutants. Results: In this study, we prepared a synthetic zeolites and copper doped zeolite composite adsorbents as cost effective and simple approach to simultaneously remove heavy metals and total coliforms from wastewater of Akaki river. The synthesized copper–zeolite X composite was obtained by ion exchange method of copper ions into zeolites frameworks. Iodine test, XRD, FTIR and autosorb IQ automated gas sorption analyzer were used to characterize the adsorbents. The mean concentrations of Cd, Cr, and Pb in untreated sample were 0.795, 0.654 and 0.7025 mg/L respectively. These concentrations decreased to Cd (0.005 mg/L), Cr (0.052 mg/L) and Pb (bellow detection limit, BDL) for sample treated with bare zeolite X while a further decrease in concentration of Cd (0.005 mg/L), Cr (BDL) and Pb (BDL) was observed for the sample treated with copper–zeolite composite. Zeolite X and copper-modified zeolite X showed complete elimination of total coliforms after 90 and 50 min contact time respectively. Conclusion: The results obtained in this study showed high antimicrobial disinfection and heavy metal removal efficiencies of the synthesized adsorbents. Furthermore, these sorbents are efficient in significantly reducing physical parameters such as electrical conductivity, turbidity, BOD and COD.

Keywords: WASTE WATER, COPPER DOPED ZEOITE X, ADSORPITION, HEAVY METAL, DISINFECTION, AKAKI RIVER

Procedia PDF Downloads 63
641 Extraction of Road Edge Lines from High-Resolution Remote Sensing Images Based on Energy Function and Snake Model

Authors: Zuoji Huang, Haiming Qian, Chunlin Wang, Jinyan Sun, Nan Xu

Abstract:

In this paper, the strategy to extract double road edge lines from acquired road stripe image was explored. The workflow is as follows: the road stripes are acquired by probabilistic boosting tree algorithm and morphological algorithm immediately, and road centerlines are detected by thinning algorithm, so the initial road edge lines can be acquired along the road centerlines. Then we refine the results with big variation of local curvature of centerlines. Specifically, the energy function of edge line is constructed by gradient feature and spectral information, and Dijkstra algorithm is used to optimize the initial road edge lines. The Snake model is constructed to solve the fracture problem of intersection, and the discrete dynamic programming algorithm is used to solve the model. After that, we could get the final road network. Experiment results show that the strategy proposed in this paper can be used to extract the continuous and smooth road edge lines from high-resolution remote sensing images with an accuracy of 88% in our study area.

Keywords: road edge lines extraction, energy function, intersection fracture, Snake model

Procedia PDF Downloads 336
640 Augmented Reality Using Cuboid Tracking as a Support for Early Stages of Architectural Design

Authors: Larissa Negris de Souza, Ana Regina Mizrahy Cuperschmid, Daniel de Carvalho Moreira

Abstract:

Augmented Reality (AR) alters the elaboration of the architectural project, which relates to project cognition: representation, visualization, and perception of information. Understanding these features from the earliest stages of the design can facilitate the study of relationships, zoning, and overall dimensions of the forms. This paper’s goal was to explore a new approach for information visualization during the early stages of architectural design using Augmented Reality (AR). A three-dimensional marker inspired by the Rubik’s Cube was developed, and its performance, evaluated. This investigation interwovens the acquired knowledge of traditional briefing methods and contemporary technology. We considered the concept of patterns (Alexander et al. 1977) to outline geometric forms and associations using visual programming. The Design Science Research was applied to develop the study. An SDK was used in a game engine to generate the AR app. The tool's functionality was assessed by verifying the readability and precision of the reconfigurable 3D marker. The results indicated an inconsistent response. To use AR in the early stages of architectural design the system must provide consistent information and appropriate feedback. Nevertheless, we conclude that our framework sets the ground for looking deep into AR tools for briefing design.

Keywords: augmented reality, cuboid marker, early design stages, graphic representation, patterns

Procedia PDF Downloads 94
639 Inclusive Education for Deaf and Hard-of-Hearing Students in China: Ideas, Practices, and Challenges

Authors: Xuan Zheng

Abstract:

China is home to one of the world’s largest Deaf and Hard of Hearing (DHH) populations. In the 1980s, the concept of inclusive education was introduced, giving rise to a unique “learning in regular class (随班就读)” model tailored to local contexts. China’s inclusive education for DHH students is diversifying with innovative models like special education classes at regular schools, regular classes at regular schools, resource classrooms, satellite classes, and bilingual-bimodal projects. The scope extends to preschool and higher education programs. However, the inclusive development of DHH students faces challenges. The prevailing pathological viewpoint on disabilities persists, emphasizing the necessity for favorable auditory and speech rehabilitation outcomes before DHH students can integrate into regular classes. In addition, inadequate support systems in inclusive schools result in poor academic performance and increased psychological disorders among the group, prompting a notable return to special education schools. Looking ahead, China’s inclusive education for DHH students needs a substantial shift from “learning in regular class” to “sharing equal regular education.” Particular attention should be devoted to the effective integration of DHH students who employ sign language into mainstream educational settings. It is crucial to strengthen regulatory frameworks and institutional safeguards, advance the professional development of educators specializing in inclusive education for DHH students, and consistently enhance resources tailored to this demographic. Furthermore, the establishment of a robust, multidimensional, and collaborative support network, engaging both families and educational institutions, is also a pivotal facet.

Keywords: deaf, hard of hearing, inclusive education, China

Procedia PDF Downloads 50
638 Electrocardiogram-Based Heartbeat Classification Using Convolutional Neural Networks

Authors: Jacqueline Rose T. Alipo-on, Francesca Isabelle F. Escobar, Myles Joshua T. Tan, Hezerul Abdul Karim, Nouar Al Dahoul

Abstract:

Electrocardiogram (ECG) signal analysis and processing are crucial in the diagnosis of cardiovascular diseases, which are considered one of the leading causes of mortality worldwide. However, the traditional rule-based analysis of large volumes of ECG data is time-consuming, labor-intensive, and prone to human errors. With the advancement of the programming paradigm, algorithms such as machine learning have been increasingly used to perform an analysis of ECG signals. In this paper, various deep learning algorithms were adapted to classify five classes of heartbeat types. The dataset used in this work is the synthetic MIT-BIH Arrhythmia dataset produced from generative adversarial networks (GANs). Various deep learning models such as ResNet-50 convolutional neural network (CNN), 1-D CNN, and long short-term memory (LSTM) were evaluated and compared. ResNet-50 was found to outperform other models in terms of recall and F1 score using a five-fold average score of 98.88% and 98.87%, respectively. 1-D CNN, on the other hand, was found to have the highest average precision of 98.93%.

Keywords: heartbeat classification, convolutional neural network, electrocardiogram signals, generative adversarial networks, long short-term memory, ResNet-50

Procedia PDF Downloads 124
637 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 228
636 Post Occupancy Evaluation in Higher Education

Authors: Balogun Azeez Olawale, Azeez S. A.

Abstract:

Post occupancy evaluation (POE) is a process of assessing building performance for its users and intended function during the occupation. User satisfaction impacts the performance of educational environments and their users: students, faculty, and staff. In addition, buildings are maintained and managed by teams that spend a large amount of time and capital on their long-term sustenance. By evaluating the feedback from users of higher education facilities, university planning departments are more prepared to understand the inputs for programming and future project planning. In addition, university buildings will be closer to meeting user and maintenance needs. This paper reports on a research team made up of academics, facility personnel, and users that have developed a plan to improve the quality of campus facilities through a POE exercise on a recently built project. This study utilized a process of focus group interviews representing the different users and subsequent surveys. The paper demonstrates both the theory and practice of POE in higher education and learning environment through the case example of four universities in Nigeria's POE exercise.

Keywords: post occupancy evaluation, building performance, building analysis, building evaluation, quality control, building assessment, facility management, design quality

Procedia PDF Downloads 109
635 Review of Downscaling Methods in Climate Change and Their Role in Hydrological Studies

Authors: Nishi Bhuvandas, P. V. Timbadiya, P. L. Patel, P. D. Porey

Abstract:

Recent perceived climate variability raises concerns with unprecedented hydrological phenomena and extremes. Distribution and circulation of the waters of the Earth become increasingly difficult to determine because of additional uncertainty related to anthropogenic emissions. According to the sixth Intergovernmental Panel on Climate Change (IPCC) Technical Paper on Climate Change and water, changes in the large-scale hydrological cycle have been related to an increase in the observed temperature over several decades. Although many previous research carried on effect of change in climate on hydrology provides a general picture of possible hydrological global change, new tools and frameworks for modelling hydrological series with nonstationary characteristics at finer scales, are required for assessing climate change impacts. Of the downscaling techniques, dynamic downscaling is usually based on the use of Regional Climate Models (RCMs), which generate finer resolution output based on atmospheric physics over a region using General Circulation Model (GCM) fields as boundary conditions. However, RCMs are not expected to capture the observed spatial precipitation extremes at a fine cell scale or at a basin scale. Statistical downscaling derives a statistical or empirical relationship between the variables simulated by the GCMs, called predictors, and station-scale hydrologic variables, called predictands. The main focus of the paper is on the need for using statistical downscaling techniques for projection of local hydrometeorological variables under climate change scenarios. The projections can be then served as a means of input source to various hydrologic models to obtain streamflow, evapotranspiration, soil moisture and other hydrological variables of interest.

Keywords: climate change, downscaling, GCM, RCM

Procedia PDF Downloads 401
634 Chairussyuhur Arman, Totti Tjiptosumirat, Muhammad Gunawan, Mastur, Joko Priyono, Baiq Tri Ratna Erawati

Authors: Maria M. Giannakou, Athanasios K. Ziliaskopoulos

Abstract:

Transmission pipelines carrying natural gas are often routed through populated cities, industrial and environmentally sensitive areas. While the need for these networks is unquestionable, there are serious concerns about the risk these lifeline networks pose to the people, to their habitat and to the critical infrastructures, especially in view of natural disasters such as earthquakes. This work presents an Integrated Pipeline Risk Management methodology (IPRM) for assessing the hazard associated with a natural gas pipeline failure due to natural or manmade disasters. IPRM aims to optimize the allocation of the available resources to countermeasures in order to minimize the impacts of pipeline failure to humans, the environment, the infrastructure and the economic activity. A proposed knapsack mathematical programming formulation is introduced that optimally selects the proper mitigation policies based on the estimated cost – benefit ratios. The proposed model is demonstrated with a small numerical example. The vulnerability analysis of these pipelines and the quantification of consequences from such failures can be useful for natural gas industries on deciding which mitigation measures to implement on the existing pipeline networks with the minimum cost in an acceptable level of hazard.

Keywords: cost benefit analysis, knapsack problem, natural gas distribution network, risk management, risk mitigation

Procedia PDF Downloads 288
633 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling

Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar

Abstract:

Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.

Keywords: toolpath, part program, optimization, pocket

Procedia PDF Downloads 285
632 A Simulation-Optimization Approach to Control Production, Subcontracting and Maintenance Decisions for a Deteriorating Production System

Authors: Héctor Rivera-Gómez, Eva Selene Hernández-Gress, Oscar Montaño-Arango, Jose Ramon Corona-Armenta

Abstract:

This research studies the joint production, maintenance and subcontracting control policy for an unreliable deteriorating manufacturing system. Production activities are controlled by a derivation of the Hedging Point Policy, and given that the system is subject to deterioration, it reduces progressively its capacity to satisfy product demand. Multiple deterioration effects are considered, reflected mainly in the quality of the parts produced and the reliability of the machine. Subcontracting is available as support to satisfy product demand; also overhaul maintenance can be conducted to reduce the effects of deterioration. The main objective of the research is to determine simultaneously the production, maintenance and subcontracting rate which minimize the total incurred cost. A stochastic dynamic programming model is developed and solved through a simulation-based approach composed of statistical analysis and optimization with the response surface methodology. The obtained results highlight the strong interactions between production, deterioration and quality which justify the development of an integrated model. A numerical example and a sensitivity analysis are presented to validate our results.

Keywords: subcontracting, optimal control, deterioration, simulation, production planning

Procedia PDF Downloads 576
631 Migration, Security, and Human Rights in Nigeria: Navigating National Interests Amidst Regional Crises

Authors: Otu Otu Akanu

Abstract:

The nexus between migration, national security, and human rights has become increasingly complex, particularly within Nigeria's geopolitical landscape. This study explores how Nigeria navigates the balance between safeguarding national security and upholding human rights amidst escalating regional crises, such as conflicts in the Lake Chad Basin and the Sahel. Through a comprehensive analysis of policy frameworks, security measures, and human rights protocols, this paper critically examines the challenges and opportunities in Nigeria's approach. The study employed a multidisciplinary methodology, integrating perspectives from International Relations, Human Security Studies, and Migration Law to provide a holistic understanding of the issue. Drawing on primary data from government reports, policy documents, and interviews with key stakeholders, alongside secondary literature, the study reveals a persistent tension between security imperatives and human rights obligations. While Nigeria has made strides in enhancing its security architecture, the findings highlight significant gaps in the protection of migrants' rights, often exacerbated by external pressures and domestic political dynamics. The paper argues that a recalibration of Nigeria's security and human rights policies is imperative for achieving sustainable peace and security in the region. By offering policy recommendations rooted in international best practices, this study contributes to the ongoing discourse on migration and security in West Africa and provides a framework for other nations grappling with similar challenges. This research underscores the need for an integrated approach that transcends traditional security paradigms, advocating a more inclusive and human-centered strategy in addressing the complexities of migration and national security.

Keywords: migration, national security, human rights, nigeria, west africa.

Procedia PDF Downloads 7
630 Classification of Myoelectric Signals Using Multilayer Perceptron Neural Network with Back-Propagation Algorithm in a Wireless Surface Myoelectric Prosthesis of the Upper-Limb

Authors: Kevin D. Manalo, Jumelyn L. Torres, Noel B. Linsangan

Abstract:

This paper focuses on a wireless myoelectric prosthesis of the upper-limb that uses a Multilayer Perceptron Neural network with back propagation. The algorithm is widely used in pattern recognition. The network can be used to train signals and be able to use it in performing a function on their own based on sample inputs. The paper makes use of the Neural Network in classifying the electromyography signal that is produced by the muscle in the amputee’s skin surface. The gathered data will be passed on through the Classification Stage wirelessly through Zigbee Technology. The signal will be classified and trained to be used in performing the arm positions in the prosthesis. Through programming using Verilog and using a Field Programmable Gate Array (FPGA) with Zigbee, the EMG signals will be acquired and will be used for classification. The classified signal is used to produce the corresponding Hand Movements (Open, Pick, Hold, and Grip) through the Zigbee controller. The data will then be processed through the MLP Neural Network using MATLAB which then be used for the surface myoelectric prosthesis. Z-test will be used to display the output acquired from using the neural network.

Keywords: field programmable gate array, multilayer perceptron neural network, verilog, zigbee

Procedia PDF Downloads 387
629 Privatization and Ensuring Accountability in the Provision of Essential Services: A Case of Water in South Africa

Authors: Odufu Ifakachukwu Clifford

Abstract:

Developing country governments are struggling to meet the basic needs and demands of citizens, especially so for the rural poor. With tightly constrained budgets, these governments have followed the lead of developed countries that have sought to restructure public service delivery through privatization, contracting out, public-private partnerships, and similar reforms. Such reforms in service delivery are generally welcomed when it is believed that private sector partners are better equipped to provide certain services than are governments. With respect to basic and essential services, however, a higher degree of uncertainty and apprehension exists as the focus shifts from simply minimizing the costs of delivering services to broadening access to all citizens. The constitution stipulates that everyone has the right to have access to sufficient food and water. Affordable and/or subsidized water, then, is not a privilege but a basic right of all citizens. Citizens elect political representatives to serve in office, with their sole mandate being to provide for the needs of the citizenry. As governments pass on some amount of responsibility for service delivery to private businesses, these governments must be able to exercise control in order to account to the people for the work done by private partners. This paper examines the legislative and policy frameworks as well as the environment within which PPPs take place in South Africa and the extent to which accountability can be strengthened in this environment. Within the aforementioned backdrop of PPPs and accountability, the constricted focus area of the paper aims to assess the extent to which the provision of clean and safe consumable water in South Africa is sustainable, cost-effective in terms of provision, and affordable to all.

Keywords: privatisation, accountability, essential services, government

Procedia PDF Downloads 62
628 A comparative Analysis of the Good Faith Principle in Construction Contracts

Authors: Nadine Rashed, A. Samer Ezeldin, Engy Serag

Abstract:

The principle of good faith plays a critical role in shaping contractual relationships, yet its application varies significantly across different types of construction contracts and legal systems. This paper presents a comparative analysis of how various construction contracts perceive the principle of good faith, a fundamental aspect that influences contractual relationships and project outcomes. The primary objective of this analysis is to examine the differences in the application and interpretation of good faith across key construction contracts, including JCT (Joint Contracts Tribunal), FIDIC (Fédération Internationale des Ingénieurs-Conseils), NEC (New Engineering Contract), and ICE (Institution of Civil Engineers) Contracts. To accomplish this, a mixed-methods approach will be employed, integrating a thorough literature review of current legal frameworks and academic publications with primary data gathered from a structured questionnaire aimed at industry professionals such as contract managers, legal advisors, and project stakeholders. This combined strategy will enable a holistic understanding of the theoretical foundations of good faith in construction contracts and its practical effects in real-world contexts. The findings of this analysis are expected to yield valuable insights into how varying interpretations of good faith can impact project performance, dispute resolution, and collaborative practices within the construction industry. This paper contributes to a deeper understanding of how the principle of good faith is evolving in the construction industry, providing insights for contract drafters, legal practitioners, and project managers seeking to navigate the complexities of contractual obligations across different legal systems.

Keywords: construction contracts, contractual obligations, ethical practices, good faith

Procedia PDF Downloads 4
627 Research on the Influence of Robot Teaching on the Creativity of Primary and Secondary School Students under the Background of STEM Education

Authors: Chu Liu

Abstract:

With the development of society and the changes of the times, the requirements for the cultivation of learners are different. In the 21st century, STEM education has become a boom in the development of education in various countries, aiming to improve the comprehensive ability of learners in science, technology, engineering, and mathematics. The rise of robot education provides an effective way for STEM education to cultivate computational thinking ability, interdisciplinary ability, problem-solving ability, and teamwork ability. Although robot education has been developed in China for several years, it still lacks a standard curriculum system. This article uses programming software as a platform, through the research and analysis of 'Basic Education Information Technology Curriculum Standards (2012 Edition)', combines with the actual learning situation of learners, tries to conduct teaching project design research, and aims at providing references for the teaching ideas and method of robot education courses. In contemporary society, technological advances increasingly require creativity. Innovative comprehensive talents urgently need a radical and effective education reform to keep up with social changes. So in this context, robot teaching design can be used for students. The tendency of creativity to influence is worth to be verified.

Keywords: STEM education, robot teaching, primary and secondary school students, tendency of creativity

Procedia PDF Downloads 117
626 Existing International Cooperation Mechanisms and Proposals to Enhance Their Effectiveness for Marine-Based Geoengineering Governance

Authors: Aylin Mohammadalipour Tofighi

Abstract:

Marine-based geoengineering methods, proposed to mitigate climate change, operate primarily through two mechanisms: reducing atmospheric carbon dioxide levels and diminishing solar absorption by the oceans. While these approaches promise beneficial outcomes, they are fraught with environmental, legal, ethical, and political challenges, necessitating robust international governance. This paper underscores the critical role of international cooperation within the governance framework, offering a focused analysis of existing international environmental mechanisms applicable to marine-based geoengineering governance. It evaluates the efficacy and limitations of current international legal structures, including treaties and organizations, in managing marine-based geoengineering, noting significant gaps such as the absence of specific regulations, dedicated international entities, and explicit governance mechanisms such as monitoring. To rectify these problems, the paper advocates for concrete steps to bolster international cooperation. These include the formulation of dedicated marine-based geoengineering guidelines within international agreements, the establishment of specialized supervisory entities, and the promotion of transparent, global consensus-building. These recommendations aim to foster governance that is environmentally sustainable, ethically sound, and politically feasible, thereby enhancing knowledge exchange, spurring innovation, and advancing the development of marine-based geoengineering approaches. This study emphasizes the importance of collaborative approaches in managing the complexities of marine-based geoengineering, contributing significantly to the discourse on international environmental governance in the face of rapid climate and technological changes.

Keywords: climate change, environmental law, international cooperation, international governance, international law, marine-based geoengineering, marine law, regulatory frameworks

Procedia PDF Downloads 68
625 Fly Ash Derived Zeolites as Potential Sorbents for Elemental Mercury Removal from Simulated Gas Stream

Authors: Piotr Kunecki, Magdalena Wdowin

Abstract:

The fly ash produced as waste in the process of conventional coal combustion was utilized in the hybrid synthesis of zeolites X and A from Faujasite (FAU) and Linde Type A (LTA) frameworks, respectively. The applied synthesis method included modification together with the crystallization stage. The sorbent modification was performed by introducing metals into the zeolite structure in order to create an ability to form stable bonds with elemental mercury (Hg0). The use of waste in the form of fly ash as a source of silicon and aluminum, as well as the proposed method of zeolite synthesis, fits the circular economy idea. The effect of zeolite modification on Hg0 removal from a simulated gas stream was studied empirically using prototype installation designed to test the effectiveness of sorption by solid-state sorbents. Both derived zeolites X and A modified with silver nitrate revealed significant mercury uptake during a 150-minute sorption experiment. The amount of elemental mercury removed in the experiment ranged from 5.69 to 6.01 µg Hg0/1g of sorbent for zeolites X and from 4.47 to 4.86 µg Hg0/1g of sorbent for zeolites A. In order to confirm the effectiveness of the sorbents towards mercury bonding, the possible re-emission effect was tested as well. Derived zeolites X and A did not show mercury re-emission after the sorption process, which confirms the stable bonding of Hg0 in the structure of synthesized zeolites. The proposed hybrid synthesis method possesses the potential to be implemented for both fly ash utilization as well as the time and energy-saving production of aluminosilicate, porous materials with high Hg0 removal efficiency. This research was supported by National Science Centre, Poland, grant no 2021/41/N/ST5/03214.

Keywords: fly ash, synthetic zeolites, elemental mercury removal, sorption, simulated gas stream

Procedia PDF Downloads 82
624 Supplemental VisCo-friction Damping for Dynamical Structural Systems

Authors: Sharad Singh, Ajay Kumar Sinha

Abstract:

Coupled dampers like viscoelastic-frictional dampers for supplemental damping are a newer technique. In this paper, innovative Visco-frictional damping models have been presented and investigated. This paper attempts to couple frictional and fluid viscous dampers into a single unit of supplemental dampers. Visco-frictional damping model is developed by series and parallel coupling of frictional and fluid viscous dampers using Maxwell and Kelvin-Voigat models. The time analysis has been performed using numerical simulation on an SDOF system with varying fundamental periods, subject to a set of 12 ground motions. The simulation was performed using the direct time integration method. MATLAB programming tool was used to carry out the numerical simulation. The response behavior has been analyzed for the varying time period and added damping. This paper compares the response reduction behavior of the two modes of coupling. This paper highlights the performance efficiency of the suggested damping models. It also presents a mathematical modeling approach to visco-frictional dampers and simultaneously suggests the suitable mode of coupling between the two sub-units.

Keywords: hysteretic damping, Kelvin model, Maxwell model, parallel coupling, series coupling, viscous damping

Procedia PDF Downloads 156
623 Fuzzy Total Factor Productivity by Credibility Theory

Authors: Shivi Agarwal, Trilok Mathur

Abstract:

This paper proposes the method to measure the total factor productivity (TFP) change by credibility theory for fuzzy input and output variables. Total factor productivity change has been widely studied with crisp input and output variables, however, in some cases, input and output data of decision-making units (DMUs) can be measured with uncertainty. These data can be represented as linguistic variable characterized by fuzzy numbers. Malmquist productivity index (MPI) is widely used to estimate the TFP change by calculating the total factor productivity of a DMU for different time periods using data envelopment analysis (DEA). The fuzzy DEA (FDEA) model is solved using the credibility theory. The results of FDEA is used to measure the TFP change for fuzzy input and output variables. Finally, numerical examples are presented to illustrate the proposed method to measure the TFP change input and output variables. The suggested methodology can be utilized for performance evaluation of DMUs and help to assess the level of integration. The methodology can also apply to rank the DMUs and can find out the DMUs that are lagging behind and make recommendations as to how they can improve their performance to bring them at par with other DMUs.

Keywords: chance-constrained programming, credibility theory, data envelopment analysis, fuzzy data, Malmquist productivity index

Procedia PDF Downloads 359
622 Polymer Composites Of MOF-5 For Efficient and Sustained Delivery of Cephalexin and Metronidazole

Authors: Anoff Anim, Lila Mahmoud, Maria Katsikogianni, Sanjit Nayak

Abstract:

Sustained and controlled delivery of antimicrobial drugs have been largely studied recently using metal organic frameworks (MOFs)and different polymers. However, much attention has not been given to combining both MOFs and biodegradable polymers, which would be a good strategy in providing a sustained gradual release of the drugs. Herein, we report a comparative study of the sustained and controlled release of widely used antibacterial drugs, cephalexin and metronidazole, from zinc-based MOF-5 incorporated in biodegradable polycaprolactone (PCL) and poly-lactic glycolic acid (PLGA) membranes. Cephalexin and metronidazole were separately incorporated in MOF-5 post-synthetically, followed by their integration into biodegradable PLGA and PCL membranes. The pristine MOF-5 and the loaded MOFs were thoroughly characterized by FT-IR, SEM, TGA and PXRD. Drug release studies were carried out to assess the release rate of the drugs in PBS and distilled water for up to 48 hours using UV-Vis Spectroscopy. Four bacterial strains from both the Gram-positive and Gram-negative types, Staphylococus aureus, Staphylococuss epidermidis, Escherichia coli, Acinetobacter baumanii, were tested against the pristine MOF, pure drugs, loaded MOFs and the drug-loaded MOF-polymer composites. Metronidazole-loaded MOF-5 composite of PLGA (PLGA-Met@MOF-5) was found to show highest efficiency to inhibit the growth of S. epidermidis compared to the other bacteria strains while maintaining a sustained minimum inhibitory concentration (MIC). This study demonstrates that the combination of biodegradable MOF-polymer composites can provide an efficient platform for sustained and controlled release of antimicrobial drugs and can be a potential strategy to integrate them in biomedical devices.

Keywords: antimicrobial resistance, biodegradable polymers, cephalexin, drug release metronidazole, MOF-5, PCL, PLGA

Procedia PDF Downloads 128
621 Assessment of the Root Causes of Marine Debris Problem in Lagos State

Authors: Chibuzo Okoye Daniels, Gillian Glegg, Lynda Rodwell

Abstract:

The continuously growing quantity of very slow degrading litter deliberately discarded into the coastal waters around Lagos as marine debris is obvious. What is not known is how to tackle this problem to reduce its prevalence and impact on the environment, economy and community. To identify ways of tackling the marine debris problem two case study areas (Ikoyi and Victoria Islands of Lagos State) were used to assess the root causes, the threat posed by marine debris in the coastal waters around Lagos and the efficacy of current instruments, programmes and initiatives that address marine debris in the study areas. The following methods were used: (1) Self-completed questionnaires for households and businesses within the study areas; (2) Semi-structured interviews with key stakeholders; (3) Observational studies of waste management from collection to disposal and waste management facilities for waste originating from land and maritime sources; (4) Beach surveys and marine debris surveys on shorelines and ports; and (5) Fishing for marine debris. Results of this study identified the following root causes: (1) Indiscriminate human activities and behaviors, and lack of awareness on the part of the main stakeholders and the public of the potential consequences of their actions; (2) Poor solid waste management practices; (3) Lack of strict legal frameworks addressing waste and marine debris problem; and (4) Disposal of non-degradable wastes into domestic sewer system and open streets drains. To effectively tackle marine debris problem in the study areas, adequate, appropriate and cost effective solutions to the above mentioned root causes needs to be identified and effectively transferred for implementation in the study areas.

Keywords: marine debris problem, Lagos state, litter, coastal waters

Procedia PDF Downloads 377
620 Design of Transmit Beamspace and DOA Estimation in MIMO Radar

Authors: S. Ilakkiya, A. Merline

Abstract:

A multiple-input multiple-output (MIMO) radar systems use modulated waveforms and directive antennas to transmit electromagnetic energy into a specific volume in space to search for targets. This paper deals with the design of transmit beamspace matrix and DOA estimation for multiple-input multiple-output (MIMO) radar with collocated antennas.The design of transmit beamspace matrix is based on minimizing the difference between a desired transmit beampattern and the actual one while enforcing the constraint of uniform power distribution across the transmit array elements. Rotational invariance property is established at the transmit array by imposing a specific structure on the beamspace matrix. Semidefinite programming and spatial-division based design (SDD) are also designed separately. In MIMO radar systems, DOA estimation is an essential process to determine the direction of incoming signals and thus to direct the beam of the antenna array towards the estimated direction. This estimation deals with non-adaptive spectral estimation and adaptive spectral estimation techniques. The design of the transmit beamspace matrix and spectral estimation techniques are studied through simulation.

Keywords: adaptive and non-adaptive spectral estimation, direction of arrival estimation, MIMO radar, rotational invariance property, transmit, receive beamforming

Procedia PDF Downloads 515
619 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 264
618 Biodegradable Polymer Composites of MOF-5 for Efficient and Sustained Delivery of Cephalexin and Metronidazole

Authors: Anoff Anim, Lila A. M. Mahmoud, Maria Katsikogianni, Sanjit Nayak

Abstract:

Sustained and controlled delivery of antimicrobial drugs have been largely studied recently using metal organic frameworks (MOFs)and different polymers. However, much attention has not been given to combining both MOFs and biodegradable polymers, which would be a good strategy in providing a sustained gradual release of the drugs. Herein, we report a comparative study of the sustained and controlled release of widely used antibacterial drugs, cephalexin and metronidazole, from zinc-based MOF-5 incorporated in biodegradable polycaprolactone (PCL) and poly-lactic glycolic acid (PLGA) membranes. Cephalexin and metronidazole were separately incorporated in MOF-5 post-synthetically, followed by their integration into biodegradable PLGA and PCL membranes. The pristine MOF-5 and the loaded MOFs were thoroughly characterized by FT-IR, SEM, TGA and PXRD. Drug release studies were carried out to assess the release rate of the drugs in PBS and distilled water for up to 48 hours using UV-Vis Spectroscopy. Four bacterial strains from both the Gram-positive and Gram-negative types, Staphylococus aureus, Staphylococuss epidermidis, Escherichia coli, Acinetobacter baumanii, were tested against the pristine MOF, pure drugs, loaded MOFs and the drug-loaded MOF-polymer composites. Metronidazole-loaded MOF-5 composite of PLGA (PLGA-Met@MOF-5) was found to show highest efficiency to inhibit the growth of S. epidermidis compared to the other bacteria strains while maintaining a sustained minimum inhibitory concentration (MIC). This study demonstrates that the combination of biodegradable MOF-polymer composites can provide an efficient platform for sustained and controlled release of antimicrobial drugs and can be a potential strategy to integrate them in biomedical devices.

Keywords: antimicrobial resistance, biodegradable polymers, cephalexin, drug release metronidazole, MOF-5, PCL, PLGA

Procedia PDF Downloads 132
617 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 254