Search results for: filter paper
24269 Contextualizing the Translation and Reconstruction of “Zhengqueyiliguan” in Promoting China-Africa Diplomatic Discourse
Authors: Queen Modestus
Abstract:
China’s diplomatic discourse is a complicated system underpinned by divergent translations. As such, the concept of “Zhengque Yi Li Guan” (or zhèngquè Yì Lì Guān in Pinyin), like numerous other Chinese concepts, is not well appreciated due, mainly, to the dearth of a uniform official translation and poor interpretation. So, the paper seeks to draw awareness to this vital issue that has been neglected in the China-Africa diplomatic discourse. As a way of filling this gap in the literature, the author argues that literal translation is not enough in diplomatic discourse. To identify the English equivalent of “Zhenque,” “Yi,” “Li,” and “Guan,” searches of Chinese classical works were carried out. Based on the scope of this paper, emphasis will be placed on “Yi” because it plays a critical role in the “zhèngquèyìlìguān” concept and has been the term with the most controversial interpretation. From a diplomatic-linguistic standpoint coupled with the help of the Critical Discourse Analysis (CDA) developed by Norman Fairclough and Teun A. van Dijk as this paper’s theoretical framework, this paper seeks to address the above issue by exploring the philosophical translations and interpretations of ZqYLG in China-Africa diplomatic discourse, with emphasis place on the discourse reconstruction of “Yi.” As a way of reconstructing “Yi” to fit the present reality of China-Africa diplomatic discourse, the author argues that “justice” (meaning impartiality) is a better translation for “Yi.”Keywords: Africa, diplomatic discourse, reconstruction, translation, 正确义利观, interests
Procedia PDF Downloads 8524268 Nondestructive Inspection of Reagents under High Attenuated Cardboard Box Using Injection-Seeded THz-Wave Parametric Generator
Authors: Shin Yoneda, Mikiya Kato, Kosuke Murate, Kodo Kawase
Abstract:
In recent years, there have been numerous attempts to smuggle narcotic drugs and chemicals by concealing them in international mail. Combatting this requires a non-destructive technique that can identify such illicit substances in mail. Terahertz (THz) waves can pass through a wide variety of materials, and many chemicals show specific frequency-dependent absorption, known as a spectral fingerprint, in the THz range. Therefore, it is reasonable to investigate non-destructive mail inspection techniques that use THz waves. For this reason, in this work, we tried to identify reagents under high attenuation shielding materials using injection-seeded THz-wave parametric generator (is-TPG). Our THz spectroscopic imaging system using is-TPG consisted of two non-linear crystals for emission and detection of THz waves. A micro-chip Nd:YAG laser and a continuous wave tunable external cavity diode laser were used as the pump and seed source, respectively. The pump beam and seed beam were injected to the LiNbO₃ crystal satisfying the noncollinear phase matching condition in order to generate high power THz-wave. The emitted THz wave was irradiated to the sample which was raster scanned by the x-z stage while changing the frequencies, and we obtained multispectral images. Then the transmitted THz wave was focused onto another crystal for detection and up-converted to the near infrared detection beam based on nonlinear optical parametric effects, wherein the detection beam intensity was measured using an infrared pyroelectric detector. It was difficult to identify reagents in a cardboard box because of high noise levels. In this work, we introduce improvements for noise reduction and image clarification, and the intensity of the near infrared detection beam was converted correctly to the intensity of the THz wave. A Gaussian spatial filter is also introduced for a clearer THz image. Through these improvements, we succeeded in identification of reagents hidden in a 42-mm thick cardboard box filled with several obstacles, which attenuate 56 dB at 1.3 THz, by improving analysis methods. Using this system, THz spectroscopic imaging was possible for saccharides and may also be applied to cases where illicit drugs are hidden in the box, and multiple reagents are mixed together. Moreover, THz spectroscopic imaging can be achieved through even thicker obstacles by introducing an NIR detector with higher sensitivity.Keywords: nondestructive inspection, principal component analysis, terahertz parametric source, THz spectroscopic imaging
Procedia PDF Downloads 17624267 Environmental Photodegradation of Tralkoxydim Herbicide and Its Formulation in Natural Waters
Authors: María José Patiño-Ropero, Manuel Alcamí, Al Mokhtar Lamsabhi, José Luis Alonso-Prados, Pilar Sandín-España
Abstract:
Tralkoxydim, commercialized under different trade names, among them Splendor® (25% active ingredient), is a cyclohexanedione herbicide used in wheat and barley fields for the post-emergence control of annual winter grass weeds. Due to their physicochemical properties, herbicides belonging to this family are known to be susceptible to reaching natural waters, where different degradation pathways can take place. Photolysis represents one of the main routes of abiotic degradation of these herbicides in water. This transformation pathway can lead to the formation of unknown by-products, which could be more toxic and/or persistent than the active substances themselves. Therefore, there is a growing need to understand the science behind such dissipation routes, which is key to estimating the persistence of these compounds and ensuring the accurate assessment of environmental behavior. However, to our best knowledge, any information regarding the photochemical behavior of tralkoxydim under natural conditions in an aqueous environment has not been available till now in the literature. This work has focused on investigating the photochemical behavior of tralkoxydim herbicide and its commercial formulation (Splendor®) in the ultrapure, river and spring water using simulated solar radiation. Besides, the evolution of detected degradation products formed in the samples has been studied. A reversed-phase HPLC-DAD (high-performance liquid chromatography with diode array detector) method was developed to evaluate the kinetic evolution and to obtain the half-lives. In both cases, the degradation rates of active ingredient tralkoxydim in natural waters were lower than in ultrapure water following the order; river water < spring water < ultrapure water, and with first-order half-life values of 5.1 h, 2.7 h and 1.1 h, respectively. These findings indicate that the photolytical behavior of active ingredients is largely affected by the water composition, and these components can exert an internal filter effect. In addition, tralkoxydim herbicide and its formulation showed the same half-lives for each one of the types of water studied, showing that the presence of adjuvants in the commercial formulation has not any effect on the degradation rates of the active ingredient. HPLC-MS (high-performance liquid chromatography with mass spectrometry) experiments were performed to study the by-products deriving from the photodegradation of tralkoxydim in water. Accordingly, three compounds were tentatively identified. These results provide a better understanding of the tralkoxydim herbicide behavior in natural waters and its fate in the environment.Keywords: by-products, natural waters, photodegradation, tralkoxydim herbicide
Procedia PDF Downloads 9024266 Challenges and Opportunities of Cloud-Based E-Learning Systems
Authors: Kashif Laeeq, Zubair A. Shaikh
Abstract:
The paradigm of education is drastically changing from conventional to e-learning model. Due to ease of learning with various other benefits, several educational institutions are adopting the e-learning models. Some institutions are still willing to transform their educational system on to e-learning, but due to limited resources, they are still compromising on the old traditional system. The cloud computing could be one of the best solutions to overcome this problem by providing hardware, software, and infrastructure resources with cost efficient manner. The adoption of cloud computing in education will bring revolution in this paradigm. This paper introduces various positive features of e-learning and presents a way how cloud computing technology can be provisioned e-learning model. This paper also investigates the numerous challenges and opportunities that would be observed in cloud computing adoption in e-learning domain. The concept and knowledge present in this paper may create a new direction of research in the domain of cloud-based e-learning.Keywords: cloud-based e-learning, e-learning, cloud computing application, smart learning
Procedia PDF Downloads 40724265 Molecular Detection of E. coli in Treated Wastewater and Well Water Samples Collected from Al Riyadh Governorate, Saudi Arabia
Authors: Hanouf A. S. Al Nuwaysir, Nadine Moubayed, Abir Ben Bacha, Islem Abid
Abstract:
Consumption of waste water continues to cause significant problems for human health in both developed and developing countries. Many regulations have been implied by different world authorities controlling water quality for the presence of coliforms used as standard indicators of water quality deterioration and historically leading health protection concept. In this study, the European directive for the detection of Escherichia coli, ISO 9308-1, was applied to examine and monitor coliforms in water samples collected from Wadi Hanifa and neighboring wells, Riyadh governorate, kingdom of Saudi Arabia, which is used for irrigation and industrial purposes. Samples were taken from different locations for 8 months consecutively, chlorine concentration ranging from 0.1- 0.4 mg/l, was determined using the DPD FREE CHLORINE HACH kit. Water samples were then analyzed following the ISO protocol which relies on the membrane filtration technique (0.45µm, pore size membrane filter) and a chromogenic medium TTC, a lactose based medium used for the detection and enumeration of total coliforms and E.coli. Data showed that the number of bacterial isolates ranged from 60 to 300 colonies/100ml for well and surface water samples respectively; where higher numbers were attributed to the surface samples. Organisms which apparently ferment lactose on TTC agar plates, appearing as orange colonies, were selected and additionally cultured on EMB and MacConkey agar for a further differentiation among E.coli and coliform bacteria. Two additional biochemical tests (Cytochrome oxidase and indole from tryptophan) were also investigated to detect and differentiate the presence of E.coli from other coliforms, E. coli was identified in an average of 5 to 7colonies among 25 selected colonies.On the other hand, a more rapid, specific and sensitive analytical molecular detection namely single colony PCR was also performed targeting hha gene to sensitively detect E.coli, giving more accurate and time consuming identification of colonies considered presumptively as E.coli. Comparative methodologies, such as ultrafiltration and direct DNA extraction from membrane filters (MoBio, Grermany) were also applied; however, results were not as accurate as the membrane filtration, making it a technique of choice for the detection and enumeration of water coliforms, followed by sufficiently specific enzymatic confirmatory stage.Keywords: coliform, cytochrome oxidase, hha primer, membrane filtration, single colony PCR
Procedia PDF Downloads 31724264 Representation of Master–Disciple Relationship in Rumi’s Poems: Spirituality Vis-A-Vis Collective Consciousness
Authors: Nodi Islam
Abstract:
This paper critically reads Rumi’s poems in The Masnavi (Book One) and the philosophy of master-disciple relationship, as reflected as a medium to attain the higher consciousness in the poems which is considered as spiritual by the Sufi practitioners. This paper further applies the concept of collective consciousness introduced by Durkheim, which stands for a set of beliefs, ideas, moral attitudes that operate as a unifying force in a certain society, in reading Rumi’s poems. According to Sufi philosophy, in order to reach to the beloved who is the Higher Being, a lover has to be a disciple of a master and dedicate himself completely even if it means to give up the earthly desires. When the process is completed, he achieves the divinity which is the utmost happiness to be one with the beloved. As this process is considered spiritual by the Sufi practitioners, this paper suggests that, apart from being spiritual, this is a reflection of collective consciousness also. This process plays a part to construct the collectivity as a means to create masters and disciples. Collective consciousness operates in this particular belief system of Sufis who tend to follow this phenomenon as a rule of obedience and accepts the rule because this is how their particular community proceeds on. This paper offers a view of Rumi’s poems which reflect such relationship and tends to offer a general discussion on the hegemonic approach of the Sufi society especially of the Mevlevi order. Finally, this paper offers a constructive representation of Mevlevi society based upon the idea of spirituality which could be an outcome of psychological and social issues and practices.Keywords: collective consciousness, divinity, master-disciple relationship, Mevlevi order
Procedia PDF Downloads 17024263 Banking Control Law 1966 in Saudi Arabia, Shortcomings and Development: A Comparative Study in Banking Supervision between the Saudi Arabian Monetary Agency and the Bank of England
Authors: Khalid Huwaydi Alshammari
Abstract:
The paper examined the extent to which it was necessary for the Saudi Arabian Monetary Agency (SAMA), as a central bank, to update the Banking Control Law 1966 (BCL) in order to gain full independence, while ensuring that SAMA would have enough flexibility to develop the banking industry yet make sound decisions with regard to the issuance of new regulations related to banking supervision.Using a comparative study approach, the paper looked to find the best practices around these issues. The Bank of England, which was recently granted full independence, presented a good opportunity for a case study. The perspectives of the World Bank, the International Monetary Fund and commercial banks in Saudi Arabia are examined, including an analysis of their recommendations regarding SAMA regulations on banking supervision. This paper found several issues are important for SAMA as the central bank in a country which is a member of the G20, and which has recently faced unstable oil prices. The paper also discusses conflicts of interest which arose when the Saudi government became a shareholder in commercial banks while simultaneously regulating SAMA through the Ministry of Finance, resulting in a monopoly which disabled free competition in the banking market. The paper recommends further steps for SAMA to develop the banking industry, which is an important arm of Saudi’s economy, and examines the challenges SAMA faces in updating regulations such as the BCL under Sharia law. The author also suggests practical solutions to the difficulties. The paper found these difficulties could be avoiding them if SAMA focuses on Islamic banking product, and fixed the lacks of regulations of the related laws.Keywords: Saudi Arabian monetary agency, comparative study, banking control law 1966, the bank of England
Procedia PDF Downloads 37824262 Inverse Matrix in the Theory of Dynamical Systems
Authors: Renata Masarova, Bohuslava Juhasova, Martin Juhas, Zuzana Sutova
Abstract:
In dynamic system theory a mathematical model is often used to describe their properties. In order to find a transfer matrix of a dynamic system we need to calculate an inverse matrix. The paper contains the fusion of the classical theory and the procedures used in the theory of automated control for calculating the inverse matrix. The final part of the paper models the given problem by the Matlab.Keywords: dynamic system, transfer matrix, inverse matrix, modeling
Procedia PDF Downloads 51324261 Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights
Authors: Tomy Prihananto, Damar Apri Sudarmadi
Abstract:
Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.Keywords: Indonesia, protection, personal data, privacy, human rights, encryption
Procedia PDF Downloads 18124260 Information Literacy Initiatives in India in Present Era Age
Authors: Darshan Lal
Abstract:
The paper describes the concept of Information literacy. It is a critical component of this information age. Information literacy is the vital process in modern changing world. Information Literacy initiatives in India was also discussed. Paper also discussed Information literacy programmes for LIS professionals. Information literacy makes person capable to recognize when information is needed and how to locate, evaluate and use effectively of the needed information.Keywords: information literacy, information communication technology (ICT), information literacy programmes
Procedia PDF Downloads 36624259 Racial Bias by Prosecutors: Evidence from Random Assignment
Authors: CarlyWill Sloan
Abstract:
Racial disparities in criminal justice outcomes are well-documented. However, there is little evidence on the extent to which racial bias by prosecutors is responsible for these disparities. This paper tests for racial bias in conviction by prosecutors. To identify effects, this paper leverages as good as random variation in prosecutor race using detailed administrative data on the case assignment process and case outcomes in New York County, New York. This paper shows that the assignment of an opposite-race prosecutor leads to a 5 percentage point (~ 8 percent) increase in the likelihood of conviction for property crimes. There is no evidence of effects for other types of crimes. Additional results indicate decreased dismissals by opposite-race prosecutors likely drive my property crime estimates.Keywords: criminal justice, discrimination, prosecutors, racial disparities
Procedia PDF Downloads 19024258 A Historical Overview and Supplementation of the Dyad Concept of Industrial Marketing
Authors: Kimmo J. Kurppa
Abstract:
This paper describes the development of the buyer-supplier dyad concept over the years and proposes improvements, clarifications and extensions to the prevailing definitions published in 1970’s and 1980’s. This paper suggests a partition of the buyer-supplier dyad to concepts of Commercial Dyad (dyadic interaction in vertical relationships) and Innovative Dyad (dyadic interaction in horizontal relationship) since dyadic interaction takes place in two major types of contexts between industrial firms. Especially the context of joint product development in a dyadic relationship has not been adequately recognized being totally different from the interaction taking place in commercial buyer-supplier interaction. This paper provides therefore a solution to the existing gap in research by clarifying the descriptions and the context where dyadic interaction takes place between industrial firms. This paper also illustrates and explains how the firm’s organization and the interaction taking place inside it, is connected to the dyadic interaction structure between the firm and its partner firm. This theme has been discussed earlier but the phenomenon has not been adequately described and has not been illustrated in earlier research. This conceptual study has been interested in how the dyad concept of Industrial Marketing has been defined in the earlier research and how the definition could be improved. This conceptual paper has been constructed by using the systematic review methodology and proposes avenues for future research. The concept and existence of relationship and interaction between firm’s internal interaction network and external interaction between firm’s dyadic counterparts, need to be verified through empirical research.Keywords: dyadic interaction, industrial dyad, buyer-supplier relationship, strategic reciprocity, experience, socially adjusted opportunism
Procedia PDF Downloads 21524257 Reducing Crash Risk at Intersections with Safety Improvements
Authors: Upal Barua
Abstract:
Crash risk at intersections is a critical safety issue. This paper examines the effectiveness of removing an existing off-set at an intersection by realignment, in reducing crashes. Empirical Bayes method was applied to conduct a before-and-after study to assess the effect of this safety improvement. The Transportation Safety Improvement Program in Austin Transportation Department completed several safety improvement projects at high crash intersections with a view to reducing crashes. One of the common safety improvement techniques applied was the realignment of intersection approaches removing an existing off-set. This paper illustrates how this safety improvement technique is applied at a high crash intersection from inception to completion. This paper also highlights the significant crash reductions achieved from this safety improvement technique applying Empirical Bayes method in a before-and-after study. The result showed that realignment of intersection approaches removing an existing off-set can reduce crashes by 53%. This paper also features the state of the art techniques applied in planning, engineering, designing and construction of this safety improvement, key factors driving the success, and lessons learned in the process.Keywords: crash risk, intersection, off-set, safety improvement technique, before-and-after study, empirical Bayes method
Procedia PDF Downloads 24224256 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System
Authors: Cara Williams
Abstract:
In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.Keywords: disability, employment, social security, welfare
Procedia PDF Downloads 16624255 Between AACR2 and RDA What Changes Occurs in Them
Authors: Ibrahim Abdullahi Mohammad
Abstract:
A library catalogue exists not only as an inventory of the collections of the particular library, but also as a retrieval device. It is provided to assist the library user in finding whatever information or information resources they may be looking for. The paper proposes that this location objective of the library catalogue can only be fulfilled, if the library catalogue is constructed, bearing in mind the information needs and searching behavior of the library user. Comparing AACR2 and RDA viz-a-viz the changes RDA has introduced into bibliographic standards, the paper tries to establish the level of viability of RDA in relation to AACR2.Keywords: library catalogue, information retrieval, AACR2, RDA
Procedia PDF Downloads 5224254 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence
Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang
Abstract:
This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.Keywords: natural intelligence, artificial intelligence, creativity, information theory, restriction of creativity
Procedia PDF Downloads 38424253 ICT: Ensuring the Survival of Voluntary Organisations in Ireland
Authors: T. J. McDonald
Abstract:
This paper explores the adoption and usage of ICT by 3 specific types of voluntary organisations in Ireland: Sporting, Community and Rural & Agricultural. It explores the problems that these organisations are facing and examines some of the concerns expressed by their members. The paper outlines how various forms of ICT are being slowly adopted and diffused among its membership to help solve these problems and address their members concerns and in doing so, perhaps ensure the survival of the organisation into the future.Keywords: Ireland, voluntary organisations, ICT, adoption and diffusion
Procedia PDF Downloads 30424252 Climate Change as Wicked Problems towards Sustainable Development
Authors: Amin Padash, Mehran Khodaparast, Saadat Khodaparast
Abstract:
Climate change is a significant and lasting change in the statistical distribution of weather patterns over periods ranging from decades to millions of years. Climate change is caused by factors such as biotic processes, variations in solar radiation received by Earth, plate tectonics, and volcanic eruptions. Certain human activities have also been identified as significant causes of recent climate change, often referred to as “Global Warming”. The ultimate goal of this paper is to determine how climate change affects the style of life and all of our activities. The paper focuses on what the effects of humans are on climate change and how communities can achieve sustainable development and use resources in a way that is good for the ecosystem and public. We opine Climate Change is a vital issue that can be called “Wicked Problem”. This paper attempts to address this wicked problem by COMPRAM Methodology as one of the possible solutions.Keywords: climate change, COMPRAM, human influences, sustainable development, wicked problems
Procedia PDF Downloads 45224251 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU
Authors: Nicole Christiansen, Hanne Marie Motzfeldt
Abstract:
In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.Keywords: AI, cyber vetting, data protection, job recruitment, online privacy
Procedia PDF Downloads 8424250 Human Rights as Part of the Core Values System of International Organisations: A Comparative Study
Authors: Ayyoub Jamali, Jennie Edlund, Alena Kozlová
Abstract:
This paper evaluates the monitoring, prevention, and enforcing mechanisms of the core values of international organisations (IOs) in a comparative human rights perspective. The IOs in focus are the European Union, the Council of Europe, the African Union, and the Organization of American States. The paper will take the founding treaties of these IOs and their relevant protocols as a starting point to identify the values and the mechanisms used for their implementation. It will explore the scope of violations, the procedures in place and evaluate what type of response to those breaches seems to work best in terms of achieving its declared objectives. The study will identify and compare the weaknesses and strengths of each mechanism used by the IOs and recognize common challenges and means, thereby drawing inter-organizational comparisons. Consequently, the findings of this paper can be used among the IOs to improve their system and thus enhance their effectiveness.Keywords: international organizations, core values, human rights, enforcement mechanism, compliance
Procedia PDF Downloads 17824249 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.Keywords: IoT, fog, cloud, data analysis, data privacy
Procedia PDF Downloads 9624248 A Study of Key Technologies for the Realization of Smart Grid and Its Research Situation in Pakistan and Abroad
Authors: Arjmand Khaliq, Pemra Sohaib
Abstract:
In this paper smart grid technologies which converts conventional grid into smart grid has been discussed. Integration of advanced technologies including two way communication, advanced control system, sensors, smart metering system and other provide opportunity to make conventional grid a intelligent and automatic system which is named as smart grid. This paper gives the concept of smart grid and functional characteristics of smart grid technology, summed up the research progress in Pakistan and abroad and the significance of developing smart grid. Based on the analysis of the smart grid, smart grid technologies will result a reliable and energy efficient power system in the future. On the other hand smart grid technologies have been reviewed in this paper highlighting the key technologies of smart grid, and points out the problems and challenges in the realization of smart grid.Keywords: energy, power system reliability, power system monitoring and control, sensor, smart grid, two-way communication
Procedia PDF Downloads 39324247 Protected Status: Violation of the Provisions of Protected Status under International Humanitarian Law during the Liberation War of Bangladesh
Authors: Sabera Sultana
Abstract:
In today's war-torn world, it is crucial to identify, understand, and apply the laws aimed at minimizing civilian casualty during wartime. The purpose of this paper is to analyze the provisions of protected status under international humanitarian law and evaluate the historical facts and shreds of evidences of violation of protected status during the Liberation War of Bangladesh. This legal research paper evaluates the international humanitarian laws and case laws regarding protected status of people during wartime and evaluates them against the historical facts and well-documented evidences of violation of protected status during the Liberation War of Bangladesh. This paper will help to create a brief guideline on Protected Status under international humanitarian law, which will help to protect our civilians during wartime if ever required.Keywords: civilian protection, international humanitarian laws, liberation war of Bangladesh, protected status
Procedia PDF Downloads 21624246 Trademarks and Non-Fungible Tokens: New Frontiers for Trademark Law
Authors: Dima Basma
Abstract:
The unprecedented expansion in the use of Non-Fungible Tokens (NFTS) has prompted luxury brand owners to file their trademark applications for the use of their marks in the metaverse world. While NFTs provide a favorable tool for product traceability and anti-counterfeiting endeavors, the legal ramifications of such abrupt shift are complex, diverse, and yet to be understood. Practically, a sizable number of NFT creators are minting digital tokens associated with existing trademarks, selling them at strikingly high rates, thus disadvantaging trademark owners who joined and are yet to join the meta-verse world. As a result, multiple luxury brands are filing confusion and dilution lawsuits against alleged artists offering for sale NFTs depicting reputable marks labeling their use as “parody” and “social commentary.” Given the already muddled state of trademark law in relation to both traditional and modern infringement criteria, this paper aims to explore the feasibility of the current system in dealing with the emerging NFT trends. The paper firstly delves into the intersection between trademarks and NFTs. Furthermore, in light of the striking increase in NFT use, the paper sheds critical light on the shortcoming of the current system. Finally, the paper provides recommendations for overcoming current and prospective challenges in this area.Keywords: trademarks, NFTs, dilution, social commentary
Procedia PDF Downloads 11624245 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables
Authors: Vicx Farm
Abstract:
This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.Keywords: energy, agriculture, sustainability, power
Procedia PDF Downloads 7124244 Auditing Hindi Celluloid as a Catalyst of Transition: The Eventual Delineation of LGBTQ+
Authors: Chinmayee Nanda
Abstract:
In this modern era, India is still chained up with the idea of ‘Heteronormativity’. As a result, homonormativity, transgressions, preconceived notions, and bigotry add to many raised eyebrows, the majority being the norm and overpowering the voices of the minority. In this country an undeniable space is the need of the hour to identify those unheard voices. Media can be considered as the most powerful space for the same. This paper aims to examine the representation as well as transition (if any) of the varied figments of the imagination and alternative facts relating to the LGBTQ+ community in celluloid in Hindi. This paper will also explore the visibility of the queer aspirations through this media. The portrayal of the LGBTQ community as the ‘other’ and ‘not normal’ is a matter of concern about any individual’s sexuality. The years 2014 and 2018 turned out to be remarkable in the Indian Legal System pertaining to the recognition of the ‘Third Gender’ and ‘Decriminalization of Homosexuality,’ respectively. In relation to that, this paper will also explore the impression of these dynamics on the subsequent depiction.Keywords: sexuality, hindi cinema, gender fluidity, legal framework
Procedia PDF Downloads 2624243 Simulation versus Hands-On Learning Methodologies: A Comparative Study for Engineering and Technology Curricula
Authors: Mohammed T. Taher, Usman Ghani, Ahmed S. Khan
Abstract:
This paper compares the findings of two studies conducted to determine the effectiveness of simulation-based, hands-on and feedback mechanism on students learning by answering the following questions: 1). Does the use of simulation improve students’ learning outcomes? 2). How do students perceive the instructional design features embedded in the simulation program such as exploration and scaffolding support in learning new concepts? 3.) What is the effect of feedback mechanisms on students’ learning in the use of simulation-based labs? The paper also discusses the other aspects of findings which reveal that simulation by itself is not very effective in promoting student learning. Simulation becomes effective when it is followed by hands-on activity and feedback mechanisms. Furthermore, the paper presents recommendations for improving student learning through the use of simulation-based, hands-on, and feedback-based teaching methodologies.Keywords: simulation-based teaching, hands-on learning, feedback-based learning, scaffolding
Procedia PDF Downloads 46024242 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 20824241 Developing Language Ownership: An Autoethnographic Perspective on Transformative Learning
Authors: Thomas Abbey
Abstract:
This paper is part of an ongoing research addressing the experience of language learners in developing a sense of language ownership in their second language. For the majority of language learners, the main goal of learning a second or foreign language is to develop proficiency in the target language. Language proficiency comprises numerous intersecting competency skills ranging from causally listening to speaking using certain registers. This autoethnography analyzes lived experiences related to transitioning from learning a language in a classroom to being in an environment where the researcher's second language is the primary means of communication. Focused on lived experiences, the purpose of this research is to provide an insight into the experiences of language learners entering new environments and needing to navigate life within another language. Through reflections, this paper offers a critical account of experience traveling to Baku, Azerbaijan as a Russian language learner. The analysis for this paper focuses on the development of a sense of language ownership.Keywords: autoethnography, language learning, language ownership, transformative learning
Procedia PDF Downloads 6324240 Engineering in Saudi Arabia: Importance of Communications and Power Engineering
Authors: Hamed D. Alsharari
Abstract:
This paper first analyses the current status regarding electrical engineering higher education in Saudi Arabian public universities. The paper focuses on the two EE sub-specialties most commonly present in Saudi Arabia, power and communications and discusses recruitment in this field, showing various market and employment demand for EE.Keywords: communications, electrical engineering, higher education, Saudi Arabia, power
Procedia PDF Downloads 407