Search results for: face compare
4165 Developing an IT Management Policy: A Proposal
Authors: Robert Gilliland
Abstract:
In any organization, a potential issue can arise and become a problem when management deviates from the standard norms set in the system development process of an IT system and the policies that pertain to it. In these instances, cybersecurity is a big challenge that organizations have to face in safeguarding the data that they generate and use. When a new idea, task, or process begins, specific standards must be followed, along with the policies and procedures that ensure the safeguard of data in the information system within the company. A good IT Strategy and Policy should have individuals who are in charge of overseeing the design, development, implementation, and auditing of these policies. Auditors are people who check to make sure that the issue conforms with the plan that is in place. Management has the ability through the role of the manager to potentially abuse power is given and to direct specific ideas, events, projects, and outcomes that are contrary to the vision or goals of the company.Keywords: strategic policy, policy management, new policy, strategic planning
Procedia PDF Downloads 1354164 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange
Authors: Dora Triki, Irena Vida, Claude Obadia
Abstract:
Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.Keywords: conation, e-Forum, information exchange, members participation
Procedia PDF Downloads 1574163 Battle on Historical Water: An Analysis Roots of conflict between India and Sri Lanka and Victimization of Arrested Indian Fishermen
Authors: Xavier Louis, Madhava Soma Sundaram
Abstract:
The Palk Bay, a narrow strip of water, separates the state of Tamil Nadu in India from north Sri Lanka. The bay, which is 137 km in length and varies from 64 to 137 kilometers in width and is home to more than 580 fish species and chunks of shrimp’s resources, is divided by the International Maritime Boundary Line (IMBL). The bay, bordering it are five Tamil Nadu districts of India and three Sri Lankan districts and assumes importance as it is one of the areas presenting permanent and serious challenges to both India and Sri Lanka with respect to the fishing rights in the Bay. Fishermen from both sides were enjoying fishing with hormones for centuries. Katchchadeevu is a tiny Island located in the Bay, which was a part of India. After the Katchchadeevu agreement 1974 it became a part of Sri Lanka and a fishing conflict arose between the two countries' fishermen. Fuelling the dispute over Katchatheevu is the overfishing of Indian mechanized trawlers in Palk Bay and the damaging environmental and economic effects of trawling. Since 2008, more than 300 Indian fishermen have been killed by firing by Sri Lankan Navy, nearly 100 fishermen have gone missing and more than 3000 fishermen were arrested and later released after the trials for trespassing into Sri Lankan waters. Currently, more than 120 fishing boats and 29 fishermen are in Sri Lankan custody. This paper attempts to find out the causes of fishing conflict and who has the fishing rights in the mentioned waters, how the international treaties are complied with at the time of arrest and trials, how the arrested fishermen are treated by them and how they suffer from fishermen families without a breadwinner. A Semi-structured interview schedule tool was prepared by the researcher, which is suitable for measuring quantitative and qualitative aspects of the above-mentioned theme. One hundred arrested fishermen were interviewed and recorded their prison experiences in Sri Lanka. The research found that the majority of the fishermen believe that they have the right to fish in the historical water and that the Sri Lankan Naval personnel have brutally attacked the Indian fishermen at the time of the arrest. The majority of the fishermen accepted that they had limited fishing grounds. As a result, they entered Sri Lankan waters for their livelihood. The majority of the fishermen expected that they would also get their belongings back at the time of release, primarily the boats. Most of the arrested fishermen's families face financial crises in the absence of their breadwinners and this situation has created conditions for child labor among the affected families and some fishers migrate to different places for different occupations. The majority of the fishers have trauma about their victimization and face uncertainty in the future of their occupation. We can discuss more the causes and nature of the fishing conflict and the financial and psychological victimization of Indian fishermen in relation to the conflict.Keywords: palk bay, historical water, fishing conflict, arrested fishermen, victimization
Procedia PDF Downloads 794162 Rail-To-Rail Output Op-Amp Design with Negative Miller Capacitance Compensation
Authors: Muhaned Zaidi, Ian Grout, Abu Khari bin A’ain
Abstract:
In this paper, a two-stage op-amp design is considered using both Miller and negative Miller compensation techniques. The first op-amp design uses Miller compensation around the second amplification stage, whilst the second op-amp design uses negative Miller compensation around the first stage and Miller compensation around the second amplification stage. The aims of this work were to compare the gain and phase margins obtained using the different compensation techniques and identify the ability to choose either compensation technique based on a particular set of design requirements. The two op-amp designs created are based on the same two-stage rail-to-rail output CMOS op-amp architecture where the first stage of the op-amp consists of differential input and cascode circuits, and the second stage is a class AB amplifier. The op-amps have been designed using a 0.35mm CMOS fabrication process.Keywords: op-amp, rail-to-rail output, Miller compensation, Negative Miller capacitance
Procedia PDF Downloads 3374161 Design of Composite Joints from Carbon Fibre for Automotive Parts
Authors: G. Hemath Kumar, H. Mohit, K. Karthick
Abstract:
One of the most important issues in the composite technology is the repairing of parts of aircraft structures which is manufactured from composite materials. In such applications and also for joining various composite parts together, they are fastened together either using adhesives or mechanical fasteners. The tensile strength of these joints was carried out using Universal Testing Machine (UTM). A parametric study was also conducted to compare the performance of the hybrid joint with varying adherent thickness, adhesive thickness and overlap length. The composition of the material is combination of epoxy resin and carbon fibre under the method of reinforcement. To utilize the full potential of composite materials as structural elements, the strength and stress distribution of these joints must be understood. The study of tensile strength in the members involved under various design conditions and various joints were took place.Keywords: carbon fiber, FRP composite, MMC, automotive
Procedia PDF Downloads 4074160 Benchmarking Bert-Based Low-Resource Language: Case Uzbek NLP Models
Authors: Jamshid Qodirov, Sirojiddin Komolov, Ravilov Mirahmad, Olimjon Mirzayev
Abstract:
Nowadays, natural language processing tools play a crucial role in our daily lives, including various techniques with text processing. There are very advanced models in modern languages, such as English, Russian etc. But, in some languages, such as Uzbek, the NLP models have been developed recently. Thus, there are only a few NLP models in Uzbek language. Moreover, there is no such work that could show which Uzbek NLP model behaves in different situations and when to use them. This work tries to close this gap and compares the Uzbek NLP models existing as of the time this article was written. The authors try to compare the NLP models in two different scenarios: sentiment analysis and sentence similarity, which are the implementations of the two most common problems in the industry: classification and similarity. Another outcome from this work is two datasets for classification and sentence similarity in Uzbek language that we generated ourselves and can be useful in both industry and academia as well.Keywords: NLP, benchmak, bert, vectorization
Procedia PDF Downloads 524159 The Feasibility of Economic Science in Islam With an Emphasis on Sadr's Vantage Point
Authors: Yahya Jahangiri, Ali Almasi
Abstract:
Currently capitalism is one of the most important economic issues discussed by great scholars around the world. But Islamic approach, regarding this issue may differ both western and eastern views. A greatest scholar in Islamic economy ‘especially in Shia’ is Martyr Muhammad Baqir Al-Sadr. He wrote “Our economy” (Iqtisaduna) to present an economic point of view according to the Islamic teachings. In this regard firstly we will mention three approaches which are common in Muslim scullers about the economic science and then the main approach which is Sadr's view is described here. His claim explains that Islam and capitalism are in conflict with each other. And finally he explains the relationship between Islam and economy and he suggests the Islamic point of view in economy and its foundations as a solution for economic problems which we face today.Keywords: Islam, economic science, capitalism, Martyr Sadr
Procedia PDF Downloads 3254158 The Human Resources Management for the Temple in Northeastern Thailand
Authors: Routsukol Sunalai
Abstract:
This research purpose is to study and compare the administration of Buddhist monks at northeastern Thailand. The samples used in the study are the priest in the Northeast by simple random sampling for 190 sampling. The tools used in this study is questioner were created in the 40 question items. The statistics used for data analysis were percentage, average, and standard deviation. The research found that the human resources management for the Buddhist monks as a whole is moderate. But it was found that the highest average is the policy followed by the management information. The Buddhist monks aged less than 25 years old with the overall difference was not significant. The priests who are less than 10 years in the monk experience and the priest has long held in the position for 10 years are not different in the significant level.Keywords: employee job-related outcomes, ethical institutionalization, quality of work life, stock exchange of Thailand
Procedia PDF Downloads 2084157 Comparison of the Toxicity of Silver and Gold Nanoparticles in Murine Fibroblasts
Authors: Šárka Hradilová, Aleš Panáček, Radek Zbořil
Abstract:
Nanotechnologies are considered the most promising fields with high added value, brings new possibilities in various sectors from industry to medicine. With the growing of interest in nanomaterials and their applications, increasing nanoparticle production leads to increased exposure of people and environment with ‘human made’ nanoparticles. Nanoparticles (NPs) are clusters of atoms in the size range of 1–100 nm. Metal nanoparticles represent one of the most important and frequently used types of NPs due to their unique physical, chemical and biological properties, which significantly differ from those of bulk material. Biological properties including toxicity of metal nanoparticles are generally determined by their size, size distribution, shape, surface area, surface charge, surface chemistry, stability in the environment and ability to release metal ions. Therefore, the biological behavior of NPs and their possible adverse effect cannot be derived from the bulk form of material because nanoparticles show unique properties and interactions with biological systems just due to their nanodimensions. Silver and gold NPs are intensively studied and used. Both can be used for instance in surface enhanced Raman spectroscopy, a considerable number of applications of silver NPs is associated with antibacterial effects, while gold NPs are associated with cancer treatment and bio imaging. Antibacterial effects of silver ions are known for centuries. Silver ions and silver-based compounds are highly toxic to microorganisms. Toxic properties of silver NPs are intensively studied, but the mechanism of cytoxicity is not fully understood. While silver NPs are considered toxic, gold NPs are referred to as toxic but also innocuous for eukaryotic cells. Therefore, gold NPs are used in various biological applications without a risk of cell damaging, even when we want to suppress the growth of cancer cells. Thus, gold NPs are toxic or harmless. Because most studies comparing particles of various sizes prepared in various ways, and testing is performed on different cell lines, it is very difficult to generalize. The novelty and significance of our research is focused to the complex biological effects of silver and gold NPs prepared by the same method, have the same parameters and the same stabilizer. That is why we can compare the biological effects of pure nanometals themselves based on their chemical nature without the influence of other variable. Aim of our study therefore is to compare the cytotoxic effect of two types of noble metal NPs focusing on the mechanisms that contribute to cytotoxicity. The study was conducted on murine fibroblasts by selected common used tests. Each of these tests monitors the selected area related to toxicity and together provides a comprehensive view on the issue of interactions of nanoparticles and living cells.Keywords: cytotoxicity, gold nanoparticles, mechanism of cytotoxicity, silver nanoparticles
Procedia PDF Downloads 2534156 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment
Authors: Y. Xu, L. Xiong, Z. Xu
Abstract:
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing
Procedia PDF Downloads 4814155 Wireless Optic Last Mile Multi-Gbit/s Communication System
Authors: Manea Viorel, Puscoci Sorin, Stoichescu Dan Alexandru
Abstract:
Free Space Optics (FSO) is an optical telecommunication system that uses laser beam to transmit data at high bit rates via terrestrial atmosphere. This article describes a method to obtain higher bit rates, under unfavorable weather conditions using multiple optical beams, which carry information with low optical power. Optical link quality assessment is given by the attenuation on different weather conditions. The goal of this paper is to compare two transmission techniques: mono and multi beam, both affected by atmospheric attenuation, using OOK and L-PPM modulation. Link availability is evaluated using eye-diagram that provides information about the overall bit error rate of the system.Keywords: free space optics, wireless optic, laser communication, spatial diversity
Procedia PDF Downloads 5044154 Measurement of Acoustic Loss in Nano-Layered Coating Developed for Thermal Noise Reduction
Authors: E. Cesarini, M. Lorenzini, R. Cardarelli, S. Chao, E. Coccia, V. Fafone, Y. Minenkow, I. Nardecchia, I. M. Pinto, A. Rocchi, V. Sequino, C. Taranto
Abstract:
Structural relaxation processes in optical coatings represent a fundamental limit to the sensitivity of gravitational waves detectors, MEMS, optical metrology and entangled state experiments. To face this problem, many research lines are now active, in particular the characterization of new materials and novel solutions to be employed as coatings in future gravitational wave detectors. Nano-layered coating deposition is among the most promising techniques. We report on the measurement of acoustic loss of nm-layered composites (Ti2O/SiO2), performed with the GeNS nodal suspension, compared with sputtered λ/4 thin films nowadays employed.Keywords: mechanical measurement, nanomaterials, optical coating, thermal noise
Procedia PDF Downloads 4224153 Optimizing Coal Yard Management Using Discrete Event Simulation
Authors: Iqbal Felani
Abstract:
A Coal-Fired Power Plant has some integrated facilities to handle coal from three separated coal yards to eight units power plant’s bunker. But nowadays the facilities are not reliable enough for supporting the system. Management planned to invest some facilities to increase the reliability. They also had a plan to make single spesification of coal used all of the units, called Single Quality Coal (SQC). This simulation would compare before and after improvement with two scenarios i.e First In First Out (FIFO) and Last In First Out (LIFO). Some parameters like stay time, reorder point and safety stock is determined by the simulation. Discrete event simulation based software, Flexsim 5.0, is used to help the simulation. Based on the simulation, Single Quality Coal with FIFO scenario has the shortest staytime with 8.38 days.Keywords: Coal Yard Management, Discrete event simulation First In First Out, Last In First Out.
Procedia PDF Downloads 6694152 Towards the Development of Uncertainties Resilient Business Model for Driving the Solar Panel Industry in Nigeria Power Sector
Authors: Balarabe Z. Ahmad, Anne-Lorène Vernay
Abstract:
The emergence of electricity in Nigeria was dated back to 1896. The power plants have the potential to generate 12,522 MW of electric power. Whereas current dispatch is about 4,000 MW, access to electrification is about 60%, with consumption at 0.14 MWh/capita. The government embarked on energy reforms to mitigate energy poverty. The reform targeted the provision of electricity access to 75% of the population by 2020 and 90% by 2030. Growth of total electricity demand by a factor of 5 by 2035 had been projected. This means that Nigeria will require almost 530 TWh of electricity which can be delivered through generators with a capacity of 65 GW. Analogously, the geographical location of Nigeria has placed it in an advantageous position as the source of solar energy; the availability of a high sunshine belt is obvious in the country. The implication is that the far North, where energy poverty is high, equally has about twice the solar radiation as against southern Nigeria. Hence, the chance of generating solar electricity is 66% possible at 11850 x 103 GWh per year, which is one hundred times the current electricity consumption rate in the country. Harvesting these huge potentials may be a mirage if the entrepreneurs in the solar panel business are left with the conventional business models that are not uncertainty resilient. Currently, business entities in RE in Nigeria are uncertain of; accessing the national grid, purchasing potentials of cooperating organizations, currency fluctuation and interest rate increases. Uncertainties such as the security of projects and government policy are issues entrepreneurs must navigate to remain sustainable in the solar panel industry in Nigeria. The aim of this paper is to identify how entrepreneurial firms consider uncertainties in developing workable business models for commercializing solar energy projects in Nigeria. In an attempt to develop a novel business model, the paper investigated how entrepreneurial firms assess and navigate uncertainties. The roles of key stakeholders in helping entrepreneurs to manage uncertainties in the Nigeria RE sector were probed in the ongoing study. The study explored empirical uncertainties that are peculiar to RE entrepreneurs in Nigeria. A mixed-mode of research was embraced using qualitative data from face-to-face interviews conducted on the Solar Energy Entrepreneurs and the experts drawn from key stakeholders. Content analysis of the interview was done using Atlas. It is a nine qualitative tool. The result suggested that all stakeholders are required to synergize in developing an uncertainty resilient business model. It was opined that the RE entrepreneurs need modifications in the business recommendations encapsulated in the energy policy in Nigeria to strengthen their capability in delivering solar energy solutions to the yawning Nigerians.Keywords: uncertainties, entrepreneurial, business model, solar-panel
Procedia PDF Downloads 1474151 Contrasting The Water Consumption Estimation Methods
Authors: Etienne Alain Feukeu, L. W. Snyman
Abstract:
Water scarcity is becoming a real issue nowadays. Most countries in the world are facing it in their own way based on their own geographical coordinate and condition. Many countries are facing a challenge of a growing water demand as a result of not only an increased population, economic growth, but also as a pressure of the population dynamic and urbanization. In view to mitigate some of this related problem, an accurate method of water estimation and future prediction, forecast is essential to guarantee not only the sufficient quantity, but also a good water distribution and management system. Beside the fact that several works have been undertaken to address this concern, there is still a considerable disparity between different methods and standard used for water prediction and estimation. Hence this work contrast and compare two well-defined and established methods from two countries (USA and South Africa) to demonstrate the inconsistency when different method and standards are used interchangeably.Keywords: water scarcity, water estimation, water prediction, water forecast.
Procedia PDF Downloads 1994150 I, Me and the Bot: Forming a Theory of Symbolic Interactivity with a Chatbot
Authors: Felix Liedel
Abstract:
The rise of artificial intelligence has numerous and far-reaching consequences. In addition to the obvious consequences for entire professions, the increasing interaction with chatbots also has a wide range of social consequences and implications. We are already increasingly used to interacting with digital chatbots, be it in virtual consulting situations, creative development processes or even in building personal or intimate virtual relationships. A media-theoretical classification of these phenomena has so far been difficult, partly because the interactive element in the exchange with artificial intelligence has undeniable similarities to human-to-human communication but is not identical to it. The proposed study, therefore, aims to reformulate the concept of symbolic interaction in the tradition of George Herbert Mead as symbolic interactivity in communication with chatbots. In particular, Mead's socio-psychological considerations will be brought into dialog with the specific conditions of digital media, the special dispositive situation of chatbots and the characteristics of artificial intelligence. One example that illustrates this particular communication situation with chatbots is so-called consensus fiction: In face-to-face communication, we use symbols on the assumption that they will be interpreted in the same or a similar way by the other person. When briefing a chatbot, it quickly becomes clear that this is by no means the case: only the bot's response shows whether the initial request corresponds to the sender's actual intention. This makes it clear that chatbots do not just respond to requests. Rather, they function equally as projection surfaces for their communication partners but also as distillations of generalized social attitudes. The personalities of the chatbot avatars result, on the one hand, from the way we behave towards them and, on the other, from the content we have learned in advance. Similarly, we interpret the response behavior of the chatbots and make it the subject of our own actions with them. In conversation with the virtual chatbot, we enter into a dialog with ourselves but also with the content that the chatbot has previously learned. In our exchanges with chatbots, we, therefore, interpret socially influenced signs and behave towards them in an individual way according to the conditions that the medium deems acceptable. This leads to the emergence of situationally determined digital identities that are in exchange with the real self but are not identical to it: In conversation with digital chatbots, we bring our own impulses, which are brought into permanent negotiation with a generalized social attitude by the chatbot. This also leads to numerous media-ethical follow-up questions. The proposed approach is a continuation of my dissertation on moral decision-making in so-called interactive films. In this dissertation, I attempted to develop a concept of symbolic interactivity based on Mead. Current developments in artificial intelligence are now opening up new areas of application.Keywords: artificial intelligence, chatbot, media theory, symbolic interactivity
Procedia PDF Downloads 514149 Coherence and Cohesion in IELTS Academic Writing: Helping Students to Improve
Authors: Rory Patrick O'Kane
Abstract:
More universities and third level institutions now require at least an IELTS Band 6 for entry into courses of study for non-native speakers of English. This presentation focuses on IELTS Academic Writing Tasks 1 and 2 and in particular on the marking criterion of Coherence and Cohesion. A requirement for candidates aiming at Band 6 and above is that they produce answers which show a clear, overall progression of information and ideas and which use cohesive devices effectively. With this in mind, the presenter will examine what exactly is meant by coherence and cohesion and various strategies which can be used to assist students in improving their scores in this area. A number of classroom teaching ideas will be introduced, and participants will have the opportunity to compare and discuss sample answers written by candidates for this examination with a specific focus on coherence and cohesion. Intended audience: Teachers of IELTS Academic Writing.Keywords: coherence, cohesion, IELTS, strategies
Procedia PDF Downloads 2684148 Dinitrotoluene and Trinitrotoluene Measuring in Double-Base Solid Propellants
Authors: Z. H. Safari, M. Anbia, G. H. Kouzegari, R. Amirkhani
Abstract:
Toluene and Nitro derivatives are widely used in industry particularly in various defense applications. Tri-nitro-toluene derivative is a powerful basic explosive material that is a basis upon which to compare equivalent explosive power of similar materials. The aim of this paper is to measure the explosive power of these hazardous substances in fuels having different shelf-life and therefore optimizing their storage and maintenance. The methodology involves measuring the amounts of di- nitro- toluene and tri-nitro-toluene in the aged samples at 90 ° C by gas chromatography. Results show no significant difference in the concentration of the TNT compound over a given time while there was a significant difference in DNT compound over the same period. The underlying reason is attributed to the simultaneous production of the material with destruction of stabilizer.Keywords: dinitrotoluene, trinitrotoluene, double-base solid propellants, artificial aging
Procedia PDF Downloads 4014147 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods
Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López
Abstract:
This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.Keywords: Matlab, make up, recognition methods, web application
Procedia PDF Downloads 1434146 Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis
Authors: Carlos Huertas, Reyes Juarez-Ramirez
Abstract:
Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques.Keywords: biomarker discovery, cancer, feature selection, mass spectrometry
Procedia PDF Downloads 3364145 General Principles of Accident Prevention in Built Environment Rehabilitation
Authors: Alfredo Soeiro
Abstract:
Rehabilitation in construction or built environment is a particular type of operations when concerning prevention of accidents. In fact, it is also a different type of task in construction itself. Therefore, due to the complex characteristics of construction rehabilitation tasks and due to the intrinsic difficulty of preventing accidents in construction, a major challenge faces the responsibility for implementing adequate safety levels in this type of safety management. This paper addresses a set of proposed generic measures to face the unknown characteristics of built environment in terms of stability, materials and actual performance of buildings or other constructions. It is also addressed the necessary adaptation of preventive guidelines to this type of delicate refurbishing and renovating of existing facilities. Training, observation and reflective approaches are necessary to perform this safety management in the rehabilitation of built environment.Keywords: built environment, rehabilitation, construction safety, accident prevention, safety plan
Procedia PDF Downloads 2154144 Assessment of Treatment Methods to Remove Hazardous Dyes from Synthetic Wastewater
Authors: Abhiram Siva Prasad Pamula
Abstract:
Access to clean drinking water becomes scarce due to the increase in extreme weather events because of the rise in the average global temperatures and climate change. By 2030, approximately 47% of the world’s population will face water shortages due to uncertainty in seasonal rainfall. Over 10000 varieties of synthetic dyes are commercially available in the market and used by textile and paper industries, negatively impacting human health when ingested. Besides humans, textile dyes have a negative impact on aquatic ecosystems by increasing biological oxygen demand and chemical oxygen demand. This study assesses different treatment methods that remove dyes from textile wastewater while focusing on energy, economic, and engineering aspects of the treatment processes.Keywords: textile wastewater, dye removal, treatment methods, hazardous pollutants
Procedia PDF Downloads 924143 Efficient Bargaining versus Right to Manage in the Era of Liberalization
Authors: Panagiota Koliousi, Natasha Miaouli
Abstract:
We compare product and labour market liberalization under the two trade union bargaining models: the Right-to-Manage (RTM) model and the Efficient Bargaining (EB) model. The vehicle is a dynamic general equilibrium (DGE) model that incorporates two types of agents (capitalists and workers), imperfectly competitive product and labour markets. The model is solved numerically employing common parameter values and data from the euro area. A key message is that product market deregulation is favourable under any labour market structure while opting for labour market deregulation one should provide special attention to the structure of the labour market such as the bargaining system of unions. If the prevailing way of bargaining is the RTM model then restructuring both markets is beneficial for all agents.Keywords: market structure, structural reforms, trade unions, unemployment
Procedia PDF Downloads 1954142 Digital Literacy Transformation and Implications in Institutions of Higher Learning in Kenya
Authors: Emily Cherono Sawe, Elisha Ondieki Makori
Abstract:
Knowledge and digital economies have brought challenges and potential opportunities for universities to innovate and improve the quality of learning. Disruption technologies and information dynamics continue to transform and change the landscape in teaching, scholarship, and research activities across universities. Digital literacy is a fundamental and imperative element in higher education and training, as witnessed during the new norm. COVID-19 caused unprecedented disruption in universities, where teaching and learning depended on digital innovations and applications. Academic services and activities were provided online, including library information services. Information professionals were forced to adopt various digital platforms in order to provide information services to patrons. University libraries’ roles in fulfilling educational responsibilities continue to evolve in response to changes in pedagogy, technology, economy, society, policies, and strategies of parent institutions. Libraries are currently undergoing considerable transformational change as a result of the inclusion of a digital environment. Academic libraries have been at the forefront of providing online learning resources and online information services, as well as supporting students and staff to develop digital literacy skills via online courses, tutorials, and workshops. Digital literacy transformation and information staff are crucial elements reminiscent of the prioritization of skills and knowledge for lifelong learning. The purpose of this baseline research is to assess the implications of digital literacy transformation in institutions of higher learning in Kenya and share appropriate strategies to leverage and sustain teaching and research. Objectives include examining the leverage and preparedness of the digital literacy environment in streamlining learning in the universities, exploring and benchmarking imperative digital competence for information professionals, establishing the perception of information professionals towards digital literacy skills, and determining lessons, best practices, and strategies to accelerate digital literacy transformation for effective research and learning in the universities. The study will adopt a descriptive research design using questionnaires and document analysis as the instruments for data collection. The targeted population is librarians and information professionals, as well as academics in public and private universities teaching information literacy programmes. Data and information are to be collected through an online structured questionnaire and digital face-to-face interviews. Findings and results will provide promising lessons together with best practices and strategies to transform and change digital literacies in university libraries in Kenya.Keywords: digital literacy, digital innovations, information professionals, librarians, higher education, university libraries, digital information literacy
Procedia PDF Downloads 914141 The Effect of Family Controlling Ownership on Financing Policy
Authors: Vera Diyanty, Akhmad Syahroza
Abstract:
This research aims to describe an empirical evidence of the influence of family control on the company’s financing policy. Additionally, this research also shows the effect of leadership from family member and the effectiveness of the board of commissioners on companies’ financing policy. The result of this study found that family control through direct and indirect ownership mechanism have a positive impact on the choice of bank loan compare to public debt. Nevertheless, this research also shows that companies’ founders who become CEO and the effectiveness of board of commissioners do not prove to increase the alignment effect nor decrease the negative impact of entrenchment effect on the bank loan preference.Keywords: family controlling, family CEO, board effectiveness, financing policy
Procedia PDF Downloads 4554140 Debunking Sexual Myths in Bangladesh through an Intervention on the Internet
Authors: E. Rommes, Els Toonen, Rahil Roodsaz, Suborna Camellia, Farhana Alam, Saad Khan, Jhalok Ranjon Talukder, Tanveer Hassan, Syeda Farjana Ahmed, Sabina Faiz Rashid
Abstract:
In Bangladesh, a country in which adults (both parents and teachers) find it particularly hard to speak with youth about sexuality, adolescents seem to struggle with various insecurities about their sexual feelings, thoughts, behavior and physical characteristics. On the basis of a large number of interviews and focus groups with rural and urban Bangla adolescent girls and boys of lower and middle class as part of the large-scale three-year project ‘Breaking the Shame’, we have identified ten sexual themes or ‘myths’ that youth struggle with most. These encompass amongst others beliefs and insecurities on masturbation, discharge, same-sex behavior and feelings, the effects of watching porn and gender norms. We argue that the Internet is a particularly suitable medium to ‘debunk’ those myths, as youth can consult it anonymously and privately and so avoid social shame. Moreover, amongst the myths, we have identified two kinds which may need different debunking techniques. One kind of myth concerns scientifically uncontested, generally biological related information, such as the effects of having sex with a pregnant woman, questions on the effects of a penile or vaginal discharge or questions on the effects of masturbation. The second kind of myths concerns more diverse information sources and deals with e.g. religious or culturally specific norms, such as on the meaning and existence of homosexuality or gender appropriate norms of behavior in Bangladesh. For addressing both kinds of myths, expert information including a wealth of references to information resources needs to be provided, which the Internet is very suitable for. For the second kind of myths, adolescents also need to learn how to deal with sometimes conflicting norms and information sources, and they need to develop and reflect on their own opinions as part of their identity formation. On the basis of a literature review, we thus distinguish general information needs from identity formation needs, which includes the need to be able to relate information and opinions to one’s own opinions and situation. Hence, we argue that youth not only need abstract expert information to be able to debunk sexual myths, but also the option to discuss this information with other adolescents and compare their own situation and opinions with other peers, who in that way serve as ‘warm experts’ for each other. In this paper, we will describe the outcomes of our qualitative study above. In addition, we will present our findings of an intervention by presenting youth with general, uncontested information on the Internet with additional peer discussion options to compare the debunking effects on different kinds of myths.Keywords: peer discussion, intervention, sexual myths, shame
Procedia PDF Downloads 2134139 Computational Investigation of Gas-Solid Flow in High Pressure High Temperature Filter
Authors: M. H. Alhajeri, Hamad M. Alhajeri, A. H. Alenezi
Abstract:
This paper reports a Computational Fluid Dynamics (CFD) investigation for a high-temperature high-pressure filtration (ceramic candle filter). However, parallel flow to the filter is considered in this study. Different face (filtration) velocities are examined using the CFD code, FLUENT. Different sizes of particles are tracked through the domain to find the height at which the particles will impinge on the filter surface. Furthermore, particle distribution around the filter (or filter cake) is studied to design efficient cleaning mechanisms. Gravity effect to the particles with various inlet velocities and pressure drop are both considered. In the CFD study, it is found that the gravity influence should not be ignored if the particle sizes exceed 1 micron.Keywords: fluid flow, CFD, filtration, HTHP
Procedia PDF Downloads 2024138 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.Keywords: Belgium, counterterrorism strategies, human rights, immigration law
Procedia PDF Downloads 1054137 Effect of Natural Binder on Pang-Rum Hardness
Authors: Pattaranut Eakwaropas, Khemjira Jarmkom, Warachate Khobjai, Surachai Techaoei
Abstract:
The aim of this study is to improve Pang-Rum (PR) hardness by adding natural binders. PR is one of Thai tradition aroma products. In the past, it was used for aesthetic propose on face and body with good odor. Nowadays, PR is not popular and going to be disappeared. Five natural materials, i.e. agar, rice flour, glutinous flour, corn starch, and tapioca starch were selected to use as binders. Binders were dissolved with boiled water into concentration 5% and 10% w/w except agar that was prepared 0.5% and 1% w/w. PR with and without binder were formulated. Physical properties, i.e. weight, shape, color, and hardness were evaluated. PR with 10% of corn starch solution had suitable hardness (14.2±0.9 kg) and the best appearance. In the future, it would be planned to study about odor and physical stability for decorated product development.Keywords: aromatic water, hardness, natural binder, pang-rum
Procedia PDF Downloads 2894136 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19
Procedia PDF Downloads 67