Search results for: cloud adoption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1917

Search results for: cloud adoption

657 Effect of Tillage Techniques on the Performance of Kharif Rice Varieties

Authors: Mahua Banerjee, Debtanu Maiti

Abstract:

Zero-tillage cultivation is a farming practice that reduces costs while maintaining harvests and protecting the environment. Innovative partnerships among researchers, farmers, and other actors in the agricultural value chain have enabled the adoption of zero-tillage to sow rice in the Indo-Gangetic Plains, increasing farmers' incomes, fostering more sustainable use of soil and water, and providing a platform for cropping diversification and the introduction of other resource-conserving practices. A field experiment was conducted in the farmer’s field of Ausgram I Block, Burdwan, West Bengal, India under sandy loam soil with soil pH of 5.2, which is low in Nitrogen, medium in Phosphorus and Potassium. There were three techniques of tillage-T1: Zero tillage in Rice, T2: conventional tillage in Rice, T3: Rice grown with Drum seeder and three varieties namely V1: MTU 7029 V2-MTU 1010, V3: Pratikha thus making nine treatment combinations which were replicated thrice and the experiment was laid out in Factorial Randomised Block Design. Among the three varieties, rice variety MTU 7029 gave higher yield in all the tillage techniques. The highest yield was obtained under Zero tillage followed by conventional tillage. From economic analysis it was revealed that the benefit:cost ratio was higher in Zero tillage and rice cultivation by drum seeder. Zero-till is increasingly being adopted because it gives more yield at less cost, saves labour and farmer time. Farmers will be interested in this technology once they overcome their tillage biases.

Keywords: economics, Indo-Gangetic plain, rice, zero tillage, yield

Procedia PDF Downloads 372
656 Shape Management Method for Safety Evaluation of Bridge Based on Terrestrial Laser Scanning Using Least Squares

Authors: Gichun Cha, Dongwan Lee, Junkyeong Kim, Aoqi Zhang, Seunghee Park

Abstract:

All the world are studying the construction technology of double deck tunnel in order to respond to the increasing urban traffic demands and environmental changes. Advanced countries have the construction technology of the double deck tunnel structure. but the domestic country began research on it. Construction technologies are important. But Safety evaluation of structure is necessary to prevent possible accidents during construction. Thus, the double deck tunnel was required the shape management of middle slabs. The domestic country is preparing the construction of double deck tunnel for an alternate route and a pleasant urban environment. Shape management of double deck tunnel has been no research because it is a new attempted technology. The present, a similar study is bridge structure for the shape management. Bridge is implemented shape model using terrestrial laser scanning(TLS). Therefore, we proceed research on the bridge slabs because there is a similar structure of double deck tunnel. In the study, we develop shape management method of bridge slabs using TLS. We select the Test-bed for measurement site. This site is bridge located on Sungkyunkwan University Natural Sciences Campus. This bridge has a total length of 34m, the vertical height of 8.7m from the ground. It connects Engineering Building #1 and Engineering Building #2. Point cloud data for shape management is acquired the TLS and We utilized the Leica ScanStation C10/C5 model. We will confirm the Maximum displacement area of middle slabs using Least-Squares Fitting. We expect to raise stability for double deck tunnel through shape management for middle slabs.

Keywords: bridge slabs, least squares, safety evaluation, shape management method, terrestrial laser scanning

Procedia PDF Downloads 237
655 Competition in Petroleum Extraction and the Challenges of Climate Change

Authors: Saeid Rabiei Majd, Motahareh Alvandi, Bahareh Asefi

Abstract:

Extraction of maximum natural resources is one of the common policies of governments, especially petroleum resources that have high economic and strategic value. The incentive to access and maintain profitable oil markets for governments or international oil companies, causing neglects them to pay attention to environmental principles and sustainable development, which in turn drives up environmental and climate change. Significant damage to the environment can cause severe damage to citizens and indigenous people, such as the compulsory evacuation of their zone due to contamination of water and air resources, destruction of animals and plants. Hawizeh Marshes is a common aquatic and environmental ecosystem along the Iran-Iraq border that also has oil resources. This marsh has been very rich in animal, vegetative, and oil resources. Since 1990, the political motives, the strategic importance of oil extraction, and the disregard for the environmental rights of the Iraqi and Iranian governments in the region have caused 90% of the marshes and forced migration of indigenous people. In this paper, we examine the environmental degradation factors resulting from the adoption of policies and practices of governments in this region based on the principles of environmental rights and sustainable development. Revision of the implementation of the government’s policies and natural resource utilization systems can prevent the spread of climate change, which is a serious international challenge today.

Keywords: climate change, indigenous rights, petroleum operation, sustainable development principles, sovereignty on resources

Procedia PDF Downloads 106
654 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 52
653 The Reality of Ethical Finance in Algerian Commercial Banks: A Case Study of a Sample of Banking Agencies in Bordj Bou Arreridj and the Setif States

Authors: Asma Righi

Abstract:

After the global financial crisis of 2008, interest in ethical economics increased, particularly in the field of finance in general and commercial banks in particular. Indeed, it has become imperative for them to move from an institution that aims to make a profit to a community partner that takes the environmental aspect into account in its funding, rationalizes its decisions and adheres to ethics in its dealings. This leads it to the need of adopting the concept of ethical finance and standing on its most important principles and dimensions to realize profits on the one hand and to serve its society and its economy on the other hand. The objective of this research is centered on knowing the reality of the Algerian commercial banks’ adoption of the dimensions and principles of ethical finance. The quantitative methodology used is based on a questionnaire survey of twenty-four banking agencies in the states of Bordj Bou Arreridj and Setif. The data obtained were processed using the Statistical Package for the Social Sciences (SPSS) program. This research led to two main results: first, the author observed a limited application of the principles of ethical finance in commercial banks active in Algeria. This application is particularly in line with the implementation of the directives of the Central Bank and the imposed monetary policy. Second, the results showed that there is a significant difference in the application of ethical financial dimensions and principles between government and foreign banks.

Keywords: Algerian commercial banks, ethical banking, ethical finance, socially responsible investment

Procedia PDF Downloads 154
652 “It Takes a Community to Save a Child”: A Qualitative Analysis of Child Trafficking Interventions from Practitioner Perspectives

Authors: Crispin Rakibu Mbamba

Abstract:

Twenty-two years after the adoption of the United Nation Trafficking Protocol, evidence suggest that child trafficking continues to rise. Community level factors, like poverty which creates the conditions for children’s vulnerability is key to the rise in trafficking cases in Ghana. Albeit, growing evidence suggestthat despite the vulnerabilities, communities have the capacity to prevent and address child trafficking issues. This study contributes to this positive agenda by exploring the ways in which communities (and the key actors) in Ghana contribute to child trafficking interventions.The study objective is explored through in-depth interviews with practitioners (including social workers) from an organization working in trafficking hotspots in Ghana. Interviews wereanalyzed thematically with the help of HyperRESEARCH software. From the in-depth interviews, three themes were identified as the ways in which communities are involved in child trafficking interventions: 1) engagement of community leaders, 2) community-led anti-trafficking committees and 3) knowledge about trafficking. Albeit the cultural differences, evidence on the instrumental role of community chiefs and leaders provide important learning on how to harness trafficking intervention measures and ensure better child protection practices. Based on the findings, we recommend the need to intensify trafficking awareness campaigns in rural communities where education is lacking to contribute to United Nations (UN) promoting Just, Peaceful and Inclusive societies’ mandate.

Keywords: child trafficking, community interventions, knowledge on trafficking, human trafficking intervention

Procedia PDF Downloads 110
651 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 123
650 Review on Low Actuation Voltage RF Mems Switches

Authors: Hassan Saffari;, Reza Askari Moghadam

Abstract:

In modern communication systems, it is highly demanded to achieve high performance with minimal power consumption. Low actuation voltage RF MEMS (Micro-Electro-Mechanical Systems) switches represent a significant advancement in this regard. These switches, with their ability to operate at lower voltages, offer promising solutions for enhancing connectivity while minimizing energy consumption. Microelectromechanical switches are good alternatives for electronic and mechanical switches due to their low insertion loss, high isolation, and fast switching speeds. They have attracted more attention in recent years. Most of the presented RF MEMS switches use electrostatic actuators due to their low power consumption. Low actuation voltage RF MEMS switches are among the important issues that have been investigated in research articles. The actuation voltage can be reduced by different methods. One usually implemented method is low spring constant structures. However, despite their numerous benefits, challenges remain in the widespread adoption of low-actuation voltage RF MEMS switches. Issues related to reliability, durability, and manufacturing scalability need to be addressed to realize their full potential in commercial applications. While overcoming certain challenges, their exceptional performance characteristics and compatibility with miniaturized electronic systems make them a promising choice for next-generation wireless communication and RF applications. In this paper, some previous works that proposed low-voltage actuation RF MEMS switches are investigated and analyzed.

Keywords: RF MEMS switches, low actuation voltage, small spring constant structures, electrostatic actuation

Procedia PDF Downloads 39
649 AutoML: Comprehensive Review and Application to Engineering Datasets

Authors: Parsa Mahdavi, M. Amin Hariri-Ardebili

Abstract:

The development of accurate machine learning and deep learning models traditionally demands hands-on expertise and a solid background to fine-tune hyperparameters. With the continuous expansion of datasets in various scientific and engineering domains, researchers increasingly turn to machine learning methods to unveil hidden insights that may elude classic regression techniques. This surge in adoption raises concerns about the adequacy of the resultant meta-models and, consequently, the interpretation of the findings. In response to these challenges, automated machine learning (AutoML) emerges as a promising solution, aiming to construct machine learning models with minimal intervention or guidance from human experts. AutoML encompasses crucial stages such as data preparation, feature engineering, hyperparameter optimization, and neural architecture search. This paper provides a comprehensive overview of the principles underpinning AutoML, surveying several widely-used AutoML platforms. Additionally, the paper offers a glimpse into the application of AutoML on various engineering datasets. By comparing these results with those obtained through classical machine learning methods, the paper quantifies the uncertainties inherent in the application of a single ML model versus the holistic approach provided by AutoML. These examples showcase the efficacy of AutoML in extracting meaningful patterns and insights, emphasizing its potential to revolutionize the way we approach and analyze complex datasets.

Keywords: automated machine learning, uncertainty, engineering dataset, regression

Procedia PDF Downloads 55
648 Mobi Navi Tour for Rescue Operations

Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan

Abstract:

Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.

Keywords: android, gps, tour, communication, service

Procedia PDF Downloads 394
647 Adaptable Regulatory Oversight and Safety Awareness Regime: An Experience-Based Contribution Towards Sustainability in a Changing Railway Environment

Authors: Peaceman Sopazi, Mabila Mathebula, John Smallwood

Abstract:

Recent health and safety (H&S) concerns and their resultant impact on railway operations, namely, the severe acute respiratory syndrome (SARS) or collectively known as SARS-CoV-2 (Covid-19) pandemic and the Fourth Industrial Revolution (4IR), which have dominated public discourse, brought into question as to whether, or not, some aspects of how we have so far managed safety oversight as railway regulatory bodies and operators will remain relevant in a changing railway environment. Railway practitioners have generally found themselves between a proverbial rock and a hard place by being confronted by emerging challenges which have brought along great opportunities for sustainability. As witnesses and participants to the progressively introduced railway safety management, and transformation regimes, this paper attempts to share gathered field experience on adaptable regulatory oversight and safety awareness. The discourse is approached from a South African context but also with an informed perspective of what seems to work and what usually does not. The authors share their own multi and transdisciplinary experience coupled with insights they have gained as researchers of global trends in general safety management and specific aspects of railway safety management, for sustainability. In addition to sharing a largely experience-based methodology for survival, suggestions are offered for consideration as a way of keeping the railway safety management discourse alive as practitioners navigate a new path which is shrouded in a cloud of untold uncertainty. The authors further believe that the right timing for the implementation of the proposed suggestions in this paper will produce beneficial outcomes. Finally, the paper will identify areas that are still open for further investigation for and by researchers and practitioners alike.

Keywords: health & safety management, safety awareness, railway safety management, railway systems sustainability

Procedia PDF Downloads 168
646 Late Payment Issues Faced by Subcontractors in the Malaysian Construction Industry

Authors: Nur Emma Mustaffa, Hii Ping Ping

Abstract:

Late payment is a common issue in the construction industry and the subcontractors are not spared from it. This study has been carried out with the objectives to identify the implications of late payment issues toward the subcontractors and the strategies adopted by them to overcome the late payment issues. In terms of the strategies which can be adopted in overcoming the late payment, the subcontractors may suspend or slow down the construction process, making periodic follow up with the client, demand the rights to interest on late payment or the issuance of a promissory note by the client. The focus of the study is primarily on Grade 4 to Grade 7 contractors in Johor Bahru, Malaysia who carried out subcontracting works and registered under Construction Industry Development Board (CIDB). Employing survey as the main research method for data collection, the analysis would therefore mainly be adopting Likert Scale Analysis, Ranking Analysis and Frequency Distribution Analysis. This research showed the main implication of late payment issues towards subcontractors is created financial hardship to them. Besides, the most effective strategy adopted by the subcontractors to overcome the late payment issues is follow-up with client using formal procedure. From the findings, most of the subcontractors had low level of experiences and frequency in the adoption of Construction Industry Payment and Adjudication Act (CIPAA) 2012 to solve the payment disputes in the construction industry. In a nutshell, it is hoped that these findings will become guidance to the subcontractors to overcome the late payment issues in their future projects.

Keywords: subcontractors, implications, strategies, CIPAA 2012, payment

Procedia PDF Downloads 166
645 Exploring Inclusive Culture and Practice: The Perspectives of Macao Teachers in Informing Inclusive Teacher Education Programmes in Higher Education

Authors: Elisa Monteiro, Kiiko Ikegami

Abstract:

The inclusion of children with diverse learning needs and/or disabilities in regular classrooms has been identified as crucial to the provision of educational equity and quality for all students. In this, teachers play an essential role, as they have a strong impact on student attainment. Whilst the adoption of inclusive practice is increasing, with potential benefits for the teaching profession, there is also a rise in the level of its challenges in Macao as many more students with learning disabilities are now being included in general education classes. Consequently, there has been a significant focus on teacher professional development to ensure that teachers are adequately prepared to teach in inclusive classrooms that give access to diverse students. Major changes in teacher education will need to take place to include more inclusive education content and to equip teachers with the necessary skills in the area of inclusive practice. This paper draws on data from in-depth interviews with 20 teachers to examine teachers’ views of support, challenges, and barriers to inclusive practices at the school and classroom levels. Thematic analysis was utilised to determine major themes within the data. Several themes emerged and serve to illustrate the identified barriers and the potential value of effective teacher education. Suggestions for increased professional development opportunities for inclusive education specific to higher education institutions are presented and the implications for practice and teacher education are discussed.

Keywords: inclusion, inclusive practice, teacher education, higher education

Procedia PDF Downloads 75
644 3D Dentofacial Surgery Full Planning Procedures

Authors: Oliveira M., Gonçalves L., Francisco I., Caramelo F., Vale F., Sanz D., Domingues M., Lopes M., Moreia D., Lopes T., Santos T., Cardoso H.

Abstract:

The ARTHUR project consists of a platform that allows the virtual performance of maxillofacial surgeries, offering, in a photorealistic concept, the possibility for the patient to have an idea of the surgical changes before they are performed on their face. For this, the system brings together several image formats, dicoms and objs that, after loading, will generate the bone volume, soft tissues and hard tissues. The system also incorporates the patient's stereophotogrammetry, in addition to their data and clinical history. After loading and inserting data, the clinician can virtually perform the surgical operation and present the final result to the patient, generating a new facial surface that contemplates the changes made in the bone and tissues of the maxillary area. This tool acts in different situations that require facial reconstruction, however this project focuses specifically on two types of use cases: bone congenital disfigurement and acquired disfiguration such as oral cancer with bone attainment. Being developed a cloud based solution, with mobile support, the tool aims to reduce the decision time window of patient. Because the current simulations are not realistic or, if realistic, need time due to the need of building plaster models, patient rates on decision, rely on a long time window (1,2 months), because they don’t identify themselves with the presented surgical outcome. On the other hand, this planning was performed time based on average estimated values of the position of the maxilla and mandible. The team was based on averages of the facial measurements of the population, without specifying racial variability, so the proposed solution was not adjusted to the real individual physiognomic needs.

Keywords: 3D computing, image processing, image registry, image reconstruction

Procedia PDF Downloads 198
643 Upward Millennium: Enterprise Resource Planning (ERP) Development and Implementation in Pakistani Organizations

Authors: Sara Aziz, Madiha Arooj, Hira Rizwani, Wasim Irshad

Abstract:

Enterprise Resource Planning (ER) as component of Information Resource System has turned up as one of the most demanding software in market for the new millennium. ERP system automates the core activities of any organization such as finance, manufacturing and supply chain management, human resource etc. to generate an access to the information in real time environment. Despite this fact many of the organizations globally particularly in developing country Pakistan are unaware and avoid adopting it. The development and implementation of ERP system is a complex and challenging process. This research was aimed to explore the benefits and coping strategies (with reference to end user reaction) of organizations those have implemented ERP. The problems addressed in this study focused the challenges and key success factors regarding implementing ERP Pakistani Organizations. Secondly, it has explored the stumbling blocks and business integration of those organizations that are not implementing ERP. The public and corporate sector organizations in Pakistan were selected to collect the data. The research finding shows that the organizational culture, openness towards adoption and learning, deployment and development, top management commitment and change systems, business processes and compatibility and user acceptance and reaction are contributing factors for successful implementation and development of ERP system. This research is thus an addition to enhance knowledge and understanding of implementation of ERP system in Pakistan.

Keywords: ERP system, user acceptance and involvement, change management, organizational culture

Procedia PDF Downloads 267
642 A Study on the Korean Connected Industrial Parks Smart Logistics It Financial Enterprise Architecture

Authors: Ilgoun Kim, Jongpil Jeong

Abstract:

Recently, a connected industrial parks (CIPs) architecture using new technologies such as RFID, cloud computing, CPS, Big Data, 5G 5G, IIOT, VR-AR, and ventral AI algorithms based on IoT has been proposed. This researcher noted the vehicle junction problem (VJP) as a more specific detail of the CIPs architectural models. The VJP noted by this researcher includes 'efficient AI physical connection challenges for vehicles' through ventilation, 'financial and financial issues with complex vehicle physical connections,' and 'welfare and working conditions of the performing personnel involved in complex vehicle physical connections.' In this paper, we propose a public solution architecture for the 'electronic financial problem of complex vehicle physical connections' as a detailed task during the vehicle junction problem (VJP). The researcher sought solutions to businesses, consumers, and Korean social problems through technological advancement. We studied how the beneficiaries of technological development can benefit from technological development with many consumers in Korean society and many small and small Korean company managers, not some specific companies. In order to more specifically implement the connected industrial parks (CIPs) architecture using the new technology, we noted the vehicle junction problem (VJP) within the smart factory industrial complex and noted the process of achieving the vehicle junction problem performance among several electronic processes. This researcher proposes a more detailed, integrated public finance enterprise architecture among the overall CIPs architectures. The main details of the public integrated financial enterprise architecture were largely organized into four main categories: 'business', 'data', 'technique', and 'finance'.

Keywords: enterprise architecture, IT Finance, smart logistics, CIPs

Procedia PDF Downloads 158
641 System-Wide Impact of Energy Efficiency in the Industry Sector: A Comparative Study between Canada and Denmark

Authors: M. Baldini, H. K. Jacobsen, M. Jaccard

Abstract:

In light of the international efforts to comply with the Paris agreement and emission targets for future energy systems, Denmark and Canada are among the front-runner countries dealing with climate change. The experiences in the energy sector have seen both countries coping with trade-offs between investments in renewable energy technologies and energy efficiency, thus tackling the climate issue from the supply and demand side respectively. On the demand side, the industrial sector is going through a remarkable transformation, with implementation of energy efficiency measures, change of input fuel for end-use processes and forecasted electrification as main features under the spotlight. By looking at Canada and Denmark's experiences as pathfinders on the demand and supply approach to climate change, it is possible to obtain valuable experience that may be applied to other countries aiming at the same goal. This paper presents a comparative study on industrial energy efficiency between Canada and Denmark. The study focuses on technologies and system options, policy design and implementation and modelling methodologies when implementing industrial energy savings in optimization models in comparison to simulation models. The study identifies gaps and junctures in the approach towards climate change actions and, learning from each other, lessen the differences to further foster the adoption of energy efficiency measurements in the industrial sector, aiming at reducing energy consumption and, consequently, CO₂ emissions.

Keywords: industrial energy efficiency, comparative study, CO₂ reduction, energy system modelling

Procedia PDF Downloads 167
640 Artificial Intelligence-Based Thermal Management of Battery System for Electric Vehicles

Authors: Raghunandan Gurumurthy, Aricson Pereira, Sandeep Patil

Abstract:

The escalating adoption of electric vehicles (EVs) across the globe has underscored the critical importance of advancing battery system technologies. This has catalyzed a shift towards the design and development of battery systems that not only exhibit higher energy efficiency but also boast enhanced thermal performance and sophisticated multi-material enclosures. A significant leap in this domain has been the incorporation of simulation-based design optimization for battery packs and Battery Management Systems (BMS), a move further enriched by integrating artificial intelligence/machine learning (AI/ML) approaches. These strategies are pivotal in refining the design, manufacturing, and operational processes for electric vehicles and energy storage systems. By leveraging AI/ML, stakeholders can now predict battery performance metrics—such as State of Health, State of Charge, and State of Power—with unprecedented accuracy. Furthermore, as Li-ion batteries (LIBs) become more prevalent in urban settings, the imperative for bolstering thermal and fire resilience has intensified. This has propelled Battery Thermal Management Systems (BTMs) to the forefront of energy storage research, highlighting the role of machine learning and AI not just as tools for enhanced safety management through accurate temperature forecasts and diagnostics but also as indispensable allies in the early detection and warning of potential battery fires.

Keywords: electric vehicles, battery thermal management, industrial engineering, machine learning, artificial intelligence, manufacturing

Procedia PDF Downloads 81
639 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 101
638 A Cloud-Based Mobile Auditing Tools for Muslim-Friendly Hospitality Services

Authors: Mohd Iskandar Illyas Tan, Zuhra Junaida Mohamad Husny, Farawahida Mohd Yusof

Abstract:

The potentials of Muslim-friendly hospitality services bring huge opportunities to operators (hoteliers, tourist guides, and travel agents), especially among the Muslim countries. In order to provide guidelines that facilitate the operations among these operators, standards and manuals have been developing by the authorities. Among the challenges is the applicability and complexity of the standard to be adopted in the real world. Mobile digital technology can be implemented to overcome those challenges. A prototype has been developed to help operators and authorities to assess their readiness in complying with MS2610:2015. This study analyzes the of mobile digital technology characteristics that are suitable for the user in conducting sharia’ compliant hospitality audit. A focus group study was conducted in the state of Penang, Malaysia that involves operators (hoteliers, tourist guide, and travel agents) as well as agencies (Islamic Tourism Center, Penang Islamic Affairs Department, Malaysian Standard) that involved directly in the implementation of the certification. Both groups were given the 3 weeks to test and provide feedback on the usability of the mobile applications in order to conduct an audit on their readiness towards the Muslim-friendly hospitality services standard developed by the Malaysian Standard. The feedbacks were analyzed and the overall results show that three criteria (ease of use, completeness and fast to complete) show the highest responses among both groups for the mobile application. This study provides the evidence that the mobile application development has huge potentials to be implemented by the Muslim-friendly hospitality services operator and agencies.

Keywords: hospitality, innovation, audit, compliance, mobile application

Procedia PDF Downloads 128
637 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 545
636 A Socio-Cultural Approach to Implementing Inclusive Education in South Africa

Authors: Louis Botha

Abstract:

Since the presentation of South Africa’s inclusive education strategy in Education White Paper 6 in 2001, very little has been accomplished in terms of its implementation. The failure to achieve the goals set by this policy document is related to teachers lacking confidence and knowledge about how to enact inclusive education, as well as challenges of inflexible curricula, limited resources in overcrowded classrooms, and so forth. This paper presents a socio-cultural approach to addressing these challenges of implementing inclusive education in the South African context. It takes its departure from the view that inclusive education has been adequately theorized and conceptualized in terms of its philosophical and ethical principles, especially in South African policy and debates. What is missing, however, are carefully theorized, practically implementable research interventions which can address the concerns mentioned above. Drawing on socio-cultural principles of learning and development and on cultural-historical activity theory (CHAT) in particular, this paper argues for the use of formative interventions which introduce appropriately constructed mediational artifacts that have the potential to initiate inclusive practices and pedagogies within South African schools and classrooms. It makes use of Vygotsky’s concept of double stimulation to show how the proposed artifacts could instigate forms of transformative agency which promote the adoption of inclusive cultures of learning and teaching.

Keywords: cultural-historical activity theory, double stimulation, formative interventions, transformative agency

Procedia PDF Downloads 226
635 Teaching Buddhist Meditation: An Investigation into Self-Learning Methods

Authors: Petcharat Lovichakorntikul, John Walsh

Abstract:

Meditation is in the process of becoming a globalized practice and its benefits have been widely acknowledged. The first wave of internationalized meditation techniques and practices was represented by Chan and Zen Buddhism and a new wave of practice has arisen in Thailand as part of the Phra Dhammakaya temple movement. This form of meditation is intended to be simple and straightforward so that it can easily be taught to people unfamiliar with the basic procedures and philosophy. This has made Phra Dhammakaya an important means of outreach to the international community. One notable aspect is to encourage adults to become like children to perform it – that is, to return to a naïve state prior to the adoption of ideology as a means of understanding the world. It is said that the Lord Buddha achieved the point of awakening at the age of seven and Phra Dhammakaya has a program to teach meditation to both children and adults. This brings about the research question of how practitioners respond to the practice of meditation and how should they be taught? If a careful understanding of how children behave can be achieved, then it will help in teaching adults how to become like children (albeit idealized children) in their approach to meditation. This paper reports on action research in this regard. Personal interviews and focus groups are held with a view to understanding self-learning methods with respect to Buddhist meditation and understanding and appreciation of the practices involved. The findings are considered in the context of existing knowledge about different learning techniques among people of different ages. The implications for pedagogical practice are discussed and learning methods are outlined.

Keywords: Buddhist meditation, Dhammakaya, meditation technique, pedagogy, self-learning

Procedia PDF Downloads 475
634 Wearable Heart Rate Sensor Based on Wireless System for Heart Health Monitoring

Authors: Murtadha Kareem, Oliver Faust

Abstract:

Wearable biosensor systems can be designed and developed for health monitoring. There is much interest in both scientific and industrial communities established since 2007. Fundamentally, the cost of healthcare has increased dramatically and the world population is aging. That creates the need to harvest technological improvements with small bio-sensing devices, wireless-communication, microelectronics and smart textiles, that leads to non-stop developments of wearable sensor based systems. There has been a significant demand to monitor patient's health status while the patient leaves the hospital in his/her personal environment. To address this need, there are numerous system prototypes which has been launched in the medical market recently, the aim of that is to provide real time information feedback about patient's health status, either to the patient himself/herself or direct to the supervising medical centre station, while being capable to give a notification for the patient in case of possible imminent health threatening conditions. Furthermore, wearable health monitoring systems comprise new techniques to address the problem of managing and monitoring chronic heart diseases for elderly people. Wearable sensor systems for health monitoring include various types of miniature sensors, either wearable or implantable. To be specific, our proposed system able to measure essential physiological parameter, such as heart rate signal which could be transmitted through Bluetooth to the cloud server in order to store, process, analysis and visualise the data acquisition. The acquired measurements are connected through internet of things to a central node, for instance an android smart phone or tablet used for visualising the collected information on application or transmit it to a medical centre.

Keywords: Wearable sensor, Heart rate, Internet of things, Chronic heart disease

Procedia PDF Downloads 158
633 The Impact of Sustainable Farm Management on Paddy Farmers’ Livelihood: The Case of Malaysia

Authors: Roslina Kamaruddin

Abstract:

The paddy farmer’s performance and ability to improve productivity for increased incomes is driven by their level of farm management practices. Knowledge on the nature and level of sustainable farm management (SFM) practice provides opportunities for supporting the competitive advantages of paddy farmers to sustainably break away from the poverty cycle. Little attention has been given to measuring the performance and impact of SFM for the improvement of paddy farmer's livelihood in Malaysia. Without understanding SFM, it is difficult to make policies and provide targeted, impactful support to paddy farmers. The objective of this study is to assess the level of SFM among paddy farmers by calculating the Sustainable Farm Management Index (SFMI) using the Rice Check (RC) guideline established by the Department of Agriculture. The structured questionnaire was designed to capture the nine elements of farming practices based on the RC and was then distributed to 788 paddy farmers in Malaysia's main granary areas, namely MADA, KADA, and BLS. Each practice was given a score to determine whether the guidelines were followed. The index ranges from 0 to 100, with 0 being unsustainable and 100 being highly sustainable. A multiple regression analysis was employed as well to estimate the effects of SFM adoption on farmer livelihoods. The findings show that adopting SFM has a positive and significant effect on farmers' livelihoods. The paper, therefore, recommends that farmers should be educated on the importance of sustainable farming practices as this is essential for the sustainable livelihood development of poor farmers who rely on government subsidies.

Keywords: sustainable farm management, paddy farming, rice check, granary areas, farmers livelihood

Procedia PDF Downloads 90
632 Reducing Friction Associated with Commercial Use of Biomimetics While Increasing the Potential for Using Eco Materials and Design in Industry

Authors: John P. Ulhøi

Abstract:

Firms are faced with pressure to stay innovative and entrepreneurial while at the same time leaving lighter ecological footprints. Traditionally inspiration for new product development (NPD) has come from the creative in-house staff and from the marketplace. Often NPD offered by this approach has proven to be (far from) optimal for its purpose or highly (resource and energy) efficient. More recently, a bio-inspired NPD approach has surfaced under the banner of biomimetics. Biomimetics refers to inspiration from and translations of designs, systems, processes, and or specific properties that exist in nature. The principles and structures working in nature have evolved over a long period of time enable them to be optimized for the purpose and resource and energy-efficient. These characteristics reflect the raison d'être behind the field of biomimetics. While biological expertise is required to understand and explain such natural and biological principles and structures, engineers are needed to translate biological design and processes into synthetic applications. It can, therefore, hardly be surprising, biomimetics long has gained a solid foothold in both biology and engineering. The commercial adoption of biomimetic applications in new production development (NDP) in industry, however, does not quite reflect a similar growth. Differently put, this situation suggests that something is missing in the biomimetic-NPD-equation, thus acting as a brake towards the wider commercial application of biomimetics and thus the use of eco-materials and design in the industry. This paper closes some of that gap. Before concluding, avenues for future research and implications for practice will be briefly sketched out.

Keywords: biomimetics, eco-materials, NPD, commercialization

Procedia PDF Downloads 154
631 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 370
630 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 29
629 Gnss Aided Photogrammetry for Digital Mapping

Authors: Muhammad Usman Akram

Abstract:

This research work based on GNSS-Aided Photogrammetry for Digital Mapping. It focuses on topographic survey of an area or site which is to be used in future Planning & development (P&D) or can be used for further, examination, exploration, research and inspection. Survey and Mapping in hard-to-access and hazardous areas are very difficult by using traditional techniques and methodologies; as well it is time consuming, labor intensive and has less precision with limited data. In comparison with the advance techniques it is saving with less manpower and provides more precise output with a wide variety of multiple data sets. In this experimentation, Aerial Photogrammetry technique is used where an UAV flies over an area and captures geocoded images and makes a Three-Dimensional Model (3-D Model), UAV operates on a user specified path or area with various parameters; Flight altitude, Ground sampling distance (GSD), Image overlapping, Camera angle etc. For ground controlling, a network of points on the ground would be observed as a Ground Control point (GCP) using Differential Global Positioning System (DGPS) in PPK or RTK mode. Furthermore, that raw data collected by UAV and DGPS will be processed in various Digital image processing programs and Computer Aided Design software. From which as an output we obtain Points Dense Cloud, Digital Elevation Model (DEM) and Ortho-photo. The imagery is converted into geospatial data by digitizing over Ortho-photo, DEM is further converted into Digital Terrain Model (DTM) for contour generation or digital surface. As a result, we get Digital Map of area to be surveyed. In conclusion, we compared processed data with exact measurements taken on site. The error will be accepted if the amount of error is not breached from survey accuracy limits set by concerned institutions.

Keywords: photogrammetry, post processing kinematics, real time kinematics, manual data inquiry

Procedia PDF Downloads 13
628 Investigation of Different Machine Learning Algorithms in Large-Scale Land Cover Mapping within the Google Earth Engine

Authors: Amin Naboureh, Ainong Li, Jinhu Bian, Guangbin Lei, Hamid Ebrahimy

Abstract:

Large-scale land cover mapping has become a new challenge in land change and remote sensing field because of involving a big volume of data. Moreover, selecting the right classification method, especially when there are different types of landscapes in the study area is quite difficult. This paper is an attempt to compare the performance of different machine learning (ML) algorithms for generating a land cover map of the China-Central Asia–West Asia Corridor that is considered as one of the main parts of the Belt and Road Initiative project (BRI). The cloud-based Google Earth Engine (GEE) platform was used for generating a land cover map for the study area from Landsat-8 images (2017) by applying three frequently used ML algorithms including random forest (RF), support vector machine (SVM), and artificial neural network (ANN). The selected ML algorithms (RF, SVM, and ANN) were trained and tested using reference data obtained from MODIS yearly land cover product and very high-resolution satellite images. The finding of the study illustrated that among three frequently used ML algorithms, RF with 91% overall accuracy had the best result in producing a land cover map for the China-Central Asia–West Asia Corridor whereas ANN showed the worst result with 85% overall accuracy. The great performance of the GEE in applying different ML algorithms and handling huge volume of remotely sensed data in the present study showed that it could also help the researchers to generate reliable long-term land cover change maps. The finding of this research has great importance for decision-makers and BRI’s authorities in strategic land use planning.

Keywords: land cover, google earth engine, machine learning, remote sensing

Procedia PDF Downloads 110